Computer Fundamentals
Computer Fundamentals
SUCCESS
COMPUTER FUNDAMENTALS
BOOST YOUR KNOWLEDGE
8 + S
2 1 ON
3 T I RS
1 S E
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.
NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:
NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.
nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:
NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents
1 Introduction to Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Computer Systems and Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Computer Generations and Classification . . . . . . . . . . . . . . . . . . . . . . . . 35
1.3 Computer Performance and Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.4 Computer Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
1.5 Definition and Classification of Computers . . . . . . . . . . . . . . . . . . . . . . . 74
1.6 Characteristics of Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
1.7 Components of a Computer System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
1.8 Computer Architecture and Organization . . . . . . . . . . . . . . . . . . . . . . . . 94
NARAYAN CHANGDER
5.3 Utility Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
5.4 System Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
5.5 Application Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
5.6 Programming Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
NARAYAN CHANGDER
1.1 Computer Systems and Components
1. is nonvolitile and refers to memory A. recipe
chips storing permanent data and instruc- B. algorithm
tions.
C. program
A. RAM
D. specifications
B. read-only memory (ROM)
C. flash memory 5. Name the software that you use for view-
ing web pages
D. firmware
A. Presentation
2. It is an integrated circuit board that pro- B. Web browser
vides a computer with the ability to pro-
C. Desktop publisher
duce sounds.
D. Communications Software
A. Sound Card
B. Motherboard 6. How many bits in a byte?
C. Read-Only Memory (ROM) A. 8
D. Video Card B. 14
C. 72
3. Users to communicate with the computer
(windows) D. 16
A. Compiler 7. Which of these is not a computer system?
B. Operating System A. PlayStation 5
C. Utilities B. iPhone 12
D. Linkers C. Washing Machine
1. B 2. A 3. B 4. B 5. B 6. A 7. E
1.1 Computer Systems and Components 3
8. The main circuit board in a computer is 13. Which of the following is known as the
called the ‘BRAIN’ of a computer?
10. The moment you turn on your computer it 15. What is Hardware
begins to access its memory. BIOS, the A. Neutral components
software that boosts up your computer, is
located in which type of memory? B. hypertext markup language protocol
C. Hydrochloric acids that make up the
A. ROM
computer system
B. Virtual memory
D. Physical Components
C. CACHE
16. Which part of computer hardware is used
D. RAM to type in information into the computer?
11. What type of CPUs are x64 operating A. Monitor
systems and software primarily designed B. Mouse
for?
C. Laptop
A. x43
D. Keyboard
B. x32
17. The memory comes with your computer
C. x86 that is pre-written to hold the instructions
D. x64 for booting-up the computer is ROM
A. True
12. It is type of software that is designed to
perform specific task that includes word B. False
processing and web browser. C. Neither
A. Peopleware D. none of above
B. Malware 18. Which is the best User Interface
C. Application Software A. CLI
D. System Software B. GUI
C. WIMP C. Peopleware
D. It is Subjective D. Malware
19. A worldwide system of computer 24. A device that allows you to type informa-
networks-a network of networks in which tion and instructions into the computer
users at any one computer can, if they
have permission, get information from A. computer
any other computer (and sometimes talk B. keyboard
NARAYAN CHANGDER
directly to users at other computers).
C. mouse
A. Internet
D. headphones
B. Twitter
C. Amazon 25. Cray an IBM z-enterprise are named ex-
amples of which major types of computer
D. Google systems?
20. In order to connect your computer to the In- A. desktop and mainframe
ternet with a modem, your computer will
B. mainframe and supercomputer
have to have a(n) port
A. HDMI C. supercomputer and mainframe
19. A 20. D 21. A 22. A 23. C 24. B 25. C 26. A 27. A 28. B 29. D
1.1 Computer Systems and Components 5
39. An internal computer expansion card that level, allowing the computer to function
facilitates the input and output of audio and the software to run.
signals. B. Electronic component, device in an
A. Video Cards electronic system used to affect electrons,
B. Memory usually industrial products.
NARAYAN CHANGDER
40. A printed circuit board found in all comput- 45. This device enables a computer to trans-
ers mit data (such as over cable or telephone
lines)
A. Video Card
A. Processor
B. Rom
B. Monitor
C. Motherboard
C. Modem
D. Ram
D. RAM
41. Notebooks and tablets are examples of
which major type of computer system? 46. Which type of network cable is commonly
used in backbone networks and telephone
A. desktop
companies?
B. embedded device
A. CAT
C. game consoles
B. Fiber Optic
D. mobile devices
C. Coaxial
42. Routers can be used on networks for de- D. RJ11
vices to
47. One megabyte is equal to kilobytes,
A. to be totally dependent without net-
works A. 10
B. to be independent of each other B. 100
C. to join the same network C. 1, 000
D. to function solely on first-come, first D. 1, 000, 000
serve
48. Which of the following are famous com-
43. Which of the following is a type of monitor puter component brands?
port? A. Ford, Porsche, Nissan
A. VGA port B. Kingston, Intel, Samsung
B. DisplayPort C. Pearson, AQA, WJEC
C. HDMI port D. Kings, GESS, DC
D. All of the above
49. It is commonly known as programs or ap-
44. operating system plications, consists of all instructions that
A. communicates with hardware and tell the hardware how to perform a task.
other installed software on the most basic A. Hardware
39. D 40. C 41. D 42. C 43. D 44. A 45. C 46. B 47. C 48. B 49. B
1.1 Computer Systems and Components 7
B. System Integration 56. the fan and heat sink are needed by the
C. System Specification CPU and other hot parts of the computer
so they don’t burn out, what do we call
D. System Settings this system
51. Which of the following statements are A. graphics card or video card
true about RAM? B. sound
A. It comes in smaller sizes compared to C. heat dispersal
Hard Disk Drive.
D. storage device
B. It gives CPU quick access to the data
that CPU needs for processing. E. optical drive
C. It keeps and stored all data. 57. How is the CPU’s speed measured?
D. It can keep data only temporarily. A. MIPS
A. Supercomputer C. MSPI
50. C 51. A 51. B 51. D 52. C 53. C 54. C 55. C 56. C 57. A 58. B 59. A
60. C 61. B
1.1 Computer Systems and Components 8
60. Which of the following is a purpose-built 66. It is a report that is normally accomplished
computer system? as soon as the tests are completed.
A. Laptop A. Components Report
B. Smartphone B. Checking System Report
C. Washing Machine C. Checking report
D. Desktop PC D. Technical report
NARAYAN CHANGDER
61. The 2 types of Software are: 67. Which of the following (there can be more
A. Operating System than one) are true regarding Operating
Systems?
B. System
A. OpS stands for Operating Systems
C. Business
B. The Operating System manages the
D. Application computer’s memory and processes, as
62. The physical part of the computer that you well as all of its software and hardware.
can actually touch, C. The Operating System allows you to
A. hardware communicate with the computer without
having to speak the computer’s language.
B. software
D. Without an Operating System, a com-
C. Input puter is useless.
D. Output
68. what is file management
63. Temporary storage device for data and A. is a computer program that provides
programs that are being accessed by the a user interface to manage files and fold-
CPU. ers.
A. Read-Only Memory B. provides files and help creates plan
B. Memory Card C. it provide user information
C. Random Access Memory D. all of the above
D. Hard Disk Drive
69. It is type of software that manages other
64. Restively new internet-enabled portable software and device inside the computer.
computers. A. Peopleware
A. Tablets B. Malware
B. Smartphones C. Application Software
C. Smartwatches D. System Software
D. Personal Computer(PC)
70. Which of the following is an example of
65. How many Megabytes are in 1 Gigabyte ‘main memory’.
A. 1 A. Hard Drive
B. 132 B. USB Drive
C. 1000 C. RAM
D. 1024 D. ROM
61. D 62. A 63. C 64. A 65. C 66. D 67. B 67. C 67. D 68. A 69. D 70. C 71. A
1.1 Computer Systems and Components 9
71. Which one of these is commonly used to 76. Which of the following are examples of a
measure storage capacity secondary storage device? Tick all the cor-
rect options.
D. ALL ARE IMPORTANT! 79. Early drive controller interface that con-
nects hard disk drives and CD/DVD drives.
74. A mobile app is a(n) developed specifi- A. SATA
cally for use on small, wireless computing
devices, such as smartphones and tablets, B. USB
rather than desktop or laptop computers. C. IDE
A. Application Software D. FDD
B. Device Software 80. Which of the following devices is an exam-
C. Hardware ple of an input device?
D. none of above A. Monitor
B. Camera
75. Which of the following is a general pur-
pose computer system? C. Speakers
D. Projector
A. Microwave
B. Traffic Lights 81. Which of the following refers to an envi-
ronment of servers that house and provide
C. Dishwasher
access to resources users access via the in-
D. Apple iPad ternet?
72. A 73. D 74. A 75. D 76. A 76. C 76. D 77. A 78. C 78. D 79. C 80. B 81. A
1.1 Computer Systems and Components 10
NARAYAN CHANGDER
equivalents as well.
A. Personal Diagram Assistant
A. Processor
B. Personal Data Account
B. Modem
C. Personal Digital Assistant
C. Motherboard
D. Personal Digital Accountant
D. Optical drive
89. It is a printed circuit board found in all com-
83. Stores the data, operating system, images,
puters.
music, documents, files etc. on the com-
puter. A. Motherboard
A. Modem B. Random Access Memory (RAM)
B. Processor C. Read-Only Memory (ROM)
C. Motherboard D. Video Card
D. Hard drive 90. Which Windows tool is used to determine
84. The CPU is attached to the inside the if a dynamic disk is corrupted?
computer A. Disk Management
A. RAM B. Device Manager
B. Motherboard C. Microsoft System Preparation
C. Hard Drive D. Bootmgr
D. Secondary Storage Device 91. When 8 bits are grouped together as a
85. When repairing an application, which is unit, how many individual characters can
less common? these 8 bits represent?
A. Resetting the program’s defaults A. 4
B. Repairing the software B. 100
C. Uninstalling and reinstalling the soft- C. 256
ware D. 8
D. None of the above
92. The main circuit board and brains of com-
86. The CPU is called the of the computer. puter is called the
A. arm A. RAM
B. mother B. dongle
C. brains C. motherboard
D. leg D. power supply unit
82. B 83. D 84. B 85. C 86. C 87. B 88. C 89. A 90. A 91. D 92. C
1.1 Computer Systems and Components 11
93. This is used to make visual images that can 99. It is also known as CPU or the Central Pro-
be displayed on a monitor cessing unit.
94. Which of the following is an example of 100. This application interface is comprised
software? of multiple APIs that support multimedia
tasks in windows.
A. Keyboard
B. Mouse A. OpenGl
93. E 94. C 95. A 96. D 97. B 98. A 99. C 100. B 101. D 102. A 103. B 104. C
1.1 Computer Systems and Components 12
NARAYAN CHANGDER
C. programs that control xbox
105. What is a motherboard? Tick the most D. an application
complete answer.
110. Software is used to organize and manipu-
A. It is a circuit board inside the com-
late numerical data (in the form of integer,
puter.
real, date, and so on
B. It is a circuit board that holds others
A. Excel
piece on it.
B. Powerpoint
C. It is the biggest circuit board in a
computer that holds every piece on it C. Word
and makes sure they can communicate to- D. Database
gether.
111. What isn’t computer hardware
D. It is the biggest circuit board in the
computer that works with CPU. A. RAM
B. EPOS
106. Programs that allow the user to do spe-
cific tasks C. HDD
A. Computer Hardware D. SSD
114. Which of these have the capacities to 119. Which piece of hardware is responsible
host multiple operating systems and oper- for carrying out all the processing, cal-
ate as a number of virtual machines and culations and comparisons performed on
115. Lack of portability-heavy and separate 120. Which type of network component is
components are connected by wires. Files used to interconnect computing devices?
have to be copied and stored on portable
A. shared peripheral
disks, especially if you need to take them
with you. B. host
A. Desktop or Personal computer (PC) C. network media
B. Laptop or notebook D. intermediate device
C. Smartphones
121. Biometric sytems are not used for
D. Personal Digital Assistants (PDAs)
A. verification
116. Allows you to save information to be B. identification
used later
C. screening
A. Input device
D. entertainment
B. Processing
C. Output device 122. Which of these is not an application soft-
ware?
D. Storage device
A. Control and Measurement
117. Output devices. Check all that apply B. APPS
A. Monitor C. Spreadsheets
B. Mouse D. Utilities
C. Headphones
123. This is a form of spoofing where a phony
D. Touch Screen webpage is created that looks just like the
E. Speakers real webpage. It LURES you to click on it.
It is usually carried out by email or instant
118. Whats HDD messaging.
A. Hard Device Driver A. Fishing
B. Hard Disk Drive- B. Farming
C. Central Processing Unit C. Phishing
D. However Devices are Deadly D. Phoning
NARAYAN CHANGDER
terior of the computer, the monitor, the A. All of these choices
keyboard, any peripherals, and cables. B. Peripherals
A. Internal Visual C. Hardware
B. External Cables D. Input Devices
C. External Visual Inspections
131. The following are application software
D. Testing Visual EXCEPT
126. The processor rely on which of the follow- A. Facebook
ing to control the timing of all computer B. Twitter
operations?
C. Microsoft Office
A. Master clock
D. Operating System
B. System clock
C. Control clock 132. Which of the following is a computer sys-
tem?
D. unit clock
A. Laptop
127. A type of computer that can perform B. Monitor
highly calculation-intensive task through
its large transaction processing power. C. Keyboard
135. Not all have 3G/4G access. Touch-screen 140. Operating system
typing can be difficult. Cannot make phone A. Windows
calls.
139. This is a general purpose computer made D. Input, Output, and Storage
up of separate components:monitor key- 145. Allows a user to manipulate digital pho-
board mouse processor and storage. tographs stored on a computer;
A. Desktop or Personal Computer (PC) A. Photo Editing Software
B. Mainframe computer B. Video Editing Software
C. Personal Digital Assistants (PDAs) C. Graphic Manipulation Software
D. Smartphones D. System Software
146. An example of computer hardware is 151. Which of the following is the correct de-
scription for software?
A. Web Browser
A. Software is the apps and programs
B. Keyboard
that you use on your device.
C. App B. Software is the physical parts of a com-
D. Operating System puter that you can touch.
C. Software is a type of computer system.
147. A light-sensitve stylus wired to a video
NARAYAN CHANGDER
terminal used to draw pictures or select D. Software is a type of purpose built
menu options. computer system.
C. 3D Holographic B. fiber-optic
167. It is a general term for the physical com- 172. What does the CPU do?
ponents that make up a computer system.
A. Provides electricity
A. Computer Hardware
B. Computer Software B. Executes Instructions
NARAYAN CHANGDER
TAGE of Hard Disk Drives over Solid State 173. One of the capabilities of operating sys-
Drives? tems:The operating system can support
two or more CPUs.
A. Faster Performance
B. Usually More Storage Space A. multi-user
C. More QuietMore Quiet B. multitasking
D. None of the Above C. multiprocessing
169. These computers can be worn on the body D. multi-threading
and are often used in the study of behavior
modeling and human health.
174. A removable storage device that connect
A. Tablet Computers to a USB port.
B. Personal Digital Assistants
A. Optical Drive
C. Desktop
B. Flash Drive
D. Wearble Computers
C. Hard Disk Drive
170. Usually refers to a general-purpose com-
puter that is made up of a separate moni- D. Floppy Drive
tor, keyboard, mouse and processor unit
A. Laptops 175. it controls the movement of the cursor or
B. Personal Computer (PC) pointer on a display on a display screen.
C. Smartwatches A. Mouse
D. Smartphones B. Touch Screen
171. Which of the following statements are C. Joystick
correct about RAM in a computer system?
A. It acts as the active working space for D. Light Pen
the CPU.
176. is the process of carrying out com-
B. It can store data permanently.
mands.
C. It hold data that the CPU is currently
working on. A. Fetching
D. It provides data to CPU much faster B. Storing
than the HDD.
C. Decoding
E. It is a lot bigger in capacity compared
to Hard Disk. D. ExecutingANS:D
177. Why may a hard drive need to be parti- 181. It includes the name of the techni-
tioned before installation of a new OS? cian(s)who conducted the diagnosis and
troubleshooting.
NARAYAN CHANGDER
C. Read-Only Memory (ROM) istry.
D. Video Card
192. What is data bus?
188. What is the purpose of a device driver?
A. a circuit that connects one part of the
A. to drive the CPU mother board to another
B. allows the operating system to commu- B. a fast clock speed
nicate with hardware components
C. local memory
C. allows the operating system to open
applications D. none of above
D. allows the operating system to per-
form multiple tasks at once 193. The term durability refers to
189. What happens if you don’t have enough A. how easily you can damage the device
RAM? B. the speed of the device
A. Your computer will slow down because C. the amount of data you can store on
it has to load everything from the Hard the device
Drive
D. how shiny the device is
B. Your computer will speed up
C. You won’t get much wool from your 194. A CPU or processor does these 2
sheep things
D. Your computer will run out of Hard A. Controls what happens in the com-
Drive Space puter
190. what is a system on a chip B. Stores data long term
A. a device that is run on a single chip C. Stores data short term
B. a device that needs many chips to run
D. Makes decisions/ executes commands
C. device that sits on top of a chip
D. none of above 195. What numbering system uses the number
0 and 1?
191. A technician has loaded an incorrect video
driver on a Windows 7 computer. How can A. Binary
the technician revert to a previous driver? B. Octa-system
A. Select the video adapter card Proper-
C. ASCII numbering system
ties in Device Manager, select the Driver
tab, and click Roll Back Driver. D. 8-bit system
196. Which of these indicates a website is se- 200. Which of the following rests below the
cure? laptop and protects the laptop from over
heating and also your lap from excessive
205. An example of utility software 211. What is Mr. Ark’s favorite operating sys-
A. Printer tem?
NARAYAN CHANGDER
ware is working properly or as expected. 212. The computer instructions
A. Device tested A. Hardware
B. Internal tested B. Software
C. System tested C. RAM
D. Visual tested D. ROM
207. In terms of processing speed, which of 213. Storage is another term used for which
the following devices is MOSTLY LIKELY of the following components?
the fastest?
A. CPU
A. desktop computer
B. RAM
B. mainframe computer
C. HDD/SSD
C. notebook computer
D. GPU.
D. smartphone
E. ROM
208. The software that is designed for
computer-specific tasks such as defrag- 214. CPU stands for central unit.
menting your disks is called: A. Protection
A. utility software B. Packet
B. operating system C. Plasma
C. application software D. Processing
D. system software
215. Which of these are output devices? Click
209. Enters information into the computer 2.
A. Input device A. keyboard
B. Processing B. printer
C. Output device C. speaker
D. Storage device D. memory stick
210. What does RAM stand for? 216. Name the two components of the CPU?
A. Random Access Monitor A. AMD and ALU
B. Random Allowed Memory B. ALU and CU
C. Random Access Memory C. Memory and CU
D. Relocated Advanced Memory D. CMOS and ALU
217. How Many Megabytes Are in 1 Gigabyte 223. Sound card, modem card, video card, and
A. 1 network interface card, are circuit boards
that add devices andcapabilities to the
228. Sends information out of the computer; 233. What is not one of the basic functions of
displays the result of processing an operating system?
A. Input device A. Manage applications
B. Processing B. Tracking the date and time
C. Output device C. Provide a user interface
D. Storage device D. Control hardware access
NARAYAN CHANGDER
234. Which is not true about desktop comput-
229. What is the best way to install device
ers
drivers?
A. Have a larger screen
A. download from manufacturer website
or use media included with the device B. Need constant power supply
B. Just use generic drivers or google and C. Easy to upgrade
download the first driver you find D. Portable
C. plug it in and hope it works 235. A type of memory where data is lost
D. look for a driver that is not digitally when the computer is switched off
signed A. HDD
230. Can track down and fix disk errors, re- B. USB
pair corrupted files, and give devices a C. ROM
performance-enhancing tune-up.
D. RAM
A. System Utilities
236. Which of the following is the most com-
B. Software mon type of volatile memory?
C. Device Driver A. RAM
D. none of above B. ROM
231. What happens to the contents of the C. CMOS
RAM when the computer is turned off? D. Flash Memory
A. It is deleted / lost 237. Primary Memory is another term used for
B. It is sent back to the secondary stor- which of the following component(s)?
age A. CPU
C. It is processed by the CPU B. RAM
D. It is stored until the computer is turned C. Hard Disk Drive
back on.
D. GPU
232. What are the 2 main types of software? E. ROM
A. System and Application 238. Which of the following symbols is NOT
B. Informational and Entertainment A. parallelogram
C. Dynamic and Static B. circle
D. Professional and Home-based C. triangle
D. Motherboard B. Smartwatches
C. Personal Computer(PC)
240. Two basic components of a computer sys-
D. Tablets
tem are the and
A. Hardware and softshell 246. Which is not an operating system?
A. Windows
B. Hardware and Hard drive
B. IOS
C. Hardware and software
C. Linux
D. Monitor and computer
D. Microsoft
241. A microphone is a device.
247. Processor speed is measured in
A. Input
A. Ghz
B. Output B. Bus Speed
C. Storage C. Hyperthreads
D. Input, Output, and storage D. Cores
242. It Is an Internal chip where data is tem- 248. Your business is relying on cloud comput-
porarily stored when running applications. ing to make data available to its develop-
ers to incorporate into applications. What
A. Motherboard
is the term for this?
B. Random Access Memory (RAM)
A. Infrastructure as a service
C. Read-Only Memory (ROM) B. Platform as a service
D. Video Card C. Data as a service
243. Which of the following types of computer D. Platform as a service
systems is Most LIKELY to have a single 249. This device converts analog audio signals
processor? into audible sounds.
A. desktop system A. Sound card
B. mainframe B. Speakers
C. mobile system C. Hard drive
D. supercomputer D. Memory
250. are so large that they take up almost a 255. Why is it that Hard Disk Drive cannot
whole room. Complex to set up. Expen- give CPU data?
sive to operate and maintain and they re- A. They cannot understand each other.
quire specialist staff to operate them.
B. Hard Disk drives work much more
A. Desktop or Personal computer (PC) slowly than CPU and it wastes a lot of time
B. Laptop or notebook of the CPU waiting for the data to arrive.
C. Mainframe computers C. Hard disk Drive has other roles that
NARAYAN CHANGDER
keeps it very busy.
D. Personal Digital Assistants (PDAs)
D. Hard Disk Drive is not in the computer.
251. What is the unit of measurement for the
256. Refers to a small memory on PC mother-
clock speed?
boards that is used to store BIOS settings
A. nano second
A. Hard disk drive
B. hertz
B. Motherboard
C. gigabytes per second C. Processor
D. pica-hertz D. CMOS battery
252. It includes the date of starting the diagno- 257. Known as the heart or “brain” of the
sis until relevant outcomes have been es- computer system, responsible for process-
tablished. ing the information that has been entered
A. Dates of received into the computer; the processor.
260. Keyboards, mice and microphones are all 266. Dram looses the information stored on it
examples of (Select all that apply) when the power is off. this is called a
261. Which cache level is the biggest? 267. Which of the following companies is
known for manufacturing computer proces-
A. Level 1 sors?
B. Level 2 A. CPU
C. Level 3 B. Intel
D. none of above C. Sony
262. Monitor D. Corel
A. Commonly replaced 268. Information Technology merges the study
B. Commonly upgraded of all of the following EXCEPT
C. Commonly replaced/upgraded A. computer science
D. none of above B. computer technology
C. information and communications tech-
263. Which of the following are the two lead- nology
ing manufactures of personal computer
processor chips? D. office automation
C. Something I can physically hold 277. which of the following processors is a sin-
D. The application inside the digital sys- gle chip with two or more processors?
tem A. Multi-core
272. These are extremely large computers B. Single-core
used in organisations (such as banks C. Binary
and government departments) where very D. Compressed
large amounts of data are processed.
278. It allows the computer to send graphical
NARAYAN CHANGDER
A. Desktop or Personal Computer (PC)
information to a video display device such
B. Mainframe computer as a monitor, television or projector.
C. Laptop or notebook A. Sound Card
D. Tablet B. Random Access Memory (RAM)
273. Select all answers below that ARE mini- C. Read-Only Memory (ROM)
mum requirements for a Windows 7 install D. Video Card
(in a 64-bit system)?
279. How do we measure Processor Speed?
A. Processor-1 Ghz or faster
A. Gigahertz
B. Monitor-1400 x 1200 resolution
B. Gigahurts
C. Hard Drive Space-20Gb or more
C. Gigabytes
D. Memory-2Gb or more RAM
D. Giga-burgers
E. RAM Type-DDR3 or better
280. Which of the following interprets and car-
274. Which of the following is the typically the ries out the basic instructions that operate
most expensive component? a computer?
A. Keyboard A. Control unit
B. RAM B. CPU
C. CPU C. Motherboard
D. Mouse D. Binary device
275. You need to connect more than two 281. Programs designed for the end user are
computers in a network. known as:
A. Network Interface Card A. System Software
B. firewall B. Utility Software
C. switch C. Application Software
D. none of above D. none of above
276. What is the physical components of com- 282. It is a detailed description on how the
puter system? tests were conducted.
A. Hardware A. Action taken
B. Software B. Action development
C. Peopleware C. Findings
D. Malware D. Recommendations
283. The instructions that tell the computer 289. Loss and theft are key disadvantages.
what to do: Battery life is limited. Keyboards and
pointin gdevices are not as flexible as
NARAYAN CHANGDER
C. A device used to supply power to the
A. Video Cards
computer
B. Memory
D. A device used to store data perma-
C. Network Interface Card nently
D. Sound card
301. To display a decision-making instruction
296. Allows the user to interact with a com- in flowchart, which of the following sym-
puter (or MP3 player, gaming device, mo- bols should be used?
bile phone A. A parallelogram
A. Graphical User Interface (GUI) B. A rectangle
B. WIMP(Windows Icon Menu and Point- C. An oval
ing)
D. A diamond
C. Operating System
302. This component, executes the instruc-
D. Desktop/PC
tions from main (primary) memory. The
297. Wireless connections happen by way of speed it does this is measured in hertz (hz)
A. radio waves. A. CPU
B. cables. B. RAM
C. Cat 5. C. HDD
D. tubes. D. SSD
298. The user interface that requires to type 303. What is an example of an end device
instructions to choose options from menus, A. printer
open software and so on.
B. desktop computer
A. Command User Interface
C. network switch
B. Command Line Interface D. network router
C. Graphical User Interface E. network firewall
D. Graphical Line Interface
304. The user interface that allows to inter-
299. During the input-processing-output- act with a computer using pictures or icons
storage(IPOS)cycle, a two-way flow of rather than having to type in a number of
data takes place between. commands.
A. input and output devices A. Command User Interface
B. the processor and primary memory B. Command Line Interface
315. A computer is 320. At every clock pulse, the CPU will per-
form:
A. A combination of hardware and soft-
ware A. A Fetch
B. Some hardware (only) B. A Decode
C. Some software (only) C. An Execute
D. The screen you are looking at D. A complete F-D-E cycle
NARAYAN CHANGDER
316. Random Access Memory (RAM) 321. what is a chip?
A. an integrated circuit
A. memory available for the operating
system, programs and processes to use B. a single component
when the computer is running. C. is soldered onto an electronic circuit
B. requires the computer to be turned on board
in order to retain data D. is soldered onto an electronic circuit
C. The data in RAM is not permanently board to connect the chip to the rest of
written (volatile memory) the device
D. All of the above E. all of them
317. What happens to data in Main Mem- 322. Are software that has been designed to
ory/RAM when we switch the power carry out specific tasks on a computer
off? A. Operating System
A. All data is lost B. Linkers
B. All data is saved C. Utilities
C. All data is backed up to the Hard Drive D. Compiler
D. All data is saved to the Processor 323. Which of these is not part of every com-
puter?
318. Advantage of using a laptop
A. Motherboard
A. Tangible
B. Processor
B. Heavy
C. Power Supply
C. Portable
D. Keyboard
D. Low performance E. RAM
319. All of the following pairs of components 324. Which term describes the interference
interrelate with each other EXCEPT when electrical impulses from one cable
A. input devices and output devices cross over to an adjacent cable?
B. output devices and storage devices A. cross over
325. Your business is looking to rely on cloud 330. Where the operating system, programs
computing services to create applications and data are permanently stored is called
using web-based development platforms. what?
A. All the programs that are open in RAM. 333. What happens to data on our Hard Disk
B. All the graphic calculations to do with Drive when we turn the power off?
video, image and colours. A. All data is saved
C. All the calculations going on on the B. All data is lost
computer. C. All data is backed up to the Graphics
D. GPU doesn’t do any calculations or pro- Card
cessing. D. All data is encrypted
329. Which of the following is an example of 334. It enables your computer to connect to
hardware? the internet.
A. Monitor A. Hard disk drive
B. Microsoft Word B. Optical drives
C. Malware C. Processor
D. Facebook D. Modem
335. Why is CLI better than GUI head of a pin would one day exceed 10 mil-
A. More Options if the user can code prop- lion
erly D. Gordon Moore stated that the num-
B. It is Lined ber of transistors per square inch on in-
tegrated circuits would double every year
C. you can command
D. It doesnt have wimp 341. The two types of file systems used for
Windows are:
336. It is a fixed computer storage medium.
NARAYAN CHANGDER
A. FAT32
A. Hard disk drive
B. NTFS
B. Motherboard
C. Linux
C. Processor
D. iOS
D. Sound card
342. North bridge and south bridge are con-
337. A monitor is a device. nected via:
A. Input A. CPU
B. Output B. Buses
C. Storage C. Motherboard
D. Input, Output, and Storage D. They don’t need to be connected!
338. The type of software that the users run 343. Which if the following is not a function of
to do various tasks on a computer is an operating system?
A. System Software A. interface between the user and the ma-
B. Application Software chine
C. Utility Software B. Editing text.
D. Operative Software C. coordinate hardware components
339. A device that must always be connected D. monitor system performance
to an external power source to work
344. It is a general term for the programs that
A. Laptop control the computer system.
B. Desktop A. Computer Hardware
C. Smartphone B. Computer Software
D. Tab C. System Software
340. Moore’s Law D. Application Software
A. Gordon Moore said that everyone 345. It is commonly called RAM (Random Ac-
should have free access to digital technol- cess Memory).
ogy
A. Video Cards
B. Gordon Moore stated that it was uneth-
ical to use DNA to store code B. Memory
7. An Expert System is a computer system 13. First electronic computer that used stored
that programs.
A. has no ability to work on its own. A. ENIAC
B. has ability to walk like humans. B. MARK I
C. has decision-making ability like hu- C. EDSAC
mans. D. None of these
D. None of these
14. What was the third generation of comput-
NARAYAN CHANGDER
8. Choose Three advantage of fourth genera- ers built with
tion of computer? A. Integrated Circuits
A. small in size B. Processors
B. used punch card as input device C. Vacuums
C. fast processing with less power con- D. Transistors
sumption
15. EDSAC stands for
D. support high level language in differ-
A. Electronic Delay Storage Automatic
ent type of computer
Calculator
9. Which component was used in Second gen- B. Electrical Delay Storage Arithmetic
eration computers Calculator
A. Transistors C. Electrical Delay Storage Automatic
B. Integrated Circuits Computer
C. Vacuum Tubes D. None of these
D. VLSI technology 16. Which generation of computers uses artifi-
cial intelligence?
10. d Generation computer used
A. Fourth Generation computers
A. Vacuum Tubes
B. First Generation computers
B. Transistors
C. Fifth Generation computers
C. Integrated Circuits
D. Third Generation computers
D. None of these
17. What was the main electronic component
11. How small is a chip used in the first generation of computers?
A. younger than a fingertip A. Tape
B. tinier than a fingertip B. Wire
C. as small as an ant C. Gum
D. something else D. Vacuum tube or valve
12. the first generation computers was 18. d Generation computer used
A. Big and cheap A. Vacuum Tubes
B. slow and expensive B. Transistors
C. slow and small C. Integrated Circuits
D. none of above D. None of these
19. The first generation of computers used 25. Which among the following generation
as a major piece of technology computers had expensive operation cost?
A. First
22. Abacus is used to perform 28. Which one is not true for Integrated Cir-
cuits (Chips)
A. Addition
A. Increased storage capacity
B. Subtraction
B. Different programs can run together
C. Multiplication
C. Large size, slow speed
D. Division
D. None of these
E. All of the above
29. Versatility means
23. Transistors are used in which generations
A. the ability to perform only one task at
of computers.
a time.
A. 1st generation
B. the ability to perform work in less time.
B. 2nd generation
C. the ability to perform different types of
C. 3rd generation jobs efficiently.
D. None of these D. None of these
24. Who is known as the father of modern 30. How many generations of computers are
computers. there?
A. Charles Babbage A. 4
B. Alan Turing B. 5
C. John Napier C. 3
D. Blaise Pascal D. 6
NARAYAN CHANGDER
B. Transistors
A. Shape C. Vacuum tubes
B. Size D. Microprocessors
C. Weight
38. Which one is not true for Microprocessor.
D. Technology
A. Greater computing power
33. First generation computers was very B. Greater Storage capacity
A. Big C. Use cost less storage device
B. Small
D. Huge in size
C. Medium
39. What is technology that used in First Gen-
D. none of above
eration?
34. What period of time was the fifth genera- A. Artificial intelligence
tion of computers used?
B. Transistor
A. 1971 to present
C. Vaccum Tubes
B. 1956 to 1963
D. Integrated circuit
C. Present to future
D. 1945 to 1956 40. At what period of time were second gen-
eration of computers used?
35. The microprocessor was introduced in A. 1940 to 1970
which generation
B. 1956 to 1963
A. Third
C. present to future
B. First
D. 1945 to 1956
C. Fourth
D. Second 41. Microprocessors were used in
A. 1st generation computer
36. Select all that apply to the first generation
of computers. B. 4th generation computer
A. Cheaper C. 5th generation computer
B. Generated a lot of heat D. None of these
NARAYAN CHANGDER
either basic sounds like beeps, or more so- tion
phisticated sounds using a sound card
B. to provide DC power for internal com-
D. used to print in warehouses where du- ponents of a computer
plicate forms (such as delivery notes) are
required C. a device that connects to a computer
and is used to project the video output
10. benefits of desktop from the computer onto a wall or screen
A. more powerful, more features, D. connectivity affected by resistance of
cheaper than laptop buildings and interference, limited range,
B. one computer cannot be used by user, slow
easier spread of viruses 14. limitations of server
C. the technology that allows the text on A. one computer cannot be used by user,
paper documents to be converted into text easier spread of viruses
which is editable after scanning
B. adds reliability, faster network expan-
D. a plug-in interface card that displays sion, allows centralised backup
progress and error codes generated dur-
ing power-on self-test (POST) of a com- C. black and white are a bit more expen-
puter sive, colour are a lot more expensive than
ink jet.
11. limitations of smartphone D. turn on heating when on way home,
A. not durable, water can damage easily, turn on music using speech
.need internet connection when browsing,
small storage capacity 15. Which of these characteristics can best
differentiate between laptops and desk-
B. have video RAM, a GPU chip and usully tops?
HDMI and DVI connections
A. cost, style, portability
C. captures audio input, feeds Text to
speech, accessibility B. cost, performance, portability
C. playing music from computer, on the A. The device that allow users to do a spe-
move cific task
24. System software consists of the program D. show status of electronic equipment vi-
that controls the operations of the com- sually, signs
puter and its devices. Two types of sys-
tem software are ; 28. The physical, tangible parts of a computer
system is the
A. Microsoft Word and Windows 10
A. Tower Casing
B. Utility programs and Windows
B. Monitor
C. Operating systems and utility pro-
C. Keyboard
NARAYAN CHANGDER
grams
D. Operating system and application soft- D. Hardware
ware 29. description of server
25. purpose of of server A. A computer running software to man-
A. to provide services to client computers age network resources
B. save space and portability where pos- B. storage size, appearance, reliability
sible with small form factor devices C. communication requires line of sight,
C. reliability, easy to expand network, se- short distance only
curity D. easy to use, intuitive, requires little
D. a disk containing a program written for training
the express purpose of locating problems 30. benefits of tablet computer
with the software, hardware, or any com-
bination there of in a system, or a network A. lightweight and portable, good for be-
of systems. ginners and light users
B. prints on paper by spraying ink out of
26. description of hybrid computer tiny nozzles-shaped by crystals or electric
A. A 2-in-1 PC consists of a screen and current
a detachable keyboard and has the func- C. usually used with PC-moves cursor
tionality of both a laptop computer and a around screen in two dimensions
tablet
D. save space and portability where pos-
B. allows user to connect without wires, sible with small form factor devices
standards are agreed, eas to set up
C. have video RAM, a GPU chip and usully 31. benefits of hybrid computer
HDMI and DVI connections A. Battery life, travel with less stuff, Tak-
D. playing music from computer, on the ing notes and reading ebooks are easier.
move B. Reads 300 cheques per minute with
100% accuracy
27. uses of tablet computer
C. expensive aonnection kits, possibility
A. Popuplar in education of for casual of hacked devices
browsing and gameplay
D. print quality low, noisy
B. Imags produced can take up a lot of
memory space, some quality lost in the 32. limitations of mainframe
process A. expensive, very large and require
C. Very expensive-only used by banks greater skills to use
B. phone calls, text to speech, recording real time for two-way network communi-
music cation.
1. Every internet user needs an address. 6. You have a computer at home. The com-
A. MAC puter is connected to the Internet through
a dial-up connection. Every time you con-
B. DNS nect to the Internet, you send a request to
C. VPN the Internet service provider (ISP).Which
D. IP device establishes this connection?
A. sound card
2. Web browser is an application software
that read HTML documents and display B. Modem
NARAYAN CHANGDER
them as C. Microphone
A. Web Site D. Speak
B. Web Browser 7. Cyber security deals with:
C. Web Page A. common thievery
D. Web Server B. Viruses, DDoS attacks and Phishing ac-
3. are used in the place of IP address be- tivities
cause they are easier to remember. C. business security
A. Domain names D. spam
B. Protocols 8. A LAN can be connected to the Internet by
C. Routers a router, provided that the LAN uses:
D. Hosts A. TCP/IP
4. Why might a Webpage appear differently B. ISP
in different web browsers? C. Wireless Connection
A. Each browser utilizes network band- D. T or E Lines
width differently
9. In the client/server environment, what is
B. Each browser interprets HTML some- the main function of client software?
what differently
A. It manages network resources & pro-
C. Each browser may interpret the Web- vides information to the client
page differently based on the pages W3C-
compliance B. It enables users to communicate with
& request information from the client
D. Each browser uses different protcols
to access the webpage C. It defines the protocols that enable the
client to communicate with the server
5. You own a small bookstore. Because of D. It enables users to communicate with
the popularity of the Internet, you decide & request information from the server
to provide online services for your cus-
tomers. Where will you go to get an In- 10. Chunks of data sent over the internet are
ternet connection for your computer? known as
A. Software development company A. packets
B. Hardware Company B. protocol
C. Internet cafe C. port
D. Internet Service Provider (ISP) D. message
A. files D. .net
NARAYAN CHANGDER
tion’s local computer
A. Type the keyword weather in the ad-
dress bar and then click New Page . 26. All statements below shows the responsi-
B. Click the link for the weather report. bilities of ISP EXCEPT
C. Right-click the link for the weather re- A. Providing and maintaining a connec-
port and then click Open in New Window tion to the Internet
D. Type the keyword weather in the B. Support the hardware and software
Search box. needed for the connection service.
23. Your brother wants to create an online C. To protect their site and network from
journal to document a special event so that external threats
all of your friends can view the pictures D. To provide 12-hours customer service
and illustrations. Which of the following and technical support.
online communities will help him create
this online journal? 27. A proxy server is used as the computer?
A. Blog A. with internal access
B. Chat group B. with no access
C. Newsgroup C. with external access
D. Bulletin board D. All of these
24. You need to send email over the Internet
28. A is a transmission which uses dig-
to your friend Paula. What information do
ital code (a 0 or 1) to write code on the
you need to send a message to Paula?
signal.
A. Telephone
A. Digital Signal
B. E-mail address
B. Web Address
C. Home address
C. Broadcast Communication
D. Company address
D. Transmission Medium
25. Which of the following describes cloud
computing? 29. What is the full form Of E-Commerce
A. A computing paradigm in which web A. Electronic Commerce
browsers & numerous other applications
B. Electrical Commerce
are required on local computers
B. Hosted applications & services offered C. Element Commerce
by a third party and run almost entirely D. Elegant Commerce
30. What is the meaning of Router? 35. You want to send your photographs to a
A. a networking device that forwards friend. What should you do to make sure
that your friend’s e-mail inbox does not
40. Which network type is best used for a 44. What moves around the Telephone cable
school supplies company which provides network?
schools with equipment? A. Train
A. Intranet B. Bus
B. Extranet C. Information (Voice calls)
C. Internet D. none of above
D. LAN
NARAYAN CHANGDER
45. What is a top-level domain in the Domain
41. How many bits does the Internet Protocol Name System (DNS)?
version 6 (IPv6) address format use? A. The left-side component of a domain
A. 128 name, which categorizes domains into
groups by server name
B. 256
B. The right-side component of a domain
C. 64 name, which categorizes domains into
D. 32 groups by common type or geography
C. The left-side component of a domain
42. What is Dial up conection?
name, which categorizes domains into
A. This is one of the earliest merhods groups by common type or geography
used to connect to the internet.
D. The right-side component of a domain
B. company that provides Internet con- name, which categorizes domains into
nections and services to individuals and groups by server name
organizations.
46. A firewall is:
C. is the transmission of wide bandwidth
data over a high speed internet connec- A. a barrier to prevent the spread of fire
tion. B. a software to restricts communication
D. an electronic communications network an improve security
that connects computer networks and or- C. a warning set for a computer overheat
ganizational computer facilities around
D. limited state of PC operation
the world-used with the except when be-
ing used attributivelydoing research on 47. are small text files that identify a
the Internetan Internet search. user’s personal preference and settings
and allows web site servers to retrieve
43. Your neighbor has moved to another coun- the information.
try. He informs you about his new job.
You want to congratulate him by sending A. Cookies
an e-mail message.Which of the following B. Micro Chips
devices must you use to connect your com-
C. Channel
puter to the Internet?
D. Files
A. Printer
B. Scanner 48. Which term is described as a “worldwide
network of computers made up of cables,
C. Modem routers, and other pieces of hardware
D. Sound card used to connect devices together”?
58. Which of the through is share the data of 63. Salman is curious about e-mail. He asks
two computer? you about the medium that is used to send
an e-mail message. Which of the following
A. Telnet
options will you use to answer his ques-
B. Arpanet tion?
C. Internet A. Fax machine
D. Network B. Postal service
NARAYAN CHANGDER
59. Which of the following best describes an C. Courier service
IP address? D. Internet
A. 4 numbers ranging between 0 and 255,
64. ISP
separated by dots
A. internet service protocol
B. 8 numbers ranging between 0 and 10,
separated by ‘@’ signs B. internet service provider
C. 3 numbers ranging between 0 and 10, C. international service provider
separated by dots
D. internet success protocol
D. 4 numbers ranging between 0 and 100,
separated by dashes 65. What network covers a LARGE geographi-
cal area?
60. Which term describes a set of rules that
A. LAN
computers on a network use to communi-
cate with one another? B. WAN
A. Method C. BAN
B. Protocol D. KAN
C. Instruction 66. What is a local area network (LAN)?
D. Conduct A. A group of computers connected
within a confined geographic area
61. What do we call a set of rules known as
“protocols” developed for the internet? B. Two or more nodes that span a wide
geographic area
A. XYZ
C. A set of protocols that enables clients
B. (TCP) Transmission Control Protocol
& servers to communicate
C. HTTP
D. A node on a network that serves as a
D. WWW portal to other networks
62. Which one of these is a type of social me- 67. Which of these is NOT part of “The First
dia? and Last Mile” of the Internet
A. BBC News A. A school network
B. Minecraft B. Cell Phone Towers
C. Instagram C. Undersea Cables
D. Amazon D. Your home WiFi network
71. What is the name of the problem-solving C. An attempt by one user to deny service
model in which a task that cannot be per- to another user by posting malicious ma-
formed by one person is outsourced to a terial on a social network
large group or community in order to ob- D. An attempt by an Internet user to ac-
tain & analyze large amounts of data? cess private information stored in a pri-
A. Cloud Computing vate database
B. Crowdsourcing
76. Which of the following is a benefit that on-
C. On-demand Computing line shopping websites provide over brick
D. SaaS and mortar stores?
72. Full form of ISP A. Users can try out an item before they
buy it
A. Internet Service provider
B. Ice Cream Service provider B. Users can easily pay with cash in per-
son
C. Inter Software PC
C. Users can easily see product reviews
D. None
and determine if an item has been satis-
73. The basic advantages of the computer net- factory for a large number of people
work is D. There is no wait time between purchas-
A. Hacking ing an item and having access to it
NARAYAN CHANGDER
78. Which field is computer networks origi- B. small network of LANs and WANs
nated from?
C. line of LANs and WANs
A. Government
D. none of above
B. Military
C. Media 83. What do the letters HTTP stand for?
B. Transmission of words or symbols, im- 84. Sabina creates a Web site for the first
ages, and data over a distance through time. She wants to know which proto-
technology. col her Web browser uses to display Web
C. Process of conveying information from pages. Which of the following protocols
a sender to a receiver. does her Web browser use?
B. Fully qualified domain name server 92. Which of the following are ways to con-
C. Top-Level Server nect to the Internet?
A. Electricity
98. One example of telecommunication? C. A more complex device that usually in-
A. Transmission cludes the capability of hubs, bridges and
switches.
B. Emailing
D. A network of computers within the
C. Transferring same building, such as a school, home or
D. Online Travelling business.
99. What is networking? 104. A common function of this hardware de-
NARAYAN CHANGDER
A. the linking of computers to allow them vice is to join a home network to the in-
to operate interactively ternet via your internet service provider
(ISP). What is the device?
B. the linking of objects that doesn’t allow
them to interact A. Router
C. a group of non linked digital devices B. Server
D. none of above C. Network cable
101. A protocol used for the transfer of files A. Hyptertext Transfer Protocol (HTTP)
between remote computers with an inter- B. File Transfer Protocol (FTP)
net connection
C. Simple Mail Transfer Protocol (SMTP)
A. FPT
D. Simple Network Management Proto-
B. PTF col.
C. TPF
106. We use these devices for wireless com-
D. FTP munication:
102. What infrastructure would you find in A. Mobile Phone
Telephone network? B. Tablets
A. People C. Laptops
B. Gas pipelines D. Telephones
C. Water pipes
E. Buses
D. Telephone cables and wires
107. private, part shared access
103. So, what is the backbone?
A. internet
A. Central network traffic infrastructure,
that connects different network. B. intranet
108. Bonus:What year was the first ever B. Sort messages by name.
email sent? C. Set a flag.
117. What forwards data packets to the right C. Users can share resources like print-
computer? ers and files
A. Router D. Viruses can spread easily
B. Internet 123. A is software such as Internet Ex-
C. Ethernet Cable plorer, Chrome, Safari, Firefox, etc.that al-
lows user to access and view web pages.
D. Clock
A. search engine
118. The need of networking arises due to the
NARAYAN CHANGDER
B. browser
following reasons, EXCEPT
C. URL
A. Limited Resources
D. firewall
B. Need of Money
124. If we connect three rooms in building,
C. Desire to share information
which network type do we get?
D. Cost reduction
A. WAN
119. What company’s operating system runs B. LAN
on the Chromebook? C. MAN
A. Microsoft D. SZAN
B. Google
125. Why are fiber optic cables used for long
C. Apple distances on the Internet Backbone, such
D. Windows as across country and under the ocean.
A. Because they are heavyweight cables
120. What type of server are you accessing
when you download software programs B. Because they are extremely durable
and documents from websites? C. Because they carry data the fastest
A. A HTTP Server D. Because they are the least expensive
B. SMTP Server 126. Allows two or more people to hold online
C. POP Server conferences at different locations using a
computer network to transmit audio and
D. FTP Server
video as if they were all in the same room
121. Which of the following enabled private A. Video Conferencing
(commercial) business to be conducted
B. Video Calls
over networks connected to NSFnet?
C. Video Locations
A. Private telecommunications
D. Video Line
B. The World Wide Web
127. What happens when you click a hyper
C. The National Science Foundation (NSF)
text link?
D. ARPA
A. Another web browser opens
122. An advantages of network is B. Another location in the same webpage
A. Users can see each others areas or another webpage appears
B. Servers may crash, so no work can be C. Current web browser closes
done D. All other open pages close
NARAYAN CHANGDER
B. Modem
A. a URL
C. WiFi card
B. your home page
D. Display card
C. an IP address
D. A web browser 144. What is the meaning of Local Area Net-
work?
140. What does the Internet prefix WWW A. A network of computers across a city .
stand for?
B. the global network of computers called
A. Wisconsin Wind Weather
the Internet, which connects millions
B. Western Washington World of networks and computers around the
C. Word Wide Web world.
D. Wide Width Wickets C. A computer network that links devices
within a building or group of adjacent
141. What function does the Domain Name buildings.
System (DNS) perform?
D. a networking device that forwards
A. It makes up the IP address of an Inter- data packets between computer networks.
net Protocol version 4 (IPv4) address Routers perform the traffic directing func-
B. It allows a computer to connect to the tions on the Internet.
Internet over a phone line
145. A network that functions like the In-
C. It provides text output that users can ternet but is only accessible to the employ-
access at their convenience and allows ees of an organization.
multiperson input
A. Extranet
D. It resolves IP addresses into easily
recognizable text-based names B. Intranet
C. Internet
142. At home, your grandfather watches you
working on your computer. He recently D. Router
heard about the Internet and wants to
146. What is the term for a software applica-
know what it is. How will you define the
tion that enables users to access & view
Internet to him?
web pages on the Internet?
A. A program installed on a computer
A. Website
B. An Electronic device for printing docu-
ments B. Web Browser
NARAYAN CHANGDER
rather than the individual T or E carrier
line A. transmission control protocol
B. Digital phone lines consisting of B. tolerance capacity protocol
shorter lengths of T or E carrier line than C. time control protocol
the standard lengths available for pur-
chase D. tender connection point
C. T or E carriers that support more band- 163. is the first part of an e-mail ad-
width than standard T or E lines dress.
D. T or E carriers that are interchange- A. User Name
able anywhere in the world
B. Web Address
158. High network traffic can lead to C. Transmission
A. data packet collisions D. Broadcast Communication
B. more users on a network
164. You want to chat with your friends over
C. faster transmissions of data the Internet. Which program must you in-
D. packets only being sent once stall to do this?
A. Microsoft Windows Messenger
159. Your internet connection can be slow be-
cause B. Microsoft Paint
A. there is a problem with the internet C. Microsoft Office Word 2013
service provider D. Microsoft Office Excel 2013
B. there is a problem with the domain
name server 165. Anna has used e-mail for more than a
year. She now has difficulty keeping track
C. there is a problem with your wireless of the contact details of all the people
router with whom she communicates. Identify
D. all of the above the method by which Anna can easily ac-
cess all of the contact details in alphabeti-
160. The full form of Internet is cal order.
A. Immediate network A. Create signature
B. International Network B. Use Address Book
C. Intermidate Network C. Sort by name
D. Internal Network D. Set a Flag
166. Which kind of data and information trans- 171. The location of a resource on the internet
mitted via the network? is given by its?
E. All the above 172. You visit your friend’s house and find her
searching for books on the Internet. Which
167. The sharing and use of resources and ap- of the following describes the status of
plications offered as services over the in- your friend’s computer?
ternet
A. Online
A. Cloud Computers
B. Offline
B. Computer Clouding C. Sleep Mode
C. Cloud Computing D. Logged off
D. Computer Clouds
173. Connecting through a modem connected
168. What is a dotted quad? to a phone line
A. A default password to acces a router A. dial up
or wireless access point B. sattelite
B. A series of numbers divided into 4 seg- C. DSL
ments that identifies a unique resources D. mobile
on the Internet
174. What does Network mean?
C. A manufacturer’s serial number for a
computer A. A network of computers across a city
D. A protocol for how data is exchanged B. network is the global network of com-
between computers puters called the Internet, which con-
nects millions of networks and computers
169. Data is around the world.
A. individual pieces C. A computer network that links devices
within a building or group of adjacent
B. individual pieces of information
buildings.
C. info
D. a networking device that forwards
D. pieces of paper data packets between computer networks.
Routers perform the traffic directing func-
170. At what speed does tele-computed re- tions on the Internet.
fer?
175. Which of the following connection types
A. Internet protocol
provides the fastest direct connection
B. Kbps speed?
C. Mbps A. Fiber-Optic Cable
D. Baud rate B. T1 Line
NARAYAN CHANGDER
C. Large storage capacity. 182. Nowadays which connectivity India
D. Wireless connection has?
A. Broadband
177. Everything on the internet has an?
B. Dial up
A. IP address
C. Internet
B. sever
D. ISP
C. packets
D. information 183. An ISP provides access to the infras-
tructure for the users.
178. Which software prevents the external ac-
cess to a system? A. Internet
A. firewall B. Protocols
180. The Internet is a network of comput- 185. Which of the below describes the term
ers that are together. ‘buffering’?
186. Which of the following wireless mode 191. Short form of Digital Subscriber line
types uses a centralized access point
A. DSL
known as a wireless access point (AP)?
B. Cable Modem C. FB
C. Ad-Hoc D. RAM
D. LAN
192. What is Domain Name?
187. When the mail server sends mail to other A. A text version of web page name.
mail servers it becomes ?
B. The text version of an IP address of a
A. SMTP host
server.
B. SMTP server
C. A search tools used to locate the infor-
C. SMTP client mation.
D. Client server
D. A worldwide collection of network.
188. Satellite orbiting the earth provide wire-
less broadband connection 193. Wifi repeaters are devices to:
A. Wireless broadband via satellite A. Improve a weak wifi signal at home or
work.
B. Wireless broadband
C. Fibre optics B. change digital signal into analog signal
189. You go to your friend’s house to play an D. reconnect an optic fiber cable
online game. You hear modem tones when
194. A/An can either be a telecommuni-
your friend’s computer sends a request to
cation company or any other organisation
the Internet service provider (ISP) to es-
specialising in providing access to Internet
tablish the Internet connection. What type
services.
of Internet connection does your friend
use? A. Network Provider
A. Dial-up B. Internet Service Provider
B. Broadband C. Service Provider
C. Wifi
D. Internet Connector
D. Dedicated
195. The modem helps the internet signal to:
190. What are T carriers?
A. Go IN the computer from analog to dig-
A. Dedicated digital telephone lines used
ital
in Europe
B. The signaling channels in an ISDN line B. Get IN and OUT from analog to digital
and from digital to analog.
C. Dedicated digital telephone lines used
in North America C. Get distributed into many devices
D. The data channels in an ISDN line D. Get into wifi
NARAYAN CHANGDER
D. The protocol by which analog data is B. Fast and Reliable
turned into digital data C. Hassle free
197. According to the domain name system D. Linked to the ISP
(DNS), which of the following is a subdo-
202. What does ISP stand for?
main of the domain example.com?
A. Internet Service Provider
A. about.example.com
B. example.com/about.html B. Icee Secret Professional
198. What is the Internet? 203. A distributed database that links com-
puter names and their IP addresses
A. A way for people to share information
between computers A. DNS (Domain Name Service)
206. Which of the following is not a main 211. Who will win the World Series this
method for sending information from one year?
computer to another?
NARAYAN CHANGDER
217. A network spread over a wide geograph-
ical area, such as a city, country or even your home computer
continents B. Searching online for the answers to
A. LAN CodeHS exercises and quizzes
B. PAN C. Purchasing an app from an app store
C. GAN and downloading it directly to a mobile de-
vice
D. WAN
D. Searching online for an electronic ver-
218. A small amount of computer data sent sion of a textbook
over a network.
A. Packet 223. What network covers a SMALL geograph-
B. TCP/IP ical area?
C. Protocol A. WAN
D. none of above B. JAN
219. If we connect three schools in a city, C. LAN
which network type do we get?
D. GAN
A. LAN
B. MAN 224. Large amounts of data sent across the in-
C. WAN ternet are split into smaller units. What is
the name of these smaller units of data?
D. HSW
A. Letters
220. If you were to use a caeser cipher with a
key of 3 shifts to the left, how would you B. Parcels
encrypt the word:Cipher?
C. Packages
A. ZAMEBO
D. Packets
B. ZOMEBO
C. ZFMEBO 225. Who owns the Internet?
D. ZFMEBA A. No one
221. What do we call a networking device that B. Bill Gates
forwards data packets between computer
networks? C. the government
A. Router D. Vint Cerf
226. What is the purpose of the Digital Millen- 230. Your device is connected to your teacher’s
nium Copyright Act? device for this quiz, which type of net-
working is this?
NARAYAN CHANGDER
236. Which of the following transmission di- A. Network
rections listed is not a legitimate channel?
B. Intranet
A. Simplex
C. Internet
B. Half duplex
D. Application
C. Full duplex
D. Double duplex 242. Which of the following can you do on the
Internet?
237. is the name given to a computer di-
rectly connected to the internet. A. All of them
A. Host B. Online shopping
B. Router C. Video calling
C. Receiver D. Streaming music
D. Channel
243. What does ISP mean?
238. www.worldbookonline.com is an exam-
ple of A. Inter Service Provider
246. A network that connects a group of com- 251. Wide World Importers has clients in vari-
puters in a small geographical area. ous countries. It requires its employees to
work in shifts and communicate with each
249. Which of the following best describes the 253. Direct Internet connections:
purpose of websites that use a “.edu” top- A. require digital terminal adapters to
level domain? transfer data over digital phone lines
A. Sites used to inform and provide public B. provide continuous access to the Inter-
services net through permanent network connec-
B. Sites used by non-profit companies tions
such as charities C. use temporary network connections to
provide Internet access
C. Sites ranging from nursery schools’ to
universities’ D. require activation for each usage pe-
riod
D. Sites likely to promote something
254. A city government is attempting to re-
250. An is a computer file which is sent duce the digital divide between groups
along with an e-mail message. with differing access to computing and the
A. Attachment Internet.Which of the following actions is
LEAST likely to be effective in this pur-
B. Network
pose?
C. Receiver
A. Holding basic computer classes at
D. Domain community centers
B. Providing free wireless Internet con- 258. What does the extension .org mean?
nections at locations in low-income neigh- A. organization
borhoods
B. education
C. Putting helpful tips for operating com-
puters on the city government website C. commerce
NARAYAN CHANGDER
does the Internet work?
sources
A. The video that we watch travel from
255. What is “Net Neutrality? ” Google data center, transmit to satellite
and sent to your mobile.
A. the principle that Internet service
providers should enable access to all con- B. Google sent the video to your mobile,
tent and applications regardless of the and we watch through the satellite
source, and without favoring or blocking C. Satellite sent the video that we watch
particular products or websites to Google data center
B. the practice of registering names, es- D. Your mobile sent the video from the
pecially well-known company or brand satellite to Google data center
names, as Internet domains, in the hope
of reselling them at a profit. 260. How are wide area networks (WANs)
created?
C. the principle that Internet service
providers should NOT enable access to all A. By connecting LANs to one another via
content and applications regardless of the public carriers
source, and without favoring or blocking B. By consolidating network equipment
particular products or websites into one physical location
D. none of above C. By connecting LANs to one another via
network clients
256. A program that allows you to view web
pages is a: D. By distributing network equipment
among two or more buildings
A. search engine
B. plug in 261. What does WAN stand for?
A. Wide Area Network
C. web browser
B. Wide Arena Network
D. none of above
C. World Area Network
257. You want to write an e-mail to your se-
D. World Arena Network
nior applying for leave. Which of the fol-
lowing will you use in your e-mail mes- 262. Which of the following is an example of
sage? a domain name
A. Fancy Quotations A. 198.146.30
B. Signature B. .com
C. Emoticons C. www.
D. Ellipses D. Google
D. Paper A. Peer-to-peer
B. Intranet
266. Individuals use to connect to friends,
upload videos and photos. C. Extranet
A. forums D. Internet
B. social media 272. A worldwide collection of networks that
C. websites connects millions of businesses, govern-
ment agencies, educational institutions,
D. URL
and individuals.
267. Customers in Martin’s company can ac- A. World Wide Web
cess certain parts of the company network
from their own company computer outside B. ARPANet
of Martin’s company. This is an example C. Internet
of a/an: D. ICANN
A. extranet
273. Which of the following website activities
B. internet.
should make use of HTTPS?
C. intranet.
A. Checking the latest sporting news
D. throughput.
B. Registering your details on a new so-
268. Two function of Modem cial media site
A. Modulation and demodalation C. Researching a holiday abroad
B. Phone and pc D. Watching a video
NARAYAN CHANGDER
275. What is a computer network?
D. Uniform Reform Listing
A. Two or more computers connected to-
gether
281. It spans large locality and connects coun-
B. A single computer tries together.
C. A powerful computer that provides a A. LAN
service
B. WAN
D. A set of rules
C. MAN
276. What is a network? D. none of above
A. a blue net you take to work
282. Which of the following is an advantage
B. a job where you make fishing nets
of a wired network?
C. 1 computer not connected to anything
A. No trailing wires
D. 2 or more computers connected to-
gether B. It allows portability
C. It is quick and cheap to connect new
277. You want to send an e-mail to apply for devices
a job in a company.
D. Better security
A. Attractive colors
B. Smilies 283. Which of the following would pose the
C. Fancy quotations greatest threat to a user’s personal pri-
vacy if it were to be leaked to the public?
D. Formal Salutation
A. The IP address of the user’s computer
278. Which term describes the amount of data B. The user’s browser cookies
that can be moved from one point on a net-
work to another point in a given time? C. The user’s email address
A. Bandwidth D. The user’s public key used for encryp-
tion
B. Speed
C. Flow 284. Internet is example of which network?
D. Bits per second A. LAN
279. What is www short for? B. WAN
A. World Weighed Website C. MAN
B. World Wide Wed D. none of above
285. Which of the below is a valid protocol for 290. Which of the following is the address
email addresses? used to uniquely identify every device on
the internet?
NARAYAN CHANGDER
B. The data channels in an ISDN line C. can be integrated into one device
C. Dedicated digital telephone lines used D. can not work one without the other
in Europe
299. Your ISP (Internet Service Provider) al-
D. The signaling channels in an ISDN line lows you to:
297. Which of the following protocols can con- A. Run your own website
nect an entire network to the internet? B. Route information to the right place
A. Internet Protocol version 6 (IPv6) C. Access the Internet
B. Point-to-Point Protocol (PPP) D. Turn your computer on
9. Microwaves, washing machine, medical 13. What does GUI stand for?
equipment, cameras, toys and airplanes A. Graphical User Instruction
are some of the appliances/ machines
B. Ground User Interface
which uses the list above.
C. General User Instruction
A. Personal Digital Assistants
D. Graphical User Interface
B. Embedded Computers
C. Micro Computers 14. Which backup strategy provides the
fastest creating of backups but the slow-
D. Wearable Computers
est recovery?
10. What are two primary disadvantages of a A. Differential
cellular-enabled tablet compared to a Wi-
B. Incremental
Fi-Only tablet? (Choose two)
A. A cellular-enabled tablet has less mem- C. Full
ory and a lower processing speed D. System State
15. Which hardware component will have C. Backups are not accessible if traveling
more memory space if you close an appli- without the computer
cation?
D. Files are accessible from anywhere.
A. Read Only Memory (ROM)
B. Hard Drive 20. A user makes the complaint that the com-
puter will not turn on. What is your first
C. DVD Drive
troubleshooting step?
D. Random Access Memory (RAM)
NARAYAN CHANGDER
A. Shake the computer
16. Which two popular operating systems are
B. Check to make sure the RAM is in-
Open Source operating systems? (Choose
stalled correctly
two)
A. Windows C. Try another mouse and keyboard on
the machine
B. Android
D. Check to make sure it is plugged in and
C. Linux
that the computer is getting power
D. iOS
21. What is the major advantage of MMS com-
17. In what way can identity theft may occur
pared to SMS?
through social media?
A. By accepting invitations from follow- A. MMS allows you to do video editing
ers you do not know B. MMS has better paragraph and charac-
B. By watching a video in your newsfeed ter formatting
C. By spying on accounts from followers C. In MMS, text messages are limited to
you do no know 160 characters
D. By reading an email requesting you to D. In MMS, text messages can contain
update your account information photos and links
18. What is a browser cookie?
22. How often should you log out of a social
A. A program that feeds your computer media account, life Facebook?
B. Text file a website puts on your com-
A. Anytime you’re not using it
puter
C. Type of virus B. Never, if not required
24. Which two items would be best for cre- C. The same local area network for both
ating backups of your computer data? devices
(Choose two)
28. What three items are required to establish 32. What are three limitations of a smart-
a VPN connection? (Choose three) phone compared to a laptop computer?
A. Public network connection, like the In- (Choose three)
ternet A. Cannot directly connect most smart-
B. VPN client installed on the remote de- phones to a USB drive
vice B. Cannot host a website
NARAYAN CHANGDER
A. Checking your bank account C. When to turn off the display
B. Watching a YouTube video D. When to turn off the hard drive
C. Making an online purchase E. Brightness level
D. Posting to your Facebook timeline
38. You have a Windows 10 computer and are
E. Browsing the news creating files in Microsoft Office. How can
34. What are three common characteristics of you put them in your OneDrive online stor-
a phishing website? (Choose three) age?
A. Has links connecting to legitimate web- A. Drag each file into your Google Drive
sites B. Open a web browser and log in to Drop-
B. Uses genuine-looking images box
C. Attempt to collect personal or financial C. Save the files in your local OneDrive
information folder
D. Uses authentic logos from a well- D. Place each file in your OneNote note-
known company book
E. Presents fake news 39. You want to install a new program, but
you aren’t sure if you PC has enough RAM.
35. You notice that your computer is full of Where on your computer is this informa-
old files and programs that you no longer tion displayed?
need, and you want to clear up memory on
your laptop. Which hardware component A. User Accounts
will have more storage after you delete a B. Date and Time
file? C. Administrative Tools
A. Random Access Memory (RAM) D. System Information
B. Hard Drive
40. Which component is responsible for hold-
C. DVD Drive ing data, instructions and information in
D. Read Only Memory (ROM) the computer when processing is taking
place?
36. They normally interact with the system via
user interface provided by the application A. RAM
software. B. ROM
A. Programmers C. CPU
B. Developers D. Secondary Storage
41. Which three of the following can be per- B. Unlimited storage space
formed when using Gmail’s chat service?
C. Accessibility
(Choose three)
B. Format text and paragraphs 46. Which three ways allow you to connect a
C. Insert tables keyboard to a computing device? (Choose
three)
D. Watch a video inside the chat window
E. Insert hyperlinks A. USB
B. Keyboard port
42. Which three options are common ways
to receive notifications on a smartphone? C. VGA Port
(Choose three) D. HDMI port
A. Fax
E. Bluetooth
B. Vibration
C. Sound 47. What two statements are true about us-
ing external hard drives to store backups?
D. Flashing screen or light (Choose two)
43. What are two advantages of a wired net- A. Transferring data to an external hard
work over a Wi-Fi network? (Choose drive is generally faster than transferring
two) to a cloud service
A. More mobility B. External hard drives must be con-
B. Costs less money to transfer data nected to the computer for each sched-
C. More security uled backup
NARAYAN CHANGDER
50. You want to browse the Internet, but first
you have to connect to a network. A smart are two things you should consider before
phone can connect to the Internet using selling your cell phone? (Choose two)
which three methods? (Choose three) A. Remove the SIM card if applicable
A. Wi-Fi B. Leave all of your personal information
B. Mobile app on the device
C. Data plan from a cellular carrier C. Perform a factory reset of the device
A. Documents B. CDMA
B. Downloads C. Wi-Fi
C. Temporary D. GSM
67. Software written to meet the need specific 72. To be effective, how often should antivirus
need of a company is software be updated?
A. special purpose software A. As often as available
B. integrated software B. Monthly
C. general purpose software C. Weekly
NARAYAN CHANGDER
68. Which service is required to use text mes-
bandwidth? (Choose two)
saging on a mobile device?
A. Amount of memory
A. A Twitter or Instagram account
B. Processor
B. A mobile text messaging plan
C. Cable modem
C. A connection to the Internet
D. Wireless router
D. A cellular account
74. Which statement is true about firewalls?
69. What is spyware? A. With a firewall in place, users will
A. Malicious software that appears to be never need to worry about viruses and
harmless or good malware
B. Replicates itself to spread to other B. A firewall is a device that protect the
computers hard drive from fire damage
C. Malicious software that collects per- C. Firewalls use a set of rules to protect
sonal information computers from harmful network traffic
85. Which of the following pieces of informa- 90. A program can be defined as a series of
tion are displayed in the properties win- detailed step-by-step that tell the com-
dow of a file? (Choose three) puter precisely what actions to perform.
A. Size A. Software
B. Location B. Inputs
C. Date Created C. Applications
D. Author D. Instructions
NARAYAN CHANGDER
E. User credentials 91. Which of the following is NOT a classifica-
tion of computers?
86. Which two ways connect a printer directly A. Micro Computer
to a computer? (Choose two)
B. Mini Computer
A. USB port
C. Desktop Computer
B. Ethernet port
D. Super Computer
C. Wi-Fi
92. You want to make a purchase online.
D. VGA port What identifier indicates that the connec-
E. HDMI tion is secure for transmitting credit card
information to the website?
87. What are two advantages of using a Wi-
A. The website’s URL begins with “https”
Fi network instead of a cellular network?
(Choose two) B. The website uses PayPal
A. Cost less money to transfer data C. The website domain is “.biz”
D. The website domain is “.com”
B. Has greater mobility
C. Accessible from more places 93. Which of the following networks will al-
low you to connect your cellular-enabled
D. Speed is faster table without incurring additional data
88. Which two methods are most commonly costs?
used to connect a pair of speakers to a lap- A. Public wireless network
top computer? (Choose two) B. Local carrier network
A. Bluetooth C. Roaming network
B. Wi-Fi D. none of above
C. Ethernet 94. Which three of the following businesses
D. Audio cable would benefit most from using cellular-
enabled tablets rather than Wi-Fi-only
89. Which two connections are made using an tablets? (Choose three)
Ethernet port on a laptop? (Choose two) A. Small restaurant
A. Connect to another computer B. Clothing store
B. Connect to a camera C. Flower-delivery service
C. Connect to a printer D. Carpet-cleaning business
D. Connect to a switch E. Real estate agent
A. Using the uninstaller will remove an 102. What type of public service will allow
application and all files associated with it you to connect your Wi-Fi device to the In-
ternet at no cost?
B. Once an application is installed, it can’t
be removed without completely erasing A. Microsoft
the hard drive B. Hotspot
C. Deleting an application’s desktop icon C. Apple
will remove the app along with all associ- D. Cellular carrier
ated files
103. What type of organization would most
D. Once a program is outdated, it must be
benefit from an LMS?
uninstalled and reinstalled to get the lat-
est version A. Legal office
B. Florist
98. What are the FOUR main functions of the
computer? C. School
A. Input, Process, Output, Recording D. Restaurant
B. Input, Output, Displaying, Remember- 104. What is one reason to zip files?
ing A. To perform routine backups of data
C. Input, Process, Output, Store and files
D. None of the above B. To maintain the organization of a set
of files or directories when sharing it with
99. Which form of network provides the great- others
est reliability and speed? C. To increase disk space
A. Wireless network D. To expand the size of files to be sent to
B. Wired network others online
NARAYAN CHANGDER
D. The computer starts your operating B. It monitors hardware upgrades
system C. In automatically drives or controls sys-
tem updates
106. A friend accidentally deletes all of your
favorite photos from you computer hard D. It is the software that allows comput-
drive. What should you do? ers to connect to a network
A. Reformat your hard drive 111. Which of the following is NOT a system
B. Backup your computer utility?
C. Create new photos A. antivirus program
D. Restore from backup B. disk checking program
C. word processing program
107. You want to share a 100 GB file with
a group of 50 people located in different D. disk defragmenting program
cities. Which is the quickest way to share 112. What are three things you cannot do with
a large file with remote users? a hardwired phone that you can do with a
A. Share a link to a cloud storage location basic cellular phone? (Choose three)
B. Email the file as an attachment A. Cannot send/receive text messages
with hardwired phones
C. Download the file to a flash drive
B. Cannot take hardwired phones with
D. Save it to a shared folder on your com-
you to use while traveling internationally
puter
C. Cannot access voice mail through hard-
108. Which of the following is a way to close wired phones
a program that is not responding without
D. Cannot use hardwired phones while
using CTRL+ALT+DELETE?
riding as a passenger in a car
A. Pressing and holding ESC on your key-
E. Cannot use hardwired phones to make
board for 10 seconds
conference calls
B. Using the End Task feature in the Task
Manager 113. What two statements are true about
using a cloud service to store backups?
C. Pressing CTRL+F5 on your keyboard
(Choose two)
D. Choosing End Task from the Security A. The computer containing the data to be
tab in the right-click menu backed up must be connected to the Inter-
109. Salesforce, Microsoft Dynamics, SAP, net.
and Pipedrive are all examples of what B. Cloud services can only be used to
type of software? backup smartphones
C. A cloud service is only useful for stor- D. When making calls from a cellular
ing large amounts of data phone
116. What is the name given to software that E. Upload several lengthy HD videos
can be used by many people for a wide 120. Computers are made up of and ?
range of tasks?
A. Hardware and Software
A. Custom-written
B. Bits and Pieces
B. Integrated
C. Inputs and Outputs
C. General-purpose
D. Plastic and Metal
D. Special-purpose
121. Which technology provides a “tunnel”
117. In what situation do you need an ISP?
through the Internet so you can securely
A. When you need a data plan for your connect from home to your office?
smartphone?
A. Wi-Fi
B. When connecting your home Wi-Fi to
the Internet B. Local Area Network (LAN)
NARAYAN CHANGDER
2. Which of the mode surveillance camera
adapts to during night? C. Transistor
D. Lollypop A. Storage
B. Accuracy
15. Two or more computers connected close to-
gether in a local area e.g. building or office C. Speed
is called? D. Versatility
A. WAN
21. A computer is a very device as it can
B. LAN process millions of instructions.
C. The Internet A. Slow
D. Virtual Network B. proper
16. Mistakes on a computer occur only when a C. fast
has been entered.
D. none of above
A. input
22. Each IoT device has a unique identity and
B. wrong data
a unique identifier (such as an IP address
C. program or a ).
D. none of above A. URN
17. What are examples of Magnetic Media B. URF
A. Hard disk C. URI
B. Floppy disk D. URV
23. Self-configuring devices have the ability to 29. What does the ‘W’ stand for in ‘WAN’
A. fetch latest software upgrades A. Wireless
B. Scatter a network B. World
C. to install a malware C. Web
D. form a container D. Wide
24. One use of IoT is: 30. To Prepare a glass of Juice, the output will
be
NARAYAN CHANGDER
A. Computer
A. Fruits
B. Laptop
B. Juicer
C. Smart Home C. Juice
D. None of these D. none of above
25. Computers are because they can per- 31. What specifications are important for
form many operations on their own with sending 2 GB of data through the mail?
few commands given to them.
A. Capacity
A. serious B. Cost Per GB
B. accurate C. Speed
C. reliable D. Durability
D. automatic E. Portability
26. The ability of the computer to process data 32. The set of rules followed to exchange data
as fast as possible is called between two devices is called?
A. Storage A. Connections
B. Accuracy B. Wires
C. Speed C. Protocols
D. Versatility D. All the above
27. The ability of the computer to store data, 33. Which of these is a characteristic of com-
information and programs is called puters?
A. Storage A. Independence
B. Freedom
B. Accuracy
C. Speed
C. Speed
D. Majestic
D. Versatility
34. IoT Devices may have the capability to
28. It is the process of entering data into the dynamically adapt with changing contexts
computer system. and take actions based on the
A. Output A. device
B. System B. things
C. Input C. sensing environment
D. none of above D. All the above
35. Select the advantage of the IoT: 40. Which of the following hardware devices
A. The ability to access information from is most likely to be shared on a network?
NARAYAN CHANGDER
D. Water Cooling A. Random Access Memory(RAM)
2. A cooling system composed of a liquid heat B. Bus
sink, internal liquid pump, a fan, and a ra- C. Cooling System
diator that all actively pump liquid in and
out with no help from an outside pumping D. Expansion Card
system.
7. A circuit board that connects to a com-
A. Active-liquid heat sink puter’s motherboard, giving it additional
B. Air cooling power or functionality.
NARAYAN CHANGDER
D. 10101 C. Scalability
2. Convert decimal 104 to hexadecimal num- D. Cost of Performing
ber
7. To get the physical address from the logi-
A. x84 cal address generated by the CPU, is
B. x32 used.
A. MAR
C. x68
B. MMU
D. x45
C. TLB
3. -scan program file-find all labels and cal- D. Overlays
culate the corresponding addressesThese
statement is referring to: 8. In solving problem using programming, the
A. First pass of assembly process following is the basic construct except
11. Convert x304E to octal number 17. What does the hardwired control genera-
A. 31116 tor consist of?
NARAYAN CHANGDER
C. Memory Data Register
A. Heap D. Accumulator
B. Stack
29. For an 8 bit signed integer number, the
C. Cache range of integers is
D. Accumulator A. -32 to +31
24. .ORIG is equivalent to B. -128 to +127
A. 001100000000001 C. 0 to 256
B. 0011000000000011 D. -64 to +63
C. 0011110000000000 30. The informs the CPU about the location
D. 001100000011000 of the data residing in the memory.
A. Data bus
25. The CPU has two modes privileged and
non-privileged. In order to change the B. Address bus
mode from privileged to non-privileged, C. Cache
is needed.
D. Control line
A. a hardware interrupt
31. A user-generated interrupt (e.g. moving
B. a software interrupt
a mouse) would be given a higher one
C. either hardware or software interrupt of these to ensure that the user interface
D. a non-privileged instruction does not lag in being updated:
A. priority
26. -32 can be represented as a sign magni-
tude number as B. service
A. 00100000 C. frequency
B. 10100000 D. none of above
C. 11100000 32. Convert the following 2’s complement in-
D. 10101000 teger number to a decimal number:111
1111 1111 1111 1111 1011
27. In cache memory, the word is written
into cache and main memory at the same A. -123
time. B. 123
A. copy-back C. -5
B. write-through D. -3206
33. Convert the following integer as a 2’s 38. Consider a non-pipelined processor with a
complement:-330 clock rate of 2.5 gigahertz and average cy-
cles per instruction of 4. The same proces-
NARAYAN CHANGDER
43. What is Digital Electronics B. RAM
A. Field of electronics involving the study C. Cache
of digital signal
D. None of these
B. Engineering of devices that digital sig-
nal 49. Which of the following assembly code has
error? I. ADD R2, R2, #-24II. BRnzp
C. Engineering of devices that produce
#27III. LD R2, NUMBERIV. HALT x23
digital signal
A. I and II
D. All Of the mentioned
B. II and III
44. Which memory device is generally made of
semiconductors? C. I, II and IV
53. Convert octal number 456 (base 8) to bi- 59. A register that keeps track of the next in-
nary (base 2) struction to be executed is called a
NARAYAN CHANGDER
A. x4D544E B. operate
B. x4D644E C. add
C. x4D554E D. data movement
D. x4D5E4E 71. To read the control words sequentially
66. is a large multilayered printed circuit is used.
board inside a computer that contains CPU, A. PC
BIOS, ROM chip and the CMOS setup infor-
B. IR
mation.
C. UPC (MPC)
A. Motherboard
B. RAM D. None of the mentioned
D. -256 A. Relative
B. Direct
77. How many bits will be required to
represent-88 as a 2’s complement signed C. Indexed
integer number? D. Immediate
A. 6 bit
83. What are the basic gates in MOS logic fam-
B. 10 bit
ily?
C. 12 bit
A. NAND and NOR
D. 9 bit
B. AND and OR
78. The register used to store the flags is C. NAND and OR
called as
D. AND and NOR What are the basic gates
A. Flag register
in MOS logic family? NAND and NOR
B. Status register
C. Test register 84. The control unit controls other units by gen-
erating
D. Log register
A. CONTROL SIGNALS
79. The ALU makes use of to store the in- B. TIMING SIGNALS
termediate results.
C. TRANSFER SIGNALS
A. Register
D. COMMAND SIGNALS
B. Accumulator
C. Stack 85. Which of the following operation will re-
D. Heap sult in overflow?
A. 01001 + 01000
80. Which of these is NOT a stage of the FDE
cycle? B. 01000 + 00100
A. Fetch C. 01001 + 00100
B. Execute D. 01000 + 10100
86. Which of these busses is unidirectional? 91. The stage delays in a 4 stage pipeline are
A. Address bus 800, 500, 400 and 300 picoseconds. The
first stage is replaced with a functionally
B. Control bus equivalent design involving two stages
C. Data bus with respective delays 600 and 350 pi-
D. none of above coseconds.The throughput increase of the
pipeline is %.
87. In zero address instruction method, the
A. 31.33%
operands are stored in
NARAYAN CHANGDER
B. 32.33%
A. registers
B. accumulators C. 33.33%
NARAYAN CHANGDER
system B. ROM
A. Mainframe C. Register
B. Desktop
D. Harddisk
C. Super
15. it can store, retrieve, and process data.
D. Laptop
A. Computer
10. Which type of computer is built to what is
the abbreviation of CPU? support an orga- B. Microphone device
nization’s information? C. DATA Switch
A. Central Processing Unit D. Router
B. Central Protocol Unit
16. The portion of a computer that fetches and
C. Counter Processing Unit executes instructions is called?
D. Central Proces A. Memory
11. What does the control unit do? B. Central processing unit
A. It controls and monitors communica- C. Register
tions between the computer and any hard- D. Cache
ware attached
B. It holds the data and programs that 17. is a hardware design aspect that defines
the CPU currently needs and prescribes the size, shape, and other
physical specifications of components, par-
C. It holds the data and programs that
ticularly in electronics.
the CPU currently needs
A. Open-Source
D. All of the above
B. CPU
12. it is any part of your computer that has a
physical structure. C. Form Factor
NARAYAN CHANGDER
A. SDRAM’s C. Desktop Computer
B. Heaps D. SMART WiFi
A. 34 bits C. ROM
18. optical disks are read with a 24. A is the main storage device in your
A. glass computer.
B. heater A. CPU
C. fuser B. Hard drive
D. laser C. Motherboard
19. What component in a computer allows you D. CD-Rom
to keep multiple windows open and allows
NARAYAN CHANGDER
you to switch between them 25. Computer memory are of two types:
A. RAM A. Hard disk and Flash drive
B. ROM B. Hard Disk and Memory Card
C. CPU C. RAM and ROM
D. SSD D. Internal memory and External memory
20. NORMA means
26. What is the smallest measurement used to
A. no remote mapping access measure a computer memory?
B. network operation of remote memory A. Megabyte
access
B. Terabyte
C. no remote memory access
D. network remote memory access C. Yottabyte
D. Bits
21. Amount of time it takes storage devices to
begin reading data 27. Where is the location of system cache?
A. process time A. on the die of the CPU
B. access time
B. on the processor chip
C. print time
C. on the motherboard
D. idel time
D. none of above
22. Boot-up program
A. Cache 28. What is RAM?
B. RAM A. Read Only Memory
C. ROM B. Random Access Memory
D. Hard Disk C. Read Any Memory
23. Which of these components are included in D. none of above
a Hard Disk Drive?
29. Operating System is loaded into?
A. Motor
B. Platter A. ROM
34. Binary data on Hard Disk Drives is repre- B. Metal Read Only Memory
sented using C. Mask Read Only Memory
A. Magnetic charges D. Mobility Read Only Memory
B. Physical pits and lands
40. Virtual memory is
C. Electrical current
A. a memory management technique
D. Lasers
B. a virus checking utility
35. What is the fastest form of memory? C. a piece of hardware
A. Level 1 cache D. an series of pixels used to represent
B. Level 2 cache an image
NARAYAN CHANGDER
B. Blu Ray Disc
be?
C. Hard Disk
A. RAM
D. none of above
B. Hard drive
C. Cache 48. A type of volatile memory
D. The cloud A. RAM
43. A line includes a that identifies which B. ROM
particular block is currently being stored C. Cache memory
A. cache D. Flash memory
B. hit
C. tag 49. Can be programmed a limited amount of
times, and one bit at a time can be erased
D. locality with electricity
44. How many bytes are there in a kilobyte? A. EEPROM
A. 2024 B. EPROM
B. 1024 C. flash ROM
C. 1000 D. PROM
D. 8
50. The memory implemented using the semi-
45. *Consider a direct mapped cache with block conductor chips is
size 4 KB. The size of main memory is 16
GB and there are 10 bits in the tag. Find A. Cache
the number of bits in line number. B. Main
A. 16 bits C. Secondary
B. 8 bits D. Registers
C. 12 bits
51. Which Of these devices can be single or
D. 32 bits
double sided?
46. Which of the following medium is used be- A. CD
tween CPU & RAM TO speed up the pro-
cessing power of a CPU? B. DVD
A. Virtual Memory C. Pen Drive
B. Flash Memory D. none of above
63. Why is there a short delay before a pro- 68. Which one is used to store data that con-
gram opens? trols the most basic computer functional-
ity?
A. Because the RAM is slow
A. RAM
B. Because the RAM is not working
B. ROM
C. Because the RAM has a virus
C. HDD
D. Because the RAM is loading the mod-
ule D. none of above
NARAYAN CHANGDER
69. RAM-What happens when the electricity
64. What is the correct order of storage capac-
Is turned off?
ity in ascending order?
A. The data from the memory is saved
A. Byte, Bit, Megabyte, Kilobyte, Gigabyte
onto flash memory
B. Bit, Byte, Kilobyte, Megabyte, Gigabyte
B. The data from the memory is saved
C. Megabyte, Byte, Gigabyte, Bit, Kilo- onto the hard disk
byte C. The data from the memory is not saved
D. Bit, Megabyte, Byte, Gigabyte, Kilobyte D. The data from the memory is saved
onto ROM
65. In approach, Shared-memory space is
ordered as an associative memory called a 70. Which storage device stores data using
tuple space. magnetic technology?
A. structuring as a database A. Solid state
B. no structuring B. Internal Hard disk
C. structuring by data type C. USB
D. None of the mentioned D. External hard disk
66. A computer keeps data, instructions, and 71. consists of electronic components that
information on this. store instructions waiting to be executed
and the data needed by those instructions.
A. Solid-State Drives
A. Memory
B. External Hard Drive
B. Storage Device
C. Storage Media
C. Memory Cards
D. none of above
D. none of above
67. What does the RAM store? 72. In distributed system, read the data
A. Operating system, programs and data item referenced by address, and write
which are currently being used the contents referenced by address to the
value of data.
B. A program used to start the computer
called the boot program or BIOS A. sets, returns
C. All programs and documents stored on B. returns, sets
the computer C. returns, returns
D. none of above D. None of the mentioned
73. If the RAM is upgraded from 512MB to B. The cache is too slow
4GB, what will be the biggest benefit? C. The virtual memory is too small
D. Charger A. thrashing
B. granularity
76. What are the examples of primary mem-
C. consistency
ory?
D. None of the mentioned
A. RAM
B. ROM 82. a portable flash memory storage device
that you plug in a USB port, which is a
C. HDD
special, easily accessible opening on a com-
D. SSD puter or mobile device.
77. The model is the strongest form of A. Mouse
memory coherence, having the most strin- B. USB Flash Drives
gent consistency requirement. C. IPhone
A. Sequential Consistency D. none of above
B. Strict Consistency
83. Portable, inexpensive storage medium
C. Causal Consistency (also called diskette)
D. None of the mentioned A. CD-ROM
78. A computer is continuously paging to the B. DVD-ROM
swap file. Why might this be C. Floppy disk
A. There is not enough RAM D. Hard disk
84. An advantage of the use of approach 89. A computer has 1024 megabytes of RAM.
in shared-memory space is that it is conve- That is the same as
nient to choose any suitable page size as A. 1 Gb
the unit of sharing and a fixed grain size
may be used for all applications. B. 1000 Gb
A. structuring as a database C. 1 Kb
B. no structuring D. 1 Tb
NARAYAN CHANGDER
C. structuring by data type 90. Why do computers need RAM?
D. None of the mentioned A. To store the boot up sequence for the
computer quickly
85. Which Memory Device is used in Portable
devices such as Mobile Phone? B. To allow the CPU to access Data and
Instructions securely
A. SIM Card
C. To allow the CPU to access Data and
B. Memory Card Instructions quickly
C. CD D. To store the boot up sequence for the
D. none of above computer securely
86. Why is RAM volatile? 91. A storage medium for portable devices like
digital cameras, mobiles.
A. It isn’t, it keeps its memory, even
when the computer is turned off A. Memory card
B. It temporarily stores data, when the B. USB
power is turned off, it loses what was was C. CD
stored in it.
D. Hard Disk
C. Its contents fly around inside it all the
time 92. Which of these components are included in
a Optical Disk Drive?
D. none of above
A. Motor
87. Where is ROM usually found inside a com-
B. Platter
puter?
C. Read-write head
A. Inside the CPU
D. ALU
B. As part of the hard drive
E. Laser
C. On the motherboard
D. With the CD drive 93. The main problem is to solve the memory
coherence problem that deals with the
88. Not intended to be a portable storage de- of a piece of shared data lying in the main
vice. memories of two or more nodes.
A. CD A. thrashing
B. Flash memory B. Granularity
C. DVD C. consistency
D. Internal hard disk D. None of the mentioned
94. Built in memory of computer is 100. “Memory is organized into records and
access must be made in a specific linear se-
A. EROM
quence” is a description of
96. The only two digits used in the binary num- D. none of above
ber system are 102. What is Blu-Ray used for?
A. one and two A. Save data for later use
B. zero and one B. Backing up whole computer systems
C. zero and two C. Storing Films, Games
99. What is BIOS? 105. Which Device uses Blue Violet Laser to
read write data?
A. Beginners Input/output System
A. RAM
B. Basic Input/Output System B. Blu Ray Disc
C. Based Inside Of System C. Hard Disk
D. none of above D. none of above
106. refers to the block size of the DSM 111. This memory stores the data of the op-
system, i.e. to the units of sharing and the erating system and programs that are cur-
unit of data transfer across the network rently running, for access by the CPU.
when a network block fault occurs.
A. RAM
A. Granularity
B. ROM
B. Coherence
C. Cache memory
C. Abstraction
D. Flash memory
NARAYAN CHANGDER
D. Synchronization
112. For set-associative mapping, the cache
107. The faster, costlier and relatively small control logic interprets a memory address
from of storage managed by computer sys- as
tem hardware is:
A. 3 fields
A. Main Memory
B. 2 fields
B. Flash Memory
C. 1 field
C. Cache memory
D. 4 fields
D. Virtual Memory
113. A CD CAN STORE UP TO OF DATA
108. Which one is an example of flash mem- AND IS IN DIAMETER.
ory?
A. 500 MB, 56 INCHES
A. SD Card
B. 700 MB, 47 INCHES
B. RAM
C. 300 MB, 54 INCHES
C. ROM
D. none of above
D. Cache
114. Data is stored in the computer memory in
109. Data and instructions stored in this In- the form of:
ternal memory is lost when computer is
A. Numbers
turned off
B. Text
A. ROM
C. Bits/Bytes
B. RAM
D. none of above
C. USB
D. Hard disk 115. What do the instructions in the ROM do
when the computer starts up?
110. The most effective Replacement Algo-
A. Transfers the Operating System from
rithms for direct mapping
Secondary Storage to the RAM
A. LRU
B. Checks the system for viruses
B. LFU
C. Checks the system for errors
C. FIFO
D. Transfers the Operating System from
D. No choice ROM to the RAM
B. ROM B. MISS
121. How Many GBs does a Terabyte have? 126. Which is the Main Secondary Memory?
A. 1024 A. Blu Ray Disc
B. 8 B. DVD
C. 100 C. Hard Disk
D. 1 D. none of above
127. Choose the correct option about computer 133. In a distributed computing environment,
memory. distributed shared memory is used which
A. RAM-Non Volatile-Permanent is
B. ROM-Volatile-Temporary A. Logical combination of virtual memo-
ries on the nodes
C. RAM-Volatile-Temporary
D. ROM-Volatile-Permanent B. Logical combination of physical memo-
ries on the nodes
128. Which type of storage is directly accessi-
NARAYAN CHANGDER
C. Logical combination of the secondary
ble to the CPU?
memories on all the nodes
A. Primary
D. All of the above
B. Secondary
C. Offline 134. What is storage?
D. none of above A. Computer equipment on which infor-
129. How many bits are in a single byte? mation can be stored
A. 4 B. Microsoft word
B. 8 C. It is a network
C. 12 D. All of the above
D. 16
135. ROM stands for
130. An example of what is stored on RAM is:
A. Read Optical Memory
A. Instructions
B. Random Only Memory
B. The Operating System
C. Calculations C. Read Only Memory
D. none of above D. Random Optical Memory
131. For internal memory, the is equal to 136. is the most effective replacement al-
the number of electrical lines into and out gorithm
of the memory module.
A. Random
A. access time
B. unit of transfer B. LFU
C. capacity C. LRU
D. memory ratio D. FIFO
132. Can be programmed a limited amount of 137. Binary data on Optical discs is repre-
times and be erased with an ultraviolet sented using
light.
A. Magnetic charges
A. EEPROM
B. EPROM B. Physical pits and lands
138. refers to whether memory is internal C. A device that uses tape to store data
or external to the computer. D. Where the computer start up instruc-
C. Secondary D. TLB
149. CD means? 154. The data held on can be read but not
changed. This is done during manufactur-
A. Circular Disc
ing.
B. Complete Disc
A. RAM
C. Compact Disc
B. ROM
D. none of above
C. Cache memory
150. This is a method of making a computer ap- D. Flash memory
NARAYAN CHANGDER
pear to have more primary memory than
it has really has physically. For instance 155. needle-like part of the HD that writes
a PC might have 2Gb of RAM as primary and reads data from the platter
memory, but of 4Gb. If a computer
A. actuator
relies on this memory it will be slow.
B. spindle
A. Virtual Memory
C. read/write head
B. Random Access Memory
D. cable
C. Read Only Memory
D. Cache Memory 156. What is stored in Read Only Memory
(ROM)?
151. If your programs are loading REALLY
A. Recently opened programs
slow-what could a reason be?
B. Operating system and currently run-
A. The RAM isn’t working
ning programs
B. The RAM is full
C. BIOS and boot sequence (the com-
C. The RAM is frozen puter’s initial start-up process)
D. none of above D. The CPU’s registers
152. When we work on any document on PC, 157. Most popular backup device.Small,
it is stored temporarily on- lightweight plug and play device used to
copy data from one computer to another
A. RAM
A. DVD
B. ROM
B. Hard disk
C. CPU
C. CD
D. Flash Memory
D. Flash drive
153. Having data belonging to two inde-
pendent processes in the same page is 158. Virtual memory typically uses two stor-
called age devices, RAM and
A. Buffering A. the hard drive
B. Blocking B. ROM
C. Message-passing C. a secondary piece of RAM
D. False sharing D. a CD-ROM
159. Very portable and robust as it is designed 165. Which transfer is faster
to be fitted into small electronic devices. A. data between the cache and the CPU
171. What Is Secondary Storage? 175. is the time from the instant that an
A. Secondary storage refers to any de- address is presented to the memory to
vice that can store data, in addition to the instant that data have been stored or
main memory. made available for use.
B. Secondary storage refers to any mem- A. memory cycle time
ory that is used after RAM is full. B. direct access
C. Secondary storage refers to storage C. transfer rate
that isnt as good as normal storage.
NARAYAN CHANGDER
D. access time
D. none of above
176. This internal memory holds start up in-
172. CPU Cache is located on
structions that prepare the computer for
A. The CPU use and check proper working of computer
B. The RAM parts.
C. The hard drive A. RAM
D. The motherboard B. Flash Drive
173. Why do a lot of devices use flash memory C. ROM
A. It is the fastest sort of mem- D. Memory Card
ory/storage you can get
177. Auxiliary Memory is
B. It is the cheapest form of mem-
ory/storage A. Primary Memory
C. It’s almost unbreakable due to no mov- B. RAM and ROM
ing parts C. Secondary Memory
D. It needs zero power to write to/read
D. none of above
from
174. What is the average latency of DRAM for 178. Which of these items are NOT stored in
current Computer systems? RAM
13. If you want to draw house plans, you could 19. What does computer memory do? Select
use this device 2.
A. Light pen A. Keep track of software and stores
B. graphic Tablet open files
C. PDA B. Remembers your shopping list
D. none of above C. How the computer types on the screen
D. can make the computer go faster
NARAYAN CHANGDER
14. Which printer is very slow and noisy?
A. Dot Matrix printer
20. Which input device captures handwriting,
B. Laser printer hand drawn images and graphics?
C. Printer A. Graphics tablet
D. none of above
B. Mouse
15. What is used to prevent viruses from en- C. Interactive whiteboard
tering your computer?
D. none of above
A. Anti-malware
B. Anti-spyware 21. Pick out two sensors that can be used in a
C. Firewall vehicle
D. Anti-virus A. proximity sensor
24. Software that protects against infections 29. keyboard have arrow keys
caused by many types of malware, includ- A. 6
ing viruses, worms, Trojan horses, spy-
35. Select the items below which are not stor- B. program
age devices. C. application
A. Web Camera D. server
B. Microphone
41. Printer, Monitor, Speakers and Head-
C. Scanner
phones are which type of devices?
D. Flash Drive
A. Input
E. SD Card
NARAYAN CHANGDER
B. Output
36. What combination of devices would you C. Software
select in order to provide customers of a
D. Hardware
supermarket with a customised bill?
A. Barcode reader and a printer 42. Which of the following are examples of In-
put Deices?
B. Keyboard, mouse and a printer
A. Barcode Scanner
C. Scanner and a printer
D. none of above B. Monitor
C. Joystick
37. Input device that only works with CRT
monitors called? D. Speaker
46. Glare view might give headache to user 52. What performs automatic stock control,
due to the sharpness of the images. enables faster changes to product infor-
mation and allows easier studying of sale
57. A point-and-draw device is nothing but D. is used when a computer is not avail-
a able
A. CD-ROM
63. A device that inputs data to a computer.
B. Mouse The data is a measurement of some physi-
C. Printer cal quantity that is continuously changing.
D. Keyboard A. Microphones
58. A device that can read text or illustrations B. Digital Camera
NARAYAN CHANGDER
printed on paper and translates the infor- C. Sensors
mation into a form the computer can use.
D. Graphic tablet
A. Scanning Devices
B. Voice-Input Devices 64. This printer normally print out large and
C. Pointing Devices high resolution printouts.
D. Direct Entry A. Inkjet printer
B. output D. Programs
C. Software 66. Which type of device is a Hard Drive?
D. USB
A. Input Device
61. What does GPS stand for? B. Output Device
A. Global Positioning System C. Storage Device
B. Global Positioning Satellites
D. none of above
C. Global Position Same
D. General Positioning System 67. What software is used to prevent hack-
ers?
62. A peripheral device is a device that
A. Firewall
A. is used on the outside of a computer
B. Anti-spyware
B. is used on the inside of a computer
C. Data Protection ActAnti-virus
C. is used both on the outside and inside
of a computer D. Anti-virus
80. A does the same thing as a mouse on 86. What is the common type of wide format
the computer. printer?
A. Track Pad A. electrostatic plotter
B. Floppy Disk B. inkjet printer
C. Hard Disk C. laser printer
D. CPU D. 3D printer
NARAYAN CHANGDER
registration is
A. RAM
A. It is not reliant on technology
B. Hard Disk Drive
B. It is cheap
C. CPU
C. It is unique to each person, so the stu-
D. ROM
dent can’t forget it or ask someone else
82. Another term for permanent output is: to scan them in.
A. hardcopy D. none of above
B. softcopy 88. Hardware devices that allow data to be
C. hardware transmitted to a computer is called?
D. printer A. Output Devices
B. Input Devices
83. An eye typer can be used to
C. Direct Data Entry
A. track a users eye movements and
record the movements as input D. Storage Devices
B. lets the user log onto a website using 89. I’m an output device you use to hear
their eye as biometric identification sounds on the computer
C. print something out in braille A. Speaker
D. enlarge information on a screen B. Monitor
C. Mouse
84. Which of the following is NOT an Operat-
ing System D. Printer
A. Android 90. Name the device used to play games on
B. Word the computer.
C. iOS A. Input device
D. Windows B. Joystick
C. Mouse
85. a device the “reads” pencil marks compat-
D. none of above
ible scan forms-used for registering stu-
dents (and tests etc.)-this is describing 91. Choose the input devices.
A. Optical Character Recognition (OCR) A. Scanner and printer
B. Optical Mark Recognition (OMR) B. Speaker and projector
C. Optical Computer Recognition (OCR) C. Mouse and keyboard
D. Optical Mark Response (OMR) D. none of above
92. Jasmine needs to hand in her report to a 97. For video conferencing over the internet
teacher, but she only has a digital copy. what do you use?
Which device would most help her with
95. The instructions that tell the computer 101. Select the shortcut key of refresh on the
what to do and how to do it: keyboard.
A. Software A. F2
B. Hardware B. F4
C. F5
C. Mouse
D. F8
D. Monitor
E. Non of these
96. Which of the following is the output de-
102. This component allows users to enter
vice?
text, numbers, and other information
A. Photocopier A. Mouse
B. Game controller B. Keyboard
C. Microphone C. Monitor
D. All of the above D. CPU
D. Microphone A. Input
B. Output
NARAYAN CHANGDER
104. Which of the following is NOT a category
of Hardware? C. Storage
A. Input Devices D. none of above
B. Software
110. Which of the following devices is in-
C. Central Processing Unit stalled in e-Channels?
D. Storage Devices A. Mice
105. What are the most used input devices B. Keyboards
A. mouse and keyboard C. Fingerprint scanners
B. scanner and space bar D. Speakers
C. power cord and printer
111. Can you identify an input device from the
D. computer and camera following?
106. Device that projects images, gives sound, A. Keyboard
and basically gives out the info from
B. Headphones
the computer so the user can obtain it
(ex:monitor, printer, projector, speakers). C. CRT
A. Byte D. USB
B. GUI
112. How is an output device for a computer
C. Output defined?
D. Input A. Component on the inside of a computer
107. is a device that moves or controls B. Device which connects to the Internet
some mechanism
C. Device which puts data into a com-
A. Sensor puter
B. Actuator D. Device which puts data out from a com-
C. Dynamo puter
D. Buzzer 113. Most commonly used input device.
108. Mark kept getting in trouble at the li- A. graphic tablet
brary because he kept watching YouTube
B. keyboard
videos over the speakers. Which device
would better help keep his audio private? C. SD card
A. Headphones D. none of above
114. What does OS stand for 120. Which device can project an image on
A. Organisation Startup the screen, and allow it to be annotated,
changed and eventually saved?
NARAYAN CHANGDER
C. A scanner
132. Which of these would you use to digitise
D. A webcam a paper photograph?
store’s web site. All this inside a simple 142. Which type of device is a Hard Disk
square. Drive?
NARAYAN CHANGDER
B. Touch Screen
A. Monitor
C. Digital Camera
B. Speaker
D. All of the Above
C. Projector
149. What type of keyboard is used in tele- D. Scanner
phone and ATMs?
155. Which type of device is a QWERTY Key-
A. Numeric keyboard board?
B. Numeric keypad A. Input Device
C. Portable keyboard B. Output Device
D. QWERTY keyboard C. Storage Device
D. none of above
150. Documents you create using Google Docs
are stored: 156. is used instead of a mouse in a lap-
A. On your computer top.
C. hotness and coldness sensor 164. Which input device is used to select ob-
jects on a screen with the touch of a fin-
D. pH sensor
ger?
170. The heart (and brains) of the computer is 176. Programs that give instruction to the
the: computer.
A. ROM A. keyboard
B. RAM B. mother board
C. Motherboard C. hardware
D. CPU D. software
171. What is a TV like screen used to show 177. Which monitor is not good for your health
NARAYAN CHANGDER
pictures and words called? (eyestrain, headache, etc)
A. Keyboard A. CRT
B. Printer B. TFT
C. Monitor C. LCD
D. Scanner D. LED
172. Which of the following is not included in 178. Which of the following input devices is
pointing device? most suitable for an information kiosk?
NARAYAN CHANGDER
C. Monitor 199. A system is set to turn on the lights in
a street light. Which of the following will
D. Printer change the data into a format that the CPU
will understand
194. Which of the following would be an ideal
situation for using a tracker ball? A. DAC
A. To output data from a computer 203. Input device which communicates com-
mands to the CPU; allows users to select,
B. To store data on a computer
highlight, and control options on the moni-
C. To input data into a computer tor
D. To process data on a computer A. Mouse
A. Optical Mark Reader Registration 210. programs that control or maintain the
operations of the computer and its devices.
B. Biometric Registration
A. Software
C. Smart Card Scan
B. System Software
D. Electronic Scan Registration
C. Application software
205. In which of the following situations D. Utility program
would you use a keyboard?
211. The unit of CPU that stores information
A. In a hospital to input a number of pa- temporarily or permanently.
tients’ records in a database
A. Control Unit
B. At an architect’s office to draw plans
B. Memory Unit
C. In an examination centre to input a
C. ALU
number of multiple choice questions
D. none of above
D. none of above
212. This component visually displays informa-
206. If you want to download pictures from a tion generated by the computer
digital camera, you would use a
A. Monitor
A. flash drive
B. Motherboard
B. SD card C. CPU
C. Scanner D. Operating System
D. none of above
213. What type of devices are mouse, track-
207. Which device converts a hard copy docu- ball and light pen?
ment into a digital copy? A. Processing devices
A. A 2D scanner B. Pointing devices
B. A printer C. Display devices
C. An interactive whiteboard D. none of above
D. none of above 214. is a type of system software allows
that allow a user to perform maintenance-
208. The most popular input device: type tasks
A. mouse A. Operating system
B. keyboard B. System Software
C. pen drive C. Application software
D. microphone D. Utility program
NARAYAN CHANGDER
puter to be processed C. Memory Card
D. none of above D. External Hard drive
216. is responsible for all the calculations
222. The device which is designed to minimize
sent to the computer.
the background sound is
A. RAM
A. Joy stick
B. ROM
B. Microphone
C. CU
C. Monitor
D. ALU
D. Data glove
217. Which of the following is NOT an actua-
tor? 223. The determines the sequence in which
instructions are executed within the com-
A. Pump puter.
B. Piston
A. RAM
C. Motor
B. ROM
D. Speaker
C. CU
218. IPO stands for D. ALU
A. Internet Programs Output
224. Which of the following Output Device
B. Input Program Output gives a ‘Hardcopy’?
C. Intelligent Processing Output A. Speaker
D. Input Processing Output B. Printer
219. What are the roles of pair programmers C. Monitor
called?
D. Projector
A. Programmers and Writers
225. which of the following is true about the
B. Navigators and Drivers
barcode reader
C. Algorithms and Flowcharts
A. it is used solely by the supermarket
D. Coders and Gamers
B. it is used to scan the type of good
220. is an Output device. C. it uses an led and photosensitive cells
A. Mouse to detect the bar lines
B. Monitor D. none of above
230. Any external device that provides input 235. A motion sensing game controller (like
and output for the computer. Examples used with the Wii) is classified as
are a keyboard, mouse, monitor, and a A. input
printer. B. output
A. CPU C. both
B. Peripheral D. none of above
C. Folder
236. These are devices where the computer
D. USB sends information to you.
231. Pointing device provides an intuitive in- A. Input Devices
terface by accepting pointing gestures and B. Output Devices
converting them into machine-readable in-
put. Select all pining devices that you C. Processing Devices
know: D. None of the above
237. Input device which has is used to move a 243. Use this key to type in all capital letters.
cursor around a computer. A. shift
A. Keyboard B. space bar
B. Mouse C. caps lock
C. Monitor D. tab
D. Printer
244. A screen magnifier can be used to
NARAYAN CHANGDER
238. A free service that provides a virtual A. make information on a screen larger
drive in the Cloud into which you can cre-
B. read out information on the screen
ate folders and store files.
C. print something out in braille
A. flash drive
D. move a pointer on a screen
B. Google Drive
C. voice recognition 245. Which type of device is a MicroSD Mem-
ory Card?
D. none of above
A. Input Device
239. Which one is very fast printer. B. Output Device
A. Inkjet printer C. Storage Device
B. Laser printer D. none of above
C. Dot matrix printer
246. Which of these is not an example of an
D. none of above input device?
240. A device used mainly for playing games: A. Printer
A. remote control B. Keyboard
B. mouse C. Mouse
C. joystick D. Web-Cam
D. trackball 247. The input device that rolls on a desktop
and controls the position of the cursor on
241. controls all the connected input and then on the screen is called a ?
output devices.
A. Touch Screen
A. CPU
B. Light Pen
B. Mouse
C. Digitizer
C. Keyboard
D. Mouse
D. Monitor
248. Which of the following are not known
242. You can input text using this device? computer “infections”.
A. Scanner A. Virus
B. Microphone B. Trojan Horse
C. Webcam C. Adware
D. Keyboard D. Firewall
249. Input device that is used to input their 255. I’m the main storage device in the com-
PIN numbers when they pay for something puter
by card, called?
254. What is the common connection medium 259. What is the use of the CPU in the auto-
for stylus with the tablet? mated systems
A. WIFI A. Control the sensor
B. Infrared B. Compare value received from sensor
C. Bluetooth C. Control the flow of data in the system
D. Microwave D. none of above
260. A device used to input drawings or dia- 266. A is a type of input device that can
grams into the computer. record videos and take pictures.
A. graphic tablet A. printer
B. SD Card B. webcam
C. Keyboard C. scanner
D. none of above D. cellphone
267. Which ones are input devices? select all
NARAYAN CHANGDER
261. Does a mobile device need an Operating
System? that applies
A. Yes A. Keyboard
B. Mouse
B. No
C. Monitor
C. Sometimes
D. Projector
D. none of above
268. Information or signals put into a com-
262. Which type of device is a Keyboard? puter system.
A. Input Device A. Input
B. Output Device B. Output
C. Storage Device C. Variables
D. none of above D. Algorithms
263. Devices used to convert information from 269. Software is a series of that tells a
the computer into useful form like printout, computer what tasks to perform and how
text etc. to perform them.
A. Input device A. data
B. Output device B. information
C. Keyboard C. instruction
D. none of above D. utility
283. Which of these is NOT an input device? 289. Can you identify the output device from
A. Screen the list?
NARAYAN CHANGDER
A. Ready Only Memory
ing on the computer?
B. Random Only Memory
A. MONITOR
C. Read Only Memory
B. COMPUTER
D. None of the Above C. SPEAKER
285. Which of these devices would not be nec- D. SCANNER
essary for a self-checkout machine?
291. Which device is both and input and an out-
A. Monitor put device
B. Speaker A. A touchscreen
C. Printer B. A scanner
D. Mouse C. A keyboard
286. Input devices which do not require typing D. A light
to input data in to the computer are called:
292. What is the purpose of a microphone
A. Output devices
A. to record/transmit audio data
B. Pointing devices B. to record/transmit text data
C. Software devices C. to record/transmit infrared data
D. none of above D. to play audio data
287. Which of the following shows the correct 293. What are the 2 types of memory?
order of storage size, starting with the
smallest? A. RAM-Random Access Memory
B. Hard drive Storage
A. Floppy disk, CD-ROM, DVD
C. Brain
B. CD-ROM, DVD, floppy disk
D. Processor
C. DVD, CD-ROM, floppy disk
D. none of above 294. What do you absolutely need to run prop-
erly in order for your computer to work?
288. Which of the following is the input de- It’s like a master programmer for your
vice? computer, telling everything what to do.
A. Photocopier A. Mouse
B. Printer B. CD Drive
C. Microphone C. Operating System
D. All of the above D. Transitor
300. The CPU is known as the of the com- B. Hard Disk Drive
puter. C. CPU
A. Heart D. Monitor
NARAYAN CHANGDER
C. Mouse
307. What is the most suitable input device for D. none of above
inputting a short report?
A. Mouse 313. Which of the following is the result of in-
creasing the resolution of a monitor?
B. Scanner
A. Images will be sharper with more lev-
C. Keyboard
els of colours
D. None of the above
B. images displayed on the monitor be-
308. What does CPU stand for: come bigger
A. Control Processing Unit C. Images displayed on the monitor be-
come smaller
B. Central Personal Unit
D. more details of images can be dis-
C. Compact Processing Unit
played.
D. Central Processing Unit
314. Which of the following is the most recent
309. What is the difference between a mouse version of Windows?
and a tracker ball?
A. Windows 8
A. One moves across a surface and the
B. Windows 7
other is stationary
C. Windows 10
B. One is input and the other is output
D. none of above
C. One has two and the other has three
buttons 315. Output device used to display images
D. none of above from a computer
A. Monitor
310. An input interface that allows a user to
input spatial data to a computer, called? B. Webcam
A. Pointing device C. Braille Display
B. Joystick D. Speakers
C. Keyboard 316. Which of the following TV screens uses
D. Touch screen more power
317. What are the 4 basic steps to how a com- 322. A display screen that is sensitive to the
puter works? touch of a finger or stylus. Used in myr-
iad applications, including ATM machines,
A. speakers A. CPU
B. headphones B. Monitor
C. microphones C. ROM
D. radios D. Hard Drive
320. Which of the following input device is
325. It is the primary storage device of com-
used at Belize Social Security Board and
puter.
Banks to sign and enter in your signature
digitally? A. Hard Disk Drive
A. Barcode Reader B. External Hard Disk Drive
B. Graphic Tablet C. CPU
C. Flatbed Scanner
D. RAM
D. Printer
326. Which input device is used on a laptop, a
321. can input graphical images and pic-
tablet and a smartphone?
tures for a computer.
A. A touchscreen
A. Plotter
B. Printer B. A keyboard
C. Mouse C. A pen
D. Scanner D. none of above
327. What is the relationship between a bar- 332. Devices used to provide data and instruc-
code and a barcode reader? tion to the computer.
A. The thick and thin lines making up a A. Input device
barcode are read by the barcode reader, B. Output device
which then forwards to the computer the
information stored in that barcode C. Monitor
B. The pattern of lines are set by the bar- D. none of above
code reader to store information into the
NARAYAN CHANGDER
333. It is an output device that shows the im-
barcode
age onto a large surface, such as wall or
C. The barcode is read by the barcode white screen.
reader and printed onto labels to attach
A. Monitor
to products
B. Projector
D. none of above
C. Scanner
328. Which of the following applies to projec-
D. none of above
tors
A. LCD screens 334. Type of input device that can automati-
B. DLP Chip cally take readings and measurements
338. How best is the size of a hard disk mea- B. Remote Control, Touch Screen and joy-
sured? stick
349. If you want to put some old paper pic- 355. Which is used with stylus to produce free-
tures into your computer, you could use a hand drawings?
A. SD Card A. Drawing pen
B. flash drive B. Light pen
C. scanner C. Buzz light year
D. none of above D. Graphic tablet
350. Which keys are the home row keys? 356. An input device used to enter characters
NARAYAN CHANGDER
and functions into the computer system
A. qwertyuiop
pressing buttons, called?
B. asdfghjkl;
A. Remote control
C. zxcvbnm
B. Keyboard
D. 12345678
C. Mouse
351. This input device is used in a zoom class D. Touch screen
session.
357. What do the letters RSI stand for?
A. monitor
A. Repeated Stress Intake
B. printer
B. Repetitive Strain Injury
C. speaker
C. Regression Strain Injury
D. webcam
D. Resilient Symptoms Intake
352. A device that recognizes your own hand-
358. What is the heart and brains of the com-
writing or smart phones that can synch
puter?
with your computer.
A. RAM
A. mouse
B. Motherboard
B. PDA
C. Sound card
C. scanner
D. CPU
D. none of above
359. Numeric keypad is used to
353. Which of the following is considered soft-
A. produce output numbers
ware?
B. input numeric data into any transac-
A. CPU-Central Processing Unit
tion
B. OS-Operation System
C. input numeric data into application
C. RAM-Random Access Memory
D. produce a numeric data
D. Graphics Chip
360. If you want to put documents, pictures,
354. Which device scans a hard copy into digi- music, etc. into your computer you could
tal image for editing in the computer? use a
A. Printer A. Flash Drive
B. Scanner B. CD
C. Joystick C. Flash Drive or CD
D. none of above D. none of above
361. Which of the following is an output de- C. the toner is a black cream
vice? D. the toner is a black powder
372. The CPU is also known as 378. A device that inputs data to a computer,
A. Control Unit the data is a measurement of some physi-
cal quantity that is continuously changing,
B. System Unit called?
C. Memory Unit A. Microphones
D. none of above B. Digital Camera
373. Which of the following materials does a C. Sensors
NARAYAN CHANGDER
laser printer use to produce the text on a D. Graphic tablet
printout?
A. magnetic powder 379. This device moves a pointed arrow on the
screen:
B. carbon powder
A. pointer
C. ink drops
B. mouse
D. laser beam
C. keyboard
374. Which one of these can project images D. Visual Display Unit
onto a wall
A. A projector 380. If you are shopping at Walmart and you
need to know the price of an item, you
B. A monitor could use a
C. A printer A. Barcode Scanner
D. Speakers B. Scanner
375. Scanner is a? C. Web Cam
A. Hardware-OUTPUT D. none of above
B. Hardware-STORAGE
381. How would you describe an input de-
C. Hardware-SYSTEM UNIT vice?
D. Hardware-INPUT A. One that supplies the computer with in-
formation about the outside world
376. is like a rectangular box
B. One that changes information for the
A. Hard disk user to understand
B. CD C. One that receives information from the
C. Pen drive computer
D. none of above D. none of above
377. OCR stands for 382. What input device do traffic lights use?
A. Optical Character Recognition A. Sensors
B. Optical Character Reader B. OCR
C. Optimised Character Reader C. Touch screens
D. One Clear Reader D. none of above
383. Which statement about RAM is true? 389. What is the name of this class?
A. It holds less data than storage A. Keyboarding
NARAYAN CHANGDER
395. This part stores data, programs, settings, A. Microphone
and the operating system while the com- B. MIDI
puter is off. while it is on, it spins inside
the computer reading and writing data. C. Speaker
A. CPU D. Printer
B. Hard disk 401. This device looks like a pencil eraser that
replaces the mouse on a portable com-
C. ROM
puter.
D. none of above
A. trackpoint
396. which of the following is an example of B. trackpad
an output device
C. trackball
A. Touch Screen
D. pointing stick
B. Speaker
402. Why are input devices needed?
C. microphone
A. So we can put information into a com-
D. Projector
puter for it to process and carry out the
397. Which of these printers would you use to tasks we want it to do.
print a wage slip using carbonised paper? B. So we can print out our homework.
A. Inkjet printer C. So that information is input into the
B. None of the above computer to search the internet.
C. Dot matrix printer D. So we can store the information per-
manently.
D. Laser printer
403. Every task in a computer follows an
398. Which of the following touchscreens cant cycle.
be used while having gloves on
A. IPO
A. Capacitive
B. CPU
B. Resistive
C. Memory
C. infra red
D. CU
D. none of above
404. Keyboard is an device.
399. An input device that is used to input
pictures, documents, pages of magazines, A. Input
and other images into the computer. B. Output
C. Input and Output 410. What input does the grid on the Micro:bit
D. Machine detect?
NARAYAN CHANGDER
C. CPU C. Moisture sensor
D. None of the above D. Humidity sensor
417. Objects you can use to put information 423. Which of these is a output device
into a computer
A. mouse
A. Printer
B. joystick
B. Speakers
C. headphones
C. Input Devices
D. bar code reader
D. none of above
418. Which one of these is an output device 424. How is an input device for a computer de-
fined?
A. A monitor
A. Component on the inside of a computer
B. A keyboard
B. Device which connects to the Internet
C. A mouse
C. Device which puts data into a com-
D. A microphone
puter
419. Select the different types of scanners. D. Device which puts out data from a com-
A. Flat bed scanner puter
B. Sheet fed scanner 425. Which of the following is NOT a storage
C. Global scanner device?
D. Hand held scanner A. DVD
NARAYAN CHANGDER
B. Magnetic = 8 bytes, Boolean = 1 byte. How much
C. Solid State storage in bytes would this take up? (In-
D. none of above cluding overheads)
A. 1023
11. Hardware that reads data and programs
B. 102
from storage media.
C. 10230
A. storage devices
D. 102300
B. RAID
C. SAN 16. Which is generally the most portable?
D. NAS A. Magnetic
B. Solid State
12. What does the tem ‘read/write time’ re-
fer to C. Optical
A. How long it takes for data to be read D. none of above
of written to the device 17. Which generally has the highest capacity?
B. How long it takes a person to A. Magnetic
read/write a word document
B. Solid State
C. The amount of data to be stored on the
device C. Optical
20. Where does all of the computer’s process- 25. Vicky has been on holiday and has taken
ing happen? lots of photos. The memory in her cam-
era is now full and she needs to trans-
NARAYAN CHANGDER
C. RAM B. RAM
D. DVD C. HDD or SSD
D. CPU
31. What is Unicode?
37. Secondary storage is (tick 2)
A. it is the same as ASCII code
A. Non-volatile storage
B. It is an encoding system for symbols
of all languages in the world, using 1, 2 B. Back up storage
or even more bytes per character. It con- C. An external hard drive
tains all the languages of the world. D. The hard drive in your computer sys-
C. The language spoken by unicorns tem
E. Permanent storage of data
D. an encrypted message
38. What is reliability?
32. What type of storage is a USB memory
A. The amount of data a device can store
stick? (4/5)
B. How consistently it performs
A. Optical
C. How easy it is to move from one place
B. Magnetic to another
C. Solid state D. How well it lasts (ie:if dropped)
D. It is not a storage device 39. Why does a laptop need secondary stor-
age? (1/2)
33. First steps to make for free cloud storage. A. To backup files to move to another
A. Upload file computer
B. To storage programs that are currently
B. Start free acount
running
C. Sharing to other cloud users C. To store data, files and software for fu-
D. none of above ture use
D. To store data that the processor needs
34. A bit is
40. ROM and RAM are both
A. a single binary digit
A. Types of Memory
B. 10 binary digits B. Types of Computer
C. 8 binary digits C. Types of Food
D. 4 binary digits D. Types of Work
41. Mass storage device widely used for home 46. Question 3:What type of storage is a USB
and small business storage. memory stick?
42. Normally used in digital cameras. can 47. Which of these is NOT a characteristics of
hold thousands of jpg photographs. storage devices?
A. SD memory cards A. Capacity
B. USB memory stick B. Speed
C. Magnetic tape C. Colour
D. CD D. Portability
E. Durability
43. This device can be easily damaged if the
correct shut down procedure is not carried 48. Primary storage is the area in a computer
out (this can lead to a head crash which in which data is stored for quick access by
would result in a loss of data) the
A. CD discs A. RAM
B. Fixed/internal hard disk drive (internal B. ROM
HDD)
C. CPU
C. Flash drive
D. CD-ROM
D. Solid state drive (SSD)
49. Which of the following best describes a
44. Select a common use case for magnetic megabyte?
tape A. Paragraph of text
A. Stores files, programs and the operat- B. A video file
ing system
C. A text document
B. Backing up large amounts of data
D. A mp3 file
C. Storage of multimedia files
D. Used to store files on phones and cam- 50. Vicky has been on holiday and has taken
eras lots of photos. The memory in her cam-
era is now full and she needs to transfer
45. How is data stored in solid state storage? her photos to an external secondary stor-
A. In the CPU age device.Define what is meant by ‘sec-
ondary storage’.Answers:2
B. In ‘marks’ arranged in patterns
A. Long term non-volatile storage of
C. In different patterns of magnetisation data/files
in a magnetisable material to store data
(tape/hard disk). B. Short term volatile storage of
data/files
D. Using a large electric current to force
electrons through a barrier and trapping C. External storage of data
them in position. D. Internal storage of data
NARAYAN CHANGDER
52. Is it correct to call your USB memory stick D. It is not a storage device
simply “my USB”?
58. Large computers used for backup storage
A. Yes
are called
B. No because USB is just a method of
A. Supercomputers
connection.
B. Servers
C. You could have USB camera
C. Clients
D. You could have USB printer
D. Giants
53. Which is generally the most portable? e.g.
Will last if it is dropped. 59. Which of the following statements about
cloud storage are true (choose as many
A. Solid State as are appropriate)
B. Magnetic A. Data will be secure if there is a fire or
C. Optical other problem at the site
D. none of above B. Data protection rules do not apply if
you opt to use cloud storage
54. The actual physical material that holds the
C. It prevents your data being
data and programs.
hacked/targeted by hackers
A. primary storage D. It prevents the need to buy expensive
B. media hardware for data storage
C. capacity 60. Why should you be careful when using file
D. access sharing sites?
A. You might be downloading malware.
55. Latency is;
B. The person sharing the file can see
A. Time taken to read and write data
your name and address.
B. Time taken for user to select where is
C. The person sharing the file will send
save the data
you a bill.
C. Time taken to retrieve data
D. none of above
D. Time taken to write this quiz
61. The types of storage are listed below from
56. What does SSD stand for in the context of least expensive per GB to the most expen-
computer storage? sive per GB. Which order is correct?
A. Solid state drive (disk) A. Solid State, Optical, Magnetic
B. Samsung Super Drive B. Optical, Magnetic, Solid State
C. Magnetic, Optical, Solid State 67. The types of storage are listed below from
least expensive to most epensive per GB.
D. Solid State, Magnetic, Optical
Which order is correct? (9)
NARAYAN CHANGDER
optical secondary storage device?
C. Extra Memory
A. USB Pen Drive
D. RAM
B. Magnetic Hard Drive
C. Floppy Disk 79. Which one of these devices is solid state?
D. DVD A. CD
74. A NAND flash memory cell uses a; B. DVD
A. Electron Gate C. Magnetic stripe
B. Solid Gate D. USB flash memory
C. Drowning Gate
80. what is secondary storage?
D. Floating Gate
A. USB ONLY
75. Which formulae can be used to estimate
B. FILES, DATA, MEMORY
the file size of a sound file?
A. bytes per sample * channels * height C. USB, DVD, CD, HARD DRIVES and etc.
+ number of minutes D. none of above
B. samples per second * number of sec-
onds * 1.1 81. In the song ‘The Twelve Days Of
Christmas’, how many swans were a-
C. samples per second * bytes per sam- swimming?
pel * duration
A. One
D. sampels pers second * bytes per sam-
ple * channels * duration in seconds B. Five
83. Similar to internal hard-disk drives except 89. Which storage medium is most appropriate
they use solid-state memory. for an action camera?
84. A Blu-Ray disc can hold; 90. Storage that loses its memory every time
the computer is turned off
A. 1000 Nibbles
A. RAM
B. 50 GB
B. ROM
C. 0.9 TB
C. CPU
D. 300 MB
D. Hard Drive
85. Fastest?
91. A memory loses stored data when the
A. SSD device is powered down.
B. HDD A. A. volatile
C. Magnetic tape B. B .non-volatile
D. CD-ROM C. C. tertiary
86. When is christmas? D. D. small
A. December 28 92. Which of the following is an example of
B. December 19 Optical StorageAnswers:3
C. December 25 A. CD
D. November 26 B. DVD
C. Blu-Ray
87. which has moving points .
D. Floppy Disk
A. HDD
E. SD Card
B. SSD
C. flash memory 93. USB drives are also known as:
C. To store all files needed for the com- C. solid state drive
puter system to run. D. none of above
D. To store all of the files just in case your
100. External hard drive is a device.
computer crashes.
A. primary
95. Which of the following storage devices is
B. secondary
most suitable for use in mobile devices?
C. offline secondary
A. Hard disk
NARAYAN CHANGDER
D. volatile
B. Memory card
C. Optical disk 101. Which is generally the cheapest per GB?
A. Magnetic
D. Solid state drive
B. Solid State
96. A databased record has 4 fields. First-
C. Optical
Name (text up to 10 characters), Surname
(text up to 10 characters), DateOfBirth, D. none of above
NumberOfChildren. There are are 100 102. Which type of storage uses lasers to
records. Text = 1 byte per character, In- write the data?
gterger = 4 bytes, Real = 4 bytes, Date
= 8 bytes, Boolean = 1 byte. How much A. Optical
storage in bytes would this take up? (In- B. Magnetic
cluding overheads) C. Solid State
A. 3520 D. All types
B. 352 103. It is an example of optical storage:
C. 35200 A. Magnetic tape
D. 352000 B. USB memory stick
97. Why is secondary storage needed? C. Blu-ray disks
A. It is non-volatile D. HDD
B. It is volatile 104. This hard-disk performance enhancement
C. It is quicker anticipates data needs.
D. It is online A. disk caching
B. file compression
98. Which is an example of Flash / Solid State
memory? C. file decompression
A. RAM D. RAID
106. Which formuale can be used to estimate 111. The disadvantage of this type of storage
the file size of an image? is that it is easily scratched.
NARAYAN CHANGDER
C. to safeguard against loss of 121. How can CD-ROM and DVD’s be the same
data/failure physical size, but differ in data storage?
D. to safeguard against loss of hardware A. Smaller pits are more densely packed
component B. Larger pits can hold more data
C. Concentric circles instead of a spiral
117. Vicky has been on holiday and has taken
lots of photos. The memory in her cam- D. Larger read/write head
era is now full and she needs to trans-
122. Which of the following typically have the
fer her photos to an external secondary
highest storage space?
storage device.Identify the three common
storage technologies Vicky can choose A. Hard-drive
from.Answers:3 B. Flash Drive (USB)
A. Optical C. SD Card
B. Magnetic D. CD
C. Solid State
123. How is data stored in magnetic storage?
D. Blu-Ray
A. In the CPU
E. Hard Drive B. In ‘marks’ arranged in patterns
118. Why is a Hard Disk Drive (HDD) not usu- C. In different patterns of magnetisation
ally recommended for portable devices? in a magnetisable material to store data
(tape/hard disk).
A. It has moving parts
D. Using a large electric current to force
B. It will break if you touch it
electrons through a barrier and trapping
C. It is too small them in position.
D. It is too large 124. Head crash occurs when makes con-
tact with the hard disk’s surface
119. A(n) card is a credit card or other sim-
ilar card, with a stripe that contains infor- A. Read-write surface
mation identifying you and the card. (Also B. Read-write tail
called swipe card)
C. Read-write head
A. Secure Digital High Capacity (SDHC)
D. none of above
B. magnetic stripe
125. When a read-write head makes contact
C. Secure Digital with the hard disk’s surface, it causes a
D. microSDHC head:
C. The laser hits the mirror and the light B. How fast the data can be accessed
sensor C. How easy it is to move from one place
to another
D. The laser hits the disk, mirror and light
sensor D. How well it lasts (ie:if dropped)
136. How many bytes per character in ASCII
130. What type of storage is an SSD?
system?
A. Magnetic A. 0.5
B. Optical B. 1
C. Solid State / Flash C. 1.5
D. none of above D. 10
137. Select all the advantages of using solid B. Used in MP3 players to store music
state storage. files
A. Robustness C. Used to transport files between com-
puters
B. Reliability
D. Used as mobile phone memory cards
C. Durability
D. Cost 143. The types of storage are lited below
from the most reliable to the least reliable.
E. Portability
NARAYAN CHANGDER
Which order is correct? (9)
138. What category of storage device is a SD A. Solid state, Optical, Magnetic
memory card? B. Solid state, Magnetic, Optical
A. Magnetic C. Magnetic, Optical, Solid state
B. Optical D. Optical, Magnetic, Solid state
C. Solid State 144. Provides permanent or nonvolatile stor-
D. Primary Memory age.
A. primary storage
139. Which of the following typically have the
lowest storage space? B. secondary storage
A. Hard-drive C. volatile memory
B. Flash Drive D. short term memory
C. SD Card 145. Primary storage is
D. CD A. Volatile storage
B. Non-volatile
140. Which is generally the most expensive
per GB? C. Permanent
A. Magnetic D. none of above
B. Solid State 146. Which of these is classed as personal in-
C. Optical formation?
A. Date of birth
D. none of above
B. Online nickname
141. Assume that all storage devices below
C. Gender
have the same capacity. Which one has
the lowest price? D. none of above
A. Solid state drives 147. Select a common use case for a Flash SD
B. Hard disks card
A. Stores files, programs and the operat-
C. Memory cards
ing system
D. USB flash drives
B. Backing up large amounts of data
142. Below are the uses of Flash Memory C. Storage of multimedia files
Cards, except D. Used to store files on phones and cam-
A. Storing photos on digital cameras eras
148. Users subscribe to a cloud storage service 154. Virtual memory occupies space on a
to computers
151. which of the storage media you think not 157. What type of storage is a USB memory
using direct access stick?
A. Magnetic tape A. Optical
B. Flash memory stick B. Magnetic
C. DVD disc C. Solid State
D. Magnetic hard disk D. It is not a storage device
153. Each track is divided into invisible wedge- 159. How many bytes are there per character
shaped sections called in a text file?
A. platter A. 0.5
B. cluster B. 1
C. sector C. 1.5
D. cylinder D. 10
160. Which of these define what secondary 165. Benefits of secondary storage
storage is?
A. lower cost, higher capacity, backup
A. Non-volatile storage / devices that are disk
not directly accessible by the CPU
B. higher cost, low capacity
B. Any non-volatile storage
C. save data, backup
C. All memory technologies that use mag- D. low cost, save data
netism.
NARAYAN CHANGDER
D. Any memory technology using laser 166. What is stored on your secondary stor-
light age in your computer system?
E. A USB device A. Programs
B. Data and files
161. The largest measurement of capacity?
C. Operating system
A. Bit
D. All data (Programs, operating system
B. Megabyte and files).
C. Byte
167. These are some types of solid state stor-
D. Kilobyte age EXCEPT.
170. What does the acronym ROM repre- 175. Which of the following statements are IN-
sent? CORRECT? (choose as many as appropri-
ate)
171. Solid state drive C. Any storage device with moving parts
is likely to be more reliable
A. Storage that works by storing the data
D. Optical storage is suited to backing
in electronic circuits
up/archiving files
B. Storage that can be disconnected from
the main computer unit, for example to 176. Which of the following is not a type of
transfer files between computers. storage.
C. Storage that uses a surface which can A. Optical
be magnetised to store data. B. Magnetic
D. none of above C. Solid Sate
D. Hard Drive
172. Optical disc most common on today’s per-
sonal computers. 177. Magnetic tapes still play important role
A. solid-state drives in different applications. Below are the
examples of the application of magnetic
B. digital versatile discs tapes, except
C. storage area network A. Clearing bank cheques
D. network attached storage B. as long term backup media
173. What is the most durable? C. utility billing
A. Magnetic Tape D. storing music and videos
180. Another term for storage is 185. Secondary storage memory is basically?
A. backup A. volatile memory
B. compressionB. compression B. non volatile memory
C. memory C. backup memory
D. zoom D. impact memory
181. A secondary storage device is 186. This type of storage uses pits and lands
to represent 1s and 0s.
NARAYAN CHANGDER
A. A built in device that holds information
A. cloud
B. The main storage or area in a com-
puter B. hard disk
C. A hardware device used by the com- C. optical
puter to access data D. solid state
D. Data storage that is not currently in a
187. The types of storage are listed below
computer’s primary storage or memory A
from fastet to lslowest. Which order is
secondary storage device is
correct? (9)
182. Magnetic storage A. Solid state, Optical, Magnetic
A. Storage that uses a surface which can B. Solid state, Magnetic, Optical
be magnetised to store data
C. Magnetic, Optical, Solid state
B. Storage that can be disconnected from
D. Optical, Magnetic, Solid state
the main computer unit, for example to
transfer files between computers. 188. Choose two advantages of SSDs.
C. Moving a data, program or file from A. They don’t require as much power to
memory onto secondary storage for later operate as hard drives do.
use.
B. The memory chips in an SSD have a un-
D. none of above limited number of write cycles,
183. What is CD-ROM? C. They are much faster than hard disks.
A. Compact Disc-Recordable Only Mode D. SSDs are cheaper than hard drives.
B. Compact Disc-Rewritable Only Mode 189. A nibble is how many bits?
C. Compact Disc-Read Only Mode A. 1
D. none of above B. 4
184. Select a common use case for Hard disk C. 8
drives D. none of above
A. Stores files, programs and the operat- 190. An image is 20 by 50 pixels. The image
ing system uses 4 bit(s)/0.5 byte(s) per pixel. How
B. Backing up large amounts of data much storage in bytes would this take up?
C. Storage of multimedia files (Including overheads)
C. 5500 C. CD-ROM
D. 55000 D. DVD-RW
NARAYAN CHANGDER
202. What type of storage is a SSD card? D. Portable, easy to carry around
A. Optical 208. Which ISN’T an example of secondary
B. Magnetic storage?
C. Solid State A. RAM
D. It is not a storage device B. SSD
C. USB memory
203. Disks containing concentric circles called
tracks are found in which secondary stor- D. CD-RW
age? 209. Which of the following statements is NOT
A. Optical true:
B. Magnetic A. Solid State Drives are more durable
than Magnetic Drives since they have no
C. Solid State Drive (SSD)
moving parts
D. Flash B. Optical drives are faster than a mag-
204. Secondary storage characteristics include netic hard drive
C. Magnetic tape is ideal for backing up
A. Capacity large quantities of data (such as a net-
work)
B. Programme
D. Cloud storage can allow many users to
C. Main data share and access the same data/files
D. none of above
210. Someone has told you three reasons why
205. Which of the following is an example of you shouldn’t let your mobile phone post
a secondary storage device? your location on social networking sites.
Which one is true?
A. RAM
A. Your parents will be able to track
B. ROM where you’ve been and guess what you’ve
C. Hard Disk Drive been up to.
D. CPU B. The local shopping centre will notice
you’re there so often that they will offer
206. Which word means:How likely the device you a job.
is to break
C. Someone might go to your house while
A. Durability you’re out and burgle it.
B. Capacity D. none of above
NARAYAN CHANGDER
223. What are the three main types of sec- B. It is too large
ondary storage devices?
C. It will break if you touch it
A. Magnetic, optical and solid state
D. It is too small
B. CPU, RAM and graphics card
C. RAM, ROM and virtual memory 229. What of the following is an advantage of
a Hard Drive?
D. Hard drive, CD ROM and floppy disk
A. Highest capacity
224. What type of storage is a DVD ROM?
(1/2) B. Low cost
236. A is a memory storage device that 241. A text file stores 100 chracters. 1 byte
plugs in a USB port on a computer or mo- per character is used. How much storage
bile devices. in bytes would this take up? (Including
overheads)
A. smart card
A. 110
B. USB flash drive
B. 11
C. UMD
C. 1100
D. memory stick D. 11000
237. The disadvantage of this type of storage 242. Which one is true about storage capac-
is that it is easily scratched, leading to the ity?
loss of data.
A. Storage capacity refers to the size of
A. Magnetic storage the storage device.
B. Optical storage B. Storage capacity refers to how expen-
C. Solid state storage sive the storage device costs.
D. none of above C. Storage capacity refers to the storage
device that is the user’s favorite.
238. Which is the smallest of these data capac- D. Storage capacity refers to how much
ities? disk space one or more storage devices
A. 2 KB provides.
243. What type of storage is a SSD card? 248. Increases storage capacity by reducing
(4/5) the amount of space required to store data
and programs.
A. Optical
A. file compression
B. Magnetic
B. digital versatile discs
C. Solid State
C. storage area network
D. Hard Drive
D. network attached storage
NARAYAN CHANGDER
244. Why is perpendicular recording in mag- 249. What type of storage is a DVD?
netic storage devices better that longitu-
A. Magnetic
dinal?
B. Solid State / Flash
A. Less densely packed
C. Optical
B. Easier to identify magnetic signals
D. none of above
C. Changed the direction of the
read/write head 250. What is speed?
254. Serial access starts from the beginning of A. Magnetic disks are less robust then
the data and then access each record of SSD’s as they contain moving parts
the data until the required record is found.
257. Which of the following is an example of B. CD-R is an optical disc on which users
a backing storage devices? can write once, but not erase.
258. Which of the following types of storage 262. Which best describes magnetic storage?
is the most expensive per MB/GB?
A. Uses magnetic fields to read/write
A. Optical
data onto a metal disc.
B. Magnetic
B. Uses electronic pulses to read/write
C. Solid State data onto a metal disc
D. They are all the same C. Uses a magnetic chip to store data
259. Which of the following statements are D. Uses a laser to read/write data onto a
True (choose as many as are appropriate) metal disc
263. Which of these storage devices make use 268. What type of storage is SSD?
of optics (laser light) to store data? (Tick A. Optical drive
All)
B. Magnetic drive
A. CD
B. Fibre Optic Cable C. It is not a storage device
NARAYAN CHANGDER
E. LED storage?
264. Which of the following devices cannot be A. Easily scratched, leading to the loss of
removed or unplugged? data
A. A. primary B. Large storage capacity
B. B. secondary C. Expensive to buy
C. magnetic D. Portable, easy to carry around
D. D. non-volatile
270. What is ASCII code?
265. Which is the largest of the storage capac- A. ASCII stands for American Standard
ities? code for information interchange which
A. 2048 MB specifies the ID code for each symbol in
B. 2 GB English/Latin language, using 1 byte
C. 2050 MB B. It is ascending order ranking of letters
D. 100000 KB C. It is the same as Unicode
266. Which is the largest of these data capac- D. It is a way of digitising sound
ities?
271. Virtual memory is used to
A. 2048 MB
A. Allow a computer to continue to run
B. 2 GB if the computer runs out of space on it’s
C. 2050 MB HDD
D. 100000 KB B. Allow a computer to continue to run
if the computer runs out of space on it’s
267. An example of optical storage is?
ROM
A. CD
C. Allow a computer to continue to run
B. DVD if the computer runs out of space on it’s
C. Blu-Ray RAM
D. All of the above D. none of above
10. TO CONVERT DECIMAL TO BINARY DIVIDE 16. What are the only two numbers you can
NARAYAN CHANGDER
THE DECIMAL NUMBER WITH use in binary?
A. 10 A. 0 and 1
B. 2 B. 1 and 2
C. 8 C. 1, 2, 3, 4, 5, 6, 7, 8, 9, 10
D. 16 D. 1, 2, 4, 8, 16
11. Convert the Hex number 93 to decimal . 17. in base-10 is what in Hex?
A. 39 A. A
B. 132 B. B
C. E
C. 147
D. F
D. 150
18. What is 100010 in decimal?
12. Convert 0.65 into an octal number
A. 43
A. 6415
B. 34
B. 5146
C. 33
C. 4165
D. 29
D. 5614
19. Convert the binary number 1110 1011 to
13. in base-10 is what in octal? Hex .
A. 10 A. EA
B. 8 B. EB
C. 1000 C. BA
D. A D. BC
14. Convert the binary number 1100 0011 to 20. THE NUMBER THAT CONTAINS BOTH AL-
Hex . PHABET AND NUMBER IS
A. 11 A. HEXADECIMAL
B. A2 B. DECIMAL
C. C3 C. OCTAL
D. D4 D. BINARY
22. Convert the Hex number DA to binary. 28. Which of these is equivalent to the Hex
A. 1100 1010 number 1A?
B. 1101 1011 A. 16 + 8 + 2
C. 1101 1010 B. 8 + 4 + 2
D. 1101 1110 C. 16 + 8 + 1
D. 16 + 8 + 4
23. what is 1A in decimal?
A. 22 29. The Octal Numbering System have a range
of “8” digits which is
B. 24
A. 1, 2, 3, 4, 5, 6, 7, 8
C. 25
B. 0, 1, 2, 3, 4, 5, 6, 7, 8
D. 26
C. 0, 1, 2, 3, 4, 5, 6, 7,
24. The highest digit in Hexadecimal is D. 1, 2, 3, 4, 5, 6, 7
A. 15
30. The highest digit in Octal is
B. 14
A. 7
C. E
B. 6
D. F
C. 5
25. Convert the binary number 0101 0101 to
D. 4
Hex .
A. 44 31. Computers store all data using
B. 55 A. Binary
C. 66 B. Hexadecimal
D. 77 C. Decimal
D. Octal
26. Which of these are hexadecimal digits?
A. F 32. What is 1101101 in decimal?
B. G A. 109
C. 6 B. 95
D. 0 C. 104
E. H D. 113
NARAYAN CHANGDER
A. A A. 0011 1111
B. 1A
B. 0000 1111
C. 1B
C. 0001 0111
D. 2A
D. 0001 1111
35. What is 12 in binary?
41. What base in decimal?
A. 1010
A. Base 2
B. 1100
B. Base 10
C. 1110
C. Base 100
D. 0111
D. Base 1
36. Which of the following is not a common
numbering system? 42. What is C in binary?
A. Binary A. 1100
B. Hexadecimal B. 1110
C. Octal C. 1000
D. Fractal D. 1010
37. What could be the maximum value of a sin- 43. octal number system means
gle digit in an octal number system?
A. 0-8
A. 8
B. 0-7
B. 7
C. 6 C. 0-9
D. 5 D. 0-10
38. One digit in Octal can represent up to 44. One digit in Hexa is can represent up to
digits in binary. digits in binary.
A. 4 A. 3
B. 3 B. 4
C. 2 C. 5
D. 5 D. 2
B. 11111111 B. 0010
C. 00000000 C. 0101
D. 10000000 D. 0111
12. What is binary 0110 multiplied by binary 18. Convert 11.75 to Floating Point Notation-
0010? 8 bit mantissa and 4 bit exponent
A. 1000 A. 00001011.1100
B. 1110 B. 00001011.1010
C. 1100 C. 00001011.1110
D. 1010 D. 00000111.1100
19. What is the normalised form of
NARAYAN CHANGDER
13. what is 11101010 in hex?
1.1100011 0011?
A. EA
A. 1.0001100 0001
B. 1410
B. 1.0001100 0011
C. ea
C. 0.1001100 0001
D. 14A D. 0.1001100 0011
14. The hexadecimal value 7A16 is equivalent 20. Denary = 255Hex =?
to what decimal value?
A. AF
A. 122
B. 1F
B. 81
C. FA
C. 123
D. FF
D. 26
21. Binary 1110Hex =?
15. Convert 0.1010000 1111 (Floating Point A. 14
Binary) to denary
B. F
A. 0.3125
C. 15
B. 0.315
D. E
C. 0.75
22. Convert 1.75 to binary (Fixed Point Nota-
D. 0.625 tion)
16. Convert 11011.1001 to denary. A. 1.11
A. 27.8125 B. 1.1
B. 27.5625 C. 1.01
C. 31.5625 D. 1.011
D. 31.34375 23. Why do we carry out normalisation on
floating point binary numbers?
17. (8 bit signed mantissa / 4 bit signed ex-
A. To convert the number into a negative
ponent) what is the decimal number?
number
A. 5.625
B. To round a decimal number down
B. 11.5
C. To provide the maximum level of preci-
C. -5.625 sion
D. -11.5 D. To round a decimal number up
A. What language can be used in a com- 5. Which of these is not an example of a Data
puter system. Set?
NARAYAN CHANGDER
B. 1 12. How many bits are used in Unicode?
C. 7 A. 8
D. 8 B. 16
7. How many bits are used in (standard) C. 2
ASCII? D. 32
A. 16
13. Why was Unicode developed in 1991?
B. 1
A. To improve the character sets on com-
C. 7 puters
D. 8 B. Needed so we could display non-
printing characters
8. ASCII uses one byte per character. Unicode
uses how many bytes per character? C. There was a need for a universal stan-
dard and more characters to cover all lan-
A. 2 bytes per character. guages on earth.
B. 3 bytes per character. D. To replace early character sets used
C. 4 bytes per character. on teletype and teleprinting machines
D. none of above 14. Choose the best answer about character
sets:
9. What is the maximum number of values
that can be represented in 7 bits? A. All characters in character sets are
stored in binary.
A. 127
B. Some characters in character sets are
B. 256 stored in binary.
C. 65, 536 C. Only binary characters in character
D. 128 sets are stored in binary.
D. none of above
10. ASCII is a character set that is saved in
form 15. Unicode can represent:
A. Binary A. 65, 536 different characters
B. ASCII B. 255 characters
C. Data Set C. 127 characters
D. Characters D. none of above
16. What is meant by the term ‘character 17. The word “Hello” is made up of 5 char-
set’? (Choose two) acters. How many bits is this (hint:how
A. The characters that are recognised by many 1’s and 0’s are needed to write it)
NARAYAN CHANGDER
4.1 Input Devices
1. Which of the following is not a manual in- 4. RFID uses to read information.
put device? A. Radio waves
A. Keyboard B. Special ink
B. Digital Camera C. Visible red light
C. Mouse D. Pin
D. Microphone
5. What are the use(s) of a mouse?
2. Input device that reads text written in spe- A. opening software
cial magnetic ink. Often used at the bot-
B. closing software
tom of checks.
C. minimizing software
A. Magnetic stripe readers
D. all three
B. Optical Character Recognition
C. Optical Mark Recognition 6. Which touchscreen technology changes the
flow of electricity across the screen when
D. Magnetic Ink Character Recognition
the screen is touched?
3. What is manual input? A. Capacitive
A. Data is input into the computer by hand B. Infra-red
or speaking C. Resistive
B. Data is input into the computer directly D. none of above
by a machine
C. Data is input into the computer by a 7. Magnetic stripe reader reads information
sensor from
NARAYAN CHANGDER
C. Dragging and dropping
C. OMR
D. Right clicking
D. Magnetic Strip Reader
20. What is used to quickly process answer
sheets for multiple choice examinations? 26. Keyboards are used to input the following
data, except;
A. RFID
A. Text
B. MICR
B. Number
C. OCR
C. Instruction
D. OMR
D. Image
21. Type of touchscreen that uses a grid of in-
visible LED beams and sensors 27. Where Quick Response (QR) codes is
A. Capacitive mostly used:
B. Infra-red A. store website addresses/URLs of the
advertiser
C. Resistive
D. none of above B. Products Prices
C. Encrypting data about users
22. This sensor is used for burglar alarms
D. at immigration counter scanning IC
A. Temperature
card
B. Humidity
28. Which is a device used together with a
C. Movement/Motion
graphics tablet?
D. PH
A. Mouse
23. Which device is used mainly for cheque pro- B. stylus
cessing?
C. tracker ball
A. Optical Character Recognition
D. none of above
B. Magnetic Ink Character Recognition
C. Optical Mark Reader 29. Allows users to input commands into the
D. none of above computer by tapping on virtual buttons.
A. Touch screen
24. An input device which the user can use to
type in numbers into a computer. B. ergonomic keyboard
A. QWERTY keyboard C. Steering wheel
B. Concept keyboard D. Remote control
30. Which input device would you use to cap- 36. What input device is best used to:play
ture sound? flight simulation games?
A. Capacitive A. 123
B. Infra-red B. 15
C. Resistive C. 10
D. none of above D. 70
NARAYAN CHANGDER
D. Turning analogue sound vibrations into D. Turning analogue sound vibrations into
electrical signals electrical signals
43. A computer chip is embedded into this with
48. A computer is a machine that works on the
customer information
principle of cycle.
A. Magnetic strip card
A. IPSO
B. Smart card
B. SOPI
C. MICR
C. POIS
D. OCR
D. POS
44. OMR and OCR are comes under cate-
gory of Input devices. 49. Device that recognises human physical
characteristics, such as fingerprints
A. Hand held Input Device
A. 2D scanner
B. Audio Input Device
B. Screen
C. Pointing Input Device
D. Optical Input Device C. AVR
D. Biometric devices
45. This device converts the text on a scanned
image or photograph into text that can ei- 50. WHICH OF THESE IS NOT AN INPUT DE-
ther be edited or looked up in a database. VICE?
A. Optical Mark Reader (OMR) A. SCANNER
B. Optical Character Recognition (OCR)
B. MICROPHONE
C. Magnetic Ink Character Recognition
C. MONITOR
(MICR)
D. MOUSE
D. Concept Keyboard
46. This device has a magnetic coil that vi- 51. A mouse, touchscreen, and a trackball are
brates when it is hit by sound waves. all examples of
52. This device can quickly read numerical data 57. Input device for sound data
that is entered as marks on a pre-printed A. Scanner
sheet such as a lottery ticket or a class
56. WORKING UPON INPUT IS KNOWN AS 62. Use of software to convert spoken words
into text.
A. INPUT A. Microphone
B. PROCESSING B. Voice control
C. OUTPUT C. Voice recognition
D. none of above D. stylus
63. What type of devices are scanner and mi- 69. The process of capturing full-motion im-
crophone? ages and storing them on a computer’s
A. Input storage medium such as a hard disk or op-
tical disc by using this type of input.
B. Output
A. Video input device
C. Storage
B. Audio input device
D. none of above
C. Digital camera
NARAYAN CHANGDER
64. Below are uses for RFID except
D. none of above
A. contactless payment card
B. track movement of livestock 70. The input device used to play computer
C. quickly locate a particular item in a games is a
warehouse A. trackball
D. to quickly process cheques
B. joystick
65. Touchscreen with the most inexpensive C. touch pad
technology
D. digitizing tablet
A. capacitive
B. infra red heat 71. What is a scanner used for?
C. resistive A. To scan pictures and text
D. infra red optical B. to scan pictures
66. What is the full form of ‘ATM’? C. to scan text
A. Automatic Time Machine D. Can not scan a picture or a text
B. Automatic Teller Machine
C. Any Time Money 72. Advantage of BarCode
74. This type of device can be used to identify 79. How trackerball works?
individuals using unique features such as A. Touch the ball with finger
the iris pattern, finger prints or voice pat-
NARAYAN CHANGDER
D. Very easy to use D. output mark reader
86. Describe RAM 92. What is the very first input device devel-
oped for the PC?
A. RAM is volatile
A. Mouse
B. RAM never stores data
B. Keyboard
C. RAM programs turn off if you close the
computer C. Touch Screen
D. RAM is the same as ROM D. Scanner
87. Which keyboard is better for people with 93. Used to convert books (hardcopy) into dig-
hand-related problems? ital versions (e-books).
D. Uses Hankai students to work 105. This mouse function displays a list of com-
mands or options on the screen depending
100. Which of the following device falls under on the application being used
Input, Output and Storage devices?
A. Clicking
A. Webcam
B. Double clicking
B. Monitor
C. Dragging and Dropping
C. Touch Screen Terminal
D. Right clicking
D. Microphone
106. In the “Chip and Pin Reader” method,
101. Which is the most used character layout what is used to ensure the person using
on a keyboard? the card is the actual owner?
A. QWERTY layout A. Name
B. ABCD layout B. Pin
C. Ergonomic keyboard layout C. Password
D. none of above D. Account number
NARAYAN CHANGDER
control a screen cursor and select menus
items. C. Keyboard
A. Joystick D. Stylus
B. Mouse 114. Which among the following is the most
C. Keyboard common device that accepts letters, num-
D. Concept Keyboard bers and symbols from a user?
A. Optical mouse
109. Touch pads are present on which type of
computer? B. Keyboard
A. mainframe C. Scanner
B. laptop D. none of above
C. PC
115. Do joysticks use pointers to navigate
D. none of above through the screen?
110. Input device used for games playing and A. Yes
flight simulators.
B. No
A. Game controllers
C. Not always
B. Joystick
D. none of above
C. Keyboards
D. Multimedia keyboard 116. What is screen resolution?
111. If you want to draw house plans, you A. The amount of pixels on a page
could prefer this device B. The most pixels on a page
A. Light Pen C. The amount of squares on a page
B. Graphic Tablet D. The least pixels on a page
C. Stylus
117. Barcode reader uses to read informa-
D. Mouse
tion.
112. Which input devices inputs letters, num- A. Radio waves
bers, symbols and special characters into
a computer? B. Special ink
A. Microphone C. Visible red light
B. Tracker Ball D. Pin
118. This device is suited to direction control in 123. Choose which are the direct data entry
some games as well as controlling physical and associated devices
devices such the tilt/pan on CCTV cameras, A. RFID
129. A company wants to invest in an adver- 134. Which is the best input device for select-
tising strategy that will increase sales by ing text?
those people coming in contact with their
A. Mouse
advertisement. What would you recom-
mend they use? B. Keyboard
A. QR codes so people can access web- C. Speaker
sites more conveniently rather than typing
url D. CPU
NARAYAN CHANGDER
B. Sending personal emails to interested
135. Input devices used to measure physical
people
traits, such as sound, heat, or light.
C. Handing out fliers and promising dis-
counts to people who wish to buy A. Trackball
D. none of above B. Voice recognition
133. Input device that reads printed text, A. they do not contain any added informa-
scans it, and converts it to text that can tion such as expiry date of items.
be edited in a word processor. B. In order to read the barcode, the bar-
A. Magnetic stripe readers code scanner needs to bequite close
B. Optical Character Reader C. Fast and accurate
C. Optical Mark Reader D. Barcode scanners need a direct line of
D. Magnetic Ink Character Reader sight tothe barcode to be able to read.
139. A device used for video games, flight sim- 145. What is the most accurate definition of a
ulators, training simulators and for con- keyboard?
trolling industrial robots is?
144. Which of the following devices is the de- 149. Which screen is are made up of a layer
vices used to check the PSE Examination or of conductive polyester and a layer of con-
to check Questionnaire and survey? ductive glass?
A. Light Pen A. Capacitive touchscreen
B. Flatbed Scanner B. Resistive touchscreen
C. Optical Mark Reader C. Infra-red touchscreen
D. Joystick D. Surface Acoustic Wave screen
150. Tick all the pointing devices. 156. A device used in flight simulators:
A. Mouse A. remote control
B. tracker ball
B. Tracker ball
C. remote control
C. Joystick
D. touchpad
E. joystick D. smart board
NARAYAN CHANGDER
151. If you want to draw house plans or en- 157. An input device used to control DVD play-
gine you could prefer this device ers and multimedia projectors:
A. Light Pen
A. Joystick
B. Keyboard
B. Ergonomic keyboards
C. Speaker
D. Mouse C. Remote control
172. Which of the following is/are example(s) 177. This device scans a pattern of dark and
of a voice input device? light lines with a laser. The reflected
pattern is converted into a number and
A. Speaker
typically used to identify a product in a
B. Microphone database.
C. Headphones A. Barcode scanner
D. Headset B. Biometric device
NARAYAN CHANGDER
C. joystick
173. A device which is useful for the disabled
people because they don’t have to move: D. Magnetic ink creator recognition
(MICR)
A. Scanner
E. laser pointer
B. remote control
C. keyboard 178. What does analogue mean in relation to
sensors?
D. mouse
A. The output takes on different binary
174. What is 0000 0101 in denary? values depending on the quantity being
measured
A. 123
B. The output is recorded in a log
B. 12
C. The output varies smoothly and contin-
C. 10 uously over time
D. 5 D. The output is analysed.
175. What input device is used to:to process 179. On which touchscreen is screen visibility
large number of cheques poor in strong sunlight
A. Keyboard A. infra-red heat
B. Scanner B. infra-red optical
C. MICR C. capacitive
D. Mouse D. resistive
176. How is touch detected in an Surface 180. What is the RAM like?
Acoustic Wave touchscreen? A. Brain
A. When touched by a finger, there is a B. Short term memory
change in the electric field at that position C. Long term memory
B. When touched by a finger, the infra- D. Distance memory
red beam is interrupted
C. Two sound wave transducers detect a 181. A trackball works by:
reduction in the sound wave amplitude A. Rotating a stationary ball to adjust the
D. When pressed by a finger, the two con- pointer on a screen
ducting layers make contact and complete B. Tracking the movement of a laser or
a circuit LED light across a flat surface
NARAYAN CHANGDER
193. A mouse, touch-pad, and a trackball are colour on a screen
all examples of:
198. An input device on your smart phone that
A. Scanning Device you operate with touch is
B. Voice-Input Devices A. Touch pad
C. Pointing Device B. Touch screen
D. Output Device C. Touch-sensitive pad
D. Stylus
194. Select one disadvantage of using mice;
A. Faster to select icons and option when 199. How can a scanner recognise a character
compare to a keyboard of text using OCR technology?
B. Easy to navigate around document and A. It looks into each line of an image and
windows finds patterns in the black and white dots
which resemble letters stored in memory
C. Small size and less space taken
B. The scan head moves up and down the
D. Require flat surface in order to work page and stores the image
properly
C. The scanner stores the page and auto-
195. Which input device is used at Belize Social matically converts it into text
Security Board to sign and enter in your D. none of above
signature digitally?
200. Which touchscreen technology is NOT
A. Barcode Reader likely to / may NOT smash/shatter if
B. Graphic Tablet dropped hard
C. Flatbed Scanner A. Capacitive
D. Printer B. Infra-red
C. Resistive
196. Which of the following is a use of the nu-
meric keypad? D. none of above
A. Input text data and numeric data into 201. This device has a diaphragm and magnetic
a computer coil that vibrate when hit by sound waves.
B. Calculate and solve mathematical cal- A. Keyboard
culations B. Trackerball
C. Input numeric data at ATMs C. Capacitive Touch Screen
D. none of above D. Microphone
202. If you want to draw cartoon characters 208. Some hotels uses this to replace actual
or design clothing on the computer, you keys for their rooms.
would use this device.
204. Device that allows you to put information 210. A resistive touch screen.
into the computer is? A. Uses pressure and conductivity to
A. Input work
B. Output B. Uses a humans electric field to work
C. Storage Devices C. Uses nothing to work
D. Printer D. Uses Hankai students to work
205. Used to create digital copies of printed 211. A Computer mouse is another device.
documents into a computer
A. Input device
A. Printer
B. Output device
B. 2D Scanner
C. Pointing device
C. QWERTY keyboard
D. none of above
D. Touchpad
212. What can QR codes link to?
206. Early input devices are
A. an image
A. Keyboard
B. Punch cards B. a website
207. This category/ type of device allows a 213. Which of these terms is the definition
user to control a pointer on the screen “the physical parts of a computer” for?
A. pointing device A. Hardware
B. keyboard B. Software
C. touch pad C. Broadband
D. touch screen D. None of the above
NARAYAN CHANGDER
215. What type of devices are scanner and joy- C. Remote control
stick? D. chip and pin reader
A. Input
221. This device connects to a sound card and
B. Storage allows the user to input speach and other
C. Output sounds.
D. none of above A. Touch screen
216. This device enables users to verify a per- B. Musical Instrument Digital Interface
son’s identity (MIDI)
A. Barcode Reader C. Microphone
B. Fingerprint Scanner D. Joystick
C. Scanner
222. OCR
D. Keyboard
A. detects marks on a paper
217. A light sensitive device that converts
B. detects unique ridges of a fingerprint
drawing, printed text or other images into
digital form is? C. understands and converts hand writ-
A. Keyboard ten text
225. Which kind of touchscreen is generally 230. What is manual input devices?
mostly used in smartphones?
A. Data is input into the computer by hand
D. Surface Acoustic Wave screen C. Data is input into the computer by sen-
sor
226. How is touch detected in a resistive D. Data is input into the computer by ac-
touchscreen? tuator
A. When touched by a finger, there is a
change in the electric field at that position 231. A is a device that feeds or steams an-
image or video in a real time to or through
B. When touched by a finger, the infra-
a computerto a computer network, such as
red beam is interrupted
the Internet.
C. Two sound wave transducers detect a
A. Webcam
reduction in the sound wave amplitude
B. Printer
D. When pressed by a finger, the two con-
ducting layers make contact and complete C. Monitor
a circuit D. OMR
227. Digital cameras use to store data.
232. A devices used to read machine readable
A. RAM code in the form of numbers and pattern
B. ROM of parallel line of varying width.
C. HDD A. Keyboard
NARAYAN CHANGDER
surface to write, draw, or make selections. A. Touch screen
The flat surface may be a screen on a mon- B. Monitor
itor or mobile device, a signature capture
pad, or a graphics tablet C. Laptop
A. Touch screen D. Graphics tablet
16. Which device would you not need to use if 21. uses of plotter
you could only move your head/eyes? A. Used by architects planners and map-
A. Eye Tracker makers to print structural drawings and
maps
B. Screen Typer
B. phone calls, text to speech, recording
C. Braille Keyboard music
D. Sip/Puff Switch C. A 2-in-1 PC consists of a screen and
NARAYAN CHANGDER
a detachable keyboard and has the func-
17. A Storage Device that uses a Laser Light tionality of both a laptop computer and a
to read data. tablet
A. Optical Storage Device D. Used on almost all computers to view
and edit
B. Internal Storage Device
C. Computer Peripheral 22. What does WIMP stand for?
D. none of above A. Windows, Icons, Mouse pointers
B. Windows, Images, Menus, Pointers
18. Which of the following is an example of a
C. Windows, Images, Mouse pointers
program to write a document?
D. Windows, Icons, Menus, Pointers
A. Browser
B. Video Editor 23. What are Input Devices?
A. Devices which are used to give infor-
C. Word Processor
mation to the computer.
D. none of above B. Devices which are used to give infor-
mation to the computr.
19. Used mainly as video and data storage.
Holds over 7 times a CD’s capacity. C. Devices which we used to get informa-
tion from the computer.
A. Compact Disc (CD)
D. Devices which we use to store informa-
B. Blu-ray Disc (BD) tion on the computer.
C. Digital Video Disc (DVD)
24. Uses a high-intensity beam of light shone
D. none of above through three layers of changing pixels
A. LCD Projector
20. An output device which is able to draw
high quality images on very large pieces of B. LED Screen
paper. It is used by engineers, architects C. Speaker
and map-makers to draw plans of build-
D. 3D Cutter
ings.
A. Plotter 25. description of plotter
NARAYAN CHANGDER
A. Output Device fessional presentations?
46. A portable flash memory storage device 51. Which one of these is an output device?
that you can plug in a USB port. A. Mouse
NARAYAN CHANGDER
C. Random Access Memory
from smartphone without wifi router
D. Random Attempt Mode
D. a networking device that connects de-
58. Why does the computer system need a vices together by using packet switching
monitor? to receive, process, and forward data to
the destination device
A. To be able to see what is being dis-
played on the screen 62. A system that designs objects using soft-
B. A monitor allows the computer to have ware that produces 3D images. When
an aesthetic look ready it can be sent to a 3D printer.
C. It allows the computer to generate A. CAD/CAM
hardcopy output B. Digital Light Projector (DLP)
D. none of above C. 3D Printer
59. uses of monitor D. 2D Cutter
A. Used on almost all computers to view 63. Which was the first output device?
and edit A. speaker
B. Most common output device. Lets B. mouse
users view and modify computer contents
C. television
graphically
D. USB
C. quiet, fast, high quality printout, low
running cost 64. Which of the following are examples of
D. a storage media that does not involve output devices?
magnetic disks or any moving parts A. Data projector
66. Lazer Printer uses 72. I am an input device which allows a user
to transmit letters, numbers and symbols.
A. Ink
NARAYAN CHANGDER
79. This is an output device that uses many
B. Monitor
small mirrors to reflect light towards a
lens. This will display an image. C. Printer
A. Digital Light Projector (DLP) D. none of above
B. 3D Printer
85. is a moniter an input device
C. Liquid Crystal Display (LCD)
A. yessssssss
D. Actuator
B. nah
80. The *BLANK* executes simple instructions
C. no
very quickly.
A. Memory D. yis
B. Device used to get information from A. slow and expensive, cannot print pho-
the computer. tos
NARAYAN CHANGDER
100. Which of the following printers is popu- and other electronic devices
larly used in healthcare application?
C. devices which are portable and allow
A. Laser printer you to communicate
B. Inkjet printer D. Short for SerialATA, a replacement for
C. Dot Matrix printer the Parallel ATA interface used in IBM
compatible computers
D. Wide Format printer
E. 3D printer 106. limitations of speaker
A. output sound can disturb others, high
101. This is an output device that uses a high quality ones can be expensive
powered laser to cut materials such as thin
metals and wood. B. Wherever fast, high quality printing is
required
A. 2D Cutter
C. display monitor that is able to sense
B. Liquid Crystal Display (LCD) the location of a finger touching the
C. Inkjet Printer screen
D. Laser Printer D. Short for small computer system inter-
face, a parallel interface standard used
102. Which of the following printer produces by Apple Macintosh computers, PCs and
the lowest print quality? many UNIX systems for attaching periph-
A. inkjet eral devices to computers
C. forms characters and graphics by A. The speaker allows for input while the
spraying tiny drops of liquid ink onto a microphone produces output
piece of paper.
111. Which is best used to replace bar codes 115. Which of the following will cause
used in libraries? headache and eye-sight problems due to
A. Magnetic Stripe Reader flicker of screen?
B. Chip Reader and PIN Pad A. CRT Monitor
C. RFID Reader B. LED Monitor
D. none of above C. IPS Monitor
117. Which of these are input devices? (TWO) 122. What is the difference between inkjet
A. Keyboard printer and laser printer?
B. Printer A. Inkjet printer-are used when low out-
put volumesLaser printer-are used when
C. Mouse high output volumes
D. Monitor
B. Inkjet printer-more expensive to buy-
118. This output device is used to rotate the Laser printer-cheaper
turntable in microwave ovens.
NARAYAN CHANGDER
C. Inkjet printer-slow printingLaser
A. Speakers printer-faster printing
B. Motors D. Inkjet printer-high quality printin-
gLaser printer-cheap high quality printing
C. Buzzers
D. Heaters 123. An output device that produces a hard
E. Light/Lamp copy of a document using thermal bubble
and piezoelectric technology.
119. Which part of the computer is called A. Inkjet Printer
VDU(Visual Display Unit)
B. Laser Printer
A. keyboard
C. LED Screen
B. monitor
D. Headphones
C. printer
D. scanner 124. uses of laser printer
120. Which of the following produces sound as A. Wherever fast, high quality printing is
output? required
A. Speakers B. to store program instructions that are
frequently re-referenced by software dur-
B. Motors
ing operation
C. Buzzers
C. storage space, form factor, data ac-
D. Heaters cess performance
E. Light/Lamp D. creates large files, difficult to use with
background noise, banned in some quiet
121. Which of the following statement refers
areas
to laser printer.
A. Produces colour photo-lab quality pic- 125. Uses powdered ink (toner)
tures A. Inkjet Printer
B. Used a laser beam and powdered ink B. Laser Printer
to transfer images onto paper.
C. 3D Printer
C. forms characters and graphics by
spraying tiny drops of liquid ink onto a D. none of above
piece of paper.
126. Plastic often used as the printing material
D. A sophisticated printers used to
produce high-quality drawings such as A. Inkjet Printer
graphs, maps, engineering drawings B. Laser Printer
A. any device used to send data from a A. Produces colour photo-lab quality pic-
computer to another device or user. tures
B. It is easy for a beginner to use with hearing loss, come in large range of
C. It is accessible to people with visual colours
disabilities B. access your work on the go, view
D. There are a lot of accessibility func- movies
tions C. A computer with a foldable sceen and
keyboard which can be easily moved from
137. OMR is place to place
A. Optical Mark Reader
NARAYAN CHANGDER
D. allows user to connect without wires,
B. Optical Magnetic Reader standards are agreed, eas to set up
C. Optical maximum Reader 142. uses of LED
D. Optical metal Reader A. show status of electronic equipment vi-
sually, signs
138. Dot Matrix Printer uses
B. dvices are extremely portable, power-
A. A4 Paper
ful computers with touchscreen controls
B. Glossy Paper
C. More accurate than a mouse, and eas-
C. Carbon Copy paper ier and more accurate to draw designs
D. none of above with
D. Input device used for games playing
139. Why are some impact printers such as and flight simulators.
dot-matrix printer still in existence?
A. They are noisy. 143. is a webcam a input devise
B. They are useful for printing multiple A. no
copies using carbon paper. B. no
C. They do not usually print acceptable C. hmmmm
graphics.
D. yis
D. They are cheap.
144. description of dot matrix printer
140. benefits of speaker A. takes a digital signal and prints it on
A. everyone can hear audio output, can paper using a print head made of pins and
create atmosphere or ambience, help an ink ribbon
blind peaople via text to speech B. Short for Read-Only Memory, a stor-
B. playing music from computer, on the age medium that is used with computers
move and other electronic devices
C. reading large quantities of voting C. expensive aonnection kits, possibility
forms of hacked devices
D. to allow a computer to connect to a net- D. Digital video camera that allows you to
worl capture video input for your computer
141. benefits of light emitting diode (LED) 145. I am an output device that allows a per-
A. Cost effective way to show equipment son to listen to sounds/music.
status, can produce warning for people A. Headphones
156. Which of the following statement refers C. used to print in warehouses where du-
to ink jet printer. plicate forms (such as delivery notes) are
A. Produces colour photo-lab quality pic- required
tures D. Can be drum or flat bed-prints accu-
rately on very large paper sheets
B. Used a laser beam and powdered ink
to transfer images onto paper. 161. A device that uses signals to make a mag-
C. forms characters and graphics by net repel or attract a coil at the bottom of
a cone which pumps out sound.
NARAYAN CHANGDER
spraying tiny drops of liquid ink onto a
piece of paper. A. Speaker
D. A sophisticated printers used to B. 3D Cutter
produce high-quality drawings such as C. Digital Light Projector (DLP)
graphs, maps, engineering drawings
D. Digital Light Projector (DLP)
157. Used to create prototype and models 162. DLP stands for
A. Inkjet Printer A. Digital Light Projector
B. Laser Printer B. Detail Light Projector
C. 3D Printer C. Digital LED projector
D. none of above D. NOne
158. limitations of dot matrix printer 163. Which device would you use if you had
difficulty seeing?
A. print quality low, noisy
A. Sip/Puff Switch
B. Exteremely fast data connection over B. Larger Keys
long distnces
C. Subtitles
C. Input device used for games playing
D. Foot Mouse
and flight simulators.
D. the ability to work in different loca- 164. which of the following device is called
tions while storing data on the hard drive, pointing device.
wide variety of models available, inte- A. keyboard
grated keyboard > no desk required B. monitor
159. is a microphone a output device C. mouse
A. yes D. printer
B. no 165. A device that takes the text and im-
ages displaying on a computer screen and
C. maybe
projects them on a larger screen.
D. oh
A. Printers
160. benefits of laser printer B. Data projector
A. quiet, fast, high quality printout, low C. Speakers
running cost D. Headphones
B. data transfer rates, startup time E. Interactive white board
166. Which of the following is the largest in B. a plug-in interface card that displays
terms of size? progress and error codes generated dur-
ing power-on self-test (POST) of a com-
NARAYAN CHANGDER
A. Hard disks
176. An output device that visually conveys
text, graphics and video information. B. USB Flash drives
A. Printers C. Solid state drives
B. Display devices D. Optical disks
C. Speakers E. Memory cards
D. Headphones 181. List three (3) output devices.
E. Interactive white board A. Printer
177. description of laser printer B. Speaker
A. Works like a photocopier-paper is C. Monitor
charged like the image, toner added and D. Pointing devices
heat and pressure applied
E. Pen Input
B. Very expensive-only used by banks
182. One of the disadvantages of a Dot Matrix
C. hardware capable of holding informa-
Printer is
tion either temporarily or permanently
that can be easilty transported A. Very noisy so not suitable for an office
environment.
D. need flat surface near to monitor,
leads can get caught up, older ones can B. They are only really fast if several
clog with dust copies are being made
178. Which device would you use if you were C. They produce ozone and volatile or-
paralysed? ganic compounds.
NARAYAN CHANGDER
1. What is the correct information processing D. none of above
cycle.
6. This device is used in the 2nd part of the
A. Output, input, storage, process IPOSC cycle and its job is to turn data into
B. Process, input, storage, output information.
C. Input, process, output and storage A. VGU
D. Input. storage, process, output B. CPU
10. What of the next devices are output de- B. Monitor, Keyboard
vices C. Microphone, Speaker
2. What does the rotational drive use to 7. Which of the following is an example of
store the informations onto the platters? secondary storage (memory)?
A. Radiation A. Cache
B. Polarization B. RAM
C. Magnitizem C. SSD
D. Gama Waves D. ROM
3. what does SD card stand for? 8. When transferring data using magnetic
A. Secure Digital Card tape, the additional tape is called?
C. 4, 7 GB B. laser drive
NARAYAN CHANGDER
sound track only
D. Comes with a secure encryption sys- D. Bank
tem 18. What type of storage medium would be
12. disk is used to store large amount of most suitable for backing up a laptop?
data A. USB
A. Hard B. Magnetic tape
B. CD C. Portable hard drive
C. DVD D. SSD card
D. none of above 19. Internal Hard Drives are
23. Typically stores 650mb-700mb of data on 28. Choose the most appropriate storage de-
it-usually music. vice for an all terrain camera crew tracking
lions across Africa
34. Optical storage media: 40. Which of these storage devices uses serial
A. store data magnetically access to read data.
B. store data on their surface A. HDD
C. storage media with no moving parts, B. SSD
based on electronic circuits and using C. Magnetic tape
flash memory
D. DVD
D. there aren’t right answers
NARAYAN CHANGDER
E. Blu-ray
35. Two main use of Flash memory cards
A. Storing photos on digital cameras 41. Two advantages of thumb-drives / pen
drives:
B. Used only for burn high definition
movies A. Cheaper than CD’s and DVD’s
C. Mobile phone memory cards B. Doesn’t need additional software to
D. used as Security device to prevent soft- work on most computer
ware piracy (dongle) C. Portable and not affected by magnetic
36. One complete sets of fields is called? fields
B. CD ROM B. Writing
C. CD DVD PLAYER C. Reading
D. none of above D. Backup
46. What does volatile memory mean? 51. Computer memory is of two types:
A. After the computer closes, the data is A. Hard disk and Flash drive
saved
B. Hard Disk and Memory Card
B. Synonym for secondary storage
C. After the computer closes, the data is C. RAM and ROM
lost D. Internal memory and External memory
D. Synonym for primary storage
52. Capacity of a storage device is measured
47. One reason your computer may slow down in
would be use of due to the need of ad-
A. Bytes
ditional memory space.
A. Virtual memory B. Bits
B. Read Only Memory C. Hz
C. Southbridge D. none of above
D. Northbridge
53. What is offline-storage
48. How is a magnetic pattern turned into A. Storage which is not on the internet
data?
B. Storage which is volatile
A. An electric signal is generated from
the magnetic patterns C. Storage which cannot be deleted
B. An electric signal is created when the D. Storage which is external (outside) the
magnets touch the drive base system, but must be connected to the sys-
C. An electric signal is generated when tem for data to be retrieved and stored
the magnetic pattern is read from the disk
drive 54. Which type of storage is the most expen-
sive?
D. An electric signal is created when each
stack of drives is pushed together A. HDD
55. What does HDD stand for? 61. Which storage device cannot be electroni-
A. Hard Driving Disks cally modified after manufacture?
A. HDD
B. Hard Drive Diagram
B. SSD
C. Hard Disk Dimensions
C. ROM
D. Hard Disk Drive
D. CD
56. External drive, flash drive, usb pen drive
NARAYAN CHANGDER
and cd-rom are examples of . 62. is plugged into USB port.
A. Primary storage A. Compact Disk
67. Which word means:How easy the device 73. Which of these is primary storage?
is to carry around (choose all that apply)
NARAYAN CHANGDER
80. Which of these is not secondary storage?
A. Portable HDD A. Reading
B. SDD B. Writing
C. Allign
C. HDD
D. Back Up
D. DVD Disc
87. Two Examples of Serial (sequential Access)
81. Magnetic tape is still used for Method:
A. Archiving/Backing up of large data A. Magnetic Tape
B. Remote storage B. Flash drive
C. Playstation games C. Cassette Tape
D. Music albums D. CD ROM
82. are used to distribute all sorts of 88. Which type of storage device generally has
data:software (e.g. office applications or the largest capacities?
games), music, electronic books
A. Hard Drives
A. Pen drive B. Flash Drives
B. Hard disk C. SD Cards
C. CD-ROMs D. Optical Drives
D. none of above
89. What do you use to type, not write?
83. Where is data stored in an HDD A. Mouse
A. In RAM B. Keyboard
B. In magnetic surfaces of disk C. Phone
C. In capacitors D. Pen
D. In NAND chips 90. Advantage of SSD:
84. Which part of the DRAM holds bits of in- A. Lower power consumption and
formation? cheaper
A. SSD B. Run much cooler than HDDs and usu-
ally much larger storage space compared
B. Transistor
to HDD within the same price range
C. Interrupts C. Much Faster than HDD and No moving
D. Capacitors parts
D. Lower power consumption and used 96. What must you do before removing your
primarily as backup storage flash drive?
NARAYAN CHANGDER
C. DVD
B. Flash drive
D. none of above
C. DVD ROM
D. Portable hard disk drives 108. The physical parts of the computer that
you can touch and feel are called
103. Solidstate media
A. Hardware
A. there aren’t right answers
B. Software
B. storage media with no moving parts,
C. Storage
based on electronic circuits and using
flash memory D. None of these
C. store data on their surface 109. What does the word “obsolete” mean?
D. store data magnetically A. Slow technology
104. Which of the following is not a periph- B. Small data storage capacity
eral? C. No longer in use
A. mouse D. Broken
B. monitor
110. One Major disadvantage of DVD RAM is:
C. keyboard
A. Requires special and expensive soft-
D. motherboard ware to run
105. ‘A laser is shone onto the disc and the B. Not as compatible as R or RW format
light is reflected based upon whether it C. it is used only to record videos
hits a pit or land’ describes which storage
device? D. is affected by the cool weather
B. Not Robust-easily be damaged or 118. A single layer can store about 4.7Gb
scratched. of data.A double layer can hold over
9Gb of data.
D. floppy disk A. 2 GB
B. 2 MB
115. This device is very portable as it can be
fitted into small electronic devices. C. 200 KB
D. Server A. Primary
B. Secondary
116. Which type of disc drive can store the
most data? C. Offline
A. CD D. none of above
117. Although not used as much any more, C. Set up automatic schedule for backing
large organisations use this type of stor- up files regularly
age device to back up mass amounts of D. Stored backups data in the same stor-
data. age to main storage
A. CD 123. File read/write speeds range generally
B. DVD above 200 MB/s and up to 550 MB/s.
C. Blu-ray A. HDD
D. Magnetic tape B. ROM
NARAYAN CHANGDER
C. progress
A. Magnetic
D. shutdown B. Optical
125. A is a computer disk drive that is C. Solid State
used to store information to removable D. none of above
diskettes.
131. What is ‘volatile’ storage?
A. Floppy Disk Drive
A. Storage which is deleted without
B. Hard disk drive power
C. Memory card B. Storage which remains in memory
without power
D. Flash drive
C. Storage which cannot be changed
126. What data can you change through ROM D. Storage which can be changed
A. Start-up instructions
132. The hardware device that are used to dis-
B. Anything you are working on stored in play the results is
ROM A. Monitor
C. Nothing B. Keyboard
D. none of above C. Mouse
D. CPU
127. What does SSD stand for?
A. Silicon Saving Device 133. What are secondary storage devices
for?
B. Solid Storage Device
A. A device use for calculating data
C. Storing Saving Drive B. A device used to store data temporar-
D. Solid State Drive ily
C. A device used to supply power to the
128. A is an optical storage device that is computer
fairly fragile and easy to break or scratch.
D. A device used to store data perma-
A. Flash memory nently
B. Magnetic Tape 134. Which of these is a storage device?
C. CD A. Mouse
D. Hard disk B. Keyboard
144. Why might RAM not be the best for sec- C. VHS Tape
ondary storage?
D. External Hard drive
A. It is volatile meaning it loses all data
when power is cut off 150. Which device would you use:
B. small storage A. Optical Disk
C. Breaks easily B. Hard Drive
D. none of above C. Flash Memory
NARAYAN CHANGDER
145. Backing up refers to the copying of D. Magnetic Tape
files/data to a different medium in case
of a problem with the 151. Two main features of DVD-RAM
A. Main Storage Device A. Use number of concentric tracks
B. External Storage Device B. Once data is been recorded and the
C. Main Secondary Storage Device process has been finalised then the disks
become Read Only.
D. Hard disk drive
C. Storage size is smaller then CD-ROM
146. What is the name given to copies of data
or program files? D. Allows simultaneous read /write and
great longevity
A. Backups
B. Programs 152. Characteristics of a hard disk include .
C. Extras (select multiple answer)
C. Control over the CPU 153. The most durable storage device as it has
D. Partial connection with the CPU not moving parts
148. The following are types of storage de- A. Solid State Storage
vces except B. Magnetic Storage
A. Hard Disk C. Optical Storage
B. Monitor D. none of above
C. Floppy Disk
154. What is the magnet called in the HDD?
D. Memory card
A. Voice Actuator
149. Two Examples of Direct (Random Access)
Method: B. Voice Coil Actuator
A. Magnetic Tape C. Coil Actuator
B. Flash drive D. Voice Coil
155. Where is data stored in a CD? 161. Cloud storage is (select all that ap-
A. In its RAM plies)
NARAYAN CHANGDER
use in a computer for secondary storage?
A. Solid state drive C. A read-write head that moves across
the magnetic discs
B. Hard Disk Drive
D. Has pits and lands that represent 0 or
C. Optical drive 1
D. none of above
174. What memory type is volatile?
169. Type of storage holds/stores data and A. RAM
applications temporarily or for a shorter
period of time while the computer is run- B. ROM
ning. C. Flash
A. RAM D. none of above
B. SSD
175. Two advantages of SSD:
C. Content management storage
A. Data access is considerably faster
D. Enhanced data storage than HDD
170. Which device has the least amount of B. Cheaper than HDD
storage space? C. More reliable as there are not moving
A. Hard Disk parts
B. Memory Card D. In applications where batch process-
ing is used (e.g.:utility billing)
C. Flash Drive
D. Floppy Disk 176. storage is bad because it is expen-
sive.
171. What type of storage are HDDs and
A. Flash
SSDs?
B. Optical
A. Primary Storage
C. Magnetic
B. Secondary Storage
D. none of above
C. Tertiary Storage
D. Storage Wars 177. Which type of storage would you use:
179. Which device would you use:To store rela- 185. Two disadvantages of SSD:
tively large amounts of data in your home A. longevity, doesn’t last long as HDD
computer B. Very Expensive compared to HDD
A. Optical Disk C. High power consumption
B. Hard Drive D. Less reliable
C. Flash Memory
186. Select all magnetic-based storage de-
D. Magnetic Tape vices.
180. A is a hardware designed to store in- A. Floppy disk
formation B. Tape drive
A. Pen drive C. HDD
B. Storage device D. DVD
C. Hard disk E. SSD
D. none of above 187. memory is also known as Immediate
181. Why haven’t SSD’s been put in all com- Access Storage and is where data is stored
puter? on the main computer memory.
A. RAM
A. Too Expensive
B. ROM
B. Too Slow
C. Enhanced data storage
C. Very Fragile
D. Front side storage
D. Not reliable
188. with such advantages what storage de-
182. Which of this is a Solid-state storage me- vices do you know? very large, fast, low,
dia? fragile is moved, expensive
A. CD-ROMs A. fixed hard disks
B. Hard Disk Drive B. portable hard disks
C. USBs C. magnetic tapes
D. Magnetic Tape D. Blu-ray
183. Optical storage media, fairly fragile, 189. Name two storage devices for keeping
easy to snap or scratch. backup copies of photographs
A. Flash memory A. memory stick and CD ROM
B. Magnetic Tape B. DVD and flash drive
C. CD C. floppy disk and Flash drive
D. Hard disk D. Hotspot and wifi
190. One main advantage of Flash memory D. It is the action of using a storage de-
cards: vice to copy data and files to put them in
A. Cheaper than CD’s and DVD’s a different storage medium.
B. not easy to lose as they are bulky in 195. Difference between Main Memory Stor-
size age vs Secondary/Backing Storage (Q1):
C. Very compact and can easily removed A. Secondary:Usually used to store data
and used in another device while it is being processed by the CPU.
NARAYAN CHANGDER
D. All types of Flash memory have larger B. Main Memory:Data’s are hold perma-
storage capacity compared to Blu-ray nently
disks C. Secondary:Temporary holding data
191. Binary on an optical disc is read as D. Main Memory:Usually used to store ap-
what? plication software, operating system soft-
ware, files etc.
A. Bumps and Flat Surfaces
B. Magnetic 1s and 0s 196. What is a feature of DRAM?
C. Tiny Holes that light shines through A. They are much faster than SRAM
D. Tiny 1s and 0s printed on the disc B. They have a higher storage capacity
than SRAM
192. Which device would be most suitable for
C. They consume more power than SRAM
downloading and storing movies?
D. They are more expensive to manufac-
A. DVD
ture than SRAM
B. Floppy Disk
197. which one is not a storage device?
C. CD
A. RAM
D. none of above
B. PRINTER
193. What is a device that moves the head
C. DVD
over the disk?
D. FLOPPY DISK
A. actuator arm
B. agitator arm 198. Two types of storage medium:
C. activator arm A. Fixed:installed internally
D. actuating hand B. removable
C. Optical Storage
194. What is data access speed?
D. Laser reading base Storage
A. There are some storage devices which
will let you access to your data really 199. Floppy Diskette is a
quickly.
A. Primary storage device
B. Is when you put data in a place you are
aware of B. Secondary storage device
200. What are the storage devices that are B. Storage that can be disconnected from
real? the main computer unit, for example to
transfer files between computers.
NARAYAN CHANGDER
C. Low storage capacity
D. Safeguard against damage caused by
D. Easily transported hackers
212. How data is read by CD ROM: 218. Which storage device can only store a
A. Has moving header to read the data small amount of data?
B. is read by bouncing the laser beam off A. HD
the surface off the medium. B. FD
C. data is read directly from Microchip C. CD
D. Uses light and pin to read the data D. DVD
213. USB stand for what?
219. What is used to record data in a com-
A. Universal series bus puter?
B. Universal serial bus A. magnetism
C. Universal serial data B. unicorns
D. none of above C. processor
214. Typically stores 700mb of data on it . D. hard drive
A. DVD 220. Why is optical storage called optical?
B. Blu-ray A. Because they are created for movies
C. CD and games.
D. Floppy disk B. Because they save data as patterns of
dots that then are read by using a light at
215. Blu ray disk can store of data. a high power.
A. 50 GB
C. Because they can be used in different
B. 50 MB devices.
C. 50 KB D. Because they can save visible informa-
D. none of these tion.
216. Which drive is called the same as IDE? 221. Which of this is a Optical storage media?
A. Pata A. Magnetic tape
B. Sata B. Portable Hard Disc Drive
C. Atx C. Memory card
D. Vata D. Blu-Rays
222. Magnetic storage devices have (select 227. Which of the following is an advantage
all that applies) of Solid State Storage?
232. is a small, shiny, circular disk that can 237. When a lazer hits a bump area in an optic
store 700 MB of data. disc the light is reflected. Reflected light is
the corresponding a in which number
A. DVD
system?
B. CD
A. O binary
C. Blu Ray Disk
B. 1 binary
D. Pen Drive
C. 1 in hexadecimal
NARAYAN CHANGDER
233. memory chip is a permanent primary D. 0 in hexadecimal
storage where the instructions are stored
E. 1A binary
by manufacturers, and users are unable to
overwrite the information stored on this 238. The printers give a very high quality
device. output
A. RAM A. Inkjet
B. ROM B. Dot Matrix
C. CPU C. Laser
D. SSD D. none of above
234. A type of memory used by an operat- 239. Which of these are secondary storage de-
ing system to compensate for shortages of vices?
physical memory (RAM).
A. ROM
A. SSD
B. HDD
B. System memory
C. DVD
C. Virtual memory
D. SSD
D. GPU
E. Floppy disk
235. What is used as primary storage?
240. The major advantage of an is that it
A. RAM is capable of storing lots of data cheaply.
B. ROM A. HDD
C. Solid State Drive B. ROM
D. Hard Disk Drive C. RAM
253. What type of storage device is the fol- 258. Why back up data? Pick 3 reasons
lowing a description of? Data is stored in A. Safeguard against loss data due to the
the form of tiny magnetised dots. Dots storage device failure
are created, read and erased by magnetic
fields created by tiny electromagnets. B. Safeguard against virus
A. Paper C. Safeguard against hackers
NARAYAN CHANGDER
C. Magnetic 259. Which optic disc can store up to 25 GB of
D. Solid State data (per layer)?
A. DVD
254. Storage device that uses direct access
and in a very fast form of data access are B. CD
listed below, except? C. BLU RAY DISC
A. Memory sticks D. CD-P
B. DVD-ROM E. DVD-P
C. Portable HDD 260. If you were choosing a new desktop, why
D. Magnetic tapes might you choose an SSD compared to a
hard disc drive?
255. A(n) converts the magnetic pattern
A. quicker to boot up and much cheaper
from a hard drive platter into electrical
pulses. B. quicker to boot up, quieter, less prone
to damage
A. actuator arm
C. quicker to boot up and stores much
B. conductor
more data
C. write project
D. none of above
D. read/write head
261. Optical drives are used to read
256. Typically has the largest storage capacity
A. CDs
and is the cheapest per giga byte (Gb).
B. Flash Drives
A. Magnetic storage
C. Floppy Disks
B. Solid state storage
D. SSDs
C. Optical storage
D. none of above 262. How many Bits are in a Byte
A. 2
257. is not a removable storage device
rather it’s an inbuilt computer storage de- B. 4
vice C. 10
A. Hard Drive D. 8
B. Memory card 263. Two disadvantages of Internal hard disk
C. Flash drive drive:
D. Floppy disk A. More expensive than SSD
B. Data transfer rate/data access time is 268. with such advantages what storage de-
slower than Optical Disks vices do you know? large, fast, high, ro-
bust, medium
NARAYAN CHANGDER
storage medium:
bile device to folders on other machines
A. Serial (sequential Access) or into the cloud, allowing users to work
B. Queue (First in First out access) from a folder or directory across devices.
C. Top down access (Structured access) C. an Internet service that provides stor-
age to computer users
D. Direct (Random Access)
D. none of above
276. What are the differences between DVD
and DVD-RAM? 281. Typically stores 650mb of data on it-
usually music.
A. DVD-RAM is a spiral track
A. DVD
B. DVD-RAM allows numerous read-write
operations B. Blu-ray
C. DVD can last for over 30 years C. CD
D. DVDs can have more than 1 layer D. Floppy disk
277. What would be the most suitable stor- 282. When a lazer hits a pit area in an optic
age device for backing up a company net- disc the light is not reflected. Not reflected
work? light is the corresponding a in which
number system?
A. DVD
A. O binary
B. Solid State Drive
B. 1 binary
C. USB
C. A in hexadecimal
D. Magnetic tape
D. b in hexadecimal
278. Computer programs or applications that
tell a computer what to do is called 283. A DVD can store data than a CD.
A. Play Store A. equal
B. Software B. less
C. Hardware C. more
D. Application Manager D. none of above
279. and are the two types of memo- 284. I am known as the “brain” of the com-
ries present in a computer. puter because I receive information and
carry out commands. I tell other parts of
A. Internal the computer what to do and when to do
B. Hard disk it.
C. Stores programs/data and files that D. Need for larger storage capacity (than
would be lost when the power is switched what RAM and ROM can provide).
off. E. Its required for Virtual Networks
NARAYAN CHANGDER
A. Numbers A. CMOS
B. Alphabets B. Flash Memory
C. Bits C. RAM
D. Special characters D. ROM
7. Choose the print primitive for the ac-
2. There are types of memory in the com-
tion:Addition of 6 and 5.
puter
A. PRINT DIFFERENCE 6 7
A. 3
B. PRINT PRODUCT 6 7
B. 1
C. PRINT ADD 6 7
C. 4
D. PRINT SUM 6 7
D. 2
8. how many types basic parts of primary
3. A computer can understand only two memory are there
states:
A. 4
A. 0(ON) and 1(OFF) B. 3
B. 0(OFF) and 1(OFF) C. 2
C. 0(OFF) and 1(ON) D. 1
D. 0(ON) and 1(ON)
9. The information in a computer is stored in
4. Example for secondary memory the form of digits.
11. What are the types of computer memory? 17. what is stored in RAM
A. Only Primary memory A. the bios
C. zettabytes C. KiloByte
D. yottabytes D. MegaByte
15. Which one is an example of flash memory? 21. Gated Latches are organized into matrices
(2-3) to
16. WHAT IS BYTE? 22. Calculate how many bits are in ( car)
A. A FLASH DRIVE A. 24
B. A COLLECTION OF 4 BITS B. 32
C. A COMPACT DISK C. 64
D. A COLLECTION OF 8 BITS D. none of above
23. what are the types of processors 28. What is Primary memory?
A. media processor A. refers to storage devices, such as hard
drives and solid state drives
B. microcontroller
B. computer memory that is accessed di-
C. EPROM rectly by the CPU.
D. EEPROM C. Non of them
D. none of above
24. how are the binary digits written?
NARAYAN CHANGDER
29. What is the smallest memory used to mea-
A. in number 2’s
sure a computer memory?
B. in number 1’s A. Terabyte
C. in number 8’s B. Bits
D. in number 0’s C. Megabyte
D. Gigabyte
25. A is a local storage space that holds
data being worked by the CPU 30. computer memory is measured in terms of
A. hard drive A. bits
B. processor register B. bytes
C. cells
C. operating system
D. units
D. none of above
31. Calculate how many bits are in ( school)
26. what is a hard disk? A. 48
A. It is the main storage medium for com- B. 64
puters. It is fixed inside the CPU Box. C. 32
B. Storage medium for portable devices D. none of above
like mobiles and digital cameras. Can
transfer images to a computer. 32. In , the touch screen is coated with
a materialin order to Store the electrical
C. optical storage device, can hold text, charges generated by a touch. Thecharge
graphics, images, videos. is measured by panels located at each cor-
D. Optical storage device, used to store ner of the device and processed.
high quality sound, games and movies. It A. resistive technology
is inserted to the CPU to see and observe
B. capacitive technology
the data.
C. surface wave technology
27. We’re late. The film by the time we D. none of above
get to the cinema.
33. What is firmware? (3-5)
A. will already start
A. A program in cache
B. will be already started B. Any hardware
C. will already have started C. Data in RAM
D. will be starting D. A program in ROM
35. Byte can hold different values 41. primary memory also know as
A. 64 A. main memory
B. 128 B. short memory
C. 256 C. no correct answer
D. none of above D. none of above
36. Internal memory is also known as: 42. WHAT DOES RAM STAND FOR?
A. Secondary memory A. RANDOM ACCESSIBLE MEMORY
B. Primary memory B. RANDOM ACCESS MEMORY
C. External memory C. REALLY ACCURATE MEMORY
D. none of above D. RANDOM ACCESS SOARING
37. Processed data is called 43. What is the Full Form of DVD?
A. Instruction A. Digital Video Disc
B. Input B. Digital Versatile Disc
C. Information C. Digital Voice Disc
D. none of above D. Both (A) & (B)
38. What is the purpose of ROM? 44. What are the types of Hard-Disk
A. To not be volatile. A. Non-Internal Hard Disk
B. To contain vital instruction for the com- B. Internal Hard Disk & External Hard
puter (e.g. Starting up). Disk
C. It has no purpose. C. Non-External Hard Disk
D. To randomly open memory without be- D. All of these
ing tasked to.
45. What is a Secondary memory?
39. The act of putting data into memory is A. refers to storage devices, such as hard
called drives and solid state drives
A. storing B. computer memory that is accessed di-
B. latching rectly by the CPU.
C. saving C. Non of them
D. writing D. none of above
46. What type of device is a headset? 52. This contains the BIOS (Boot-up program)
A. Input (3-4)
B. Output A. ROM
NARAYAN CHANGDER
A. 1024 53. A/ An allows programmer to erase the
contents by exposing to ultraviolet light
B. 100
A. PROM
C. 1000
B. EPROM
D. 999
C. EEPROM
48. what is computer memory?
D. none of above
A. it is the internal memory of the com-
puter 54. what are types of RAM
B. it the external memory of a computer A. SRAM
C. it is a physical device used to store B. DRAM
data and instructions
C. PROM
D. it is the data stored in a computer in
D. NON
the form of 1’s and 0’s
55. A/ An allows programmer to erase the
49. Print primitive used to display the last
contents with an electrical signal.
word of a sentence.
A. PROM
A. PRODUCT
B. LAST B. EPROM
C. ADD C. EEPROM
50. Computer primary memory are of two 56. What is the Full Form of ROM?
types: A. Read Only Memory
A. Hard disk and Flash drive B. Random Access Memory
B. Hard Disk and Memory Card C. Read Only Message
C. RAM and ROM D. None of these
D. Internal memory and External memory
57. A computer can understand only the
51. One is about 1 million bytes. language
A. terabyte A. Java
B. gigabyte B. C++
C. megabyte C. Binary
D. kilobyte D. Octal
58. Computer can store and process 64. Which one of those is not a type of Stor-
A. Binary and decimal numbers age?
70. Which storage device is NOT flash mem- 76. The following is a correct order of units of
ory? storage from lowest to highest:
A. RAM A. a bit, a nibble, a byte, a kilobyte, a
megabyte, a gigabyte, a terabyte
B. Micro SD
B. a bit, a byte, a nibble, a kilobyte, a
C. BIOS megabyte, a gigabyte, a terabyte
D. SD Card C. a bit, a nibble, a byte, a megabyte, a
kilobyte, a gigabyte, a terabyte
NARAYAN CHANGDER
71. Full form of CD-RW
D. a byte, a bit, a nibble, a megabyte, a
A. Compact Disc-Readable kilobyte, a gigabyte, a terabyte
B. Compact Disc-Recordable 77. USB stand for Serial Bus
C. Compact Disc Rewriteable A. Union
D. none of above B. Universal
92. The intersections where the latches are lo- 98. HOW MANY BITS ARE IN A CRUMB?
cated are called a
A. 1
A. location
B. 2
B. matrix location
C. 3
C. memory address
D. 10
D. latch address
99. CD stands for Disk
NARAYAN CHANGDER
93. The network card is also known as
A. Continuous
A. sound card
B. Cotton
B. video card
C. Compact
C. ethernet card
D. Complete
D. none of above
100. Eight Bits make up a
94. what is HDD
A. byte
A. a metal disk which data for a computer
can be stored B. megabyte
B. removable storage device C. kilobyte
C. hard drive D. None
D. none of above 101. What is the fastest data storage in a com-
puter (6-9)
95. What is the full form of GB?
A. Registers
A. Gate Byte
B. Giga Byte B. RAM
96. The primitive turns the head of the tur- 102. What is the full form of ALU?
tle towards the left side. A. Arithmetic Long Unit
A. PU B. Arithmetic and Logical Unit
B. LT C. None of these
C. PD D. none of above
D. RT
103. Full form of PROM is
97. What is the Full Form of RAM? A. Programmable Read Only Memory
A. Read Only Memory B. Erasable Programmable Read Only
B. Resume Access Memory Memory
C. Random Access Memory C. Read Only Memory
D. None of these D. Random Access Memory
104. What is the difference between SRAM 109. A half byte is known as
and DRAM? A. data
B. Shiny circular disk, optical storage de- 120. SDD stands for
vice, can hold text, graphics, images, A. solid state drive
videos.
B. solid liquid gas
C. Storage medium for portable devices
like mobiles and digital cameras. C. state drive
NARAYAN CHANGDER
A. faster
more than CD.
B. expensive
115. A / An is a blank ROM chip which al-
C. long life
lows programmer to write permanently
D. non
A. PROM
B. EPROM 122. What is the full form of CPU?
C. EEPROM A. Control Process Unit
D. none of above B. Central Processing Unit
C. Control Processing Unit
116. A group of 8 bits is called a
D. none of above
A. bit
B. byte 123. There are two types of computer memory
D. Megabyte B. Bytes
C. KM
117. The memory which is inside the computer
D. Secondary Memory
A. External memory
124. What is the definition of memory?
B. Internal Memory
A. Electronic components that store in-
C. Paternal Memory
structions waiting to be executed by the
D. none of above central process unit
118. The lowest measurement of data? B. Electronic components that store in-
structions waiting to be executed by the
A. Megabyte
processor
B. Gigabyte
C. Electronic components that store in-
C. Nibble structions waiting to be executed by the
D. Byte motherboard
D. none of above
119. Select the device with smallest storage
capacity. 125. External memory are of types
A. CD-RW A. 4
B. DVD B. 2
C. Pen Drive C. 3
D. Floppy Disk D. None
131. In , the touch screen device is layered 136. Another name for Primary memory
with ametallic electric conductor in order A. Internal Memory
to provide resistance to change in electric
current. B. Bytes
A. Resistive technology C. Bits
B. Surface wave technology D. Binary
138. What is the Full Form of CD-RW? 144. . “What a beautiful shirt you’re wear-
NARAYAN CHANGDER
ing!” “Thank you. It especially for me
A. Compact Disc-Read & Write by my mother.”
B. Control Disc-Rewritable A. is made
C. Compact Disc-Rewritable B. has made
D. Compact Disc-Record & Write C. made
139. Smallest measuring unit is D. was made
A. Megabyte 145. is the storage medium for portables
B. Kilobyte devices like digital cameras, mobiles.
C. Byte A. Flash drive
D. none of above B. CD
C. Memory card
140. WHAT STORES PHOTOS AND VIDEOS ON
A CAMERA? D. Hard disk
142. Memory is divided into two types: 148. WHAT TYPE OF STORAGE IS A USB?
A. Internal memory A. MAGNETIC
B. Inside memory B. OPTICAL
C. External memory C. SOLIDE STATE
D. Outside memory D. SOLID STATE
153. Binary langauge consists of and 159. I store the operating system of the com-
puter
A. Ones and Twos
A. ROM
B. Zeros and Twos
B. RAM
C. Ones and Tens
C. USB Drive
D. Zeros and Ones
D. DVD Drive
154. Which of the following is NOT TRUE
160. Terabyte is
about non-volatile memory?
A. 1000 Gigabyte
A. Data on most ROM chips cannot be
modified B. 1000 Megabyte
B. ROM is a memory chip that stores tem- C. 1000 TKilling
porary data D. none of above
161. A gaming computer is “thrashing” the 167. Computer memory is divided into two
disk. Why? (5-7) parts
A. The processor is short of RAM A. Primary and Secondary Memory
B. The game uses high resolution graph- B. zero and one
ics C. Upper and Lower Memory
C. The screen uses too many colours D. CPU and Hard disk
D. The game takes up too much space 168. where does the processor exist
NARAYAN CHANGDER
162. Multiplexers are used to determine A. computer
A. which column to write to B. sensors
B. which row and column to write to C. desktop
C. which row to write to D. none of above
D. the memory address 169. You can write data more than once to this
device (1-3)
163. A popular storage device that is small in
A. DVD+R
size, scratch resistant and can be easily
carried from place to place. B. CD ROM
A. DVD C. ROM
B. Hard disk D. RAM
C. CD 170. Order these units of data storage in order
D. Flash drive from smallest to greatest.
A. bit, byte, gigabyte, megabyte, kilobyte,
164. A single character takes up of memory yottabyte, zettabyte
A. Bit B. bit, nibble, byte, megabyte, exabyte,
B. Byte terabyte
C. Giga Byte C. bit, nibble, byte, kilobyte, megabyte, gi-
gabyte, terabyte
D. none of above
D. none of above
165. A is a single dot on the computer
screen. 171. What are types of Primary memory?
A. Only RAM
A. Pixel
B. CD
B. card
C. Only ROM
C. laser beam
D. RAM & ROM
D. none of above
172. You can write data more than once to this
166. It is popularly known as Pendrive device
A. Flash Drive A. CD ROM
B. Memory Card B. RAM
C. Blu-ray disk C. ROM
D. CD D. DVD+R
174. Computer stores information in 180. all of the following are non-volatile mem-
ory except
A. Byte
A. ROM
B. Decimal
B. PROM
C. can not store information
C. flash memory
D. none of above
D. RAM
175. Binary bits are typically in groups of 8.8 181. Full form of RAM
bits makes a
A. Read Only Memory
A. byte
B. Random Access Memory
B. bite
C. Record Only Memory
C. mouthful
D. Rewrite Only Memory
D. big number
182. is not a secondary storage device.
176. The act of getting data out of memory is A. DVD
called
B. ROM
A. reading
C. Flash Drive
B. retrieving
D. Memory Card
C. getting
183. Persistent memory stores information
D. opening
.
177. Which storage device is not flash mem- A. only when you ask it to
ory? (2-3) B. when needed
A. RAM C. forever
B. Micro SD D. while the power is off
C. BIOS
184. ROM is used for storing a special soft-
D. SD Card ware called
178. which contents are lost when the com- A. BIOS
puter turns off? B. EXCEL
A. memory C. WORD
B. storage D. PAINT
185. The AND-OR Latch (select all that ap- 191. WHAT CONTAINS THE BOOTSTRAP
ply) LOADER?
A. has two inputs, set and reset A. RAM
B. outputs the stored value B. SD CARD
C. is basis for all memory C. ROM
D. stores a 0 or a 1 D. RIM
NARAYAN CHANGDER
186. A computer uses for storing data and 192. A storage device that is circular in shape
instructions. and can hold upto 700 MB of data.
A. Memory A. Blu Ray Disk
B. Keyboard
B. CD
C. Printer
C. DVD
D. Speaker
D. none of above
187. How much of a computers processing is
carried out by the CPU? 193. How many bytes are in a Gigabyte?
A. Some A. 100000000
B. most B. 10000
C. All C. 1000000000
D. none D. 10000000
188. which one is the secondary memory de- 194. full form of IPO cycle
vice
A. input-process-output
A. floppy disk
B. inside-product-outside
B. CPU
C. input-process-outside
C. mouse
D. none of above
D. ALU
195. memory is measured in
189. What is the full form of RAM
A. bits and bytes
A. Random Access Memory
B. liters
B. Read Access Memory
C. Read Automatic Memory C. kilograms
197. what is the term for firmware C. the work that you save your document
A. a type of software that controls the D. the instructions needed to start up the
207. WHAT TYPE OF STORAGE IS A BLU-RAY? C. The data from the memory is not saved
A. OPTICALE D. The data from the memory is saved
B. OPTICAL onto ROM
C. OPICAL 210. how many types of processors are there
D. OPTICA7 A. 5
208. is volatile or erasable memory. It B. 6
means that the data storedon RAM is tem-
NARAYAN CHANGDER
C. 3
porary, and it gets deleted when the com-
D. 4
puter isturned off or if the electricity sup-
ply is interrupted. 211. what is the full form of a DVD
A. ROM A. digital verse disk
B. RAM B. digital versa disk
C. DVD C. digital venrtrole disk
D. CD D. digital versatile disk
209. RAM-What happens when electricity is 212. Where does virtual memory live? (2-3)
turned off?
A. Cache
A. The data from the memory is saved
onto flash memory B. ROM
5. The connection on a motherboard for hold- 10. RAM Chips are plugged into these slots.
ing the CPU is called the A. PCI Slots
firmware.Before performing the upgrade, A. Edit the BIOS to allow quad-core CPUs.
if possible, which of the following is the B. Read the motherboard documentation
BEST action to take? to identify which processors are sup-
A. Password protect the system. ported.
B. Upgrade the processor. C. Configure jumpers on the mother-
board to allow four CPU cores.
C. Connect the computer to a UPS.
D. Install the processor.
D. Change the motherboard bat-
NARAYAN CHANGDER
tery.Explanation E. Replace the VRM.
15. What is a motherboard? 19. What is the function of the memory slot?
A. PCIe C. microATX
B. AGP D. NLX
23. It refers to the parts of motherboard that you take to begin troubleshooting the is-
hold the processor or CPU Chip sue? (Select TWO).
E. Locate the flash utility or tool that was 31. A support technician is installing a new
shipped with your PC. hard drive on a computer. What type of
cable connector will the technician plug in
27. You have just finished upgrading the CPU to supply power to the drive?
in your desktop system. After running
for about 15 minutes, the system spon- A. 15 pin connector
taneously shuts down.Which steps should B. 7 pin connector
NARAYAN CHANGDER
A. Pin 1 has a blue strip B. 72-pin SIMM
B. Pin 1 has a black stripe C. 184-pin DIMM
C. Pin 1 has a red stripe D. 240-pin DIMM
D. Pin 1 has a grey strip
38. Your Core i5 fan has a four-pin connector,
33. How much do motherboards cost? but your motherboard only has a single
A. $250 to $500 three pin header with the CPU FAN la-
bel. Which of the following will be the eas-
B. $100 to $200
iest solution to get the necessary cooling
C. $500 to $1000 for your CPU?
D. none of above A. Plug the four-pin connector into the
three-pin header.
34. Embedded components are almost always
configured through B. Buy an adapter.
A. The Task Bar C. Leave the plug disconnected and just
B. The Start Menu use the heat sink.
C. The Control Panel D. Add an extra chassis fan.
D. CMOS Setup
39. A computer is processing software instruc-
35. The primary ATX power connection on a tions on the central processing unit. How
motherboard is either is all computer software broken down to
be processed?
A. 20 or 24 pin
B. 4 or 8 pin A. Bus
C. 16 or 20 pin B. Binary
D. 18 or 24 pin C. RAM
36. You are installing a PCI card into a desktop D. System clock All computer software
computer, and you notice that there are works by running instructions in the cen-
small spacers inside of the PCI slot. What tral processing unit (CPU) and computers
function do these spacers provide? process all the software and data as the
ones and zeroes of binary code. A com-
A. They keep the PCI adapters at equal puter is processing software instructions
distances from each other on the central processing unit. How is
B. They ensure proper voltage to the all computer software broken down to be
adapter card processed?
50. How does clock speed affect computer per- 55. Which of the following BEST describes the
formance? chipset?
A. The higher the clock speed the slower A. Designed to be compatible with a spe-
the computer will run. cific type of memory module.
B. It improves the amount you can store B. Facilitates communication between
on the computer. the processor, memory, and peripheral
devices.
C. The higher the clock speed the better
NARAYAN CHANGDER
the performance. C. Allows you to expand the capabilities
of your computer by installing expansion
D. It will make loading program slower
cards.
51. Which of the following is an attached com- D. Connections to the motherboard’s
ponent of a motherboard? front panel connectors, which are also
called headers.
A. Processor
B. ROM 56. The PCI Express bus currently comes in
how many different slot sizes?
C. Sound Card
A. 1
D. Memory Slot
B. 2
52. What are the functions of motherboard? C. 3
A. Connects all the devices and compo- D. 4
nents attached.
57. Capable of executing multiple pieces of
B. Prints the graphics
codes simultaneously
C. Provides connectors for other periph-
A. Data Transfer
erals.
B. Multiplexer
D. Saves the data into permanent stor-
age. C. Hyperthreading
D. CPU
53. It is the part of the mother board that
holds the computer Memory or RAM. 58. A support technician opened a PC case
and observed a small computer system in-
A. ATX Power connector
terface (SCSI) connector plugged into the
B. Memory Slot motherboard. What can the technician
C. Hard Disk Drive know to be true about the connector?
NARAYAN CHANGDER
A. DIMM
B. ATX
B. AGP
C. Micro-ATX
C. PCI-X
D. SCSI
D. Mini PCI
70. our video card slot should be connected to
the chipset, also known as the Mem- 75. When talking about CPU connections, ZIF
ory Controller Hub, because this chipset is stands for
located closer to the CPU which allows for
A. Zero Inert Force
faster throughput of data.
A. North Bridge B. Zero Insertion Face
79. Which motherboard design style is most 84. A support technician is installing a cam-
widely implemented? era that requires the Universal Serial Bus
(USB) 3.1 standard. What type of connec-
NARAYAN CHANGDER
90. This term refers to the amount of force C. Access
needed to install a CPU into a socket or
D. Apple
slot:
A. LGA 96. In this CPU architecture, the pins are on
the underside of the processor package:
B. ZIF
A. PGA
C. PGA
B. LGA
D. a lot
C. BGA
91. What to look for when buying a mother- D. ZIF
board?
A. Which one is the cheapest 97. Many older motherboards and expansion
stored setup data using a switch,
B. Make sure the motherboard you chose which has an on and an off position.
is compatible with your current (or new)
processor. A. DIP
100. If a motherboard fan connection has 4 105. is a temporary storage area of mem-
pins instead of 3, what does that allow? ory that stores the contents of frequently
used data or instructions.
103. What is the name of the data connection 108. Which of the following is most likely NOT
commonly used for hard drives and optical a symptom that a motherboard or proces-
drives? sor is failing?
A. RAID A. The system begins to boot but then
powers down.
B. ATX
B. The power button on the tower quits
C. RAM working.
D. SATA C. An error message displays during the
boot.
104. A support technician needs to connect the
D. Intermittent Windows or hard drive er-
USB port on a portable monitor to an HDMI
rors occur.
port on a laptop to extend the laptop’s dis-
play. What kind of cable will the techni- 109. What is a processor socket?
cian use to accomplish this? A. a type of computer memory that can be
A. SCSI accessed randomly
B. Adapter B. A processor socket is the connector on
the motherboard that houses a CPU and
C. EIDE
forms the electrical interface and contact
D. DVI with the CPU.
NARAYAN CHANGDER
110. It is commonly known as a bridge of the B. BIOS
I/O cards of the computer i.e. LAN card,
C. CMOS
WIFI card, USB expansion card and sound
card. D. Bridges
A. IDE Connector 115. The PCI sound card in your computer has
B. PCI Slot stopped working. You decide to use the
motherboard’s integrated sound until you
C. Memory Slot can replace the PCI sound card. After re-
D. SATA Connector moving the PCI sound card and powering
on the computer, you have no sound, and
111. In this CPU architecture, the pins are in the built-in sound card does not show up in
the socket instead of on the processor: Device Manager.To solve this issue, which
A. LGA of the following is the BEST action to try
first?
B. BGA
A. Edit the CMOS settings and enable the
C. PGA
onboard sound.
D. ZIF
B. Enable the sound card in Device Man-
112. You have been using the same computer ager.
for several years. To extend its service C. Update the drivers for the device.
life, you decide to upgrade the proces- D. Update the necessary audio codecs.
sor. You check the motherboard documen-
tation and purchase the fastest processor 116. Select devices that can be attached via
supported by the motherboard. However, the motherboard port.
when you start the computer, it beeps reg- A. Printer
ularly, nothing is displayed on the screen,
and it doesn’t start.While troubleshoot- B. Internal hard disk drive
ing this computer, which of the following C. Mouse
would be BEST to try first? D. Power supply
A. Upgrade the motherboard.
117. Which of the following is not controlled
B. Return the CPU for a new one. by the Northbridge?
C. Press F8 while booting the computer. A. PCIe
D. Update the UEFI firmware. B. SATA
113. Motherboard sizes are called and will C. Cache Memory
effect your choice of other components. D. AGP
127. Which one is not other names for the date is set back to January 1, 1990.Which
motherboard? of the following is the MOST likely cause
A. main board of this anomaly?
NARAYAN CHANGDER
128. Where all your files are permanently D. The CMOS settings are not being saved
stored. before powering off the computer.
A. Hard Drive
133. This part joins the USB port of the front
B. CD Drive panel
C. Floppy Drive A. USB Connector
D. RAM B. USB Hub
129. The notches on an expansion slot are of- C. USB port
ten physical indicators of: D. USB panel
A. The possible power requirements of 134. The PCI Express bus architecture sounds
that card similar to the PCI bus architecture. What
B. The possible transfer speeds of that is the primary architectural difference be-
card tween PCI and PCI Express?
C. The upgrade potential of that card A. PCI provides for higher throughput
D. The expected heat output of that card than PCI Express
B. PCI is a parallel bus architecture and
130. What type of expansion slot is pre- PCI Express is a serial bus architecture
ferred today for high-performance graph-
ics adapters? C. PCI has more communication lanes
than PCI Express
A. AGP
D. PCI is a newer specification than PCI
B. PCIe Express
C. PCI
135. A device issues a , which is a command
D. ISA to the processor to wait for slower devices
to catch up.
131. A bus that does NOT run in sync with the
system clock is called a(n) bus. A. Wait State
A. Synchronized B. Pause Command
B. Expansion C. Stop Commansd
C. Data D. Synchronized command
D. Memory 136. PCIe communicates over this type of bus
architecture.
132. An employee complains that every time
they turn their computer off, the com- A. Serial
puter’s time is set to 12:00 p.m., and the B. Express
NARAYAN CHANGDER
C. SSD
B. Accelerated Graphics Port D. CMOS
C. Peripheral Component Interconnect
151. Which hardware component is responsi-
D. none of above ble for ensuring that a CPU operates at a
regular temperature?
147. is a small amount of memory which
is a part of the CPU-closer to the CPU than A. Heat sink
RAM. B. Power supply
A. Cache C. Hard drive
B. Core D. RAM
C. Intel
152. PCI and PCI-X communicate over this
D. Clock speed type of bus architecture
148. Which motherboard design style features A. Parallel
smaller size and lower power consump- B. Serial
tion?
C. Express
A. ATX
D. Dual
B. AT
153. ZIF refers to the amount of force needed
C. Micro ATX
to install a CPU into the motherboard
D. ITX socket or slot?
NARAYAN CHANGDER
B. there are large communities of devel-
8. A bank thinks of getting a database pack- opers to support it
age. They have particular needs, such as
C. Every version has been thoroughly
having their logo on every screen and tim-
tested before being released by the devel-
ing employees performing tasks. The best
oper
software in this case would be:
D. It can be easily customised and
A. bespoke changed to meet your needs
B. off the shelf
14. The following type of software will typi-
C. open source cally have the biggest number of users:
D. none of above A. off the shelf
9. Classification of System Software are B. proprietory
B. easy to keep track, team members can 27. Software is made up of and soft-
be anywhere, action taken quickly ware.
NARAYAN CHANGDER
29. SOFTWARE IS USED TO CREATE A
COPY OF THE DATA C. Integrated
A. BACKUP D. Custom Written
B. Application 35. Which of the following are examples of de-
C. System vices that use embedded software
D. none of above A. Microwave
B. Mobile Phone
30. How many types of operating system are
there? C. iPad
A. 1 D. All of these
B. 2 36. Software that you can use but do not have
C. 3 access to the actual code is called
D. 4 A. Bespoke
B. Close Source
31. :Allows users to create, edit a docu-
C. Open Source
ment. Example:MS Word, Word Pad etc
D. Off the shelf
A. Spreadsheet Software
B. Multimedia Software 37. :Allows users to store and retrieve
vast amount of data. Example:MS Access,
C. Word Processing Software
MySQL, Oracle etc.
D. Database Software A. Spreadsheet Software
E. Presentation Graphic Software B. Multimedia Software
32. Which of the following would generate C. Word Processing Software
hardware interrupts? D. Database Software
A. Division by zero E. Presentation Graphic Software
B. Printer out of paper
38. description of shareware
C. User presses a key
A. software that is available free of
D. Program crash charge and often distributed informally
for evaluation, after which a fee may be
33. COMPUTERS ARE CLASSIFIED INTO requested for continued use
GENERATIONS
B. transferring information from one
A. 8 place to another using a range of tech-
B. 20 niques
C. staying connected, find people with 44. The program that controls the computer
common interests, spread information A. Operating System
very fast
NARAYAN CHANGDER
the TWO main categories of software? C. Custom Written
A. Operating system software D. none of above
B. System software
56. Types of System Software:
C. Application software
A. Language Processors
D. Gaming software
B. Utility Software
51. Copyrighted software made available for C. Operating System
use, free of charge, for an unlimited time.
D. All of these
A. Malware
B. Shareware 57. Set of programs developed to perform spe-
cific tasks.
C. Freeware
A. System software
D. Proprietary
B. Application software
52. These are programs that identify, reject
C. Operating system
and eliminate software viruses.
A. Backup Software D. Anti-Virus software
60. WHAT DO YOU MEAN BY DISK DEFRAG- 65. Which of these is an operating system
MENTATION? A. Safari
NARAYAN CHANGDER
ment? C. an electronic message sent in real
A. Deals with movement, editing and time via the Internet and therefore imme-
deletion of data diately available for display on the recipi-
ent’s screen
B. Colour codes data
D. software written to control machines
C. Translates data into binary
or devices that are not typically thought
D. None of these of as computers
73. It is used to create video, animation, 77. Select ALL appropriate answers. Applica-
sound, graphics, and text with a high de- tion software can be categorized as:
gree of interaction.
A. General purpose
A. MS Word
B. Specialist application software
B. MS Access
C. CorelDRAW C. Profession oriented application soft-
ware
D. Windows Media Player
D. Custom written application software
74. description of embedded
78. (a) when the computer is first powered on.
A. software written to control machines
or devices that are not typically thought A. application software
of as computers B. operating system
B. training isnt customised to your indus- C. firmware
try, less expensive, regular updates
D. hardware
C. software that combines text, sounds,
images and video to present information E. bootstrap
D. program that transforms source code 79. WHAT IS APPLICATION SOFTWARE?
written in a programming language (the
source language) into another computer A. THAT ALLOWS A USER TO PERFORM
language MAINTENANCE TYPE TASKS
B. ARE ALL PROGRAMS THAT PERFORM
75. Software that you can but but do not have
SPECIFIC TASKS FOR USERS.
access to the actual code is called
A. Bespoke C. INCLUDES EVERY COMPUTER RE-
LATED OBJECTS THAT YOU CAN PHYSI-
B. Proprietary CALLY TOUCH AND HANDLE LIKE DISKS
C. Open Source
D. Off the shelf D. none of above
80. Microsoft Office and Windows are exam- 86. increases disk capacity bycompressing
ples of: files before saving them on the hard disk.
NARAYAN CHANGDER
D. none of above
92. operating system allows only one user
97. A COMPUTER IS A MACHINE.
to use computer system at any given time.
A. TIRED
A. Multi user
B. FUNNY
B. Single user
C. SMALL
C. Multi Tasking
D. INTELLIGENT
D. none of above
98. A collection of programs stored and run on
93. Companies who want software specific to the hardware and help the user work on
their individual needs can choose between the computer.
which 2 types of software A. Hardware
A. Open Source B. Software
B. Proprietary C. Utility
C. Off the shelf D. Devices
D. Custom Written 99. OS stands for
A. Organization Systems
94. Your teacher wants to calculate the grades
for all the students in the class, which ap- B. Open and Save
plication software would you recommend C. Operational Systems
to her? D. Operating System
A. Microsoft Word
100. Select ALL examples of application soft-
B. Microsoft PowerPoint ware:
C. Microsoft Excel A. iOS
D. none of above B. Adobe Photoshop
C. Android OS
95. The following is not a good reason to use
bespoke software: D. 21st Century ICT
A. the need to perform a very wide range 101. Data transmitted over the internet is bro-
of tasks ken down into (a)
B. special features only needed by one A. packets
company B. routers
C. low computer skills of employees C. out of order
D. none of above D. reordered
102. :Allows users to create visual presen- 108. Open source software is free
tation. Example:MS Power Point A. true
A. Word Processing Software B. false
B. Multimedia Software C. Sometimes
C. Spreadsheet Software D. none of above
D. Presentation Graphic Software 109. The act of examining the computer sys-
E. Database Software tem, drives, or files for possible virus or
malware attack is known as
103. This software acts as a link between
A. Backup
hardware and software
B. Scanning
A. System Software
C. Disk Management
B. Antivirus Software
D. none of above
C. Utility Software
D. Application Software 110. TO DEFRAGMENT YOUR DISK FIRST
CLICK
104. The instructions that tell the computer
A. Shut down
what to do is
B. Start
A. Hardware
C. landscape
B. Input
D. none of above
C. Software
D. Output 111. These programs carry out precise and
accurate tasks.It helps manage, maintain
105. Software is split into categories. and control all computer resources.
A. 4 A. Operating System
B. 3 B. Application System
C. 2 C. Utility System
D. none of above D. None of the above
106. An example of software would be 112. Which of the following is NOT an OS
A. MS Power Point A. Windows 85
B. keyboard B. Microsoft Office 2000
C. monitor C. Linux
D. printer D. Windows XP
NARAYAN CHANGDER
114. What information might you find in the
header of a data packet? A. 122 + 47
A. IP address of sender B. 200 + 122
B. IP address of destination C. 150 + 106
C. The contents of the message D. 84 + 69
D. Error-checking bits 120. TWO EXAMPLES OF SYSTEM SOFTWARE
E. Packet Number ARE:
A. OS(OPERATING SYSTEM)
115. IC STANDS FOR:
B. MS WORD
A. INTERGRATED CIRCUITS
B. VACCUM TUBES C. WORDPAD
C. HOME SOFTWARE & APPLICATION 129. HOW MANY TYPES OF SOFTWARE ARE
SOFTWARE THERE?
B. Canva E. 2
135. Example of Operating System is 141. utility scans for file errors and direc-
A. Compiler tory structure errors.
B. Windows A. Scanning
C. Antivirus B. Error Checking
D. System Clean Up C. Backup
D. none of above
136. Software are of two types
NARAYAN CHANGDER
A. Input and output 142. IN WHICH YEAR PROGRAMS WERE
WRITTEN BY ‘’LADY ADA LOVELACE”
B. System software and Application soft-
ware A. 2011
C. Application software and operating B. 1943
system C. 1937
D. Utility software and Language proces- D. 1843
sor
143. are two examples of SYSTEM SOFT-
137. Select all the types of application soft- WARE
ware:
A. Antivirus, Disk Checker
A. Microsoft Excel
B. Operating system, Disk cleaner
B. Windows
C. Utility software, Screen saver
C. Web Browser
D. Operating system, Utility Software
D. Microsoft Word
144. Software that is available free of charge
138. An antivirus program is an example of
what type of software A. Shareware
A. Utility B. Cheapware
B. Operating System C. Freeware
C. Application D. Open source ware
D. Custom 145. Which of the following will be the most
139. Example of utility software is expensive?
A. Compiler A. Open Source Bespoke Software
B. Windows B. Closed Source Bespoke Software
C. Antivirus C. Open Source Off-The-Shelf Software
D. Android D. Closed Source Off-The-Shelf Software
140. Select ALL appropriate answers. Choose 146. PROGRAMS USED BY COMPUTER ARE
examples of Integrated packages: CALLED
A. Office 2021 A. PRINTERS
B. Libre Office B. COMMUNICATORS
C. Microsoft Word C. HARDWARE
D. Google Suite D. SOFTWARE
158. The application software used to create 164. Identify the Operating system.
video, animations, sound and graphics. A. Linux
A. DBMS
B. Unix
B. Multimedia software
C. MacOS
C. Presentation software
D. Windows
D. Desktop publishing software
E. MS Office
NARAYAN CHANGDER
159. Windows 2000 and Linux are all exam-
165. Which of the following task is NOT man-
ples of
aged by the Operating System?
A. Application software
A. Managing memory resources
B. Types of Custom Written Software
B. Providing a firewall to protect the com-
C. System Software puter
D. Installed by a regular computer user C. Accessing a website and view web
pages
160. If a computer’s IP address changes every
time it connects to the network, it is D. Dealing with security e.g. usernames
and passwords
A. static
B. dynamic 166. Select ALL appropriate answers. Exam-
ples of single purpose software are:
C. IPv4
A. Microsoft Word
D. IPv6
B. Microsoft Excel
161. Select ALL examples of system software:
C. Libre Office
A. Microsoft Office
D. Adobe Photoshop
B. Windows 11
C. Mac OS 167. A small office is thinking about getting
productivity sofware for typing up letters
D. Android OS and simple spreadsheet modelling. Their
needs and budget are modest. The best
162. Operating system is software
software in this case would be:
A. application software
A. off the shelf
B. system software
B. bespoke
C. utility software
C. none of the above
D. none of above
D. none of above
163. A software designed for end user for spe-
cific task. 168. description of freeware
NARAYAN CHANGDER
efit the user
B. Application
C. Program 11. What is the main advantage of a GUI?
A. Reduces the cost of computing
D. Management
B. Makes the computer easier to use
6. What are the 3 main operating systems?
C. Required a less powerful computer
A. MAC OS D. Does not need updating
B. Linux
12. Which operating system is like a UNIX op-
C. Windows erating system with a GUI?
D. Firefox A. Windows
17. Which term relates to a multiuser system 23. Why is it important to keep the operating
A. batch jobs system up to date?
B. timesharing A. To impress your friends
C. serial processing B. To avoid buying a new one
D. punch cards C. To protect your computer form mal-
ware
18. The term OS is short for?
D. Because it’s the law
A. Apple
24. Tags and instructions developed by the cre-
B. Operating Software
ator which tell the foundation of the sys-
C. Operating System tem and how it was created
D. Overload System A. UNIX
19. These are examples of mobile operating B. source code
systems C. C++
A. Windows server and Windows Desk- D. Java
top
B. Android and OSI 25. What is the fullform of GUI?
C. Androde and IOS A. Graphic User International
D. Android and IOS B. Graphical Uses Interface
C. Graphical User Interface
20. Which of these is NOT a task of Operating
Systems D. Graphical Users International
A. communicating with the user 26. What is the purpose of an operating sys-
B. communicating with the hardware tem?
C. managing memory A. Manage software on computer
D. browsing the Internet B. Manage hardware on computer
NARAYAN CHANGDER
A. Single task up space for other programs being used?
B. Multi-user A. Memory management
C. Multi task B. File and disk management
D. Real-time C. User management
A. You can’t move them 34. Which of the following statements relates
to paging?
B. Right Click
A. Refreshing the current in memory cells
C. Dragging and Dropping
B. Fixed size memory blocks
D. Double click
C. Variable sized memory blocks
29. Choose the Apple operating system D. Logical divisions of memory
A. Windows
35. Which part of the operating system will
B. Android allocate memory to applications to allow
C. Linux more than one piece of software to be run
at once?
D. Mac OS X
A. Memory management
30. What is one reason there is a greater per- B. File and disk management
centage of Windows users than Mac OS
C. User management
X?
D. User interface
A. Not as good
B. Do not meet the individual needs 36. Question 8:Windows, Icons, menus and
Pointers are all part of this? (1-4)
C. More expensive
A. Graphical User Interface
D. Bad reviews
B. Command Line Interface
31. What does a file extension tell your com- C. Menu Interface
puter? D. No User Interface
A. Which file name to display
37. Which components of a computer system
B. Where a program is saved would you associate a device driver with?
C. What type of program to open A. CPU component:ALU
D. When the file was created B. Primary memory:RAM & ROM
40. Question 5:Dividing processor time be- A. Deals with the processes that are esti-
tween processes so that they appear to mated to take the smallest number of CPU
multitaskis known as:(1-3) cycles first with time slicing
47. The following describes what process? 52. Why is virtual memory used?
Asymmetric (public key) encryption is used A. To store the most frequently used
first to establish the connection, which is instructions and data in the processor,
then replaced with symmetric encryption speeding up the computer
(called the session (Session Key) for the
duration B. To allow access to documents in the
cloud, anytime, anywhere
A. HTTP
C. To extend the storage capacity of the
B. PKI (HTTPS)
NARAYAN CHANGDER
computer
C. WEP D. To allow more programs to execute
D. WPA2 than could be possible with the physical
RAM available
48. Terminal is a common tech launch point for
which 2 operating systems? 53. Which Operating System function allows
more than one program can run at the
A. WindowsmacOS
same time?
B. AndroidLinux
A. User Interface
C. LinuxiOS
B. Memory Management
D. macOSLinux
C. User Management
49. The ability of the processor to stop what D. File Management
is currently doing and instead service a
request from hardware or software is 54. An operating system used to run on mo-
known as bile devices such as mobile phones, tablets,
and other hand held devices
A. hardware handling
A. Mobile-OS
B. buffer handling
B. Traveling-OS
C. interrupt handling
C. Apple-OS
D. error handling
D. MS-DOS
50. The technique of swapping items between
memory and storage is called. 55. The common security triad CIA stands
for?
A. caching
A. Confidentiality, Internet, Availability
B. buffering
B. Confidentiality, Integrity, Authentica-
C. thrashing
tion
D. paging
C. Confidentiality, Integrity, Availability
51. What is the top folder of the file tree D. Confidential, Integrity, Available
called?
56. Process management .
A. .jpg
A. allocates time for processes to use the
B. windows CPU
C. ? B. is responsible for creating, deleting,
D. the root renaming of files and folders
C. stores programs and data that are 61. Which cannot self replicate?
presently being used by the CPU A. Virus
NARAYAN CHANGDER
67. Windows is the Product of? B. server
A. Apple C. internet
B. HP D. supercomputer
C. Dell 73. Essentially a secure cyrptoprocessor that
D. Microsoft can store cryptographic keys.
68. This is also known as memory resident, A. TPM (Trusted Platform Microproces-
which means it remains in memory while sor)
the computer or mobile device is running B. TPM (Trusted Platform Module)
A. graphical interface C. PTM (PlatformTrusted Module)
B. kernel D. CKL (Crypto Key Logger)
C. ROM
74. What controls a computer’s basic opera-
D. virtual display tions?
69. Worldwide, publicly accessed network A. Operating system
A. supercomputer B. RAM
B. internet C. RAM
C. aparnet D. Software system
D. firewall 75. This is needed to ensure security of a given
70. Which type of operating system only sup- operating system is maintained
ports textual commands to interact with A. FDisk
the computer? B. Storage management
A. Graphical User Interface
C. WPA2
B. Real-Time Operating System
D. Patch Management
C. Distributed Operating System
76. Which of these is an example of systems
D. Character User Interface
software?
71. This runs on proprietary hardware only, A. Operating system
with an emphasis on speed, dependability
B. Spreadsheet
and accuracy. It is partially open source
but it’s kernel is based on Unix. C. Word processor
A. iOS D. Web browser
77. Which of these devices can have an REAL 83. What is defragmentation?
TIME operating system?
A. Rearranging files to occupy contiguous
79. Safari, is a native app for which OS? 85. What is the need for malware protection
A. Android on a system?
B. Apple IOS A. To send emails
C. ISO B. to block malicious code from running
D. Titan C. to keep it running efficiently
80. Software program that carries out some D. to prevent malicious code from run-
action ning and to remove malicious code
A. process
86. SmartCard/Token authentication is consid-
B. command
ered as
C. software
A. Knowledge
D. direction
B. Possession
81. Where is the BIOS stored?
C. Biometric
A. ROM & flash memory
D. none of above
B. Optical disk
C. Virtual memory 87. Why is virtual memory needed?
D. RAM
A. The hard disk may not be large enough
82. What happens when a computer runs out to store all the files
of RAM? B. A user may want to access files stored
A. Virtual networks can be used on remote servers in the cloud
B. Virtual storage is used C. A computer cannot multi-task when it
C. Virtual servers are used runs out of memory
D. Virtual memory is used D. Networks need to kept secure
88. Which is not a type of OPERATING SYS- 93. Windows, Icons, menus and Pointers are
TEM SOFTWARE? all part of this?
A. Windows 7 A. Graphical User Interface
B. LINUX B. Command Line Interface
NARAYAN CHANGDER
89. Which Operating System function enables containing instructions that coordinate all
access levels to be given? the activities among computer hardware
A. User Interface resources?
B. Peripheral Management A. Management System
100. Windows 10 and Windows 7 are exam- B. Putting the laptop to sleep.
ples of: C. Shutting down the laptop.
A. IOS Phone D. Displaying the lock screen.
B. Android
105. Used to select multiple files in a series
C. Microsoft Windows
A. Control Key
D. none of above
B. Shift Key
101. *A ******* is a type of malware*It is a C. Task Bar
standalone program that does need to at-
D. Ram
tach itself to an existing program in order
to spread 106. What does Kernel mean?
A. Virus A. Hardware of the OS
B. Trojan Horse B. Central component of the operative
C. WAN system
D. Worm C. Is the processor of the system
D. Is a Firmware
102. How can a trojan infect your pc?
A. On memory sticks. 107. All of the following are examples of stor-
B. Through email attachments. age except
NARAYAN CHANGDER
C. Mac OSX 113. Which of the following below is not a
cloud model described by Microsoft?
D. Linux
A. Private cloud
109. Which is NOT a characteristic of desktop
operating systems? B. Hosted private cloud
111. An operating system manages printing 115. These are small computer programs that
using spooling. In doing so what does the allow operating systems to read pieces of
operating system do? hardware connected to your computer
117. Which of the following statements is NOT 122. Latest Version of Windows Series is?
true about user interfaces? A. Windows 8
B. blackout B. Multi-tasking
C. backward balance C. Distributed
D. backward compatible D. Embedded
128. Where do multiple documents line up in a 133. BIOS stands for
printer?
A. Basic Instruction Operating System
A. Glossary
B. Basic Information Output System
NARAYAN CHANGDER
B. Queue
C. Index C. Basic Input Output System
129. What type of device is used to detect 134. Which of these is NOT a Stand-alone OS?
physical changes in things such as light, A. Ubuntu
temperature or object proximity.
B. Linux
A. Sensors
C. Microsoft Mac
B. Magnets
C. Mice D. Mac OS X
C. dock D. Mac OS X
D. downlink 137. Which of the following passwords fol-
lows a suggested strength?
132. What type of operating system can be de-
scribed by a company creating online ex- A. Password1
aminations where single question papers
B. p4ssword
are sent to different terminals for students
to sit the paper independently C. Password
A. Real Time D. P@ssw4d
148. What is one of the significant problems 153. What is the method of multitasking that
with virtual memory? requires the operating system to give con-
trol to a running process, and wait for that
A. Disk thrashing
process to finish?
B. Disk becomes full
A. Cooperative multitasking
C. Disk threading B. Shared multitasking
D. Disk requires buffering C. Preemptive multitasking
NARAYAN CHANGDER
149. What type of Software is needed to con- D. Basic multitasking
trol the computer’s hardware?
154. What does user management mean in the
A. Programming Software context of an operating system?
B. Systems Software A. Providing for different users to log in
C. Application Software to a computer retaining their settings and
security
D. Bespoke Software
B. Providing real-time communication
150. A segment of memory or storage in which such as video calling
items are placed while waiting to be trans- C. Providing anti-virus protection
ferred from an input device or to an output D. Providing for different users to collab-
device. orate on the same document online
A. brownout
155. Which company is responsible for the An-
B. blogging droid operating system?
C. buffer A. Apple
D. burning B. Samsung
C. Google
151. Which of the following a suitable wire-
less security protocols? a. WPA2b. D. Windows
WPA1c. WPAd. WEP
156. Which of the following is NOT a network
A. a, b and c operating system?
B. b, c and d A. Windows Server 2003
C. a, c and d B. Banyan VINES
D. all of them C. Unix
D. Xerox Network Systems
152. Question 1:What type of Software is
needed to control the computer’s hard- 157. System software is a set of needed for
ware? (1-3) a computer to
A. Programming Software A. program, work
B. Systems Software B. instructions, pause
C. Application Software C. instructions, work
D. Bespoke Software D. none of above
C. Fetching the next instruction as the 165. What is the first thing that needs to hap-
current one is being decoded pen when an interrupt is detected?
D. Parts of files distributed across a disk A. Change the process state of the cur-
rently executing process to blocked
160. The following is not a function of an op-
B. Load the interrupt service routine
erating system:
C. Pop registers off the memory stack
A. Checking for viruses
D. Push the current contents of CPU reg-
B. Directing information from peripheral isters onto the memory stack
devices like a mouse or a printer
C. Allowing users to open applications 166. The user can’t modify the source code
and/or distribute
D. Allocating the computer’s memory be-
tween different tasks. A. Shareware
B. Open Source
161. Who might send out an emergency
C. Closedwaire
alert?
D. Closed Source
A. Mr. Doering
B. Trump 167. Which of the following Wireless proto-
cols is the most secure?
C. Obama
A. WEP
D. Professional Organizations
B. WPA
162. Bytecode is an example of . C. WPA2
A. Machine code D. WINS
B. Assembly language
168. Which type of system needs interactive
C. Source code processing
D. Intermediate code A. Calculating the electricity bill for you
customers
163. One of the capabilities of operating sys-
tems:The computer is capable of operating B. On-Line check in for flights
multiple applications at the same time. C. Controlling an airplane in the air
A. multi-user D. none of above
NARAYAN CHANGDER
170. Which of the following are benefits to cost to the organisation
encrypting a mobile phone? a. The de-
A. a, b and c
vice cannot be unlocked without the pass-
codeb. The information on the users phone B. b, c and d
is unable to be read without the decryp- C. a, c and d
tion codec. This phone is no longer able to
D. all of the them
make or receive phone callsd. The phone is
not able to connect to unsecured wireless 174. You need to prepare a brand-new replace-
networks ment hard drive for storage. What is the
A. a and b only first step needed to get it ready?
B. c and d only A. Format the drive
172. The core of an operating system that 177. Choose two words to describe Dis-
manages memory and devices, maintains tributed Operating System.
the internal clock, runs programs, apps, A. Enter commands, shows menus and
data, and information is called this. options
A. kernel B. Specific time period, used in robots
B. hub C. Interconnected, integrated computer
B. uses to name, store, and organize files 188. what is the main part of the operating
on a drive system
C. produce basic information about data A. user interface
B. kernel B. Multi-tasking
C. system utilities C. Single task OS
D. device drivers D. Real-time
189. You are going to purchase a new iPhone. 194. Which of these tasks is a function of the
Which operating system will be instead on operating system?
it?
A. Scanning a photograph
A. iOS
NARAYAN CHANGDER
B. Copying a file
B. OS X
C. Producing a database report
C. iPhone OS
D. Adding data to a spreadsheet
D. ion know
190. The following is not a type of Systems 195. A computer uses to organize all of
Software the different files and applications that it
contains.
A. Device Drivers
A. Folder
B. Utility Programs
B. Icons
C. Applications
C. Trash Can
D. Operating Systems
D. Applications
191. Which Operating System function en-
ables the allocation of folders? 196. factor-authentication (2FA) involves
A. User Interface A. Username and password
B. Memory Management B. username, password and random gen-
C. User Management erated code
D. File Management C. username and random generated code
D. password and passport
192. What is the best definition of the term,
‘memory management’? 197. When you save your document to your
A. The use of hard disk space to store run- computer, where is it stored?
ning jobs when main memory runs out of
A. in the cloud
space
B. in a folder
B. The process of system administrators
setting limits on memory usage C. on the Internet
C. The process of organising the com- D. on a hard drive
puter memory flexibly
198. Which of the following are benefits of
D. An operating system tool to allow the
compressing data? Tick two answers.
user to divide up their hard drive and main
memory A. Files are quicker to download
B. Files take up less disk space
193. A type of OS which can respond instantly
to any inputs or sensors C. The data is secured against viruses
A. Multi user OS D. The data is defragmented
199. Define the term BYOD 204. Which of the following is a disadvantage
A. Bring your own dessert of a graphical user interface?
NARAYAN CHANGDER
214. Which of these is NOT an example of in-
C. Mac OS X terrupt
D. Chrome OS A. Power-fail interrupt
NARAYAN CHANGDER
B. User Interface
what to be run?
C. Virtual Connection
A. Applications
D. Remote Access
B. Hardware
230. Why use HTTPS? a. Increases user’s
trust and confidenceb. Protects user’s sen- C. Cache
sitive informationc. Allows quicker deliv- D. Processes
ery of webpagesd. Increases Organisa-
tion’s reputation over the internet 236. A company has 20 employees each of
A. all of the above whom have a personal computer. Each em-
ployee needs to be able to run several pro-
B. a, c and d
grams at any given time. Which type of
C. b, c and d operating system would work best?
D. a, b and d A. Single-user, single task operating sys-
tem
231. where is Task bar is Located in Windows
A. Top B. Single-user, multi-task operating sys-
tem
B. Bottom
C. Multi-user operating system
C. Right
D. Unix operating system
D. Left
232. Question 11:This following is an example 237. These are example of Mobile OS Except
of a peripheral (7-9) for
A. Processor A. iOS
B. Main Memory (RAM) B. Symbian OS
C. Hard Disk Drive C. Linux OS
D. ROM D. Android OS
233. Which of the following means the operat-
238. Which of the following does an operating
ing system automatically configures new
system not do
devices as users install them?
A. Operational Buffering A. Manages memory (RAM)
D. Peripherals require software called 253. What is the difference between pag-
“drivers” in order for the OS to control ing and segmentation in memory manage-
them ment?
A. Paging splits the process to be loaded
249. This is the abbreviation given the the
into equal size blocks
cryptography technique used by HTTPS
B. Paging splits the process to be loaded
A. PIK into variable sized, logical blocks
B. PEKI
NARAYAN CHANGDER
C. Paging allocates frames to hold the
C. PKI data on the hard drive
D. KPI D. Paging is used on Windows computers,
segmentation on MacOS
250. Which is NOT an example of a peripheral
254. Which part of Operating system is re-
device?
sponsible for sending basic instructions
A. Printer and managing the hardware?
B. Monitor A. Kernel
C. Projector B. Shell
D. Computer C. The shell allows the user develop the
D. Freeware
251. What is the purpose of a firewall(Utility
systems software)? 255. Which of these is not a file type?
A. For security-scramble data using a key A. .txt
to encrypt so it can’t be understood. To B. .pdf
decrypt a key is needed to put it into its
C. .exe
original form.
D. .pp
B. For security-prevents unwanted ac-
cess to or from a private network or the 256. Which of the following is NOT a feature
internet. Messages can be blocked based of embedded systems?
on criteria e.g. website addresses.
A. Capable of carrying out a wide variety
C. For security-scans for and removes of tasks
malicious files. B. Often resource limited
D. For security-to block and remove pro- C. Typically designed for a single purpose
grams designed to get your personal in-
formation. D. Includes a simple or no user interface
258. space in memory where user processes 264. What is intermediate code?
run.
A. Code that has been compiled and is
269. Which of the following are you likely to 274. Application software is
find between multiple school buildings in a A. help the user run specific tasks like
city wide school district? word processors, web browser, email,
A. Peer-to-peer clients, games, etc
B. LAN B. run tasks like the operating systems,
utilities, etc
C. WAN
C. help the user run things down
D. none of above
NARAYAN CHANGDER
D. run tasks like the doing my homework,
270. The ability for a computer to execute revision, etc
more than one task simultaneously
275. With which of the following file systems
A. multitasking can you not rename a file when it’s open?
B. multiprogramming A. ext3
C. multiprocessing B. ext4
D. timesharing C. XFS
D. NTFS
271. This is open source, acts like Unix, com-
posed of just the kernel and not the OS so 276. Which of the following best describes the
that it can be built off of, and is has over ‘multi-level feedback queue’ scheduling al-
300 different types of distributions gorithm?
A. Linux A. Handles processes in the order in
which they arrive
B. macOS
B. Handles each process in turn
C. Uni
C. Handles different queues using priori-
D. Windows ties to promote and demote processes
272. An operating system developed by Apple D. Handles the processes requiring the
used for the iPhones, iPads, and iPods least amount of time to complete first
A. Apple-IOS 277. Which of the following is not a job typ-
B. Mac-OS ically handled by an operating system’s
kernel?
C. Android-OS
A. Managing the use of RAM
D. Linux
B. Handling priority levels assigned to
programs
273. You just deleted a shortcut to an impor-
tant work presentation. What happened C. Managing interactions with the CPU
to the data in the presentation? D. Displaying a GUI
A. Nothing
278. Which type of User Interface contains
B. It’s in the Recycle Bin/Trash Windows, Icons, Menus, and Pointers?
C. It’s deleted A. Command Line Interface
D. It’s in the recovery partition B. Graphical User Interface
280. Which of these is NOT an operating sys- 285. Before a document prints it waits in the
tem?
A. Windows A. BIOS
B. Linux
B. buffer
C. itunes
C. boot process
D. Android
D. swap
281. Which best describes the position of an
operating system within a computer sys- 286. Operating system used on PC platform or
tem? IBM computer.
A. Operating system > Hardware < Ap- A. IOS
plications
B. Windows XP
B. Hardware > Applications < Operat-
ing system C. Android
C. Applications > Hardware < Operat- D. Mac OS
ing system
D. Hardware > Operating System < Ap- 287. In which of these places might you be
plications most likely to find a peer-to-peer net-
work?
282. By combining the words ‘malicious’ and
‘software’ we get the word ‘malware’. A. On the Internet
What does malicious mean? B. In a home
A. Malicious means delicious. C. In a large office building
B. Malicious means Mali Juice.
D. In a hospital
C. Malicious means harmful.
D. None of these 288. A role of the operating system that helps
keep storage devices well organized and
283. Which of the following is not a resource maintained.
managed by the OS?
A. Application Management
A. CPU
B. Cache B. Disk Management
NARAYAN CHANGDER
C. A software routine that hardware or B. Please Operate Speedy Thanks-is the
software invokes in response to an inter- diagnostic testing of the keyboard, ran-
rupt dom access memory, disk drives, and
other hardware when the PC is turned on
D. A software routine which is always in-
voked by a user interrupt action C. Power on Self Test-is the diagnostic
testing of the keyboard, random access
290. Which of the following is a VPN technol- memory, disk drives, and other hardware
ogy when the PC is turned on
A. UDP D. Power on Self Test-is the diagnostic
testing of the human body when it wakes
B. TCP
from sleep.
C. L22P
295. Which type of User Interface is text-
D. L2TP based and requires the user to write com-
291. Which of the following is least likely to mands?
be the reason for an automatic update. A. Command Line Interface
A. Improving Functionality B. Graphical User Interface
B. Enhancing Security C. Menu Interface
C. Modifying Device Drivers D. No User Interface
D. Providing Decryption 296. An open-source, Linux-based mobile op-
erating system made by Google for smart-
292. A type of systems software
phones and tablets.
A. Utilities
A. iOS
B. Closed source software
B. Chrome OS
C. Open source software
C. Android
D. Off the shelf software D. OS X
293. In this kind of memory, the operating 297. How do you select a file or folder inWin-
system allocates a portion of a storage dows Explorer?
medium, usually the hard disk or a USB
flash drive, to function as additional RAM. A. [Ctrl][X]
What kind of memory is this? B. Single-click it.
A. Performance C. shortcut menu
B. Managed D. Folder
308. Question 3:A Virtual Machine is said to 313. Google’s Linux based operating system
(7-9) designed to work primarily with web
apps.
A. Allow the user to play games with Vir-
tual Reality Glasses A. Chrome OS
B. Allow the user to virtually use an Oper- B. Foxfire
ating System
C. Windows 10
C. Allow a MAC to run on Windows
D. iOS
NARAYAN CHANGDER
D. Hide the complexities of the hardware
from the user 314. A list of options a user can choose from
is a .
309. One of the operating system’s functions
A. list
is peripheral management. What is meant
by a “peripheral”? B. tab
A. A type of printer C. menu
B. Any additional hardware device D. form
C. Files and folders 315. From the hard drive’s perspective, mov-
D. The user ing a file is a analogous to which of the
following actions?
310. A message sent by the OS to change the
A. Copy and paste
CPU schedule is known as
B. Cut and paste
A. Interupt
C. Delete and paste
B. Poll
D. Renaming
C. Cache
D. Defrag 316. This has a centralized OS kernel which is
responsible for managing the entire sys-
311. What are the utilities is an OS called that tem. Is considered the mother of most OS
enable programs such as a screen reader? (1965), is proprietary but some versions
are free for development use
A. Accessibility options
A. macOS
B. Reading options
B. Linux
C. User options
C. Unix
D. User account settings
D. MS-Dos
312. Biometric authentication that uses
pattern-recognition techniques based on 317. How many satellites does GPS need to
high-resolution images of the retinal work?
A. Iris Recognition A. 2
B. Fingerprint Recognition B. 4
C. Voice Recognition C. 6
D. Facial Recognition D. 8
328. Icons, menus and windows are part of: 333. Mainframe computers would most likely
A. Graphical user interface make use of which of the following types
of OS?
B. System security
A. Single task
C. Applications and user files
B. Multi-user
D. Graphics or games packages
C. Multi task
329. A type of applications software
D. Real-time
NARAYAN CHANGDER
A. Translators
B. Operating system 334. What does a server do?
C. Off the shelf or Bespoke software A. It provides the basic functions of a
D. Libraries computer
B. It connects computers together
330. What are the 3 most common operating
systems for personal computers? C. It provides a particular service and
manages resources
A. Linux
B. Microsoft Windows D. It is the computer’s memory
338. Which of the following application 343. A file extension of .xlsx means that the
browsers is compatible with Android? file contains what?
339. What type of account is created automat- 344. A signal sent by a hardware or software
ically when Windows is installed on a com- to the CPU indicating that something needs
puter? attention is
A. Administrator account A. a system call
B. Standard user account B. interrupt
C. System administrator account C. paging
D. Guest account D. blocking
340. Keeping track of the location of processes 345. Open a shortcut Menu
in memory and allocating space to new pro- A. right click
cesses is known as B. click
A. Memory Management C. double click
B. Process Management D. none of above
C. Memory Scheduling
346. What does the OS manage to allow multi-
D. Process Scheduling tasking?
341. , like Microsoft Suite, are programs A. Hard disk
that are designed to help users to be more B. Memory and CPU
productive with their personal tasks. C. Motherboard
A. Software D. none of above
B. System Software
347. Which of the following is not a method
C. Application software used by the OS to manage memory:
D. Utility program A. Segmentation
342. *may open a “back door” into your com- B. Defragmentation
puter system through which your personal C. Virtual Memory
information can be harvested.*It can also
D. Paging
use your computer power and network
bandwidth to send thousands of spam 348. Microsoft utilises this open source SSH
emails to others. solution
A. Virus A. OpenSSH
B. Trojan Horse B. SSHOpenSystem
C. WAN C. SSHOpen
D. Worm D. OpenSecureSH
NARAYAN CHANGDER
A. Disk clean up D. none of above
B. Cookie
356. Which of the following is required to cre-
C. defragmenter ate Apple iOS apps?
D. GUI A. SDK
351. What is a multitasking computer? B. Xcode
A. Multiple users can be logged in at the C. Google IDE
same time D. Apple Development
B. A CPU core that can run more than one
process at a time 357. Is a non-computer OS, targeted for smart-
phones, open source and has it’s own app
C. Multiple programs can be running at store. Considered a flexible OS because
the same time users can tweak the OS as they wish.
D. A computer that can handle multiple in- A. iOS
put devices.
B. Android
352. A file extension of .mp4 means that the C. Windows
file contains what?
D. Linux
A. A video
B. An application 358. A popular multitasking UNIX based oper-
ating system that runs on a variety of per-
C. An image
sonal computers, servers, and devices.
D. A compressed file
A. Chrome OS
353. Apple’s mobile operating system specifi- B. Foxfire
cally made for Apple’s mobile service.
C. Linux
A. Windows
D. iOS
B. Foxfire
C. iOS 359. part of an operating system’s job with pe-
ripheral management is providing an area
D. Chrome OS of memory called a This compensates
354. A disadvantage of this authentication for the speed difference between the CPU
method is that ridge patterns can be af- and external devices such as printers
fected by cuts, dirt, or even wear and tear. A. track
A. Iris Recognition B. buffer
B. Fingerprint Recognition C. steeplejack
370. THE IS THE MAIN CIRCUIT BOARD B. Any operating system designed to al-
OF A COMPUTER. ALL COMPUTER COM- low multiple processes to be carried out
PONENTS ARE ATTACHED TO IT. at the same time
A. MOTHERBOARD C. An operating system intended to serve
B. EXPANSION CARDS and process data as it comes in, typically
without buffering delays
C. VIDEO CARD
D. Any operating system designed to al-
D. HARD DRIVE low multiple users to connect to it from
NARAYAN CHANGDER
371. Question 4:Dividing tasks so that the Op- different locations at the same time
erating System appears to multitask is 376. When does BIOS run?
dealtwith under:(4-6)
A. Runs after Windows loads
A. Memory Management
B. Runs before you shut down
B. File Management
C. Runs after you log in
C. Processor Management
D. Runs before Windows loads
D. Peripheral Management
377. A translates computer code to control
372. What is information?
and interface with various pieces of hard-
A. hardware and electronics ware, making it usable to an operating sys-
B. software and hardware tem.
C. hard drive, processor A. Kernel
D. (or data) in paper or electronic format B. I/O tower
B. video parallel network 378. Which is the best advantage of using Win-
C. video port network dows?
NARAYAN CHANGDER
391. Programs which direct the operation of
C. Edge
computers; instructions for a computer
D. Windows Vista
A. hardware
B. firewall 397. What is the purpose of backup programs
(Utility systems software)?
C. computer
D. software A. For system optimisation-to rearrange
parts of files on a hard drive that have be-
392. Programs that are running while you are come fragmented. This puts then back to-
on a computer but are not in use are in the gether for quicker access.
B. For system optimisation-to search and
A. foreground remove files no longer needed.
B. background C. For system optimisation-to make files
C. virtual network smaller so they take up less space.
NARAYAN CHANGDER
C. Android 417. Which of the following consists of one
or more chips on the motherboard that
D. Chrome OS
hold items such as data and instructions
412. Which of these devices can have an while the processor interprets and exe-
BATCH operating system? cutes them?
A. Server A. POST
B. Gaming console B. ROM
C. ATM C. RAM
D. Tesla car
D. Basic Input Output System
413. Which of the following is a private combi-
nation of characters associated with a user 418. Operating system is a set of programs
name that allows access to certain com- that connects and manages software with
puter resources?
A. Password A. System
B. Username B. User
C. Folder C. Hardware
D. Cipher D. Application
414. The kernel can be stored in
419. Why do we need Operating Systems? Be-
A. ROM cause it
B. RAM
A. Enables the user to interact with the
C. the Hard Disk computer
D. Computer Disk B. Protect your computer from viruses
415. What is a service pack? C. Is of obligation to run the computer
A. A collection of software updates. D. Because of the applications
B. A form of spyware.
420. Which of these is NOT a Server OS?
C. A power mode designed to provide
emergency power during a power outage. A. Linux
D. A collection of Desktop backgrounds, B. OpenSolaris
sounds and themes that you can find on-
C. Solaris
line and then download and install on your
system. D. Microsoft Windows 10
423. The performs memory and hardware 429. What does the term file management
component tests on startup, during a pro- mean?
cess called the Power-on Self Test (POST). A. How your manager is able to find your
A. Kernel file.
B. BIOS B. The way in which we organise our files
and documents on the computer.
C. Device driver
C. How you organise the rough edges of
D. CPU your nails
424. FCFS is operates similar to a D. none of above
A. stack 430. What is the purpose of memory manage-
ment?
B. sorting algorithm
A. To store data in the most efficient man-
C. circle
ner
D. queue B. To optimize the use of RAM
425. Which of the following uses an embedded C. To start the computer and operating
operating system? system quickly
A. Computer D. To allocate system resources stored in
ROM
B. Smart Phone
C. GPS 431. Which of the following should be per-
formed in order to prevent an issue with
D. Tablet information system?
426. Which operating system is iOS based off A. Decreasing security on computers
of? B. Increasing expenses/costs
A. Linux C. increasing complexity of systems
B. Mac OSX D. Increasing security on computers
NARAYAN CHANGDER
B. create, edit, share and store web-
lows for remote desktop to a PC. What pages and sites.
port number does it function over?
C. create, edit, share and store spread-
A. 389
sheet documents.
B. 80
D. create, edit, share and store word-
C. 21 processing documents.
D. 3389
439. Which of the following application stores
434. What is windows XP? is compatible with Android?
A. legacy operating systems A. App Store.
B. current operating system
B. Windows Marketplace.
C. Shareware software
C. Google Play.
D. none of above
D. BlackBerry World.
435. Which of these tasks is the responsibility
of the operating system? 440. This is a feature that can be found on dif-
A. The power-on self test ferent operating systems is where data is
stored and and a way for the user to find
B. The user interface the data.
C. Synchronising the flow of data be-
A. File structures and paths
tween registers
D. The initial boot sequence B. RAID storage system
C. manage multiple desktops
436. Which is the most secure way of remotely
access a system D. tech launch points
A. Telnet
441. Ubuntu is an open-source Operating Sys-
B. HTTPS tem. This means that:
C. SSH A. it is very expensive
D. Nano B. you pay for the operating system but
437. Which of the following software man- not for the applications.
ages the files and folders on your com- C. the original code is open to devel-
puter’s hard disk drive? operns and programmers to change it ac-
A. Word processing software cording to their needs.
B. Anti-virus software D. none of above
NARAYAN CHANGDER
an animation C. Firmware
D. Brown Indigo Orange Silver
B. To maintain the computer system
C. To check all the components are con- 459. On which OS would you use the
nected to the motherboard correctly Ctrl+Window Switcher key to create a
screen capture?
D. To load the first instructions to boot
the computer A. Windows
B. Linux
454. Which of the following is NOT a function
of an operating system: C. Mac OS X
D. Chrome OS
A. Providing an interface between the
user and the hardware 460. SSH allows for remote management of a
B. Managing memory system. Whats does SSH stand for?
C. Allowing the user to organise files A. Secure Software hosting
D. Managing peripherals B. Secure Socket host
463. At which point in the fetch-decode- 468. The grouping of jobs that require similar
execute cycle are interrupts checked for resources
and processed?
474. In Windows and Mac, the User Interface 479. In which language was Unix originally
is known as written?
A. Home Screen A. C language
B. Desktop B. Assembly language
C. Taskbar C. Java
D. GUI D. C ++
NARAYAN CHANGDER
475. You have the choice of using SSH or telnet 480. Which of the following is not a state that
to remote manage a machine, what would a process in memory can be in?
you choose? A. Ready to run
A. telnet as the commands are built into B. Running
all operating systems
C. Blocked
B. SSH as it provides encryption of the
commands being sent and recieved D. Paused
C. telnet as it provided encryption of the 481. What is meant by the term multi-
commands being sent and received tasking?
D. SSH as all systems have it installed so A. Having more than one user profile so
its there to use different people can log into the same
computer.
476. How many subdirectories are you al-
lowed to create within a single directory B. Running multiple applications at the
is an OS? same time by giving each a small time-
slice of processor time.
A. It depends on the OS
C. Having more than one operating sys-
B. 32, 000 tem installed and choosing which to boot.
C. 64, 000 D. Running multiple applications at the
D. Unlimited same time by having more than one pro-
cessor.
477. Which is the best advantage of using Mac
OS? 482. Which of the following Windows dialog
box features allows you to select several
A. The price
options?
B. The publicity
A. Drop-down lists
C. Better graphic design
B. Radio buttons
D. the people
C. Check boxes
478. Which command displays all network D. Command buttons
adapters installed on a Windows PC?
483. If the interrupt is raised by a program
A. ifconfig rather than a piece of hardware it is
B. ipconfig /all known as a
C. ifconfig-a A. device driver interrupt
D. ipconfig B. operating system interrupt
494. Select the best choice for the statement. 498. Which type of interface uses WIMP ele-
Acomputer icon is a(n): ments?
A. embedded computer A. Command Line Interface
B. small image on a Windows screen tha-
B. Graphical User Interface
trepresents a file or folder
C. file containing the full image of thes- C. Touch Interface
mall one displayed D. Voice Interface
NARAYAN CHANGDER
D. folder
499. Which touchscreens need to be constantly
495. Which of the following is a unique combi- calibrated?
nation of characters, such as letters of the
alphabet and/or numbers, that identifies A. Resistive Touchscreen
one specific user? B. Capacitive Touchscreen
A. Client
C. New Touchscreens
B. Username
D. Gyroscope Screens
C. Password
D. Cycle 500. A IS THE PRIMARY DEVICE THAT
496. What is the purpose of spyware detec- A COMPUTER USES TO STORE INFORMA-
tors (Utility systems software)? TION.
503. It is a computer operating system; a sys- 508. which of these scheduling methods pro-
tem that is designed primarily to support cesses jobs FIFO but then with a limited
workstation, personal computer, and, in time slice (quantum)
505. Which of the following operating sys- A. Ensures that different processes can
tems is free and open-source? utilise the CPU and do not interfere with
each other or crash
A. Windows
B. Allows creation and deletion of user
B. Mac OS X accounts
C. Linux
C. Communicates with and receives data
D. UNIX input to a keyboard/mouse/other valid in-
put device
506. Which one of the following is not true?
A. kernel is the first part of operating sys- D. Ensures that programs/data do not
tem to load into memory during booting corrupt each other
B. kernel is made of various modules 511. What is the purpose of file compression
which can not be loaded in running oper- software (Utility systems software)?
ating system A. For system optimisation-to rearrange
C. kernel is the program that constitutes parts of files on a hard drive that have be-
the central core of the operating system come fragmented. This puts then back to-
D. kernel remains in the memory during gether for quicker access.
the entire computer session B. For system optimisation-to search and
remove files no longer needed.
507. VOIP utilises the following protocol?
C. For system optimisation-to make files
A. TCP
smaller so they take up less space.
B. PI
D. For backing up-copying files to a sec-
C. HTTP ond medium away from the originals for
D. UDP safe keeping.
512. In an OS, the scheduling of processes is 516. An advantage of having different user ac-
done by counts on a computer
A. the shell (.e.g. bash) A. They are cheap, fast and reliable.
B. the graphical user interface (e.g., B. They are easy to use for all users
gnome) C. They can be time consuming to setup
C. the file system D. You can setup security for different
users, particularly helpful with children so
D. none of the above
NARAYAN CHANGDER
they don’t delete your files and restrict
513. You just copied a file from the Work di- their access
rectory to the Projects directory on your 517. A type of OS which can run on a stan-
Windows PC. What happened to the file dalone PC (or other device) and supports
on the hard drive? the use of running more than one job simul-
A. Nothing taneously
D. The file was copied to a new location A. to convert images or text on paper to
on the hard drive and was associated with a digital format
the Project’s directory B. to record audio data
C. to print paper copies of files
514. Why is systems software needed? Tick
all that apply D. to play audio data
521. Mac OS X operating systems are named 526. This allows equipment such as fax ma-
after: chines, printers and files to be “served”
to multiple computers
531. What system loads first when booting a 537. Which of the following is NOT a desktop
PC? operating system?
A. BIOS A. OS X
B. Word processor B. Windows
C. Operating system C. Chrome OS
D. Firmware D. Google Android
532. If an OS has the ability to run more than
NARAYAN CHANGDER
538. Why do we use a backup utility instead
one program simultaneously what is this of copying and pasting files onto a memory
called? stick?
A. Mutlihandling A. Its an easy interface to use.
B. Multitasking B. It optimises the files that are frag-
C. Multiuser mented by puttin gthem back together.
D. Multiprogram C. Because it is automated, the users will
not forget to backup to a designated drive.
533. The operating system is a type of
D. It cleans the computer of viruses and
A. system software other malicious software
B. general purpose software
539. The purpose of the GUI is to
C. utility software
A. hide the complexities of the machine
D. application software
from the user
534. What is the name of new built in browser B. Guide the user
included in windows 10?
C. to make the screen look nice
A. Oprah
D. none of above
B. Edge
C. Super internet explorer Pro 540. One of the capabilities of operating sys-
tems:Two or more users have individual ac-
D. none of above counts that allow them to work with pro-
535. The memory returned by a call to malloc grams and peripheral devices at the same
comes from the time.
A. data segment A. Multi-user
B. heap segment B. multiprocessing
C. text segment C. multitasking
D. stack segment D. multithreading
536. Which is the definition of free software? 541. Which of the following is a benefit of a
Command Line Interface?
A. The freedom to study how the program
works, and change it A. Does not need a powerful computer
B. The freedom is cheap software B. Easy for inexperienced users to learn
C. The free in the use C. Recognises slang words
D. fredom of the designer D. Looks pretty
546. Which of the following file systems does A. Printer out of paper
not have a built-in security? B. Hard drive failure
A. ext3 C. Keyboard press
B. ext4 D. Interval timer expires
552. The information contained in a file system 558. The CPU is the of the computer.
A. The computer characteristics A. Knee
B. the direction web B. Brain
C. Location, name, type of flie . C. Body
D. Type of OS, tipe of memory, name D. Heart
553. A interacts with a user and responds 559. A system designed to prevent unautho-
immediately or almost immediately to re- rized access to or from a private network
NARAYAN CHANGDER
quests. A. Adware
A. Multiuser system B. Firewall
B. Time Sharing system C. Antiviruis
C. Real-Time system D. Spyware
D. Multisharing system 560. If somebody is using a laptop at a coffee
554. What native application would be used shop, how are they likely connected to a
to run commands in a Windows environ- network?
ment? A. Wired
A. commando B. 3G
B. Command Prompt C. Wi-Fi
C. Terminal D. none of above
D. Nano 561. Public and Private keys are needed as
part of which cryptography technique?
555. Choose the correct examples of Real-
Time operating systems. A. Symmetric (Private Key)
A. Windows CE B. WEP
B. Linux C. Asymmetric (Shared Key)
C. Unix D. HTTPS
D. Lynx OS 562. From the hard drive’s perspective, mov-
ing a file is analogous (or similar) to which
556. Which one is not an operating system? of the following actions?
A. iOX A. Copy and paste
B. Windows B. Cut and paste
C. Android C. Delete and paste
D. Poloroid D. Renaming
557. Select the operating system used on our 563. What language do operating systems
desktop computers? use?
A. iOS A. The operators language
B. Android B. Binary Code
C. Windows C. Code
D. Linux D. XOXO
564. Hard drive space that can work as RAM. 569. When the OS creates temporary RAM on
the Hard Drive it is known as
A. Virtual Memory
B. Version A. iOS
C. Kernel B. Linux
D. Source C. Samsung
D. iPhone
566. Wich is the best advantage of using
Linux? E. MacOSX
A. family of open-source operating sys- 571. What protocol can be used for authenti-
tems, cation on a VPN connection?
B. The design A. CHIP
C. The programs B. CHOP
D. the people C. CHEP
567. What do operating systems provide? D. CHAP
A. A backspace button that you can press. 572. Processor scheduling is one of the func-
B. Communication from you to the com- tions managed by the OS. Which one is a
puter. scheduling method used by the scheduler
C. A server that makes the keyboard A. Round To It
work. B. Round Table
D. Communication between your touch-
C. Round Robin
screen and the speakers.
D. none of above
568. This is a feature that can be found on
different operating systems for grouping 573. A role of the operating system that man-
your open applications and to increase pro- ages applications or programs that are in-
ductivity stalled on a system.
A. File structures and paths A. Application/Program Management
B. RAID storage system B. Service Management
C. manage multiple desktops C. Access Control/Protection
D. tech launch points D. Windows Settings App
NARAYAN CHANGDER
tion in the computer is:
D. is the method by which the user inter-
acts with the computer system A. .txt
B. .docx
575. The User Interface in Android is called:
C. .exe
A. Desktop
D. none of above
B. Home Screen
C. Taskbar 580. Which utility organizes files efficiently on
the hard drive?
D. Main Menu
A. Uninstaller
576. a set of programs containing instruc- B. Disk defragmenter
tions that work together to coordinate all
the activities among computer hardware C. Backup Utility
resources D. File Manager
A. Operating system 581. Which of the following is not an operat-
B. System Software ing system?
C. Application software A. iPadOS
D. Utility program B. Windows
C. Linux
577. Where are programs executed from?
D. Microsoft
A. Primary storage:RAM & ROM
B. Peripherals 582. A user interface made up of a command
prompt is called:
C. Secondary storage:Hard disk/SSD
A. Graphical User Interface
D. Tertiary storage:External mounted
drives B. Super User Interface
C. Command Line Interface
578. Virtual memory can be explained as:
D. Command User Interface
A. Putting instructions into a memory
space in the CPU so that it doesn’t need 583. A group of computers that share re-
to fetch them again from the RAM if they sources are called what?
are needed soon afterwards A. A network
B. Putting documents you have created B. A router
into the cloud so you can work on them
anytime, on any computer connected to C. A server
the internet D. A personal computer
584. How does a worm infect a computer? C. Software will not install
A. E-mail attachments D. You won’t get pester anymore when
you want to run something
595. Which of the following is not systems B. The software is spread over a collec-
software? tion of independent and physically sepa-
A. Web Browser rate nodes
NARAYAN CHANGDER
596. POST is short for low multiple users to connect to it from dif-
ferent locations / computers at the same
A. Power On Self Test
time
B. Power Off Self Test
C. Program On Self test 601. Which company was created by Bill
Gates?
D. Program Off Self Test
A. Windows
597. What do device drivers do?
B. Macintosh
A. Allows the OS to communicate with
hardware C. Android
B. Drives around the motherboard D. Blackberry?
C. Increases the amount of storage
602. What doesn’t an operating system do?
D. none of above
A. Sorts out data on disk drives
598. Using part of the hard disk as if it were
RAM is known as what? B. Deals with security
605. Which of the following is an advantage 610. When choosing an Operating System one
of an IPSec VPN? needs to keep in mind:
NARAYAN CHANGDER
B. Mac iOS 621. What mobile payment service uses the
physical phone?
C. Android
A. SMS
D. LINUX
B. Direct Mobile Billing
616. What is a ‘POST’?
C. NFC
A. Permanent On Self Test
D. Mobile Web Payments
B. Permanent On Service Test
622. Operating Systems need to manage Sys-
C. Power On Self Test
tem ?
D. Power On Service Test A. Objectives
617. Which of the following helps distinguish B. Electricity
individual computers, serving the same C. Restores
purpose as a street address
D. Resources
A. Firewall
B. Metropolitan area networks 623. How does the OS provide memory man-
agement?
C. Transmission control protocol
A. By moving data to secondary storage
D. Graphical user interface
B. By allocating processor time between
618. Question 6:Operating Systems need to different programs
manage System ? (1-3) C. By making the communication possible
A. Objectives between the input and output devices and
the computer
B. Electricity
D. By allocating areas of memory to dif-
C. Restores
ferent programs so that each program
D. Resources can run effectively
619. When a hard drive becomes fragmented 624. Which of these is NOT a characteristic of
reading and writing files becomes a Network operating system?
?
A. It is for use in a SOHO environment
A. Faster
B. It provides increased security com-
B. Slower pared to desktop operating systems
C. No different C. It runs multi-user applications
D. Harder D. It supports multiple users
625. A signal sent by a hardware or software 630. This operating system provides great us-
to CPU indicating that something needs at- ability for home and business users.
tention
D. exclusion D. Spiceworks
626. Which of these is an advantage to using 631. What native application would be used to
a command-line interface over a GUI? run commands in a Linux environment?
A. More interactive A. cmd
B. Easier to use
B. Command Prompt
C. Less resource heavy
C. Terminal
D. none of above
D. Nano
627. What is the best definition of the term
‘scheduling’? 632. The process of starting or restarting a
A. Method used by your operating system computer is called.
to manage a users calendar
A. kick starting
B. The process which handles the start up
of a computer system on boot up B. driving
C. Term used to describe what jobs get C. reviving
loaded into main memory and when
D. booting
D. Maximising the use of the processor
time between open processes E. charging
628. Which of these are operating system 633. The operating system that a computer
functions? uses sometimes is called this.
A. Processor, CPU and capacitor manage- A. platform
ment
B. firmware
B. Peripheral, CPU and power-supply
management. C. software
C. CPU, RAM, Storage and network man- D. file
agement
D. all of the above 634. The earlier versions of Windows used to
run on a former operating system known
629. Instructions that enable the operating as:
system to interact with a device.
A. Windows 3.1
A. Virtual Memory
B. Application software B. Android
635. Windows, Icons, menus and Pointers are C. Read Only Memory
all part of this? (1-4) D. Random Only Memory
A. Graphical User Interface
637. The last character in a file name, after the
B. Command Line Interface
period that usually identifies the program
C. Menu Interface used to create the file
D. No User Interface A. Windows Exploer
636. ROM B. Android-Os
NARAYAN CHANGDER
A. Read Only Memory C. File Extension
B. Read Onsite Memory D. Windows 10
7. Which method of backup takes longer to C. detect and repairs disk problems
perform? D. to improve system performance
NARAYAN CHANGDER
est security patches and updates for soft-
ware installed. A. Program instructions and data are
spread across tracks and sectors on the
B. creates business documents. hard disk drive
C. shows how much storage space is left B. Programs and instructions are
on a computer. grouped together to occupy a continuous
D. transfers files to other computers. section of the hard disk drive
36. What are the benefits of an Incremental 41. I am running out of space on my hard drive,
Backup? (pick 2) I should use the tool.
A. It is quicker than a full back up A. disk cleanup
B. It will incur less traffic on the system B. email
C. It will copy all the files in one go for C. disk defragment
every user D. backup
D. It is slower than full backups
42. which of these is a task utility softwares
NARAYAN CHANGDER
37. You want to write/record/store text, DON’T perform( select all that apply )
graphics, audio, and video files on a record- A. deleting data
able or rewritable CD, DVD, or Blu-ray B. contract softwares
Disc. Which software would you use?
C. manages all files and applications
A. Disc Recording Software
D. computer backup
B. Disc Ruining Software
43. Which of the following is not a piece of
C. Disc Burning software
Utility Software?
D. none of above
A. Encryption
38. In the Windows 7 operating system, B. Compression
provides an enhanced visual look, addi-
C. Defragmenter
tional navigation options, and animation.
D. Translator
A. Windows Aero
B. Plug and Play 44. Which method of backup is quicker to per-
form once an initial backup file is created?
C. Mac OS X
A. Full
D. Windows 7 Starter provides an en-
B. Differential
hanced visual look, additional navigation
options, and animation. C. Fragmented
D. Incremental
39. A is a small program that tells the op-
erating system how to communicate with 45. GUI stands for
a specific device. A. Galaxy using interface
A. buffer B. Grandad uses internet
B. driver C. Graphical user interface
C. performance monitor D. Graphical using interface
D. device
46. I am about to install a new program but
40. Which of the following are functions of a want to make sure I can revert back to the
file manager? computers current state if anything goes
wrong, I should before I do anything
A. displaying a list of files on CD, DVD or
else.
HDD
A. set a system restore point
B. organizing files in folders
B. switch off the firewall
C. Sorting files and folders
C. empty the recycle bin
D. Creating shortcuts
D. send an email to my teacher
CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS
5.4 System Software 385
10. Each device attached to your computer has 15. State three (3) examples of Server OS.
a special program called a(n) that en- A. BlackBerry OS
ables the device and operating system to
communicate with each other. B. Android OS
A. device driver C. UNIX
B. translator D. Solaris
C. interpreter E. NetWare
NARAYAN CHANGDER
D. device configurator 16. What are the causes of data loss?
11. holds many components of the system A. Head crash
and provides connectors for other periph- B. Malfunctions
erals.
C. Controller failure
A. USB
D. Virus attack
B. Touch screen
C. Motherboard 17. The role of the Program Counter (PC) is
to
D. CPU
A. Hold the current instruction being exe-
12. Unencrypted messages are called which? cuted
(1-3)
B. Holds the address of the next instruc-
A. Plaintext tion to be executed
B. Ciphertext C. Holds the address of the memory loca-
C. Keytext tion where data is fetched to be fetched
from or written to
D. Originaltext
D. Used to temporarily store data that is
13. A local football club wants to use a com- read from/written to memory
puter to store all its members’ records. It
wants to keep the club accounts as well 18. An incremental backup.
as send letters to its members. Select A. Makes copies only of the new files
the THREE types of software the club will
need. B. Saves your backup to secondary stor-
age
A. Presentation
C. Makes copies of all files
B. Database
D. Makes a copy of the entire drive
C. Spreadsheet
D. Wordprocessing 19. A is a flash device with a storage ca-
pacity similar to a small hard drive. They
E. Measurement
are faster than hard drives, they have no
14. This was one of the first operating sys- moving parts, and they have lower power
tems ever written consumption than hard drives.
A. Linux A. Solid State Drive
B. UNIX B. Hard Disk Drive
C. Microsoft Windows C. Optical Drive
D. Macintosh OS D. none of above
20. Programs and other operating information 25. What is the main benefit of proprietary
used by a computer is called software?
NARAYAN CHANGDER
a thicker protective shell. It consists of
A. Backup programs
several aluminum platters, each of which
requires a read/write head for each side. B. Antivirus
A. Hard Disk Drive C. Utility Software
B. Solid State Drive
D. None of the above
C. Optical drive
D. Flash drive 37. The is a small symbol displayed on the
screen that moves when the user moves
32. Which of the following are types of soft- the mouse
ware?
A. icon
A. System Software
B. menu
B. Programming Software
C. Operating Software C. window
33. These are programs that works with the 38. This is also known as a photo editor, this
operating system to allow communication specialized graphics program edits or mod-
between a device and the rest of a com- ifies digital photographs.
puter system
A. Presentation
A. Antivirus
B. Spreadsheet
B. Utility software
C. Device Driver C. Image Editor
D. None of the above D. Word Processor
34. The BIOS (Basic Input Output System) is 39. A virtual machine
stored in
A. uses secondary storage instead of
A. RAM
RAM when the computer runs out of space
B. ROM on the main memory
C. Virtual Memory B. allows software to act as hardware,
D. Cache running code or an operating system
within another OS.
35. Utility Programs that:Makes a duplicate
copy of selected file or entire hard disk C. can only be used through the internet
A. Program Uninstaller D. relies on cloud storage
40. For a very large and complex system 45. State two examples of Backup and Re-
which needs multiple processors, you store utility program.
would use a OS:
50. This type of software copies data from a C. File Compression Tools
hard drive to another storage device, such D. Backup Utility
as a CD-R drive.Lesson 7-2
E. Antivirus Program
A. program utility
B. driver utility 55. Select a device which contains an embed-
ded system
C. back-up utility
A. Toaster
D. compression utility
NARAYAN CHANGDER
B. Kettle
51. A single user/ operating system al-
C. Microwave Oven
lows a single user to work on two or more
programs that reside in memory at the D. Iron
same time.
56. Example of system software are:-Choose
A. multitasking ALL that apply.
B. interfacing A. Microsoft Word
C. command-based B. Linux
D. throttle C. Unix
52. A type of specialized suite that includes D. Windows 8
a variety of programs designed to make E. Mozilla firefox
computing easier and safer.
A. System software 57. What does the systems software include
from the following?
B. Application software
A. Utility software
C. Utility
B. Drivers
D. None of the above
C. Operating system
53. Emulated computer environment that sim-
D. Hardware
ulates hardware and can be used for
running OS’s separate from the physical 58. Which type of operating system is used
(host) computer. Replicates the function- to control large equipment and to regulate
ality of a physical machine factory operations? Lesson 7-1
A. Multi-tasking machine A. real-time
B. Physical machine B. single-user/single-task
C. Virtual machine C. single-user/multitasking
D. Multi user machine D. multi-user
54. Reorganizes files and unused space on a 59. Which operating system is used for mobile
hard disk so that operating system access devices?
data menu quickly and program run faster.
Which utility program refers to this de- A. Android
scription? B. Android and IOS
A. Restore Utility C. Utility
B. Disk Defragmenters D. Anti-virus
60. Which of the following functions might be 65. When it comes to SCHEDULING, choose the
carried out by user management features THREE options that best describes it.
on an operating system? *choose all ap-
70. A good antivirus software will deny any 75. Operating systems need to manage
access to unauthorised users.Choose the what?
best synonym of the underlined word.
A. Objectives
A. not allow
B. Electricity
B. resume
C. Restoration of files
C. permit
D. Resources
D. update
NARAYAN CHANGDER
76. Which of the following is a feature of a
71. Which of the following is NOT a type of utility program?
application software?
A. It is unavailable to users.
A. Word processor
B. It is part of an integrated package.
B. Spreadsheets
C. It is written by application users.
C. Windows
D. It is considered to be systems soft-
D. Smart Draw ware.
72. With the Macintosh Operating System
77. Utility software is extra software that
where do you go in order to make any
the Operating System doesn’t provide for.
changes to your computer (desktop back-
Tick three utility software
ground, printer settings, trackpad ges-
tures, etc )? A. Virus Scanner
A. System Preferences B. Excel
B. Finder C. System monitor
C. Mission Control D. Disk defragmenter
D. Launchpad E. Application software
73. What lets you do many things, like write 78. Sorting, Formulas and Charts are all fea-
book reports and stories? tures of which type of software?
A. Antivirus Software A. Spreadsheet Software
B. Email B. Desktop Publishing Software (DTP)
C. Duct Tape C. Database Software
D. Application Programs D. Presentation Software
74. Linux is software, which means its E. Word Processing Software
code is provided for use, modification, and
redistribution. 79. A hard disk drive contains
A. open source A. disks
B. client/server B. platters
C. upgradable C. CDs
D. multitasking D. no moving parts
B. File Explorer allows you to search for a 85. Which of the following is NOT a capability
file based on certain criteria:file size, type of UNIX?
of file, partial file name, date accessed
and even text in file A. It is multiuser
C. Saving data om a format that can be B. It is multitasking
read by different version of same applica- C. It is a network OS
tion or new application. Menu option ‘Ex-
port’ or ‘Save As’. D. It is only for supercomputers
D. Opening or ‘reading’ data created in
86. Which of the following is NOT a type of
different version of the same application
user interface?
or new application.
A. Command-driven
81. Linux based OS developed by Open Hand-
set Alliance (including Google). B. Application programming interface
(API)
A. Windows Mobile
C. Menu-driven
B. Windows Embedded
C. Android D. Graphical user interface (GUI)
D. none of above 87. Define multiprocessing.
82. A Virtual Machine is said to A. Allows a single user to work on two or
A. Allow the user to play games with Vir- more programs at the same time.
tual Reality Glasses B. Allows only one user to run one pro-
B. Allow the user to virtually use an Oper- gram at a time.
ating System C. Supports two or more processors run-
C. Allow a MAC to run on Windows ning programs at the same time.
D. Hides the complexities of the hard- D. Enables two or more users to run pro-
ware from the user gram simultaneously.
83. Which of the following is a type of soft-
88. Which of the following is the first step in
ware?
the boot process?
A. Application programs
A. The BIOS is activated by turning on the
B. Replicate programs computer
C. Logical programs B. The BIOS checks that all devices are
D. Relative programs operational
84. It is starting of a computer that has been C. The OS is loaded into RAM
turned off D. Configuration and customization set-
A. Warm Boot tings are checked
89. This is a utility program of Windows Op- 94. A collection of related data
erating System that removes unnecessary A. Data Type
files
B. Information
A. File History
C. Blog
B. Disk Cleanup
D. Database
C. Optimize Drives
D. Defragmenter 95. Which is the correct statement regarding
NARAYAN CHANGDER
the “Application Software”?
90. Which one of these best describes a Graph-
A. *A set of programs that are written
ical user Interface?
for a specific purpose and provide the
A. They are easy to use because they required functionality is called software
make use of icons. package.
B. They can be complicated for inexperi- B. It may be a single program or a set of
enced users. programs
C. They use special command to do tasks. C. *The software that a user uses for ac-
complishing a specific task is the applica-
D. none of above tion software.
91. Which bus sends the request to the RAM D. Control the computer hatrdware and
requesting the next instruction to be exe- software.
cuted?
96. Which of these NOT popular to be use in
A. Address Bus Desktop?
B. Data Bus A. Windows OS
C. Control Bus B. Blackberry OS
D. none of above C. IOS
92. Will Kim Jong Un meet Donald Trump? D. Linux OS
A. There is a strong possibility E. Windows 10
B. No 97. Fill in the blank. the whole program
C. Donald Trump will meet North Korea’s one statement at a time.
leader Kim Jong Un A. Compilers
D. North Korea is threatening to cancel
B. Interpreters
President Donald Trump’s summit with
Kim Jong Un because of planned U.S. mil- C. Translators
itary drills with South Korea. D. none of above
93. Stores the results of calculations made by 98. If a file is fragmented it means that .
the ALU.
A. It is broken and no longer readable
A. Program Counter
B. Parts of the file are scatters in differ-
B. Memory data register ent places on the hard disk
C. Accumulator C. Parts of the files data has been deleted
D. Current Instruction register and cannot be recovered
D. Parts of the file are stored sequentially B. Empty spaces collected together (1)
on the hard disk C. Files are moved to be stored together
A. Files on the hard disc drive are moved A. Computers embedded into computers
(1) B. Computers built into other devices
NARAYAN CHANGDER
C. The software that provides an environ-
ment for other software to run in C. UNIX
110. A utility software is used to 115. Which utility temporarily removes redun-
A. Maintain a computer dancies in a file to reduce the file size?
118. An example of a menu interface is a 124. State three types of Utility Program.
A. Pop-up A. Desktop OS
NARAYAN CHANGDER
130. Which of these is an example of a periph- B. UNIX
eral device?
C. Microsoft Windows
A. Processor
D. Macintosh OS
B. Main Memory (RAM)
C. Hard Disk Drive 136. Designed to search for files on the user’s
hard drive
D. Monitor
A. Search Tools
131. Which one is not the example for applica- B. Diagnostic Programs
tion software?
C. Disk Management Programs
A. *Word Processing Software
D. Uninstall utilities
B. *Spreadsheet Software
C. *CAD/CAM Software 137. speeds up your hard disk
D. Anti Virus Software A. It protects your system from Trojans
and viruses
E. *Accounting Software
B. Disk defragmenter
132. The 2 types of system software are:
C. It looks at your current system re-
A. Application software sources
B. Operating system D. none of above
C. Business software
138. Uses data structures consisting of data
D. Utility software fields and methods together with their in-
133. What type of back-up is slowest to re- teractions (objects) to design programs
store from? A. Procedural programming
A. Fragmented B. Object-oriented programming
B. Incremental C. Declarative programming
C. Differential D. Functional programming
D. Full
139. Which type of interface uses ‘WIMP’
134. I plug my pendrive into the USB port. Au- A. Command line
tomatically, the window popup with the
B. Graphical
content inside of my pendrive. This pro-
cess called C. Menu
A. coordinate tasks. D. Natural language
140. What law was created to counteract C. Full backups take longer to complete
hacking? Under this law it is an offence to and require more disk space
gain unauthorised access to computer ma-
C. To put together sections of files which 154. Utility programs are usually ?
are physically separated on a hard disk A. Part of the operating system
D. To remove files which are no longer B. Purchased as a disk from a store
needed
C. Only needed if you connect to the inter-
149. A signal from a software program, hard- net
ware device or internal clock to the CPU. D. Very expensive to buy
A. process
155. Select the software below that is APPLI-
NARAYAN CHANGDER
B. Instruction CATION software.
C. processor scheduling A. Spreadsheet
D. Interrupt B. Google Chrome
159. It is the outermost layer of the operat- B. A compiler converts the whole of a
ing system that provides a way for you to higher level program code into machine
communicate with the operating system. code in one step.
NARAYAN CHANGDER
D. To help processor in processing B. Disk formatter
C. Web browser
170. This program contains data needed by a
program to operate an input or output de- D. Anti-Virus software
vice
175. Two examples of software
A. program utility A. Mouse and word
B. driver utility B. OS and Internet Browser
C. backup utility C. Keyboard and Mouse
D. compression utility D. OS and webcam
171. Application software consists of: 176. Which of the following is NOT The role of
A. Entertainment software the operating system:
B. Productivity software A. Providing the user interface
C. Speciality software B. Managing programs
D. All of the above C. Preventing basic security
172. What are the TWO things the Task Man- D. Managing hardware
ager does? 177. The operating system lets you change
A. Provides some information about the some features of the , such as the look
computer’s performance and the applica- of the background or the placement of the
tions and processes running. icons.Lesson 7-1
B. Helps you find the missing documents A. options
scattered all over the hard-drive of the B. programs
computer.
C. desktop
C. Gathers information on the processing
and compiling of modern documents and D. memory
related aspects. 178. Which of the following Windows utility
D. Most often used to terminate a pro- programs arranges pieces of files on your
cess or program that is not responding. hard drive to allow for faster access?
179. Utility programs are usually ? 184. This is the general term for any program
A. Part of the Operating System and procedure running within your com-
puter system.
NARAYAN CHANGDER
189. Which one is not a computer management B. Differential
software?
C. Full
A. Operating system software.
D. Fragmented
B. Device drivers.
195. This operating system is installed on
C. System Utilities more than 90 percent of personal comput-
D. Translator software ers.
199. Optical disks use and to represent 204. Events that occur between the time you
the digits 0 and 1. turn the computer on and when it becomes
ready to use.
210. Simple applications that can be down- 215. Software that allows or help user to per-
loaded cheaply; do not have capabilities of form related specific tasks
full version. A. Operating System
A. App
NARAYAN CHANGDER
B. Utility Program
B. Application C. Word Processing
C. Operating System D. Application Software
D. Software Program 216. What software would be used to create
211. Data Compression a website
220. Optimizing the use of main memory 225. The on-screen tools you use to interact
(RAM) with a computer are called the
230. Which of the software below is best 235. Allows the user to compress the size of
suited for typing letters? large files for easier storage sending data.
A. Control program A. Compression Software
B. Database B. Antivirus Software
C. Measuring program C. Computer games
NARAYAN CHANGDER
E. Word processor 236. Controls how users enter data and in-
structions and how information is dis-
231. UNIX is an example of this type of oper- played on the screen. Which function of
ating system.Lesson 7-1 OS related to this description?
A. real-time A. Providing user interface
B. single-user/single-task B. Controlling a network
C. single-user/multitasking C. Managing programs
234. Organizes and coordinates how multiple C. It is operated by touching the screen
users access and share resources on a net- with your finger.
workWhich function of OS related to this D. none of above
description?
239. These are designed to run all of its appli-
A. Providing user interface cations and services thru a web browser.
B. Controlling a network A. Real-time OS
C. Managing programs B. Internet/Web OS
D. Managing memory C. Multi-user OS
E. Starting and shutting the computer D. Network OS
240. This model is an iterative approach to 244. is the process of starting or restart-
software delivery that builds software in- ing a computer.
crementally from the start of the project,
E. It has clear and precisely stated steps C. Is used to control the operating sys-
that produce the correct output for any set tem
of valid inputs. D. none of above
NARAYAN CHANGDER
250. Most supercomputers use the operat-
ing system. (select all that apply)
A. UNIX A. are less memory intensive
B. Linux B. allow the programmer to directly con-
trol hardware (in embedded systems)
C. Windows
C. easy to write and test
D. iOS
D. easy to run on any machine
251. Designed for consumer and industrial de-
vices that are not personal computers 256. State two examples of Disk Defrag-
menters program.
A. Windows Mobile
A. Finder
B. Windows Embedded
B. Spyware Doctor
C. Android
C. MyDefrag
D. none of above
D. Windows Explorer
252. Which is NOT considered application soft- E. Contig
ware?
257. Which is faster to restore?
A. Word
A. Full Backup
B. Photoshop
B. Incremental Backup
C. Android
C. Only one backup needs to be restored
D. Audacity
D. The full back up needs to be restored
253. This testing is carried out by the software first then each incremental backup
developer’s in-house testing team.It is es-
258. Which Operating System function en-
sential because it often reveals both errors
ables allocation of folders? (1-3)
and omissions in the system requirements
definition. A. User Interface
A. Beta testing B. Memory Management
B. Alpha testing C. User Management
C. Black box testing D. File Management
D. White box testing 259. Lossy compression is ?
254. The software that runs on a computer A. Usually performed on text
that is responsible for the management of B. When some original data is lost and
the computer. Provides user interface, file the original file cannot be re-created
269. software is privately owned soft- 274. Which of the following is an example of
ware and limited to a specific vendor or a peripheral?
computer model. A. Processor
A. Stand-alone B. RAM or Main Memory
B. Freeware C. Hard disk drive
C. Proprietary D. ROM
D. Shareware
275. Which one of these best describes a func-
NARAYAN CHANGDER
270. This interface requires the user to type in tion of an operating system?
codes or words A. It allows the users to run apps.
A. Command Line B. It connects all of the components with
B. Graphical cables.
C. Menu Driven C. It makes the computer system faster.
281. [Select all appropriate answer]Example 286. A computer program that controls a par-
of Application software ticular device that is connected to your
A. Photoshop computer for configuration?
C. Word B. Middleware
282. All memory is measured in what? 287. What law states that your data can be
handed over to the police or security ser-
A. Meters (m) vices to prevent terrorism and crime?
B. Volume (v) A. Data Protection Act
C. Giga Bytes (GB) B. Computer Misuse Act
D. Inches (in) C. Regulation of Investigatory Powers
283. It is a program that acts an interface Act (RIPA)
between the software and the computer D. Copyright Act
hardware.
288. The predominate personal operating sys-
A. Cache tem developed by Microsoft Corporation
B. Operating system A. Windows
C. CPU B. MAC OS
D. RAM C. UNIX
284. Why will someone encrypt their files? D. LINUX
A. To scramble their data so that unautho- 289. Key job of the operating system. Al-
rised users can’t access it. lows programs to be stored safely and ef-
B. To scramble their data so that they get ficiently. Restricts each program to access-
confused. ing and amending its own area of data.
NARAYAN CHANGDER
D. off-the-shelf software
A. Device Drivers
B. Utility Programs 295. A full-featured software that can run
complex software like a word processor
C. Applications or spreadsheet.
D. Operating Systems A. Application
B. Apps
291. What rearranges parts of the file on the
disk drive to move them all to the same C. Software Program
area for quicker access? D. Operating System
A. Firewall 296. Define multitasking.
B. Disk Defragmentation A. Allows a single user to work on two or
C. File Compression more programs at the same time.
B. Allows only one user to run one pro-
D. Encryption
gram at a time.
292. What is the first thing that happens when C. Supports two or more processors run-
a computer is switched on ning programs at the same time.
A. Try and find and load the operating sys- D. Enables two or more users to run pro-
tem gram simultaneously.
B. Instructions perform some basic hard- 297. Select all the application software:
ware tests A. Spreadsheets
C. Process of loading the operating sys- B. Word Processors
tem is called booting the computer
C. Browsers
D. Computer looks for instructions to fol- D. Operating System
low (on ROM)
E. Anti-Virus
293. What is the purpose of a user interface 298. Segmentation:
(as a part of the operating system)
A. Splits processes into variable sized
A. Provides a method to communicate pieces
with the system
B. Splits processes into set sized pieces
B. Is a graphical layout C. Keeps processes together in RAM
C. Is user management D. Places processes wherever there is
D. Allows users to have different ac- space in RAM
counts E. Can cause stack overflow
299. Aryan buy a new printer. If the new 304. A(n) operating system enables two
printer attached to a computer, the or more users to run programs simultane-
must be installed before the device can be ously.
300. Each platter on a magnetic hard drive is 305. Which of the following statements is not
broken down into tracks. What part of the true
track is data stored into? A. Buses typically consist of 8, 16, 32 or
A. Section 64 lines
B. Sector B. Most modern computers use a range
C. Track Segment of general purpose registers rather than
a single accumulator
D. Quadrant
C. Memory is divided into units called
301. The layout arrangement of the different WORDS which are variable in size
devices in a network?
D. The ALU can perform mathematics
A. Open System with fixed and floating point numbers, as
B. Closed Sytem well as logical shifts and boolean logic
C. Network Topology
306. Software is;
D. Computer Network
A. instructions that control processing
302. Which of the following are examples of
B. programs or sets of instructions
Utility Software?
C. the meeting point between parts of a
A. Word Processor
system
B. Anti-virus software
D. the general term of components
C. Web Browser needed to perform a task
D. Disk Defragmenter
E. Fortnite 307. What is the User Interface (UI)?
A. The part of the Operating System that
303. to optimize the use of RAMWhich func- manages memory optimization
tion of OS related to this description?
B. The part of the Operating System that
A. Providing user interface
enables the user to interact with the sys-
B. Controlling a network tem
C. Managing programs C. The part of the Operating System that
D. Managing memory manages hardware devices
E. Starting and shutting the computer D. None of the above
NARAYAN CHANGDER
C. BIOS
C. Spiral model D. Backup data
D. Rapid application developement
314. When you purchase a personal computer,
309. Which of the following tasks is NOT per- it usually has system software installed on
formed by the operating system? Lesson its hard disk.
7-1 A. True
A. managing computer memory B. False
B. managing the CPU C. Not Sure
C. managing the formatting in a letter D. none of above
D. managing input devices
315. The process of starting or restarting a
310. How much storage space do you need on computer is called bootingWhich function
your hard drive in order to install and use of OS related to this description?
an application successfully? A. Providing user interface
A. Just enough space to hold the program B. Controlling a network
files
C. Managing programs
B. Applications never use any hard drive
space D. Managing memory
C. Enough space to hold the program files E. Starting and shutting the computer
and any data files you might produce 316. Which of the following is designed to con-
D. Just enough space to hold your data trol the operations of a computer?
files A. Application Software
311. A file utility is a utility that shrinks B. System Software
the size of a file(s). C. Utility Software
A. unit D. User
B. compression
317. This program contains data needed by a
C. matrix program to operate an input or output de-
D. conversion vice.Lesson 7-2
318. It is an online diary or commentary C. The user interacts with the machine
A. Article via the operating system
328. Which tasks are the memory manager re- C. data compression
sponsible for (as a part of the Operating D. anti-virus
System)
E. firewall
A. Swapping applications and data be-
tween RAM and virtual memory 333. These allows the devices to communicate
B. Allocated sections of memory to appli- with the operating system of the computer
cations A. Operating system
NARAYAN CHANGDER
C. Communicating with peripheral de- B. Utilities
vices connected to the computer C. Device Drivers
D. Allows the end user to control the com- D. Translators
puter effectively
334. is an electronic component that store
329. C:denotes a(n) directory that is at the instructions waiting to be executed by the
top of the filing structure of a computer. processor
A. sub A. Random fetching memory
B. cluster B. Random execute memory
C. root C. Random access memory
D. domain D. Random devices
330. It is the two or three or four letters af- 335. An OS which you would use in day-to-day
ter the dot in a filename. It also indicates life on a normal school computer is a
what kind of file you are dealing with. A. Embedded
A. File name B. Real Time
B. File extension C. Distributed
C. File size D. Multi-Tasking
D. File management E. Multi-User
331. Helps manage the system resources, in- 336. Solid state drives contain floating gates
cluding memory management and schedul- to represent 1’s and 0’s. What are the ad-
ing. All Applications use this to send and vantages to SSDs? (select all that apply)
receive data to and from devices which lies A. Fast access speeds
below the operating system.
B. Small, light and portable
A. operating system
C. Quiet
B. Kernel
D. No moving parts
C. Control Unit
E. Cheap
D. Application software
337. What is File Management?
332. Which of the following are examples of A. The part of the Operating System that
utility system software (hint:not security) manages the memory of the system
A. encryption software B. Specific purpose software used for
B. defragmentation specific tasks
A. Finder B. BIOS
348. What type of software am I? Spread- 353. Which is not a computer translator?
sheet software, e.g. Microsoft Excel A. Interpreter
A. Operating System B. Compiler
B. Application software C. Word Processor
C. Utility software D. Assembler
D. none of above
354. Amin buys a new computer with an op-
NARAYAN CHANGDER
349. This following is an example of a periph- erating system and some utilities.State
eral (7-9) two functions of the operating sys-
tem.Answers:4
A. Processor
A. Provides interfaces between user and
B. Main Memory (RAM) computer / Determines look and feel of
C. Hard Disk Drive the computer
C. By giving each application exclusive ac- 364. Which utility is used to exit from a non-
cess to all computer resources responsive program?
D. By executing only one application at a A. Task Manager
time, but with higher priority for certain
applications B. Disk Cleanup
368. These are operating systems that are en- C. Allow a MAC to run on Windows
tirely stored within a device D. Hide the complexities of the hardware
A. Stand-alone operating systems from the user
B. Network operating systems 374. Which is NOT a utility program?
C. Embedded operating systems A. Word processor
D. None of the above B. Compression software
369. Designed for use with smart phones. C. Back-up
NARAYAN CHANGDER
A. iPhone OS D. Disk organisation
B. BlackBerry Operating System 375. State two examples of File Manager Util-
C. Palm OS and Palm webOS ity program.
D. Symbian OS A. Finder
B. Windows Disk Cleanup
370. To share one processor’s power between
multiple people, you would use a OS: C. Windows Explorer
A. Embedded D. PhoneClean
B. Real Time E. WinZip
C. Distributed 376. Select the true statements about memory
D. Multi-Tasking paging:
379. These runs single user applications and 384. In which of the following file formats can
shares files and folders on a small net- music files be compressed?
work.
389. Which one of these is not System Soft- C. Something which moves data around
ware? the CPU
A. Android D. none of above
B. Norton Anti-virus 394. Interpreter is used as a translator for
C. Apple macOS A. Low level language
D. Office 365 B. High Level Language
NARAYAN CHANGDER
390. What is the purpose of Utility software? C. Internet language
A. To keep the computer maintained and D. C
in working order 395. Data is;
B. To control how the computer operates A. individual facts input into a system
C. To manage resources available to B. physical units that make up a system
hardware
C. programs or sets of instructions
D. none of above
D. users of a system
391. Choose the answers that are TRUE.
396. File property is:
A. Cache memory is built into various
A. Additional data stored about a file
components on a computer, including the
processor. B. Property of file that can be set
B. Cache memory is cheaper, because it C. Basic information about files, name,
is slower than normal memory (RAM) but size and date modified
it can increase the overall performance of D. Process of reducing the size of a file
a computer quite dramatically.
397. These are used to control and coordinate
C. In general, the higher the speed of the
computer that are linked together.
CPU, the slower it will perform.
A. Desktop OS
D. Fragmentation has no affect on speed
of SSDs. B. Virtualization
C. Mobile OS
392. is computer software that causes a
computer to perform useful tasks beyond D. Network OS
the running of the computer itself. 398. It is the program that runs and manages
A. System software the computer
B. Utility software A. Application Software
C. Application software B. System Software
D. none of above C. Programming Languages
D. Internet
393. An operand is
A. The operation to be performed on a set 399. Which one of these is an Open source
of data software?
C. Skype C. Robotics
D. none of above D. Educational
A. multitasking B. Textbox
NARAYAN CHANGDER
B. Database
411. Three functions of the operating system C. Measuring program
A. User Interface, multitasking, commu- D. Search engine
nicates with hardware via device drivers
E. Word processor
B. User Interface, multitasking, saving
C. fetch, decode and execute instructions 417. Decompressing is when:
C. Contains Windows, Icons, Menus, 425. Julian buys a new laptop with a sys-
PointersVisual tem information utility and a diagnosis util-
ity.Describe, using examples, the purpose
C. A form created by someone made to C. That all processes have a fair use of
fill out resources and that processes with higher
D. none of above priority are executed first
D. That all data on the computer is secure
430. The name of the interface used by blind and protected from unauthorized access
persons to perform operations on a com-
puter is 435. Which of the following is not mobile op-
erating system?
A. sensor
NARAYAN CHANGDER
A. Blackberry
B. icon
B. Android
C. braille
C. Windows Phone
D. touch screen D. a-phone
431. is a multitasking operating system 436. Networks, servers, mainframes, and
developed in the early 1970s by scientists supercomputers allow hundreds to thou-
at Bell Laboratories. sands of users to connect at the same time,
A. Linux and thus are
B. Perl A. single user
440. Diagnose and repair problems related to C. are programs or sets of instructions
your hard drive D. are physical units that make up a sys-
tem
451. Which of the software below is best 456. is software which allows a computer
suited for storing records of books in a li- to run and to be maintained.
brary? A. Application software
A. Control program B. System software
B. Database C. MS Word
C. Measuring program D. none of above
D. Search engine 457. These enables users to collaborate on doc-
NARAYAN CHANGDER
E. Word processor uments with other online.
A. Cloud Storage
452. You cannot use an operating system’s file
manager to B. Email
462. What are the disadvantages of using op- C. Creating and managing passwords
tical disks? (select all that apply) and usernames
464. Most operating system perform similar 469. What is the function of the operating sys-
functions, except tem that provides the user interface?
NARAYAN CHANGDER
B. Disk Defragmenters 477. Embedded systems can be found in (select
C. File Compression Tools all that apply)
D. Backup Utility A. Washing Machines
A. Protect computer against virus. 478. Tool in optical drive that reads informa-
tion
B. Protect computer from bacteria.
A. needle
C. Damaging the computer program.
B. laser
D. Remove computer form viruses.
C. tape
473. How many different languages of pro- D. sensor
gramming are there? (estimate)
A. All programming is in one 479. These are programs typically used to cre-
ate attractive, visually interesting presen-
B. 100 tations
C. 500 A. Illustration programs
D. 700 B. Presentation graphics
474. Protect computers and users C. Image Editor
A. File Compression Programs D. Adobe Photoshop
484. What are the storage locations inside a 490. Which of the following is NOT a function
CPU called? of Operating System?
A. Registers A. Booting the computer
B. RAM slots B. Managing resources and jobs
C. Control Memory C. Interfacing with users (typically via a
GUI)
D. Open Memory
D. Disk management
485. Version (flavor) of UNIX available with-
out charge over the Internet 491. A software repository is ?
A. Windows A. Software already available for pur-
chase
B. MAC OS
B. An online collection of software
C. UNIX
C. combination of hardware and systems
D. LINUX
software that supports the running of ap-
486. What software would be used to make plications
calculations D. none of above
A. Image editing software 492. looks at your current system re-
B. Spreadsheet sources
C. Desktop Publishing (DTP) software A. Disk defragmenter
D. Web authoring software B. Virus Scanner
NARAYAN CHANGDER
499. With a command-line interface,
C. devices can be stolen (with data and
A. user can give command by lining up the
files stored on them)
instructions.
D. disasters-fires, earthquakes and
B. a user can command anyone to help
floods can destroy hardware
them.
494. Windows XP, Windows 7, and iOS 12 C. user can interfere with any command.
are examples of:
D. a user uses the keyboard to enter data
A. Operating systems and instructions.
B. Application software
500. Why we need computer software?
C. Utility software
A. *Software is required for the function-
D. General Purpose software ing of computer.
495. Which of the following is NOT a definition B. Instruct computer about the actions to
of System Software? be performed
A. Enables boot process C. To get perform a task or set of tasks
B. Transfers files D. Non of these
C. Controls software configuration 501. John received computer hardware from
D. Launches applications a friend who lives in the United States
of America, but the some of the software
496. Which of the following is not type of Ap- was missing. He therefore, decided to pur-
plication Software chase the necessary software. Since John
A. Spreadsheet intended to use the computer in his family
business, he had a choice of acquiring soft-
B. Word Processing ware designed especially for his business.
C. Presentation What kind of software is this?
D. Database A. General Purpose
B. Custom written
497. An assembler translates assembly code
language into C. Integrated
A. High Level Language D. Specialized
B. Machine Code 502. What does an incremental backup en-
C. Processor Code tail?
D. Mnemonics A. Makes copies only of the new files
B. Saves your backup to secondary stor- 507. The BIOS allows you to:
age A. Change the computer’s time/date set-
506. How would I open the Task Manager? 511. Which one of the following best describes
utility software?
A. Shift+Alt+Del
A. A series of gaming apps.
B. Ctrl+Alt+Del
B. Software that allows you to do specific
C. Ctrl+Enter+Del tasks e.g. Make slideshows and type let-
D. Ctrl+Alt+Enter ters.
NARAYAN CHANGDER
B. Control Unit (CU)
C. High Level Language
C. Accumulator (ACC)
D. Complier
D. Memory Address Register (MAR)
513. Which one is true about Open source soft-
ware from the following? 518. These are programs that reduce the size
A. It is very expensive. of computer files
B. It is made to make profit. A. Antivirus
C. It made for the betterment of other B. File compression programs
people. C. Backup programs
D. Well tested and reliable and updates
D. None of the above
will be regularly be issued.
514. Disk Cleanup, Task Manager and File Re- 519. Which of these are false
covery are considered to be A. the cloud is easy to use
A. root directories B. the cloud can be accessed on any de-
B. file management systems vice
C. Windows utility programs C. you need internet to use the cloud
D. Accessibility Utilities D. data can be added to the cloud on any
device
515. A set of programs containing instructions
that work together to coordinate all the E. you need a wired connection to use the
activities among computer hardware re- cloud
sources.
520. Why would it be ill advised to run a disk
A. System Software
defragmenter application on an SSD
B. Utility Software
A. SSDs have more moving parts so they
C. Operating System wear more easily
D. Translator
B. The location a file is stored on an SSD
516. What type of software works with users, does not affect how quickly it can be ac-
application software, and computer hard- cessed
ware to handle the majority of technical C. SSDs are fast enough it doesn’t matter
details
D. Moving files physically on the SSD can
A. Application contribute to wear and can reduce their
B. Operating System lifespan
521. Enables users to interact with a computer B. Stopping unauthorised access in the
system through windows, icons, menus computer system.
and pointers.
C. software that keeps the computer per- 536. What is the definition of a “Process” in
forming at it’s best computing?
D. none of above A. A written code of a program stored on
secondary storage
531. Memory in the CPU used to store used
data and data that will be used frequently B. A program that is currently being exe-
is called cuted (running)
A. Cache Memory C. A piece of software that manages the
NARAYAN CHANGDER
execution of programs on a computer
B. Random Access Memory
D. A piece of software that manages user
C. Read Only Memory
accounts on a computer
D. Virtual Memory
537. Metadata is:
532. The basic input/output system (BIOS) is
A. Additional data stored about a file
stored on a chip.
A. ROM B. Property of file that can be set
534. Evaluate your system and make recom- 539. The ability of an operating system
mendations for fixing any errors found to switch between different applications
stored in memory
A. Search Tools
A. Diversion
B. Diagnostic Programs
B. Multitasking
C. Disk Management Programs
C. Operation
D. Uninstall utilities
D. Programming
535. A hierarchy;
540. Booting is the process of starting or
A. is the means of carrying out opera-
restarting a computer. What the process
tions or instructions
involve?
B. are users of a system
A. Scheduling jobs
C. is software not fully understood by
B. Configuring devices
most users
D. is a diagram where the most important C. Starting a computer
level of a system is at the top D. Providing file management utilities
551. Programs that control or maintain the op- 556. Fill in the blank. translate the whole
erations of the computer and its devices. program as an object code at once.
A. Operating System A. Compilers
B. Utility Software B. Interpreters
C. System Software C. Translator
D. Compression Software D. none of above
NARAYAN CHANGDER
552. What type of software am I? I am the 557. Smaller files take up less
communicator between applications soft-
ware and hardware. A. Storage place
puter. C. custom
NARAYAN CHANGDER
D. Spreadsheet
C. 2
3. Images in an image gallery consist of
D. 3
A. Bitmap images
9. The use of Personal Information Manager
B. Vector images (PIM) software is to enable you to
C. Clip art A. create and edit written documents
D. Stock photograph B. to do calculations and numeral analy-
4. Softwares used to create and edit sound sis
clips and video clips are known as C. take notes and easily organized the
A. Web Authoring software notes.
D. sychronize your calendar, tasks, email
B. Video Game Design software
to keep our organised
C. Graphics Program
10. Email is commonly used in business and at
D. Audio and Video editor Program
home for communication. Which of the fol-
5. What type of software enables you to pur- lowing is a feature of email software?
chase, collect, and play video games on a A. Bookmark
computer?
B. Message Log
A. Entertainment Software C. Call Blocking
B. CAD Software D. Address Book
C. Gaming software
11. Examples of games made in Stencyl are
D. Productivity Software
13. With , you can view, organize, sort, D. Thorough, regular and well-tested up-
catalog, print and share digital photos dates
24. What kind of documents can a Desktop 29. An example of application software is
Publishing Software (DTP) create? A. file management
A. Posters, newsletters, magazines
B. operating system
B. Comics, magazines, novels
C. disk operating system
C. Brochures, leaflets, mail
D. Microsoft office.
D. Catalogues, newsletters, posters
30. When using spreadsheet software, a func-
NARAYAN CHANGDER
25. What type of software uses columns, tion
rows and cells to represent data that
A. depicts data in graphical form
can be manipulated by formulas in other
cells? B. changes certain values to reveal the ef-
fects of the changes
A. Database
C. is a predefined formula that performs
B. Word Processing
common calculations
C. Spreadsheet
D. contains the formatting necessary for
D. Graphics a specific worksheet type
26. The smallest unit of a digital image or 31. A grammar checker, thesaurus or spelling
graphic that can be displayed and repre- checker are features of what type of soft-
sented on a digital display device. ware?
A. pixel A. Graphics Software
B. dot B. Word processing software
C. bit C. Entertainment software
D. none of above D. Communication software
27. Spreadsheet 32. Your sister is living in Italy. What type of
A. AppleNumbers Software would you need to keep in touch
B. Calculator with her?
A. Forms the foundation to make a full 33. Which type of application software is Mi-
game crosoft Word?
B. Allows business companies to pro- A. Spreadsheet
mote their products and services
B. Word Processor
C. Allows developers to improve the de-
C. Database
sign
D. Lets developers see how the game D. Presentation
plays E. Email
44. Microsoft Excel, OpenOffice Calc, and 49. PCIe is a high speed computer expan-
Google Sheets sion bus standard.
A. Word Processors A. serial
B. Spreadsheets B. parallel
C. Presentation Graphics C. internal
D. DBMS D. external
50. A collection of separate application pro-
NARAYAN CHANGDER
45. Adobe Photoshop, Canva and GIMP are ex-
grams bundled together and available as
amples of software.
a group is a:
A. Drawing or illustration program
A. integrated package
B. Desktop publishing or page layout
B. software suite
C. Image or photo editing C. app suite
D. none of above D. office apps
46. If your teacher asked you to find the 51. What is the function of page layout or
location of the continent of Asia using desktop publishing?
computer software, which one would you
A. Mix text and graphics to create pub-
use?
lications of professional quality, such as
A. Entertainment brochures, newsletters or textbooks.
B. Communication B. Bitmap images become jagged when
C. Reference expanded.
C. Used for graphic design, page layout,
D. Spreadsheet
create sharp artistic image.
47. Graphics that typically appear as black and D. Edit or modify digital photos called
white boxes that automatically link mobile bitmap or raster images which consist of
devices to a variety of different content. pixels.
A. Flash 52. What is an example of a Graphics Manip-
B. Animation ulation software
C. vector A. Microsoft Excel
D. QR codes B. Adobe Photoshop
C. Microsoft Powerpoint
48. This is designed and written to perform
specific personal, business, or scientific D. Adobe Illustrator
processing tasks, such as payroll, process- 53. Programs that combine a variety of visual
ing, human resource management, or in- objects to create attractive, visually inter-
ventory management. esting presentations.
A. Programming Language A. DBMS
B. Application Software B. presentation graphics
C. Operating System C. spreadsheet
D. Device Drivers D. word processor
54. What is the file extension for a Microsoft 59. Ciara is looking at purchasing new spread-
Word document? sheet software for her business. Which of
the following are compatibility issues that
56. Allows user to manipulate digital photos 60. Apple Pages, Google Docs, and Corel
is the main function of WordPerfect
A. Control / Measuring software A. Word Processors
B. Video editing software B. Spreadsheets
C. Word Processor software C. Presentation Graphics
D. Photo editing software D. DBMS
57. Each application software of Hannah has a 61. what is the name of the large background
feature that automatically starts a setup area of the large background area of the
screen for the software. What do we call windows environment that holds ions for
this feature? files, folders and applications?
A. Autoplay feature A. desktop
B. Extra Utility feature B. windows
C. Auto-setup feature C. background
D. Add-ons D. home screen
58. Define the term ‘open source software’. 62. which of the following application soft-
A. Software that is supplied with its ware can be used to create contracts
source code. Source code can be modified A. presentation
and the software redistributed (as long as B. database system
this too is open source)
C. spread sheet
B. Software that can be purchased from
a high street or online store. D. word processor
C. Software that can be copyrighted and 63. One downside of using a is that you
the license sold under a patented or trade- are dependent on the server providing the
marked name. application to be available whenever you
D. Software that is written for one cus- need it.
tomer’s specific requirements. A. cloud suite
NARAYAN CHANGDER
B. Dreamweaver
C. Google Chrome A. it is used for project planning, schedul-
ing, resource allocation and change man-
D. Internet Explorer
agement
65. A collection of related data equivalent to B. to create and edit sound clips
an electronic file cabinet: C. A collection of individual software,
A. database grouped and sold together as a bundle
B. spreadsheet D. to make a website interactive and in-
C. word processor teresting to viewers
C. settings C. spreadsheet
D. Web browsing
D. instructions
84. Which is not a type of installation?
79. The programs and other operating informa-
tion used by a computer A. Custom Installation
A. software B. Full Installation
NARAYAN CHANGDER
C. Purchase
D. Delivery B. database
96. A general-purpose software that has been D. Create a presentation about your sis-
modified to perform specific tasks for the ter.
user.
106. When using a spreadsheet, the expres- 112. The appropriate software to use for cre-
sion =D8-D17 is called a ating research papers is software.
A. function A. spreadsheet
B. range B. presentation
C. formula C. word processing
D. cell
D. database
NARAYAN CHANGDER
107. What name is given to the person requir-
ing the software? 113. Which of the following is an example of
a Word Processor?
A. Organisation
A. Google Chrome
B. Company
C. Client B. Microsoft Word
D. User C. MS Publisher
117. This feature automatically moves the cur- electronics, mechanical objects, animation
sor to the next line when the margin of the and other products?
page has been reached and will readjust
119. Select the 2 advantages of Laser printers B. It makes pictures look cool
NARAYAN CHANGDER
D. It does not need an Internet connec- encing
tion. A. Collaboration Software
128. Applications are software in which the B. Productivity Software
vendor hosts the software online over the C. Utility Software
Internet and you do not to install the soft- D. Specialized Software
ware on your computer
133. applications are software in which
A. Open Source as a Service
the vendor hosts the software online over
B. Platform as a Service the Internet and you do not to install the
C. Software as a Service software on your computer.
D. Infrastructure as a Service Applica- A. Open Source as a Service
tions are software in which the vendor B. Platform as a Service
hosts the software online over the Inter- C. Software as a Service
net and you do not to install the software
D. Infrastructure as a Service
on your computer
134. One of the PCIe features is it has hot
129. Control and measuring software is de-
functionality,
signed to .
A. plug
A. control and measure a computer’s per-
formance B. play
B. measure a computer’s performance C. pause
D. patch
C. control a computer
D. allow a computer or microprocessor to 135. Microsoft PowerPoint is an example of
interface with sensors. software
A. Presentation
130. Which Control Panel category do you click
if you want to uninstall an application? B. Word Processing
A. Appearance and Personalization C. Spreadsheet
D. Reference
B. Programs and Applications
C. Hardware and Sound 136. Give advantages of using closed source
code
D. Programs and Features
A. Thorough, regular and well-tested up-
131. What is the main purpose of database dates
software? B. Expert support and user manuals from
A. Managing Records company
NARAYAN CHANGDER
148. combines application software such
as word processing, spreadsheet, presen- B. database
tation graphics, ande-mail. C. spreadsheet
A. Shareware D. operating system
B. software suite 154. The characters used to calculate numbers
C. Packaged software within the formula?
D. Custom software A. Arithmetic operators
B. Formula Bar
149. What is the name of the narrow strip
along the bottom of the windows environ- C. Formula
ment? D. none of above
A. taskbar 155. A(n) is an online area where users
B. toolbar have written discussions
C. navigation bar A. FTP program
D. shortcuts B. text message
C. newsgroup/message board
150. What type of software is installed and
used, then purchased if you decide to con- D. Web browser
tinue using it?
156. A subset of e-commerce that uses so-
A. Freeware cial networks to assist in marketing and
B. Purchase ware purchasing products is known as com-
merce.
C. Custom made
A. crowd
D. Shareware
B. source
151. To remove red eye from a digital image, C. friend
you would use software such as
D. social
A. Adobe Photoshop
157. The recommended memory cache of CPU
B. Adobe Acrobat
in installing a Microsoft Office 2010 in a
C. Microsoft PowerPoint 64-bit Windows operating system is
D. Apple Keynote A. 1 GHz
152. The following are file extensions for B. 5 GHz
what type of files:.doc, .ppt, .txt, .rtf? C. 1.4 GHz
A. Documents D. 1.5 GHz
158. used for creating spreadsheets and 163. What is the file extension for Microsoft
graphs Excel?
A. AutoFormat D. .
B. Software crash 174. The required available hard disk space for
C. System crash installing a Microsoft Office 2010 in a 64-
bit Windows operating system is
D. Malware infection
A. 32 GB
169. software provides a means for shar-
ing, distributing, and searching through B. 20 GB
documents byconverting them into a for- C. 40 BG
mat that can be viewed byany user
D. 30 GB
NARAYAN CHANGDER
A. Portable Document Format (PDF)
B. Document management 175. The functions of Project Management
Software are
C. Database
A. Calendar and contact sharing
D. Word processing
B. Document sharing and collaboration
170. Apple FileMaker, Microsoft Access, and
OpenOffice Base C. Social networking
A. Word Processor D. Create and edit vector images
B. Spreadsheet 176. Which statement best describes Spread-
C. Presentation Graphics sheet software?
D. DBMS A. Used to create and edit text-based doc-
uments such as letters and posters.
171. The following are the features of spread-
sheet except B. Used to create interactive presenta-
A. Formula tions about specific subjects.
B. Dynamic File Links C. Used to store and perform calcula-
tions on numerical data.
C. What-If analysis
D. Tables D. Used to send and receive electronic
messages.
172. The portion of the application that allows
you to control and to interact with the pro- 177. Task manager is used to .& . ap-
gram. plication software
A. dialog box A. Open
B. gallery B. Control
C. user interface C. Decipher
D. window D. Close
173. Your teacher needs to calculate grades for
178. This application software organizes, ana-
your class. What type of application soft-
lyzes, and graphs numeric data.
ware would he/she MOST LIKELY use?
A. Spreadsheet A. spreadsheet
B. Word processing B. word processor
C. Database C. database
D. Internet D. presentation graphic
190. The following are Graphics Program ex- 196. Making sure your software works with
cept your system is called this type of compat-
A. Drawing or Illustration program ibility
B. Twine A. Computer
NARAYAN CHANGDER
191. Other examples of Presentation Graphics
are 197. What are the examples of specialized ap-
A. FireBird plication?
211. The unique address for a particular web- 216. software helps run the computer and
site is the coordinates instructions between other
software and the hardware devices.
A. protocol
A. Application
B. domain section
B. Utility
C. client
C. System
D. URL
D. Recovery
NARAYAN CHANGDER
212. the file extension for MS-Word document
in Office 2007 is 217. Which type of application software
would you use to attach and send your as-
A. .doc signments to your lecturer?
B. .docx A. Presentation
C. .pdf B. Email
D. .xls C. Database
232. Which of the following is the website B. to include email addresses of newly
that provides mobile apps for Android de- hired employees
vices? C. to clarify the overall purpose of the
A. Apple App Store message
B. Android Store D. to copy the email confidentially
C. Google Play Store 238. which of the following applications can be
D. Windows Phone Store used for strong, modifying, extracting and
NARAYAN CHANGDER
searching data
233. InShot is an example of a software.
A. word processing software
A. Word Processing
B. database software
B. Photo Editing
C. presentation software
C. Video Editing
D. conferencing software
D. Graphics Manipulation
239. Windows, IOS, and Linux are all types of
234. microsoft word, microsoft powerpoint, what?
and internet explorer are examples of A. Software systems
A. application software B. Hardware systems
B. hardware C. Operating systems
C. system software D. All of the above
D. input devices
240. What is the term used to put software on
235. Which of the following is NOT a precau- a computer?
tion to take when shopping online? A. Download
A. Pay with a debit card, not a credit card. B. Upload
B. Shop at well-known, reputable sites. C. Install
C. Avoid making online transactions on a D. Uninstall
public computer.
241. Beta software is made available because
D. When placing an order, make sure you
receive a confirmation number.
A. new programmers have been hired
236. What is the most common way to get
B. a company is making an early release
new software?
to test a bugs
A. Install it from CDs/DVDs.
C. wireless networking must be added
B. Share it via Bluetooth.
D. the company needs more profit
C. Download it from the Internet.
242. Fill in the blank.We store all these infor-
D. Send it through email.
mation into something call which has
237. when composing an email message why Tables that includes rows and columns.
might you want to use the Bcc field? A. page
A. to include extra-long email addresses B. database
C. client C. path
D. slide D. top-level domain
244. The type of gui that uses tabs to organize 250. The recommended memory in installing
groups of related items. a Microsoft Office 2010 in a 64-bit Win-
A. character dows operating system is
B. gallery A. 512 MB
C. ribbon B. 1 GB
D. traditional C. 2 GB
245. Also known as an online suite. D. 256 MB
A. cloud
251. software includes programs that are
B. office
not specific to any organization or busi-
C. integrated ness and can be used by anyone
D. utility A. General-purpose
246. A Web site that provides access to spe- B. Specialized
cific mobile apps is called a(n):
C. Customized
A. mobile store
D. Custom-written
B. app store
C. iPhone apps 252. What category of software is a Compiler
D. smartphone store A. Productivity software
247. Software is also known as B. Development tools
A. Application C. Business software
B. Hardware D. none of above
C. Input
253. E-mail is from category of
D. Output
A. Utility Software
248. In the URL http://www.microsoft.com/surface,
the portion labeled “http” is the B. Application Software
A. protocol C. System Software
B. domain name D. None of these.
254. It is a digital distribution platform cre- 260. Google Docs, Zoho, and Microsoft Office
ated for Windows Operating System. Web Apps are examples of:
A. App Store A. basic applications
B. Play Store
B. cloud suites
C. Galaxy Store
C. utility suites
D. Microsoft Store
D. specialized applications
255. What is the program that is used to set
NARAYAN CHANGDER
up an electronic database? 261. What is NOT a reason for why backups
A. Spreadsheet are necessary?
B. Word Processor A. Data corruption
C. Software Suite
B. Hardware failure
D. DBMS
C. Leaked Information
256. What does application software NOT al-
D. Malicious software
low a user to do?
A. Create Documents 262. What should a level 1 technician do when
B. Enhance Internet Connection they are unable to solve an issue?
C. Manage Finances A. Close the ticket and let someone else
D. Edit Images handle it.
257. What is the function of a word proces- B. Escalate to a higher level of support.
sor? C. Keep working at it until they resolve it.
A. create presentations
D. Contact Microsoft support.
B. manipulate textual data
C. manipulate numeric data 263. A driver is used to .& . with hard-
D. create spreadsheets ware devices
A. Compression B. Control
B. Disk defragmentation C. Collaborate
C. Antivirus D. Communicate
D. Word Processor
E. Presentation Software 264. Which of these tasks would you complete
using an internet browser? There is more
259. When the software is installed, what do than 1 answer.
you do next?
A. Write an email to a friend.
A. Test the software
B. Search for a new laptop.
B. Uninstall old version
C. Upgrade to new version C. Find a local florist’s telephone number.
D. Update the logbook D. Watch Youtube videos.
265. Amie is on her last step in software ap- 270. The following file extension is for a file
plication installation. What is this last that includes limited amount of formatting
step that allows her to easily access the such as bold and italic.
NARAYAN CHANGDER
1. converts assembly language in to ma- C. Guido Lee
chine code.
D. none of above
A. Compiler
B. Interpreter 6. Which of these is not a high-level lan-
guage.
C. Assembler
A. Machine languages
D. none of above
B. Fortran
2. What is the only thing that it is “native”
language of a computer? C. c
10. The command STOP is used in a software D. Adds new features to the delivered
language as a debugging tool to halt a pro- program
gram. The program cannot resume until
11. Which IDE tool converts each line of source C. Linus Torvalds
code into machine code, and executes it as D. Bjarne Stroustrup
each line of code is run?
A. Compiler 16. Consider the sentence:A book has one or
B. Variable Watch more pages. Which of the following best
characterizes the relationship between the
C. Memory Inspector
Book class and the Page class?
D. Interpreter
A. Inheritance
12. Which Data Type is used to store whole
numbers? B. Specialization
A. String C. Association
B. Double D. Composition
C. Integer
17. Software can be described as Fit for Pur-
D. Boolean
pose if it:
13. which two statements are true of a com-
A. Fulfils the requirements set out during
piler?
the Analysis stage
A. the translation is done once only and
as a separate process B. Fulfils the requirements set out during
the Design stage
B. when an error is found this is reported
and it stops. It pinpoints the error so the C. Fulfils the requirements set out during
programmer knows where it has occurred the Implementation stage
C. the program can be easily edited as it D. Fulfils the requirements set out during
always exists as source code the Testing stage
D. the program that is run is already
translated into machine code so it can be 18. Please select the Logic Paradigm(s).
executed more rapidly
A. ALGOL, FORTRAN, Pascal, C, Ada
14. The operations and maintenance phase B. C++, Java, Smalltalk
A. Determines what the program will do
C. Lisp, Scheme, ML, Haskell
B. Determines how the program will work
D. Prolog
C. Determines whether or not the pro-
gram works E. Python, Perl, Ruby
NARAYAN CHANGDER
D. A program which helps locate, identify ming language?
and rectify errors in a program.
A. C
20. One kilobyte is equal to approximately B. Prolog
memory locations.
C. FORTRAN
A. 1, 000
D. Lisp
B. 10, 000
C. 100, 000 26. Assembly langauge is written using
D. 1, 000, 000 A. Binary
21. What is an advantage of a Game Library B. English-like key words
over a Graphics Library? C. Abbreviated mnemonic keywords
A. Game Library is faster
D. none of above
B. Graphics Library always have better
graphics 27. FOXPRO is a -generation language.
C. Game Library is more complete, such A. Second
as having audio support
B. First
D. Game Library takes up more space and
C. Third
takes longer to load
D. Fourth
22. A language that allows the user to add fea-
tures to it is: 28. Visual Basic is an example of
A. Irregular A. Machine Code
B. Semantically safe B. High Level Language
C. an Extensible language
C. Assembly Language
D. Syntactically safe
D. Low Level Langauge
23. What are the 2 ways to classify program-
ming languages? (SELECT 2 options) 29. Programming Language with letter A
30. Which code displays Hello World on the 35. What is the Brain of Computer?
Phone Simulator screen? A. UPS
NARAYAN CHANGDER
B. Machine
page address?
C. Object oriented
A. CSS
D. Assembler
B. JAVA
42. Focus is on the result of a calculation given C. URL
certain data D. CNN
A. procedural paradigm
48. “Contain both data and the procedures
B. functional paradigm that read or manipulate that data”. This
C. object-oriented paradigm statement describe which programming
paradigm?
D. none of above
A. Logic
43. was developed at a university called B. Object Oriented
MIT in2003.
C. Procedural
A. Scratch
D. none of above
B. Python
49. What is “black box” testing?
C. Java
A. System testing
D. none of above
B. Integration testing
44. What will the output be from the following C. Testing with knowledge of the system
code? print(”Hello” + “world!”) internals
A. Hello world! D. Testing without knowledge of the soft-
B. Helloworld! ware internals
C. SyntaxError 50. Translates entire source code in one go
D. “Hello” “world!” A. Language Translator
B. Compiler
45. Modern IDEs assist programmers by:
C. Interpreter
A. Automatically completing code
D. none of above
B. Writing programs for the user
C. Stopping any errors from being pro- 51. Which language translator is used during
duced the development of a program?
NARAYAN CHANGDER
B. Simplicity and abstraction
63. A programming language that automati-
C. Logical or mathematical precision
cally turns lots of information into web
pages D. Object-Oriented approach to abstrac-
A. C tion
73. Python is a clear and powerful - 78. characters are stored as string data
oriented programming language. type
NARAYAN CHANGDER
84. What is a software design strategy? D. All of these
A. A graphical or textual description of 89. What does IDE stand for?
the software
A. Integrated Debugging Equipment
B. A fundamental idea that can be applied
to designing a system. B. Integrated Debugging Environment
A. Hexadecimal D. 10
D. Duodecimal A. First
B. Second
86. What is the smallest unit of measurement
used to quantify computer data. C. Third
A. a bridle D. Fourth
D. a tablespoon A. Instructions
B. Questions
87. What is a MNEMONIC?
C. Answers
A. A single action that can be performed
by a computer. D. Numbers
95. Languages that relate to the architecture 101. Case label in switch() should not be
and hardware of a specific computer are A. floating point
known as
B. integer
A. High Level Languages C. long integer
B. Low Level Languages D. all above
C. Simplex Languages
102. Binary numbers are usually expressed in
D. Complex Languages groups of bit(s).
96. A phase in the Program Development Cy- A. 1
cle that involves the consideration of what B. 2
the end users want or need.
C. 8
A. Understanding the Problem D. 10
B. Planning the Logic
103. HTML coding involves using to create
C. Coding the Program webpages.
D. none of above A. Tabs
97. Select the LOW LEVEL languages B. Tags
A. Machine language C. Labels
B. Assembly language D. Quotes
NARAYAN CHANGDER
106. Which of the following is false: C. A Machine Code
A. INTERPRETED programs run slower D. An Algorithm
than COMPILED programs
111. What is the name for the software used
B. ASSEMBLY LANGUAGE is easier to to convert an assembly language program
read then MACHINE CODE into machine code?
C. COMPILED programs are easier to de-
A. Assembler
bug
B. Interpreter
D. MACHINE CODE programs are usually
HARDWARE SPECIFIC C. Compiler
D. Translator
107. The first stored programs were written
in binary. How many bits did each line of 112. Computer Works on which cycle?
code contain?
A. Process, Output, Input
A. 4
B. Output, Process Input
B. 8
C. Input, Process, Output
C. 16
D. None of the Above.
D. 32
113. Which one of the following is the cor-
108. Select all that are true about Python. rect ordering of the coupling of modules
A. Python was not intended to replace from strongest (least desirable) to weak-
C or C++ for large or time-critical sys- est (most desirable)?
tems. A. content, common, control, stamp, data
B. Runtime type-checking is perfectly B. common, content, control, stamp, data
suitable for time-critical applications.
C. content, data, common, stamp, com-
C. The absence of static type-checking mon
can be a liability in testing and verification
of a large software system. D. data, control, common, stamp, content
D. The design goal of ease of use for a 114. Select two advantages of high level lan-
novice has not been achieved. guages
126. Which of these converts a computer pro- 132. Why was C++ a success?
gram from one language to another? A. Introduced just as interest in object-
A. Compiler oriented techniques was exploding
B. Interpreter B. Straightforward syntax, not tied to any
C. No Translator operating environment
NARAYAN CHANGDER
D. Its flexibility, hybrid nature, and will-
done but not HOW it should be done? ingness to extend its features were pop-
A. Declarative ular
B. Imperative E. All of the above
C. Functional 133. This programming language is one of the
D. OOP three core technologies of the world wide
web.
128. The program can be divided into two
A. Javascript
forms such as and
B. Java
A. Syntax
C. Python
B. Semantics
D. HTML
C. Algorithm
D. Pseudocode 134. Binary represents
A. 1
129. A single sentence that tells the computer
to do something is: B. 0, 1
A. Code C. 2
B. Computer Program D. none of above
A. Scratch C. Ruby
D. Java
B. Java
C. HTML 145. Which type of translator is used to to cre-
ate a machine code version of a HLL pro-
D. Python
gram prior to distribution to the public?
140. What is syntax? A. Compiler
A. Syntax is the word used to describe an B. Interpreter
error C. Converter
B. Syntax is the rules of the programming D. Assembler
language
C. It is used to read information 146. A decision tree uses to calculate likely
outcomes.
D. It is used to output information
A. stakeholder information
141. Translate and execute high level code- B. facts and statistics
Line by Line, Statement by Statement.
C. estimates and probabilities
A. Interpretor
D. shareholder data
B. Translator
147. Low level programming languages are
C. Compiler
[2 answers]
D. Assembler
A. Easy to read, understand and modify
142. Which IDE tool converts all source code B. Difficult to read, understand and mod-
into executable machine code before send- ify
ing it to the CPU? C. Very simple to understand
A. Loader D. More memory efficient than high-level
B. Compiler languages
148. The implementation phase 153. Which statement below is NOT correct?
A. Determines whether or not the pro- A. Decision trees are only useful if the
gram is feasible choices at each decision point are binary
B. Determines which classes are needed B. Both decision trees and tables can
and what they will do have redundancy, if not carefully designed
C. Determines whether or not the pro- C. Both decision trees and tables are
gram works good for modelling complex logic
NARAYAN CHANGDER
D. Implements the program code D. none of above
149. Which type of translator is used to test 154. What is a high-level programming lan-
if a HLL program works and contains no guage that was developed in the mid-
syntax errors? 1970s. It is now used to write applica-
A. Interpreter tions for nearly every available platform.
B. Converter A. Scratch
C. Assembler B. Bark-Bark
D. Compiler C. tynker
150. Why is a translator not required for a D. C++
programme written in machine level lan-
155. What form of documentation/diagram
guage?
is the most appropriate for showing the
A. Because it is a high level language schedule and timelines for activity in a
B. Because it is the computers native lan- project?
guage A. Gantt chart
C. Because it is a third generation lan- B. Storyboard
guage
C. Data flow diagram
D. because it has already been translated
D. System flowchart
151. In software design three levels of design
exist, which are- 156. PASCAL, Qbasic and Pseudocode are ex-
amples of which generation language?
A. External Design
B. Architectural Design A. First
NARAYAN CHANGDER
C. Produce programs that require small
machine code
file sizes
A. Assembler
D. Easier to de-bug
B. Compiler
C. Interpreter 174. The analysis phase
178. The first significant high level language. 183. Which generation of computer languages
Developed by John Backus in the mid 50s used the LOAD, ADD and STORE codes,
NARAYAN CHANGDER
tasks
189. Before a computer can understand a pro- 194. To focus on the logic and make refine-
gram it must be ments to a program before translating it
A. Translated into its machine code. into a programming language, a program-
mer often creates an outline of the pro-
B. Translated into a high level language.
gram’s algorithm. What is the term for
C. Translated into a low level language. this type of outline?
D. none of above A. Pseudocode
B. Sketch
190. An Assembler is a program that
C. Compiler
A. Translates assembly language code to
binary machine code. D. Interpreter
B. Translates binary machine code to as- 195. The 3 main types of translators are
sembly language code. A. Assemblers, Compilers & Interpreters
C. Assembles IKEA furniture. B. Assemblers, Compilers & Converters
D. none of above C. Assemblers, Scripters & Interpreters
D. Converters, Scripters & Interpreters
191. What is Top Down Design?
A. start function at the top, break down 196. An advantage of programming in High
into parts, definitions at the bottom Level is
A. Easier for us to understand
B. Put the steps at the top and put the ex-
planation in layers at the bottom B. Useful for device drivers
C. Write a 10 page story about how to run C. Programs execute faster than other
the code and break it into chapters to help generations
you organize. D. none of above
D. none of above 197. The design phase
192. Which language translator is needed for A. Determines whether or not the pro-
the first generation? gram is feasible
198. Abstraction is: 203. What would you use to convert high-
A. adding to a problem level source code to machine code?
209. An is used to indicate the flow of logic 215. A disadvantage of programming in Low
A. symbols Level is
NARAYAN CHANGDER
A. Hyper Text Markup Language
B. High Tech MachineLanguage 216. For
C. High Tech Modem Language A. Used to create a counting loop
D. Hyper Tech Markup Lexicon
B. To display a response on screen to the
211. Which languages are statically typed? user
A. C C. A loop with a condition set at the start
B. Python D. Requires an entry from the user in re-
C. Javascript sponse to a question
D. Java 217. Examples of Structured data abstraction
E. Ruby include:
213. This is a software program that is de- 218. The widely used abstraction mechanisms
signed to help programmers and develop- in software design are-
ers build software. A. Functional Abstraction
A. Integrated Development Environment B. Data Abstraction
B. Operating System C. Control Abstraction
C. Application System
D. Procedure Abstraction
D. Object-Oriented Programing
219. Which register within the CPU contains
214. Security is closely related to which other
the intermediate value of a calculation?
design concept?
A. Accumulator
A. Generality
B. Orthogonality B. Instruction Register
C. Reliability C. Program Counter
D. Uniformity D. ALU
220. Which of the following is unique to D. Assembly language is not very good
the object-oriented paradigm of program- for hand-optimization
ming?
D. Algorithms A. 4
B. 6
224. Assembly language is an improvement
over binary machine code, but still has C. 8
what shortcomings? D. 10
A. Lacks abstraction of conventional
mathematical notation 229. First step in Requirement Engineering
B. Each type of computer hardware ar- A. Gathering Requirement
chitecture has its own instruction set and
B. Feasibility Study
therefore its own dialect of assembly lan-
guage C. Elicitation
C. Assembly language is high level D. requirement analysis
NARAYAN CHANGDER
ASCII code 236. Which level would create the fastest code
to execute?
231. Who is considered by many to be the “Fa-
ther of the World Wide Web” and the cre- A. Low
ator of HTML? ” B. Assembly
A. Tim Berners-Lee
C. High
B. Tim Cook
D. none of above
C. Tim Sweeney
D. none of above 237. This programming language was devel-
oped in the 1970s to construct Unix
232. State the advantages of procedural pro- utilities. Most operating system pro-
gramming(more than one) gramming, embedded programming, and
A. Can be applied to a wide range of prob- firmware programming is this language.
lems. A. C
B. Relatively easy to write and interpret. B. Fortran
C. Reuse of code through inheritance C. Assembly
D. Flexibility through polymorphism
D. C++
233. Then E. Python
A. To provide a response if a statement is
not met 238. A visual programming language that’s
ideal for learning programming
B. To provide a response if a statement is
met A. Ruby
C. A loop with a condition set at the start B. Java
D. Used in a question as part of the deci- C. Scratch
sion process D. Javascript
234. Why did Stroustrup choose to base C++ E. Python
on C?
A. Flexibility 239. Computers are really good at
D. Identfier table 249. How many bytes are needed for an array
of 1, 000 integers if each integer requires
244. A set of instructions executed directly by 32 bits of storage?
a computer’s central processing unit (CPU).
A. 1, 000 bytes
A. machine language B. 4, 000 bytes
B. instruction set C. 16, 000 bytes
C. programming language D. 32, 000 bytes
D. motherboard
250. Which translator converts from different
E. RAM languages?
245. What was the first programming lan- A. Language Translator
guage? B. Compiler
A. FORTRAN C. Interpreter
B. COBOL D. none of above
251. Focus is on the data, and processes asso- C. A loop with a condition set at the start
ciated with the data, all encapsulated into D. Used in a question as part of the deci-
an object, using abstraction, inheritance, sion process
and polymorphism as the main key ingre-
dients of the class design. 256. The characters of the string are shown in-
A. procedural paradigm side
NARAYAN CHANGDER
C. object-oriented paradigm
D. none of above C. quote marks
D. none of above
252. Languages that prevent a programmer
from compiling or executing any state- 257. Which of the following is not an advan-
ments or expressions that violate the lan- tage of using a low level language?
guage definition are said to be: A. Makes more efficient use of primary
A. Syntactically safe memory.
B. an Extensible language B. Tailor a program to a specific piece of
hardware.
C. Irregular
C. To perform a task very quickly.
D. Semantically safe
D. To enable the program to be run on
253. DRAWBACKS OF USING DECISION TREES multiple platforms.
include:
258. Which is NOT a programming paradigm
A. Probabilities are just estimates-
always prone to error A. Imperative
B. Choices are set out in a logical way B. Declarative
C. Potential options & choices are consid- C. Functional
ered at the same time D. Java
D. Use of probabilities enables the “risk”
259. This language was developed in the
of the options to be addressed
1970s to encourage good programming
254. Which IDE tool allows a programmer to practices using structured programming
enter, format and edit source code. and data structuring.
A. Linker A. Fortran
B. Compiler B. Pascal
C. Interpreter C. C
D. Editor D. C++
E. Python
255. While
A. To provide a response if a statement is 260. people = [”John”, “Rob”, “Bob”]print
not met (people[1]) what would this result be?
A. C# D. Defragmentation
272. Which of the following is the oldest pro- 277. Software that translates and executes a
gramming language still commonly used to- high level language program one line at a
day? time is known as a?
A. C A. Compiler
B. COBOL B. Interpreter
C. Java C. Assembler
D. Binary D. Executor
NARAYAN CHANGDER
278. ALGOL:
273. What is a primitive data types?
A. Included structured control state-
A. A crude form of representing numbers ments for sequencing, loops, and selec-
B. Those not defined in terms of other tion statements.
data types B. Introduced the array structure.
C. The part of languages that is the same C. Supported recursion.
as in older languages
D. Is a low-level programming language.
D. A data type that cannot be used as part E. Uses an Assembler to translate pro-
of an object. gramming language statements into ma-
chine code.
274. The output of the Python command
print(”Ahmed” + “Ali”) is 279. Examples of Unit data abstraction in-
A. AhmedAli clude:
B. Ahmed Ali A. Modules
B. Packages
C. Ali Ahmed
C. Arrays
D. none of above
D. Classes
275. Translates source code into machine code E. Variables
one line at a time.
280. Syntax errors
A. Compiler
A. read the program and begin execution.
B. Interpreter
B. function imperfectly to express compu-
C. Editor tations.
D. Assembler C. occur when the programmer does not
follow the rules of the language
276. For a program in NetBeans to work, it
comprises at least 4 things, which are: D. none of above
A. Project name, Classes, Objects, Code. 281. How many types of computer genera-
tion?
B. Package Name, Attributes, Pseu-
docode. A. 3
C. Compilation, Execution, Creation of B. 5
the .Jar file and Save the project. C. 6
D. JDK, IDE, Clases y Objetos D. 4
292. Which evaluation criteria are Type Check- 297. Which utility program frees up space on
ing and Exception Handling especially the disk by reorganising it?
about? A. Anti-virus
A. Readability
B. Firewall
B. Writeability
C. Defragmentation
C. Reliability
D. System clean up
D. Cost
NARAYAN CHANGDER
298. Select all that applies in Abstraction?
293. a green flag or play button that must be
clicked to run the program A. is a problem solving tool
A. null B. removes unimportant information
B. output C. adds important information
C. go D. simplifies a situation
D. loop E. focuses on what is important
294. In 1985, Stroustrup replaced his prepro- 299. In Python input data is stored as a
cessor with a more sophisticated compiler. A. float
What was this compiler called?
B. string
A. C
C. integer
B. C++
D. none of above
C. Cpre
D. Cfront 300. The two categories of low level language
are
295. Which of the following lists the evolution
of programming languages in the correct A. Machine Code & Assembly
order? B. Machine Code & Algorithms
A. Procedural, non-procedural, object ori- C. Assembly & Algorithms
ented, machine, assembler
D. Algorithms & Binary
B. machine, assembler, procedural, non-
procedural, object oriented 301. HTML is the code used to create
C. machine, procedural, assembler, non- A. games
procedural, object oriented B. UI
D. machine, assembler, object oriented, C. webpages
procedural, non-procedural
D. none of above
296. Which paradigm makes use of meth-
ods and attributes to encapsulate data in 302. Processors only understand instructions
classes. written in 1s and 0s.
A. OOP A. Machine language
B. Imperative B. Assembly language
C. Declarative C. High Level language
D. none of above D. none of above
NARAYAN CHANGDER
D. The nature of data structures used by C. Choices are set out in a logical way
processes within the system. D. Assignment of probabilities and ex-
315. A programming language where the type pected values prone to bias
of variable is known only at run time. 320. Are IDEs open source?
A. Statically Typed A. Yes
B. Dynamically Typed B. No
C. Compiled Language C. Some are open source some are not
D. Interpreted Language D. none of above
316. All programs are finally converted into 321. This programming language extends the
A. Primary code that uses only prime C programming language with a large stan-
numbers dard library and object-oriented mecha-
nisms.
B. Binary code that uses only a and b
A. C++
C. Binary code that uses only ones and ze-
roes B. Objective-C
C. C#
D. Tertiary code that uses ones, twos and
threes D. Java
E. Tertiary code that uses zeroes, ones 322. a language with a specific set of symbols,
and twos rules, and syntax that can only be inter-
preted in one way
317. One advantage of programming in a high
level language is. A. Programming language
A. Eliminates bugs B. Formal language
B. Easier to understand C. Natural language
324. Which of these is NOT an example of a 329. In the past 25 years, what programming
High Level Language? language design criterion was most em-
phasized?
335. What is used to translate assembly code. D. Java converts to binary in real-time,
A. Assembler which is slower
B. Compiler 341. Breaking a complex problem down into
C. Interpreter smaller problems and solving each one in-
D. Router dividually.
A. Decomposition
336. This language, developed in the 1990s,
is primarily used for backend web devel- B. Abstraction
NARAYAN CHANGDER
opment and web applications. C. Programming
A. Ruby
D. Algorithmic Thinking
B. Python
C. C 342. A syntax error is caused by:
D. Javascript A. A large font size in your code
337. This paradigm is difficult to search for er- B. A typing error in your code
rors: C. Using internal commentary in your
A. object-oriented code
B. procedural D. Using indentation in your code
C. scripting
343. Which generation of computer languages
D. aspect-oriented includes the SQL (Database Search)?
338. Python is sensitive which means you A. First
must use the same indentation every time
B. Second
A. space
C. Third
B. color
D. Fourth
C. code
D. word 344. Why is binary code used?
339. Which of these are high-level languages? A. it makes it harder to hack into
(2 answers) B. it makes computers run faster
A. Java C. it was the first code ever invented
B. Assembly
D. because why not
C. Machine code
D. Ada 345. There are three levels of abstractions,
categorized by the amount of information
340. Which is the main reason why Lua runs hidden in the abstraction. What are they?
faster than Java for games?
A. Basic, Structured, Unit
A. Lua does not rely on a Virtual Machine
B. Small, Medium, Large
B. Java code is longer than Lua
C. Basic, Intermediate, Advanced
C. Lua converts to C++, which is very
fast D. Private, Public, Protected
B. A method of problem solving and an ap- C. A loop with a condition set at the start
proach to programming language design. D. Used in a question as part of the deci-
C. Set of programming language sion process
D. none of above
355. Which level would create the easiest code
350. Print for humans to understand?
A. Used to create a counting loop A. Low
B. To display a response on screen to the B. Assembly
user
C. High
C. A loop with a condition set at the start
D. none of above
D. Requires an entry from the user in re-
sponse to a question
356. A high level programming language is
351. The wrapping up of data and functions A. very efficient on the processor
into a single unit is called
B. easy for humans to read
A. overloading
B. class C. interpreted or compiled
C. object D. multiple instructions per statement
D. encapsulation E. assembled
357. A programming language Ideal for pro- 363. What is Assembly language?
grams that need to carry out lots of cal-
A. Another name for Pseudocode
culations
A. C B. A programming language that uses
mnemonic codes
B. MATLAB
C. Ada C. A program that joins pieces of code to-
gether
D. Ruby
NARAYAN CHANGDER
D. Another name for machine code
E. Java
358. What is a variable? 364. Who created C++ at Bell Labs in 1979-
A. A box(memory location) where you 1980?
store values A. Linus Torvalds
B. a type of graphics
B. John von Neumann
C. Data type
C. Bjarne Stroustrup
D. a type of memory
D. Alan Turing
359. Translation software needed at run-time
A. Language Translator 365. Statement “130 num(subs) = 2*subs-1”
B. Compiler is an example of?
C. Interpreter A. array in BASIC
D. none of above B. array in PASCAL
360. A list of instructions that enable a com- C. array in COBOL
puter to perform a specific task is a
D. none of above
A. Computer Program
B. Algorithm 366. What is a translator?
C. Machine Code A. A program that converts commands
D. Binary Code into machine code
361. tells you what the program must do. B. A program that converts High Level
Level Language to assembly code
A. algorithm
B. Program requirement C. A program that converts the inputs
from a keyboard
C. event
D. none of above D. A program for writing code
362. Which of the following command would 367. An IDE checks programming code using a:
not be found in an assembly language?
A. Debugger
A. LOAD
B. Fault finder
B. STORE
C. ADD C. Breakpoint
D. SORT D. Compiler
368. What will the output be from the follow- 374. There are storage classes in C
ing code? print(”3*4+5”) A. 2
381. Which of these is not a reason for break- D. Compiled → Executable Binary → Vir-
tual Machine → Hardware
NARAYAN CHANGDER
ing problems down into modules
A. Reusability 386. Helps identify and fix errors in code
391. A language that is one step higher than 396. Function which is used in stepwise refine-
machine language, easier to work with ment of program is classified
than machine language, but still very te-
NARAYAN CHANGDER
402. Translates low level assembly language A. Debugger
mnemonic into machine code B. Picture Editor
A. Assembler
C. Auto Documentation
B. Compiler
D. Source Code Editor
C. Interpreter
408. Which generation would be easier to pro-
D. none of above
gram for a programmer?
403. Programming language COBOL works A. 1st
best if used for?
B. 2nd
A. beginners
C. 3rd
B. student applications
D. 4th
C. commercial applications
409. Which group of languages is based on ar-
D. household user interface
tificial intelligence.
404. Which of the following techniques is used A. Second-generation
by most programming languages to inter-
B. fifth-generation
cept events that disrupt the normal flow
of a program’s execution? C. first generation
A. Code security D. forth-generation
B. Flow control 410. What part of an experiment contains the
C. Exception handling data tables and graphs?
D. Error detection A. Analysis
B. Conclusion
405. This paradigm tells how to do something
rather than what to do: C. Hypothesis
A. Declarative D. Materials
B. Procedural 411. In the 1970s and 1980s, what program-
C. Scripting ming language design criterion was most
D. Functional emphasized?
A. Efficiency of execution
406. Developed in the 1950s based off of
Grace Hoppers designs, this language was B. Writability
meant for business applications. C. Simplicity and abstraction
A. Fortran D. Logical or mathematical precision
412. Software licensing that allows for modi- 417. a formal language created for people to
fications in all cases is called communicate with computers
NARAYAN CHANGDER
B. Compiler
429. Select two advantages of low level lan-
C. Interpreter guages
D. none of above A. Easier to learn
B. Executes very fast
424. Which of the following is NOT a transla-
tor? C. The code will occupy less memory
D. Programs can be written faster
A. Assembler
B. Compiler 430. Process of giving instruction to a com-
puter to perform specified task is
C. Interpreter
A. Performance
D. Executable B. Programming
425. These languages are Procedural. C. language
A. Pascal D. object program
434. They use key words such as print, If, 439. Who created Python?
while and program, in logic rather than A. Bjarne Stroustrup
dealing with hardware
NARAYAN CHANGDER
Communications
B. Why do we use wi-fi all the time? 6. Which of these protocols are NOT in the
C. Why is a network complicated? application layer?
D. none of above A. IMAP
3. If a computer in a star network fails, the B. HTTP
network will:
C. SMTP
A. Still work UN effected
B. Work with limited capabilities D. TCP
C. Case to function
7. IMAP is used for
D. none of the above
A. accessing websites
4. The protocol that controls the addressing
B. retrieving emails
of packets is called
A. IP (Internet protocol C. moving and editing files
B. TCP (transmission control protocol) D. sending emails
8. The shopping centre connects computers 13. Which of these protocols deals with
and other devices using Ethernet connec- email?
tions. The computers and devices are
18. Which of these isn’t an advantage of 23. Choose all that are true about WiFi
TCP/IP? A. WiFi is a wireless protocol
A. Packets contain information allowing B. WiFi is just a catchy name for the pro-
them to be reassembled correctly tocol IEEE 802.11
B. Packets can avoid congestion individu- C. WiFi needs Ethernet cables to connect
ally you to it
C. More efficient squatting of slav D. WiFi is just another name for Internet
NARAYAN CHANGDER
D. More efficient delivery of memes 24. What does FTP stand for?
19. Which of these is not an advantage of a A. Flat Transfer Procedure
network? B. File Transfer Protocol
A. Shared files and resources C. Flat Transfer Protocol
B. Less vulnerable to hackers D. File Transferring Protocol
C. Data can be shared across a range of 25. Which of these is not a protocol?
users A. TCP/IP
D. User accounts can be created B. DCHP
20. A selects a route and forwards a data C. HTTP
packet from one network to another D. HTTPS
A. Switch 26. device works on network layer of OSI
B. Rooter model
C. Route A. Hub
D. Router B. Switch
C. Router
21. Which Is A Disadvantage Of WiFi? D. Repeater
A. You can use it in a range of ‘hard to
reach’ locations making users more mo- 27. The Encryption method used on Secure In-
bile ternet transition is called?
A. Public Key Encryption
B. It is simple to join a WiFi network
B. Public Code Encrypting
C. It reduces Health & Safety issues by
removing wires C. Public Key Encrypting
29. IP assigned for a client by DHCP server is 34. Choose all the MAC addresses
A. for a limited period A. 00-06:5B-BC-7A-C7
32. The protocol used for normal web requests 38. Choose all that are true
(such as to see a webpage) is called
A. The Internet works with packet switch-
A. HTTP (hyper-text transfer protocol ing
B. FTP (file transfer protocol) B. The Internet works with circuit switch-
ing
C. POP (Post Office protocol)
C. Packet switched networks use band-
D. IP (Internet protocol)
width more efficiently than circuit switch-
ing
33. Bus, ring and star topologies mostly used
in the? D. Packet switched networks rely on
routers
A. LAN
B. MAN 39. Another email protocol that us used to re-
trieve email from mail servers. This is a
C. WAN
more recent protocol. The emails are not
D. Internet deleted from the server after downloading
NARAYAN CHANGDER
40. What are the most common network us-
45. What is packet switching?
age models?
A. When packets that carry the same in-
A. Peer-to-peer and Client-Server
formation is copied
B. LAN and WAN
B. When packets switch change routes as
C. Star and Bus they are need to go to a different destina-
D. none of above tion. As the previous packet has been de-
stroyed
41. Which are true about WiFi frequency
bands and channels? C. When individual data packets follow
different routes to get to a destination
A. Each channel is divided into several
bands D. When packets that aren’t needed get
destroyed and another data packet takes
B. Each band is divided into several chan-
its place
nels
C. Using different channels helps stop in- 46. What word will you remember associated
terference with Protocols?
D. Each channel has a slightly different A. Rule
frequency B. Instruction
42. This is one of two protocols that let a C. Order
network administrator supervise and dis-
D. Choice
tribute IP addresses from a central point.
It automatically sends a new IP address 47. What type of network does the Ethernet
when a computer is plugged into a differ- system work in?
ent place in the network.
A. WAN
A. DHCP
B. CAN
B. TCPMAN
C. LAN
C. TCP
D. BAN
D. UDP
43. Sends Emails 48. A LAN works in a
A. IMAP A. Small area
B. POP B. Large area
C. FTP C. Wide area
D. SMTP D. Long area
49. Which topology most likely uses coaxial 54. Passing data over the physical layer
cabling? A. Application Layer (4)
NARAYAN CHANGDER
C. Topiology
60. Which of these is NOT a factor that would D. Toppology
affect connection speed?
66. A more secure version of HTTP (encrypts
A. Type of ethernet cable
all information)
B. Physical interference (walls, floors
A. TCP
etc.)
B. HTTP
C. Distance from router
C. IP
D. Amount of RAM available
D. HTTPS
61. The protocol for SENDING an email is
67. Which TWO of these protocols are for re-
A. SMTP (Simple Mail Transfer Protocol) ceiving email?
B. POP (Post Office Protocol) A. SMTP (Simple Mail Transfer Protocol)
C. FTP (File Transfer Protocol) B. IMAP (Internet Message Access Pro-
D. HTTP (Hyper Text Transfer Protocol) tocol)
62. Which network layer does the SMTP pro- C. POP (Post Office Protocol)
tocol operate at? D. FTP (File Transfer Protocol)
A. Transport Layer 68. Which protocol is used to receive mail
B. Data Link Layer A. SMTP
C. Application Layer B. POP3
D. Network Layer C. FTP
63. What is data transported using in a LAN? D. HTTP
A. Frames 69. Which of these is not a real IP address?
B. Pixels A. 192.168.2.156
C. Packets B. 192.168.2.1
D. Routes C. 192.168.2.200
64. What is the term used to describe how D. 192.168.2.328
devices are connected and how messages 70. Which layer Provides services to appli-
flow from device to device cations such as web browsers and email
A. Protocol clients?
B. Network A. Application
74. What is a benefit of a wired network over 80. What is the maximum header size of an IP
a wireless network? (7-9) packet?
A. 32 bits
A. Increased costs
B. 64 Bits
B. Technical Knowledge needed
C. 16 Bits
C. Faster Data Transfer Speeds
D. 48 Bits
D. Easier to hack
81. Which best describes 5 GHz Wifi Fre-
75. What is a characteristic of a WAN? quency vs 2.4 Ghz? Answers:3
A. Uses 3rd Party Hardware, cables or A. Less widely used.
satellites. B. Better at travelling through walls.
B. All computers are really close to each C. Worse range
other.
D. Less crowded.
C. Play games in your house on it. E. 14 channels which overlap causing in-
D. none of above terference.
82. What is the function of protocol POP? 87. What network has the server placed in the
centre and the devices around it? (1-4)
A. used to send emails and forward them
between mail servers A. Ring
B. manages emails on a server so multi- B. Bus
ple clients can access the same email ac- C. Star
count together
D. Mesh
C. used to download emails stored on a
NARAYAN CHANGDER
remote server to a mail server 88. What do you mean by broadcasting in Net-
working?
D. used to download emails stored on a
remote server to a local client A. It means addressing a packet to all ma-
chine
83. The topology with highest reliability is B. It means addressing a packet to some
what? machine
A. Bus Topology C. It means addressing a packet to a par-
ticular machine
B. Star Topology
D. It means addressing a packet to ex-
C. Ring Topology cept a particular machine
D. Mesh Topology
89. ‘’ A central backing store is available to
84. “The represents the layout of network all computers” is a feature of which usage
nodes and links.” model?
97. What does HTTPS stand for? 102. OSI stands for
A. Hypertext Transfer Protocol Secure A. open system interconnection
B. Hyper Text Protocol Secure B. operating system interface
C. Hidden Text Transfer Protocol Station C. optical service implementation
D. Hypertext Transfer Protocol Station D. none of the mentioned
NARAYAN CHANGDER
A. TCP/IP (Transmission Control Proto-
104. Which Type Of Network Needs A col/Internet Protocol)
Server?
B. HTTP (Hyper Text Transfer Protocol)
A. Bus
C. HTTPS (Hyper Text Transfer Protocol
B. Ring Secure)
C. Star D. FTP (File Transfer Protocol)
D. Gran’s Sleeping-bag
110. What does HTTPS stand for? (1-4)
105. Which of the following is a characteristic
A. Hypertext Transfer Protocol Secure
of a logical ring topology? (Choose all that
apply.) B. Hyper Text Protocol Secure
A. It’s used by Ethernet. C. Hidden Text Transfer Protocol Station
B. One technology uses an MAU. D. Hypertext Transfer Protocol Station
C. It’s used by FDDI. 111. Choose all that are WiFi encryption meth-
D. Some technologies use a token. ods?
A. WPA2
106. Which email protocol deletes the email
from the mail server once you have down- B. WEP
loaded it? C. WAP
A. SMTP D. WYSIWYG
B. POP3
112. Which network layer does Ethernet oper-
C. TCP ate at?
D. IMAP A. Transport Layer
107. In mesh topology, every device has a ded- B. Data Link Layer
icated topology of what? C. Network Layer
A. Multipoint linking D. Application Layer
B. Point to point linking
113. Which topology requires a multipoint con-
C. None of Above nection?
D. Both a and b A. Mesh
108. Where is a MAC address stored? (5-6) B. Star
A. In the computer C. Bus
B. On the NIC D. Ring
B. Measured in GHz 129. Turning data into websites and other ap-
C. Measured in KHz plications
A. Application Layer (4)
D. The frequency of connection from a de-
vice to a router/hub/switch B. Data Link Layer (1)
C. Transport layer (3)
124. Why have Mesh networks become more
popular? D. Network Layer (2)
A. Wireless Technology 130. In which protocol layer does POP hap-
NARAYAN CHANGDER
B. More wires available pen?
135. The protocol that manages the creation of D. FTP (File Transfer Protocol)
packets is called
140. Which are true about WiFi?
NARAYAN CHANGDER
D. none of above B. It is used for email communication and
146. Where is a MAC address located? sending emails
C. The unit of measurement is the freq C. If one computer fails, the network
D. Radio waves can have a variety of fre- keeps working
NARAYAN CHANGDER
A. Star C. Wider Allowance Networking
B. Ring D. none of above
C. Bus
172. Which of these is not an advantage of a
D. none of above Network? (1-4)
167. Which protocol use handshaking process A. Shared les and resources
to establish connection B. Less vulnerable to hackers
A. TCP/IP C. Data can be shared across a range of
B. HTTP users
C. FTP D. User accounts can be created
D. SMTP 173. The protocol used with financial sites
168. A MAC Address is usually recorded in such as banks or PayPal is called
170. Which is a feature of a Mesh Network? 175. Making connections between networks
(5-6)
A. Application Layer (4)
A. Data can be transmitted from different
B. Data Link Layer (1)
devices simultaneously.
B. Devices are dependent on a central C. Transport layer (3)
sever. D. Network Layer (2)
186. Allows the transfer of files between com- D. It allows data to be communicated
putersUsed when uploading web pages to through a 4 Layer model
a web server; When downloading a file
from a website 191. Switch works on which layer of OSI
A. TCP/IP (Transmission Control Proto- model?
col/Internet Protocol) A. Data Layer
B. HTTP (Hyper Text Transfer Protocol) B. Session Layer
C. HTTPS (Hyper Text Transfer Protocol
NARAYAN CHANGDER
C. Network Layer
Secure)
D. Application Layer
D. FTP (File Transfer Protocol)
187. Which protocol is used to compress voice 192. The DHCP server can provide the of
data into packets the IP addresses.
A. SLIP A. dynamic allocation
B. VoIP B. automatic allocation
C. HTTP C. static allocation
D. POP3 D. all of the above
188. Mbps is known as
193. Disadvantage of a Star Network
A. Megabits per second
A. Complicated to add more devices
B. Megabytes per second
B. Problem with the server-the network
C. Gigabits per second
is badly affected
D. none of above
C. Worse performance than other set ups
189. Which layer Passes data over the
physical network. Responsible for how
D. none of above
bits are sent as electrical signals over ca-
bles or wireless 194. What size are data packets?
A. Application
A. 500-1500 megabytes
B. Transport
B. 150-500 bytes
C. Internet
C. 500-1500 bytes
D. Data Link
D. 1500-2500 nibbles
190. What is the purpose of the HTTP proto-
col? 195. Raj is working as admin and wants to use
A. When transferring large files, it is clients system, which protocol will help
used to organise them and process the him
HTML code on the web page A. TCP/IP
B. It is used for email communication and B. Telnet
sending emails
C. FTP
C. It makes the transfer of a webpage
from the servers to the users’ device D. SMTP
199. Choose all that are true about IP ad- 203. Protocols are set of rules to govern
dresses A. Communication
A. They are used to let routers decide B. Standards
where packets should go
C. Metropolitan communication
B. You can use IP addresses to send post-
D. Bandwidth
cards and letters
C. IP addresses are only put on the FIRST 204. In IPv4, class has the greatest num-
packet in a transmission ber of addresses in each block.
D. Devices add the destination AND their A. A
own IP addresses to requests B. B
200. Which of these is a type of encryption C. C
A. Distributed denial of service D. D
NARAYAN CHANGDER
of network ual devices to share files between each
D. Untrue since the internet is obviously other.
the best invention ever D. Peer-to-peer networks are commonly
E. Untrue because they WANS are bigger used in large organisations
E. It is easier to implement security pro-
3. Compared to wired networks, how do cedures throughout a client-server net-
wireless networks perform? work than a peer-to-peer network.
A. Much better-they are cheaper
8. Networks allow
B. Much quicker-radio waves travel
A. Storage and software to be shared
faster
B. Software to be shared only
C. Slower-radio waves can be interfered
with C. cannot share software
D. Bigger-they have a larger range D. No internet access on a network
12. Which best describes the function of a 16. Advantages of the network?
router?
A. Expensive Hardware
13. Define the term ‘wireless access point’ or A. A LAN connects computers in a small
WAP. geographical area such as an office
A. Devices that decide where data pack- B. A modem is needed to connect a com-
ets go. They are used all over the world. puter to a LAN
B. Built into a pc usually on the mother- C. A LAN consists of only one computer
board. It allows you to plug an ethernet D. none of above
cable into the computer and helps create
a wired network. 18. Peer-to-peer may be better because
C. A device that connects two local area A. It is simple to set up
networks (LANs), or two segments of the
same LAN together. B. It requires specialised equipment
14. Which of these is an example of a LAN? 19. Fibre optic cables are often used for WANs
because .
A. A School
A. they provide very high bandwidth
B. The Internet
B. they need less technical skill to set up
C. A Town than Wi-Fi
D. A City C. they can transmit images, video and
music
15. Which of the following statements about
a network is FALSE? D. none of above
A. Resources such as printers can be
20. A computer network is device(s) con-
shared
nected together.
B. Viruses can spread to other computers
A. One computer
throughout a computer network
B. Two or more
C. Files cannot be shared between users
C. Three or more
D. none of above D. Four or more
21. Is the maximum amount of data that can C. Networks are less secure as can let in
pass through the medium (e.g. wire) per malware
second
D. Only Grey hats can gain access
A. Latency
26. What is Ethernet cable used for?
B. Bit Rate
C. Bandwidth A. Connecting computers wirelessly
NARAYAN CHANGDER
C. Connecting computers in one room
22. Which of the following shows the cor-
rect arrangemment of networks from the D. Connecting computers in LANs
smallest to the largest network?
27. A computer network that help enterprise
A. LAN, WAN, MAN companies with a number of disparate of-
B. LAN, MAN, WAN fices connect those offices to each in se-
cure way over a network. This explana-
C. WAN, LAN, MAN
tion means for
D. WAN, MAN, LAN
A. LAN
23. SERVERS are better than WORKSTATIONS B. WAN
A. True because they are faster. C. EPN
B. True because SERVERS are more ex- D. VPN
pensive
C. Untrue-they have equal value but pro- 28. Which one of these items is true of a client-
vide different functions server network?
D. Untrue since P2P is more cost effec- A. Needs a network manager to run the
tive network
E. Untrue since workstations can be B. No centralised management
more versatile than servers C. All computers have equal status
24. Which of these is a characteristic of a D. No dependency on a server
LAN?
29. Which of these are functions that servers
A. It covers a wide geographical area
can perform?
B. Computers are connected together us-
A. Controls the level of user access to
ing a leased line or a satellite
files and software
C. Users can share files and peripherals
B. Controls installation of software on the
D. Data can only be transmitted at a very client computers
slow rate
C. Controls access to network printers
25. Networks are less secure as they can let and managing print queues
in malware ( worms, Virus) D. Controls client computer access to the
A. Networks are totally secure Internet
B. Networks have a firewall so are secure E. All of the above
30. What do computer networks allow you to 35. Which affects network performance ?
do? (tick all that apply) A. The package you choose with your ISP
33. To log onto a network, what do you usu- D. The route a packet takes when it is be-
ally need? ing transmitted
NARAYAN CHANGDER
C. County one computer
D. State D. Files and peripherals can be shared
41. Which of the following is an advantage of
46. What is the difference between the inter-
a peer to peer network?
net and the world wide web?
A. Files and folders cannot be centrally
A. The internet connects computers
backed up.
around the world
B. Does not need an expensive server
as individual workstations are used to ac- B. The world wide web connects comput-
cess files. ers around the world
C. The server is expensive to purchase C. The internet is only used for websites
43. WAN stands for 48. What are most NICs built into nowadays?
A. Wired Area Network A. The CPU
B. Wise Area Network B. The ROM
C. Wireless Area Network C. The RAM
D. Wide Area Network
D. A PC’s motherboard
44. The (ISP) like Singtel and StarHub sup-
ply the Internet data to users. 49. LAN stands for
50. What is a server in a computer network? 55. Example for LAN except
A. Someone who manages the network A. home network
51. What’s the problem with Ethernet cable? A. LAN (Local Area Network)
A. Ethernet cable is expensive compared B. MAN (Metropolitan Area Network)
to other cable
C. WAN (Wide Area Network)
B. Signal gains strength over longer dis- D. none of above
tances
C. Ethernet cable is slow 57. Benefits of a network
D. Signal loses strength over longer dis- A. Allows you to share Peripherals
tances B. Allows you to share people
C. A Town B. Latency
D. A City C. Literacy
D. Lag
61. What is the purpose of a modem?
A. To connect you to a Local Area Net- 66. Which one of these items is not an advan-
work (LAN) using WiFi and Ethernet con- tage of a client-server network?
nections. A. No central point of failure
B. To connect you to a Wide Area Network B. Central control of security
NARAYAN CHANGDER
(WAN) using a telephone line or satellite C. Easier to supervise network perfor-
link. mance
C. To connect you to a Wide Area Net- D. Easier to perform software upgrades
work (WAN) using Bluetooth.
67. Where are you most likely to find a peer-
D. none of above
to-per network?
62. What does DNS stand for? A. In a large organisation
A. Domain Name System B. In a home
B. Decent Name System C. In a large office
C. Domain Network Server D. Across several offices in a company
D. Decent Network Speeds 68. What is the disadvantage of a LAN
63. What would we have to do if we didn’t A. if all computers running at once, can
have DNS? reduce speed for each.
A. Remember the website address for ev- B. Setting up a network can be an expen-
ery website we wanted to visit sive
B. Nothing, the DNS doesn’t do anything C. Setting up a network needs a compli-
cated experience
C. Ring up a company to ask for direc-
tions to the website D. Maintenance problem
D. Remember the IP address for every 69. Which device is not intelligent as it sends
website we wanted to visit data to all computers on a network which
causes a reduction in network speed?
64. Defining properties of a LAN?
A. Switch
A. Local geographical Area
B. Router
B. Wi-Fi
C. Hub
C. Wide geographical Area
D. Network Interface Card (NIC)
D. Host organisation owns all the tele-
coms equipment 70. Question 4:Which of these statements is
true?
E. Some telecoms equipment is owned by
a 3rd party A. A client-server network has a central
computer that provides services to the
65. describes how much time it takes for a rest of the network
data packet to travel across the network. B. A client-server network is cheap and
A. Larceny easy to set up
80. Which network covers the smallest geo- B. Can be a single point of failure
graphic area? C. Use clients to get services
A. Personal Area Network D. Provide services to clients
B. Wide Area Network E. Are more difficult to backup
C. Local Area Network
86. Disadvantages of networks?
D. none of above
A. Share files
NARAYAN CHANGDER
81. How does a DNS allow you to access a
B. Viruses
website?
C. Share Internet
A. DNS doesn’t help access websites
D. Roaming
B. DNS looks up the IP address for a web-
site 87. What is the ‘client’ part of a network?
C. DNS is a way of speeding up the inter- A. A device such as a switch or a router
net that works for the network.
D. IP looks up the DNS for a website B. A server providing a service to work-
stations on a network.
82. Wireless technology used for short dis-
tance or personal area networks C. A workstation, network node or node.
A. protocol D. The ISP-Internet Service Provider.
B. WiFi 88. What is the purpose of a repeater in a com-
C. Bluetooth puter network?
D. MODEM A. Stores user files, enabling access of
files on any computer on a network.
83. This term describes how much data can be Shares files between network users.
transferred over a connection in a given
time. B. A device that connects two local area
networks (LANs), or two segments of the
A. Transmission media same LAN together.
B. Contention ratio C. Is used to extend transmissions so
C. Bandwidth that the signal can cover longer distances.
D. none of above D. Used to link all computers on a net-
work as cables from each one feed into
84. The average speed of data transmission on a port on the hub.
a WAN is
A. 150 Kbps (approx) 89. A technology that creates a safe and en-
crypted connection over less secure net-
B. 150 Mbps (approx) work, such as the internet. This explana-
C. 150 Gbps (approx) tion means for
D. none of above A. LAN
90. Which BEST describes the function of a C. Twin and earth cable
switch?
D. Fibre optic cable
NARAYAN CHANGDER
6. Temporary memory on your computer that
is sometimes used to store local copies of A. Cyber Security
files opened when you browse the Inter-
net. B. Cyber Ethics
A. backup C. Cyber Safety
B. firewall D. Cyber Space
C. cache memory
12. What should people do if they are cyber-
D. encryption
bullied?
7. Which of the following is the most likely A. Delete any messages received from
source of a virus the cyberbully.
A. A memory stick B. Respond to the cyberbully right away.
B. A government website
C. Talk to a trusted adult about what hap-
C. Computer games pened.
D. Someone sneezing on your keyboard D. All of the choices are correct.
8. Which of the following would be consid-
ered a strong password? 13. The Act which specifies the rules about col-
lecting and holding personal data is called:
A. 123abc456def
A. the Criminal Misuse Act
B. p3MberLY%Av
B. the Data Protection Act
C. p@sswOrd1
D. w3st! C. the Personal Data Act
D. the Health and Safety Act
9. Hacking is illegal under:
A. The Data Protection Act 14. A computer security expert, who special-
B. The Computer Misuse Act izes in penetration testing and in other
testing methodologies to ensure the secu-
C. Copyright Law
rity of an organization’s information sys-
D. Health and Safety Law tems.
10. What kind of cybersecurity risks can be A. Ethical hacker
minimized by using a Virtual Private Net- B. Programer
work (VPN)?
C. Social Engineer
A. De-anonymization by network opera-
tors D. none of above
15. Proactive monitoring of unwanted intrud- 19. Someone who carries out an attack with
ers e.g. firewall. intent regardless of any political views.
C. Pass wor d 34(89) 28. What type of malware locks up your com-
puter until you pay a fee?
D. Bunnies
A. Ransomware
24. Select all correct answers:Which of the B. Phishing
following is true about the Internet of
Things? C. Spyware
D. A worm
A. The Internet of Things is the network
of devices with the ability to connect and
NARAYAN CHANGDER
29. When did T-Mobile began resetting the
exchange data. PINs for Prepaid customers as safety mea-
B. The Internet of Things increases our sures and account security?
vulnerability to cyber attacks. A. August 13, 2021
C. The Internet of Things is purely B. August 14, 2021
positive-there are no negative conse- C. August 18, 2021
quences to increased connectivity
D. August 17, 2021
D. None of these is correct.
30. Which of the following actions compromise
25. Security needs of a networked system, ei- cyber security?
ther specified by the client or implied by A. Vulnerability
the scenario.
B. Threat
A. Security requirements
C. Attack
B. Service provider agreement D. Exploit
C. Risk assessment
31. The collection of tools, policies, security
D. Cyber security plan concepts, etc. to protect the cyber envi-
ronment.
26. Correctly paraphrasing is
A. information security
A. Using the author’s exact words but in-
B. data security
cluding a citation.
C. cybersecurity
B. Rewriting the author’s words in your
own words and including a citation. D. cyber hygiene
C. Rewriting the author’s words in your 32. What is the most important thing to ask
own words but not including a citation. yourself before posting on social media?
D. None of the answers are correct. A. Will this make me more popular?
B. Will my friends think this is funny?
27. “Malware” is:
C. Am I ok with everybody I know seeing
A. a type of virus this?
B. unwanted software installed without D. Did I check my spelling
consent that might monitor key presses
33. Identifies network weaknesses to see
C. security software to detect viruses what is possible .
D. a software bug A. Penetration testing
NARAYAN CHANGDER
C. . Once a cyber criminals gains access 48. The National Institute of Standards and
to your system, he can do pretty much Technology (NIST) recommends that pass-
whatever he wants. words:
D. Take a few minutes to tweak your se- A. Contain a mixture of upper and lower
curity settings, case letters
B. Contain a minimum of eight characters
44. A connection between two or more com-
puters or devices thatare not on the same C. Contain a mixture of letters and num-
private network. bers
A. demilitarized zone (DMZ) D. All of these
B. virtual private network (VPN) E. None of these
52. Which of the following refers to the type D. Attempting to penetrate a network to
of websites that provides a virtual com- locate vulnerabilities.
munity for people with similar interests to
NARAYAN CHANGDER
C. A web browser with advanced capabil-
B. white hat hackers
ity
C. grey hat hackers
D. Next generation antivirus
D. none of above
68. Which of the following explains why open
63. A computer virus can standards make encryption more secure
A. Corrupt your files A. They allow everyone to develop their
B. Damage your hardware own standards and practices for encryp-
tion
C. Give you the flu
D. Delete the computers memory B. They are developed and reviewed by
committees of experts and adopted by all
64. Personal data stored on SIM cards, USB Internet users
sticks, SD cards are exempt from the Data C. They make it easy for people to create
Protection Act principles as it is on remov- and implement new encryption methods
able media.
D. They do not make encryption more se-
A. True cure; open standards make it easier for
B. False third parties to intercept and decode mes-
C. Only sometimes true sages
71. also referred to as information tech- 76. Unauthorized copying of copyrighted soft-
nology security, focuses on protecting com- ware without obtaining the license or per-
puters, networks, programs and data from mission of its copyright owner.
NARAYAN CHANGDER
82. what is the name of an application that ap- B. Forever
pears to look like a helpful application but C. 30 years
instead does harm to your computer?
D. 5 years
A. virus
B. worm 88. Aside from the many benefits of new dig-
C. malware ital technology, which of the following is
considered an issue?
D. Trojan horse
A. Safety and Health Issues
83. What type of server would you install that
B. High internet subscription price
would be used to trap a hacker?
A. honeypot C. Increase of technology users
B. NAT D. New credit card system
C. IPS
89. Which of the following deals with network
D. IDS intrusion detection and real-time traffic
analysis?
84. firewalls are a combination of other
three types of firewalls. A. Snort
A. Packet Filtering B. LoptCrack
B. Circuit Level Gateway C. John The Ripper
C. Application-level Gateway
D. Nessus
D. Stateful Multilayer Inspection
90. what are the 4 types of cyber security in-
85. What is the most common type of biomet-
cidents
rics password used on devices?
A. Lie detectors that measure pulse rate A. authorized access, inspection, modifi-
cation, disclosure
B. Fingerprint scanners and readers
B. adware, spyware, virus, Trojan
C. Iris and retinal scanners
C. unauthorized access, inspection, mod-
D. Voice and face recognition scanners
ification, disclosure
86. Which of the following can be used to pro- D. not following protocols, physical se-
tect a network? curity breaches, firewall breaches, pres-
A. Firewall ident trump
NARAYAN CHANGDER
puter on fire worthy entity in an electronic communica-
tion.
101. are malicious instructions that appear A. Converting
as legitimate programmes, mostly arriving
via email or infected websites. B. Hacking
A. Ransomware C. Phishing
B. virus B. Malware
C. Trojan horse C. Software
D. online predator D. Firmware
119. A computer program that is installed on 124. Which of the following statements best
your computer without your knowledge. describes Cyber Interaction?
Spyware can secretly send out informa- A. an online communication between one
tion about your Web browsing habits or person to another via digital technology
other personal details to another computer such as email, forum or blog
through the network.
B. an act of working together and sharing
A. phishing ideas and info using online technology
B. slander C. a privilege to use technology
NARAYAN CHANGDER
C. spyware D. None of the above
D. software piracy 125. A device that can detect malicious net-
workactivities (e.g., port scans and DoS
120. A faulty can cause data to become attacks) by constantly monitoring network
corrupt? traffic.
A. Scanner A. virtual private network (VPN)
B. Hard disk B. World Wide Web (WWW)
C. Copier C. network intrusion detection system
(NIDS)
D. Printer
D. Point-to-Point
121. What are types of malware
126. A name used to gain access to a computer
A. Worm system.
B. Dangerware A. User Name
C. Trojan Horse B. Password
C. Your Name
D. Scaryware
D. Identification Name
122. Why do you need security on a com-
puter? 127. Cecilia has been told that anything she
posts online is traceable. Her teacher ex-
A. So no personal data can’t be stolen plains that the information about herself
and hacked also private information that she posts for anyone to obtain could
B. To share everything with everyone be damaging to her:
137. This attack is designed to hinder the nor- 142. A document that defines how an organi-
mal operation of a website or other net- sation will respond to an IT security inci-
work resources. dent.
A. DDoS Attack A. Security incident management policy
B. Phishing B. Security requirements
C. PoS Attack C. Service provider agreement
D. Ransomware D. Cloud computing
NARAYAN CHANGDER
143. What is the host operating system?
138. Which of the following is not effective in
preventing malware infections? A. An external system to handle the pro-
cesses and hardware, such as memory,
A. Opening email attachments disk, and CPU, from other containers.
B. Turning on Windows Automatic Up- B. The operating system that is located
dates on the physical machine.
C. Installing anti-virus software C. Operating system that is included in-
D. Setting Internet Explorer’s security ternally on the machine.
setting to medium-high D. Virtualization platform developed by
Microsoft for its servers and desktops.
139. Which one of the following systems can-
not be considered as an example of the op- 144. What program reproduces itself?
erating systems? A. worm
A. Windows 8 B. malware
B. Red Hat Linux C. virus
C. BSD Linux D. none of the above
D. Microsoft Office 145. What should be accountable when chang-
ing your password?
140. Which of these is the best way to mon-
itor your online presence and how other A. Make it simple
people see your information? B. Put a random password
A. Ask everyone you know to tell you what C. Something that’s hard to guess and not
they see. hard to remember.
B. Make sure you have all your informa- D. Put your name as a password.
tion visible.
146. Joyce has confided in Mark, explaining
C. Google yourself. that Tim posted hurtful messages online
D. Use a password manager. that make fun of her weight. Joyce
feels depressed and embarrassed to at-
141. What port does Telnet use? tend their club. What should Mark do?
A. 80 A. Mark should confront Tim and demand
that he delete the messages.
B. 20
B. Mark should tell Joyce to get even
C. 23 by spreading rumors about Tim around
D. 22 school.
155. Which type of malware can self- 160. When using public networks this soft-
replicate? ware tool can be helpful in protecting data.
A. Trojan A. VPN
B. Worm
B. Hashing
C. Spyware
C. NAS
D. Virus
D. Backups
NARAYAN CHANGDER
156. Encrypting data storage is an example
of? 161. Which of the following is the most accu-
A. Malware rate definition of a Trojan?
B. Effective password management A. A stand-alone program that replicates,
C. Device Hardening doing damage to a system
D. none of above B. Malicious code that spreads from de-
vice to device but does not need to attach
157. Which of the following is NOT recom-
itself to a program in order to do so
mended when creating a strong pass-
word? C. A program that pretends to be safe,
A. longer than six characters while actually containing malicious code
B. generator to create more random D. software that installs itself onto de-
passwords vices and then steals personal informa-
tion about the user, like passwords,
C. same password for multiple accounts
D. numbers, symbols, and special charac- 162. What is the standard or basic collection
ters of NTFS permissions?
158. Used to identify flaws in mechanisms A. Read and execute, read, write, full con-
that are meant to protect data and func- trol, modify, list folder contents
tionality.
B. Change permissions, read permis-
A. Security functionality
sions, write permissions
B. Intrusion detection system (IDS)
C. Read attributes, list folder/read data,
C. Honey pot traverse folder/execute file
D. Signature based
D. Create files/write data, create fold-
159. Who has little or no skill, often using ex- ers/append data, take ownership
isting tools or instructions found on the In-
ternet to launch attacks. Some of them 163. These are two methods used to keep data
are just curious, while others are trying to confidential.(Pick 2)
demonstrate their skills and cause harm?
A. Accounting
A. State Sponsored Hackers
B. Authorization
B. Script Kiddies
C. Terrorists C. Authentication
D. Hacktivists D. Encryption
164. You can protect your files from unautho- C. Morse code
rised access by D. Encryption
NARAYAN CHANGDER
other person 179. What is Spam?
A. Encryption A. Canned meat.
B. AUP B. Unsolicited emails sent to many email
addresses that try to get you buy some-
C. Morse code
thing or share private information.
D. Cyberbullying
C. A computer virus that will hack your ac-
174. How does Mia manage the web server? count.
A. Phone App D. none of above
B. Laptop App 180. software/license theft, shoulder surfing,
C. Another PC and dumpster diving are all examples of
D. none of above ?
A. Malware
175. What do hackers do?
B. Security best practices
A. THEY PLAY MINECRAFT
C. Physical security threats
B. They steal cars
C. They steal computer software D. Device hardening
D. Security through something you see D. The ability to quickly deploy resources
when needed.
177. A plan that describes threats, protection
measures (actions), reasons for the mea- 182. Which of these is an indicator that the
sures, constraints, legal responsibilities, website is secure.
usability, cost/benefit and a test plan. A. Bruce Lee photo
A. Cyber security plan B. The http://
B. Anti-malware software C. The https://
C. Risk assessment D. The https:
D. Security requirements
183. Which vocabulary word fits this defini- B. So no one can guess your password in
tion? A method to hide a message by re- order for your account to not get hacked
placing each letter with a sequence of let-
194. What is not an example of security best C. Phishing and Password attacks
practices? D. All of the above
A. disabling guest accounts
199. Unsolicited electronic messages, espe-
B. being alert for suspicious emails, at- cially advertising is know as?
tachments, and hyperlinks
A. Spim
C. Not responding to security software
B. Spam
alerts
NARAYAN CHANGDER
C. Ransomware
D. none of above
D. none of above
195. What is a type 1 hypervisor?
200. One of the most popular online activities-
A. One that does not interface with the and one that poses the greatest risk to
host operating system. your privacy-is:
B. One that runs on the host operating A. online gaming
system.
B. watching movies
C. Virtualization platform developed by
Microsoft for its servers and desktops. C. social networking
204. Which one is a safe email 209. Under the Computer Misuse Act, it is ille-
A. [email protected] gal to:
213. The security of computers and users infor- A. A lot of social media links are attached
mation to the website.
B. The author of the website is consid-
NARAYAN CHANGDER
A. Cybersecurity
ered an expert on the content.
B. Computer virus
C. The website was the first link to ap-
C. Phishing pear in a search engine’s list of related
D. Spam websites.
A. were designed to lie dormant until a 219. What is your best defense against virus
specific logical condition is met infection?
B. tracks users’ keystrokes, obtains pass- A. Don’t download files from the Internet
words, and other personal information B. Don’t open e-mail attachments you’re
C. is an entry point into a program with- not expecting
out it knowing C. Don’t surf the Internet
D. go KABOOM D. Don’t use disks to transfer data
215. Security measures are adopted to in- 220. Strategic and tactical capability of the or-
crease the level of protection against what ganization to plan for and respond to inci-
kind of threats? dents and business disruptions in order to
A. Internal continue business operations at an accept-
B. External able predefined level
B. Co-workers C. Spam
C. Friends D. Denial of Service (DoS)
C. All the time, on ALL digital devices-and A. use something easy to remember like
make sure it is updated! your pet’s name
D. As soon as you start to feel sick. B. use a combination of letters and num-
bers that mean something to you but no
226. Which of the following refers to stealing one else
one’s idea or invention of others and use
C. save all your passwords in a file on
it for their own benefits?
your computer in case you forget one
A. Piracy
D. use a foreign word that will not be in
B. Plagiarism an English dictionary
C. Intellectual property rights
231. Which law makes it illegal to share com-
D. All of the above
puter viruses
227. What’s the name given to the use of elec- A. The Virus Act
tronic messaging systems to send an unso-
licited message, usually repeatedly? B. The Internet Act
A. Ransomware C. The Computer Misuse Act
B. CyberBullying D. The Data Protection Act
232. A malware program that, when executed, A. It is attached to a program and runs
replicates by inserting copies of itself (pos- each time the program is opened.
sibly modified) into other computer pro- B. It is disguised as an accounting pro-
grams, data files, or firmware is known gram and runs when the program is
as? opened.
A. Malware C. It is sent as an email that asks recipi-
B. Virus ents for their credit card numbers.
D. It is a piece of software that looks for
NARAYAN CHANGDER
C. Spoofing
security holes in a network and uses those
D. none of above holes to infect other computers.
233. What is the biggest DDOS attack? 237. What’s wrong with this code? function
A. Best Buy start() { move(); go(); go();}function go()
{ move(); move();}function go() { move();
B. MySpace move();}
C. GitHub A. The go function is called twice
D. Mr.You B. The go function has a syntax error
234. What is the definition of RTO? C. The go function has been defined twice
A. Recovery Time Objective is the time it D. go is not a command that Karel under-
takes to restore a business process after stands
a failure 238. The other day you were watching the
B. Recovery Time Objective is the amount news and you heard a journalist talking
of time that has transpired since a previ- about a of cyber-threat. Essentially crimi-
ous failure nals seem to be able to use malicious soft-
ware to restrict users from accessing their
C. Recovery Time Occurrences are the
computer system or personal files. Later
number of systems failures within a given
criminals demand a payment in order for
reporting period
the restriction to be removed. What is the
D. Recovery Time Operations are the name of this threat?
times associated with each recovery op- A. Ransomware
eration needed to recover from a failure
B. Virus
235. How do you prevent cyber attacks? C. Botnet
A. Don’t use the computer D. Trojan
B. Use a secure password that only you 239. Chris is planning on using a copyrighted
would know song for a school project. He wants to
C. Use a software that protects your com- make sure he is following the rules of fair
puter use. Which of the following is an appropri-
ate use of the song following the rules of
D. none of above
fair use?
236. Computer viruses come in many forms. A. Chris must sell his project online and
Which of the following descriptions is most send a portion of the profits to the copy-
UNlikely to be describing a virus? right owner.
249. Which of the following is/are (an) appro- A. will destroy your computer hardware
priate communication(s) when online? B. you may unintentionally transmit to
A. Never say anything nice online other computers and infect them
B. Always use the right language C. can only be transmitted via email
C. Always encourage a fight
NARAYAN CHANGDER
D. cannot be removed from your com-
D. Always use the right language and puter
never say anything nice online
250. Which vocabulary word fits this defini- 255. Why should you update your anti-virus
tion? Technology, processes, and practices software regularly?
that are used in order to protect against
A. To make sure no one is tracking you on-
unauthorized or criminal use of or attack
line.
on electronic data
A. Intellectual property B. To help out the software companies
B. Cypersecurity C. To gain access to new websites
C. E-commerce
D. To protect your computer against new
D. Encryption viruses and malware
251. What type of malware can record the
keys you press? 256. Tricking people into revealing private in-
formation, by using emails or fake web-
A. Adware
sites.
B. Spyware
A. Tracking
C. Ransomware
D. Catphishing B. Phishing
258. A cyber attack in which the data on a vic- 263. When you use the word it means you
tim’s computer is locked, typically by en- are protecting your data from getting dis-
cryption, and payment is demanded before closed.
NARAYAN CHANGDER
C. Security B. Host intrusion detection system
D. Longevity (HIDS)
C. Anomaly based
269. How do you create a secure password?
D. Security functionality
A. A combination of capital letter, number
and special characters 274. Three methods used to identify people for
the purpose of authentication.(Pick 3)
B. Using a phrase like “iloveManU” with
some numbers added A. Something you are
C. Including numbers instead of charac- B. Something you know
ters e.g. K3llySm1th C. Something you have
D. Use the default password issued to D. Something you like
you, as others would presume you have E. Something you ate
updated it
275. This is the process of keeping track of
270. Program to keep track of your internet what all the users do within your systems.
activities without your knowledge.
A. Accounting
A. Phishing
B. Authorization
B. Digital Footprint
C. Authentication
C. Spyware
D. Availability
D. Firewall
276. Malicious code that secretly watches
271. Black, white, and gray all refer to the your computer activity
type of a hacker can be identified by. A. Spyware
A. Socks B. Trojan Horse
B. Hat C. Worms
C. Underwear D. Phishing
D. Attack
277. Software used to protect a computer sys-
272. A computer program that propagates it- tem from viruses.
self across computers, usually by creating A. Anti-virus software
copies of itself in each computer’s memory. B. Spyware software
A worm might duplicate itself in one com-
puter so often that it causes the computer C. Google hardware
to crash. D. Anti-virus hardware
D. To get rid of all the viruses your device 285. In cybersecurity, what does CIA stand
may have currently installed for?
A. Confidentiality, Integrity, Availability
280. In the acronym WIPS what does the W
stand for? B. Central Intelligence Agency
A. Wireless C. Cybersecurity Investigation Agency
B. Wired D. Cybersecurity, Internet, Accessibility
C. WiFi 286. To protect the computer system against
D. Wire Free the hacker and different kind of viruses,
one must always keep on in the com-
281. Which term describes bad people who puter system.
watch and read your personal informa- A. Antivirus
tion online for the purpose of harassing or
B. Firewall
harming you?
C. Vlc player
A. Online teachers
D. Script
B. Digital footprints
C. Online predators 287. Which of the following data is considered
to be “personal data” when held by a
D. Social networkers school:
282. Which vocabulary word fits this defini- A. the school’s email address
tion? Using the internet to buy, sell, or B. the number of pupils in the school
trade foods and services as well as trans-
C. the year that a particular pupil joined
ferring money
the school
A. Public key cryptology D. the average percentage a*-c grades
B. Pigpen cipher at gcse gained by pupils last year
NARAYAN CHANGDER
289. Software that collects information about A. metallic wires within cable
the users in order to advertise.
B. glass or plastic fibers
A. Batman’s Batcomputer
C. wireless transmission
B. Spyware
D. none of above
C. Google Docs
D. GTA 4 295. what is RAM?
A. random acces memory
290. For $500:Which of the following is not a
tip to avoid falling for scams? B. random analogue memory
A. Thinking before you click. C. random ankle mass
B. Doing a web search for a company’s D. random any memory
name before you give them any informa-
296. Laws that protect an author’s work.
tion about yourself.
A. CopyLeft Legal Spies
C. Read the fine print.
D. All of these. B. Copyright Rules
C. Copyleft Laws
291. How can we teach Karel new com-
mands? D. Copyright Laws
NARAYAN CHANGDER
309. Which of these is not a form of phishing B. Adware
A. fake email C. Spyware
B. fake website link D. Worm
C. spam 315. A secret series of numbers or letters that
D. key logger authorizes you to use a computer system
320. What is an SQL Injection? 324. What is the biggest vulnerability to com-
puter information security?
A. Insert code into a data-driven applica-
A. Instant messaging
tion for malicious reasons (like dumping
all data to an attacker) B. Spam and phishing attacks
B. An injection given to hackers when C. Malware-virus, worms, spyware
they are caught so they can no longer use
D. End users
computers
C. Addings SQL statements to an existing 325. What is the term for computer programs
system to allow it to run more efficiently that attack your computer?
and securely A. Malware
D. Adding SQL code to a program that usu- B. DangerDroids
ally wouldn’t use SQL (such as a computer
game) to steal user details C. RudeBots
D. Dangerware
321. A person who uses computer expertise
to gain unauthorized access to a computer, 326. What technology can you use to isolate
and then misuses or tampers the programs a network of servers so that they cannot
and data stored on the computer. interact with other servers?
A. hacker A. bridge
B. encrypt B. switch
C. firewall C. router
D. programmer D. VLAN
327. Which type of malware is focused on find- 332. A document that identifies the security
ing personal information? risks to a system and determines the like-
A. Virus lihood of each risk occurring and the sever-
ity of the loss that may occur as a result
B. Worm of an incident.
C. Trojan A. Risk assessment
D. Spyware B. Security incident management policy
C. Service provider agreement
NARAYAN CHANGDER
328. How many bits is the effective length of
the key used in the Message Digest five D. Cyber security plan
(MD5) algorithm?
333. Which of the following are secure ways
A. 168 to store passwords?
B. 128 A. Encrypted Word document or Excel
spreadsheet
C. 56
B. Notebook hidden in drawer
D. 64
C. Secure password manager app
329. Who’s the contact person in your D. All of these
Team/Cluster that you need to share the
Chat ID if you received chat regarding Cy- 334. Data is translated into a code which can
bersecurity Incident? only be understood by a key
A. Teammate A. Anti Malware
B. CRE B. Network Forensics
C. OM C. Encryption
D. User Access Levels
D. Office crush
335. RSI (Repetitive Strain Injury) can be
330. Software updates are important because caused by:
A. They fix vulnerabilities and bugs A. moving heavy computers about fre-
B. They stop the computer accessing the quently
internet B. using a computer in almost all of your
C. They identify any virus that are on the lessons
computer C. using a keyboard for several hours a
D. They allow the software company to day over and over again
check your computer for malicious code D. sitting in the same position for too long
331. Which are common types of malware? 336. How can a large company protect cus-
tomer’s personal details?
A. Adware
A. Keep their data separate from a hard
B. Ransomware drive
C. Key Logger B. Encryption
D. Mouse Hacker C. Keep the data on a floppy disk
E. Windows Breaker D. none of above
337. For $100:Is it safe to use your real per- 342. Which type of system detects unautho-
sonal information for an online character? rized intruders and then takes action to
stop them from proceeding?
347. How long can your “digital footprint” 352. A is a malware that will self replicate
last online? and spread without the end-user action.
A. Forever A. virus
B. Minutes B. worm
C. Months C. trojan
D. Hours D. adware
NARAYAN CHANGDER
348. The art of writing or solving codes. 353. What’s the name given to the attempt to
obtain sensitive information such as user-
A. Programming names and passwords, by disguising as a
B. Cyberslacking trustworthy entity in an electronic commu-
nication (e.g. creating a fake website)?
C. Caligraphy
A. Trojan
D. Cryptography
B. Virus
349. Cybersecurity also be referred to as? C. Ransomware
A. incident security D. Phishing
B. information technology security
354. Uses the hacking techniques of others to
C. internet security carry out hacking but does not know how
D. threat security Cybersecurity also be to create scripts by themselves.
referred to as? incident security infor- A. Hacktivist
mation technology securi internet security B. Script Kiddie
threat security
C. Scammer
350. A program that is loaded on your com- D. Phisher
puter without your knowledge.
355. Why is important that you should not in-
A. Virus
clude any of your personal information on
B. Worm any social media site/app?
C. Chocolate Chip Cookie A. So no one can use your information to
D. Both A and C expose you to any one else but you.
357. Which vocabulary word fits this defini- 363. Which of the following best defines cy-
tion? Information about someone result- berbullying?
ing from their use of the Internet
NARAYAN CHANGDER
change your password
C. Make sure to log out of all accounts D. All of these
D. Show passwords and personal infor-
mation to everyone around 374. What is defense in depth?
A. All of the locations and methods that
369. Programs that secretly record what you could constitute a security risk.
do on your computer. E.g. what you type
B. Breaks down the aspects of a busi-
A. pharming ness and security domains into manage-
B. computer Virus able tasks areas and tasks.
C. malware C. Multiple layers of protection.
D. spyware D. A system that includes the services
and software that is used to provide ac-
370. AUP is? ? ? cess to data and other resources.
A. A nollywood film
375. How often should you update anti virus
B. An acceptable use policy software
C. An unacceptable legal policy A. Once a year
D. none of above B. Twice a day
371. When is it okay to share personal infor- C. Once a week
mation, like your full name and address, D. Once a month
online?
376. GDMS Cyber Security Policies can be
A. Only when buying something
found:
B. Only when you are setting up your so-
A. On the IT Cyber Security CrossPoint
cial networking profile
Site
C. Only when you are on a site you trust B. Nowhere, they do not exist
D. Only when a friend you met online is C. On HUB
asking for it
D. In your New Hire Passport
372. What should you use top prevent viruses
to attack your computer? 377. Which of the following best describes a
social network?
A. An antivirus
A. A place where books are stored, such
B. Nothing as the library
C. Not use the computer B. Membership in a face-to-face book
D. Use a malware club
388. To provide integrity of data, hashing is D. Fix the indentation of this program
often used. Which of the following is a
commonly used 128-bit hash digest? 392. Which one is the best option for secu-
rity?
A. SHA-1
B. MD-5 A. DNS
C. CRAMMD5 B. Antivirus
D. SHA-256 C. Antimalware
NARAYAN CHANGDER
389. Alice is checking her grades on a school D. End-Point Security
computer in the library, and she forgets to
393. According to the CIA Triad, which of the
log out before she leaves. Bob gets on the
below-mentioned element is not consid-
computer after her, and he sees her grades
ered in the triad?
for all of her classes.Which part of the CIA
triad was broken? A. Confidentiality
A. Confidentiality B. Integrity
B. Integrity C. Authenticity
C. Availability D. Availability
D. All of the above
394. You can tell whether a link in email will
390. What is the difference between a white take you to a genuine website, for exam-
hat hacker and a black hat hacker? ple belonging to a bank, without risk, by:
A. Their hats are different colors. A. pointing to the link or hovering over it
B. There’s no difference between a white without clicking
hat hacker and a black hat hacker. B. deleting the email
C. A white hacker hacks for a company C. replying to the email
to see their vulnerabilities, meanwhile a
black hat hacker hacks for malicious rea- D. clicking on the link
sons.
395. A legal statement of the terms of how
D. A white hat hacker hacks for a com- software can be used.
pany to see their vulnerabilities, mean-
while a black hat hacker hacks by violating A. Internet Agreement
laws, but has no malicious intentions. B. Driver”s License
391. How can we improve the following pro- C. Lease Agreement
gram? function start() { move(); move(); D. License Agreement
move(); move(); move(); move(); move();
move(); move();} 396. Select all correct answers:Which of the
A. Break down this program into more following statements are true?
functions A. There has been a decrease in the num-
B. Use a for loop to repeat the move com- ber of cyber attacks in the past decade.
mand B. Cybersecurity is the protection of com-
C. Use a while loop to repeat the move puter systems, networks, and data from
command digital attacks.
401. What is Cyber Security? 406. Tricking people into giving up their pass-
A. Protecting your device from hardware words and information.
or software damage and theft. A. Phishing
NARAYAN CHANGDER
B. second generation firewalls downloading the music.
C. third generation firewalls
D. fourth generation firewalls 412. What can you trust to be secure 100%
of the time?
408. When visiting a website, you notice a
A. Text messages
lock icon before the url in the address bar.
What does the lock represent? B. Emails
A. A link to open another site C. Browser history
B. A webpage that has a secure connec- D. Apps
tion
E. None of the above
C. A program that prevents you from leav-
ing the page 413. For $1, 000:Chain emails are
D. A warning that you are not allowed to
A. A way to ensure you have good luck
view this webpage
B. A way to stay in touch with your friends
409. Special program which can detect and re-
move viruses from computer is called C. A way for you to help cybercriminals to
spread scams and tricks
A. Virus
D. None of these
B. Anti virus
C. Group ware 414. What is 1010 0000 in decimal?
D. Custom A. 160
410. Which of the following four passwords is B. 192
the most secure?
C. 144
A. Boat123
D. 200
B. WTh!5Z
E. 92
C. into*48
D. 123456 415. HTTPS can be based on which types of
E. P@ssword Encryption Protocol?
A. Secure Sockets Layer (SSL)
411. Aurora is downloading some music off a
public domain Web site, and then posting B. Transport Layer Security (TLS)
the music on her own site. Which of the
C. Network Address Translation (NAT)
following should Aurora do when posting
the content? D. System Transport Security (STS)
416. A filter that blocks unreliable and unau- 420. Why are computer viruses dangerous?
thorized information from the Internet be-
A. They can run programs that may harm
fore it reaches your computer or a private
424. If testers have little to no information re- B. If the holder of the private key forgot
garding the system they are trying to hack or destroyed the private key
they are: C. If a third party accessed the private
A. White box testing key
B. Yellow box testing D. If the public key was made known
C. Black box testing 429. The primary purpose of Network Access
D. Blue box testing Protection (NAP) is to prevent:
NARAYAN CHANGDER
A. Loss of data from client computers on
425. If your best friend is being cyberbullied,
a network.
what should you do?
B. Non-compliant systems from connect-
A. Gossip about the bully at school or
ing to a network.
work.
C. Users on a network from installing
B. Tell your friend to ignore the situation.
software.
C. Tell someone in authority.
D. Unauthorized users from accessing a
D. Stand up for your friend and bully network.
those who are responsible.
430. What’s the name given to the cyber-
426. How does a zero-day vulnerability differ attack where the perpetrator seeks to
from malware? make a machine unavailable to its intended
A. they are the same type of threat users by temporarily disrupting its ser-
vices, typically accomplished by flooding
B. it is a flaw in software when it was re- the targeted machine in an attempt to
leased, not an infection overload it?
C. it can be passed from one computer to A. Spam
another, where malware cannot
B. Cyberbullying
D. it is not a security concern, where mal-
ware is a concern C. Denial of Service (DoS)
D. Ransomware
427. Which one of the following is a piece of
software that captures every keystroke 431. An attack carried out within an organi-
on a computer and sends it to a third sation, for example by a disgruntled em-
party? ployee over personal reasons.
A. Keylogging software A. Hacktivist
B. Screen recording software B. Cyber Terrorist
C. Winzip C. Scammer
D. Streaming software D. Insider
428. Which of the following scenarios would 432. Which vocabulary word fits this defini-
breach the security of a message en- tion? Code using images and geometric
crypted with a public key? shapes to represent the alphabet to trans-
A. If the encrypted message was inter- mit messages
cepted by a third party A. Morse code
B. Pigpen cipher 437. How much was the total loss due to
C. Public key cryptology covert attacks in 2003?
NARAYAN CHANGDER
B. “Data should be viewable at all times” C. Intrusion detection system (IDS)
C. “Data should be access by only the D. Network intrusion detection system
right people” (NIDS)
D. “None of the above”
449. Which one of the following is actually con-
444. Under which law can law enforcement sidered as the first computer virus?
agencies intercept personal communica- A. Sasser
tions?
B. Blaster
A. Freedom of Information Act
C. Creeper
B. Data Protection Act
D. Both A and C
C. Regulation of Investigatory Powers
Act (RIPA) 450. Which of the following is/are considered
D. Computer Misuse Act as (a) shared resource(s)?
A. Printers
445. Time it takes for a bit to travel from its
sender to its receiver. B. Books
A. Latency C. Ipads
B. Redundancy D. Files and Printers
C. Packet
451. HTTPS is a type of protocol. What does
D. Protocol “S” stands for
446. what does the CIA triad stand for A. Safe
A. central intelligence agency B. Secure
B. conformity, intellect, availability C. Standup
C. confidentiality, integrity, availability D. Safety
D. conformity, integrity, assurance
452. The type of malware collects personal
447. There are types of VPNs. information and sends it to a third party.
A. 3 A. Worm
B. 2 B. Toolbar
C. 5 C. Homepage hijacker
D. 4 D. Spyware
453. For $250, 000:Identity theft only occurs 458. An irrelevant and unsolicited e-mail mes-
to sage sent by an unknown sender. A spam
is sent to distribute a message to many re-
457. Which one of the following is a security 461. The informal code of positive conduct
threat? (select all that apply) used whenever someone is connected to
the Internet is the definition of
A. Worm
A. Cyber Security
B. Phishing
C. Black Hat Hacking B. Cyber Ethics
D. Antivirus C. Cyber Safety
E. White Hat Hacking D. Cyber Space
462. Which of the following is a sign of a pos- 467. The art and science of breaking the cipher
sible malware attack? text is known as
A. A new toolbar appears on your A. Cryptanalysis
browser B. Cryptography
B. You see a lot of pop-up adverts even C. Staganography
when you’re offline
D. Watermarking
C. Your hard disk is working overtime but
468. The main reason black-hat hackers com-
NARAYAN CHANGDER
you’re not doing anything
mit their acts is for what?
D. Any of the above
A. Challenge and thrills
463. Using VPN, we can access
B. Revenge
A. Access sites that are blocked geo-
C. Hacktivism
graphically
D. Criminal intent
B. Compromise other’s system remotely
C. Hide our personal data in the cloud 469. A type of attack that sends enough re-
quests to overload a resource or even stop-
D. Encrypts our local drive files while ping its operation.
transferring
A. Denialof Service (DoS)
464. Which of the following are forms of social B. DistributedDoS(DDoS)
engineering:
C. SYNFlood
A. Phishing
D. Spoofing
B. Farming
470. What is the proper format for a single
C. Fishing
line comment in Karel?
D. Blagging
A. # This is a comment
E. Shouldering
B. // This is a comment
465. This cybersecurity goal or principle in- C. /* This is a comment
volves preventing the disclosure of infor- D. This is a comment
mation to unauthorized people, resources,
or processes. 471. These days in the media it is not uncom-
A. Integrity mon to hear that organisations and com-
panies have suffered from cyber-attacks.
B. Confidentiality The popular image is that these attacks are
C. Availability carried out by so-called malicious hackers
that are external to an organisation. How-
D. Accountability
ever several observations show that many
466. What is the default router password? of these attacks are carried out by organ-
isation employees/officers or former em-
A. Password
ployees. What is the common name which
B. Admin is given to this latter type of threat?
C. 123 A. Ethical hacking
D. Yummy Toes B. Trolling
482. The act of extracting personal informa- 487. Which of the following is unlikely to dam-
tion, such as passwords and credit card age or delete data?
details, from computer users and then use
A. Virus
the information for malicious purposes.
B. Archiving
A. phishing
B. intellectual property C. System crash
NARAYAN CHANGDER
D. online predator 488. What’s the best way of protecting your
483. Intentional and repeated harm inflicted computer against viruses
through the use of computers, cell phones, A. Using a firewall
and other electronic devices.
B. Make sure it doesn’t overheat
A. Cyberbullicide
C. Installing anti virus software
B. Cyberbullying
D. Not letting anyone else use it
C. Flaming
D. None of the answers are correct. 489. What process is described below? Two
keys are used. One is yours and the other
484. Working at your desk, you’ve received is the receiver’s. You send a message is
an email from Microsoft explaining that your key. Then, that person sends it back
your password it out of date, and you in their key along with yours. You undo
must set a new one. The link within the your key so that only their’s is left and re-
email will guide you through it. Your next send the message.
step is?
A. Public key cryptology
A. Follow the link and reset password.
B. Baconian Cipher
B. Ignore the email and delete it.
C. Reset your password manually. C. AUP
485. Which of these groups exploits cyber vul- 490. Which is not a type of anti-malware?
nerabilities? A. Anti-Virus
A. Criminals
B. Anti-Spyware
B. Governments
C. Malware Scanner
C. Hackivists
D. Defragmenter
D. All of the above
491. Which creative commons license is the
486. What is “crash” as it relates to comput-
least restrictive?
ers?
A. To destroy the monitor A. CC BY (Attribution)
B. Smashing the hard drive into the mon- B. CC BY-SA (Attribution-ShareAlike)
itor C. CC BY-NC-ND (Attribution-NonCommercial-
C. The system stops functioning properly NoDerivs)
D. To bang the mouse on the keyboard D. CC BY-NC (Attribution-NonCommercial)
492. This is the psychological manipulation of or file in a victim computer; spread by hu-
people into performing actions or divulging man action, such as sharing infected files
confidential information.
501. What is netiquette? 506. White hat hackers help businesses and
A. A term used to describe network at- corporations with which of the following?
tacks. (choose all that apply)
A. Software Compliance
B. A malware that pretends to have eth-
ical standards but attacks you when you B. Network Security
least suspect it. C. Transferring money
C. The term for commonly accepted rules D. Computer Security
NARAYAN CHANGDER
of how to behave online. E. Flaws and Loopholes
D. none of above
507. This is the practice of deliberately trying
502. What does a gray-hat hacker do? to find security holes in your own systems
A. Does harm, usually outside of the law. A. Penetration testing
B. Ethical and law-abiding and actions B. Access testing
and does hacking for the good. C. Rights testing
C. Do not harm, do not ask permission ei- D. none of above
ther.
508. Which one of the following is NOT a de-
D. Engages in hacking but does it for the fense strategy against security threats?
fun only.
A. Assess Trustworthiness
503. Open source software can be used to set B. Firewall
up a web server. Which of these are not C. Private Browsing
an issue?
D. Spam
A. No free support from the vendor
509. Which is Not a type of Cybercrime?
B. It can be difficult to set up correctly
A. Phishing
C. It is not secure out of the box
B. DDOS
D. It does not cost anything
C. Computer virus
504. is a popular tool used for discovering D. IOS
networks as well as in security auditing.
510. What is our main problem?
A. Ettercap
A. No one can defeat cyber criminals
B. Metasploit
B. Hackers will keep your information
C. Nmap
C. Hackers can’t be defeated
D. Burp Suit
D. Hackers keep on hacking
505. If you upload an image to a social me- 511. You can be confident your passwords are
dia website, and link it to a friends profile, completely secure if:
this is called
A. they are at least 8 characters long
A. Tagging
B. you change them regularly
B. Vishing
C. you use different passwords for all
C. Trolling your online accounts
D. Linking D. All of these
512. What is the main source of data collection 517. A “data harvesting tool” is:
for advertising companies? A. illegal software used to steal pass-
522. Finger print and iris scanners are exam- 527. When might an activity be considered cy-
ples of berbullying?
A. medical security A. If the activity could potentially hurt
someone’s feelings
B. biometric security
B. If it makes a person feel embarrassed
C. biology security or unsafe
D. body security C. If adults would generally disapprove
NARAYAN CHANGDER
of the activity
523. What type of file recognizes your com-
puter when you visit a website? D. All of the answers are correct
526. What type of attack tries to guess pass- 530. Which kind of personal information do
words by every combination of charac- people send over the Internet?
ters? A. Credit Card Numbers
A. dictionary attack B. Contact Information
B. brute-force attack C. Medical Information
C. man-in-the-middle attack D. All of these
D. smurf attack E. None of these
531. framework made cracking of vulner- 536. What shows that a website has a secu-
abilities easy like point and click. rity certificate? Choose 2.
532. When you enter personal details on social 537. function start() { move(); for (var i = 0; i
networking sites you should never: < 5; i++) { move(); putBall(); }}
A. enter personal details of your friends A. 1
NARAYAN CHANGDER
542. are messages that try to trick you
A. Accounting
into providing sensitive information.
B. Authorization
A. Phishing scams
C. Authentication
B. HTTPS
D. Availability
C. Cookie scams
D. Plug-ins 548. Which apply to a DDOS attack?
A. an attempt to make an online service
543. What does the term BYOD represent in unavailable by overwhelming it with traf-
technology? fic from multiple sources
A. Bring Your Own Disaster B. a way to hack into a network so you
B. Bring Your Own Drinks can run SQL code
C. Bring Your Own Device C. A method used by hackers to track
D. Bring it on Man what users enter on their keyboard to
steal personal information and passwords
544. The term “TCP/IP” stands for D. Will often create a botnet to increase
A. Transmission Contribution protocol/ the amount of traffic being created
internet protocol E. Will allow you to steal someone’s web-
B. Transmission Control Protocol/ inter- site and use it for yourself
net protocol
549. What was(is) the ‘wanna cry’ virus
C. Transaction Control protocol/ internet
A. WannaCry is a ransomware cryp-
protocol
toworm,
D. Transmission Control Protocol/ inter-
B. wanna cry is a kelivin type virus
net protocol
C. wanna cry is a ransome domestic cryp-
545. Which of the following is not the role in toworm
cyber security?
D. none of above
A. Security Management
550. What is AntiVirus software?
B. Standing Committee
A. Software that blocks all unwanted ads.
C. Executive Committee
B. Software that keeps you from getting
D. Cybersecurity Practitioners sick.
546. Encrypt “goodday” with “say” using Vi- C. Software that protects your device
genere cipher from viruses and malware.
A. yomtyyq D. none of above
551. how long can it take for your computer 556. Site-to-site VPNs are also known as
to get hacked?
A. Switch-to-switch VPNs
552. Someone posing as an IT tech requests 557. Which of the following is about under-
information about your computer configu- standing the privilege of using electronic
ration. What kind of attack is this? information as well as the right to having
A. Insider Threat equal, secure, and reliable way to connect
B. Phishing to the Internet?
C. Social Engineering A. Cyber Access
D. Whaling B. Digital Divide
553. What is a type of attach where people C. Global Information
receive an email pretending to be from a
D. Infrastructure
bank asking them to reset a password?
A. Phishing 558. Which will deploy when conditions exist
B. Trojan that the malware is seeking?
C. Brute Force A. Armored virus
D. none of above B. Time bomb
554. You can protect your files from unautho- C. Trojan horse
rised access by?
D. Logic bomb
A. Only allowing your friends and family
to know your passwords
559. What port number is DNS (Domain Name
B. Never using computers in a public System)?
place such as a library
A. udp/tcp 53
C. Choosing a strong password and
changing it regularly B. tcp 21
D. none of above C. udp 21
555. Provides you a capability to grant or D. udp/tcp 427
reject networkaccess to traffic flows be-
tween an untrusted zone (e.g., the Inter- 560. A set of computers connected together
net) and a trusted zone (e.g., a private for the purpose of sharing resources
orcorporate network).
A. Network
A. VPN
B. Antivirus
B. End point security
C. firewall/UTM C. Update
D. All of the above D. Software
NARAYAN CHANGDER
562. What is Cybersecurity? A. Confidentiality
A. a game that has a cool character- B. Integrity
B. a program to edit pictures C. Availability
C. a movie with a bad story D. none of above
D. the state of being protected against
568. The shift cipher is sometimes referred to
the criminal or unauthorized use of elec-
as the
tronic data, or the measures taken to
achieve this A. Caesar cipher
B. Shift cipher
563. What are types of personal information
C. cipher
A. Favorite ice cream
D. cipher text
B. Password
C. Email 569. What is a type of attack that locks you
out of your computer until a sum of money
D. None of the above has been paid?
E. School A. Ransomware
564. What is NOT an example of computer B. Hostageware
software? C. Spyware
A. Gmail D. Malware
B. Internet Explorer
570. Malicious code that secretly watches
C. Mouse your computer activity and sends the in-
D. Google Chrome formation over the Internet; can secretly
capture your keystrokes (including pass-
565. Which one of the following is also re- words) and compromise your identity
ferred to as malicious software?
A. spyware
A. Maliciousware
B. virus
B. Badware
C. worms
C. Ilegalware
D. phishing
D. Malware
571. Which type of malware disguises itself as
566. Give at least 3 types of attack vectors something good, like a game?
A. Social Network A. Virus
B. USB B. Worm
NARAYAN CHANGDER
person to another via digital technology
583. means the protection of data from
such as email, forum or blog
modification by unknown users.
C. Knowing when and when not to use the
A. Confidentiality
internet
B. Integrity
D. None of the above
C. Authentication
588. Modern networks primarily use three
D. Non-repudiation
types of media to interconnect devices and
584. A property of access control systems that to provide the pathway over which data
allows a user to log in once and gain access can be transmitted. Which of these en-
to all interrelated systems without being codes data using electrical pulses?
prompted to log in again is known as? A. metallic wires within cable
A. Single sign-on B. glass or plastic fibers
B. Malware C. wireless transmission
C. Encrypting D. none of above
D. none of above 589. What is an IP Address?
585. A person’s digital footprint consists of A. a unique string of numbers separated
the following:I. Emails you sendII. Pictures by periods that identifies each computer
you postIII. Topics you searchIV. Apps you using the Internet Protocol to communi-
useV. Other people’s comments cate over a network.
A. I and II B. A web of connected computers or de-
vices
B. II-IV
C. a person or thing that provides a ser-
C. I-IV
vice or commodity.
D. All of the above
D. a method employing encryption to pro-
586. Modern networks primarily use three vide secure access to a remote computer
types of media to interconnect devices and over the Internet.
to provide the pathway over which data 590. A small file on a computer that is created
can be transmitted. Which of these en- when a user visits a Web site. A Web site
codes data using wavelengths from the uses cookies to identify users who visit
electromagnetic spectrum? the site, and also track the preferences of
A. metallic wires within cable the users.
B. glass or plastic fibers A. cache memory
591. You were browsing the web on a ques- 595. What is the youngest age you can be
tionable website, and now you get a pop- charged of a Computer Misuse act of-
up window stating that if you do not pay fence?
$100 within one hour, all files on your A. 12
computer will be destroyed.what is this an
B. 14
example of?
C. 16
A. heistware
D. 18
B. theftware
C. extortionware 596. It help prevent attackers from monitoring
or recording traffic between resources and
D. Ransomware
computers, by making data more difficult
592. A phishing email is one which: to read.
A. requests a payment for goods you A. Data Encryption
have not received B. Firewall
B. offers you products in which you may C. Antivirus
have no interest
D. none of above
C. encourages you to click on a link to a
fraudulent website 597. A method of evaluating the security of an
D. contains abusive and threatening lan- information system or network by simulat-
guage ing an attack from a malicious source.
A. Penetration Testing
593. What is an Identity Theft?
B. Black Box Testing
A. One who tracks digital footprints by
browsing his/her actions on the internet C. Access Testing
B. Stealing someone’s identity to use D. Security Skills Testing
stuff in their name such as credit cards
598. Which method of computer security soft-
C. Person who looks for flaw or poten- ware searches all files to see if they look
tials to harm as to go about hacking some- suspicious?
one
A. Anti-virus
D. Identity that is obtained by malware
B. Firewall
hidden in other files that looks innocent
and harmless C. Network policy
B. You have just won a free trip to Disney- 605. What does Gramm-Leach-Bliley Act
world! Here are the details below: (GLBA) do?
C. Click this link and you will win a million A. cover responsibilities of a public corpo-
dollars. ration’s board of directors, adds criminal
D. Click this link to prevent viruses. penalties for certain misconduct
B. provides data privacy and security pro-
600. When did T-Mobile begin sending SMS visions for safeguarding medical informa-
messages to postpaid customers impacted tion
NARAYAN CHANGDER
by the August 2021 Cyber Security
C. control the ways that financial institu-
Event?
tions deal with the private information of
A. August 13, 2021 individuals
B. August 14, 2021 D. an information security standard for
C. August 18, 2021 organizations that handle branded credit
cards from the major card schemes
D. August 17, 2021
606. In relation to computers, what is a
601. The state of being protected against crim- virus?
inal or unauthorized use of electronic data.
A. A program that secretly watches your
A. Cybersecurity computer activity and sends the informa-
B. Cyber-slacking tion over the Internet
C. Cryptography B. A self-replicating program that dam-
ages the hard drive and affects the com-
D. Technographics
puter’s operation
602. Wireshark is a tool. C. A URL that may lead the user to down-
A. network protocol analysis load a video file
B. network connection security D. A program that is useful to download
from the Internet
C. connection analysis
D. defending malicious packet-filtering 607. A method of computer access control
which a user can pass by successfully
603. Cipher based on substitution, using multi- presenting authentication factors from at
ple substitution alphabets is called: least two of the three categories of knowl-
A. Polyalphabetic cipher edge, possession, and inherence and a part
of password management
B. Monoalphabetic cipher
A. multi-factor authentication
C. Polycipher
B. password complexity
D. Monocipher
C. permissions
604. What’s pharming? D. none of above
A. scam through bogus websites
608. The is a number or a set of numbers
B. scams through emails on which the cipher operates.
C. scams through phone calls A. secret
D. scams through text messages B. cipher
618. People that try to make people angry 623. Your computer has just been infected
or emotional on the internet by harass- with Ransomware and the hacker is de-
NARAYAN CHANGDER
ing them and constantly contacting them manding £1, 000 before releasing it.
or commenting about them on social media What do you do?
A. trolls A. Try your best to get rid of it before any-
B. hacker one finds out.
C. pharmer B. Pay the ransom. You need your files
D. admin back!
C. Disconnect your computer from the
619. You have found a copyrighted image on network.
the Internet you wish to use in your Com-
puter Science project. What is the most D. none of above
ethical way to use it?
624. Sifting through garbage cans for credit
A. Do not use it card information, social security numbers
B. Get permission or other personal information.
C. Give credit A. Virus
D. Just use it B. Trojan Horse
620. If you have more than one device, what C. Botnet
should you do?
D. Smishing
A. Use the same password
E. Dumpster Diving
B. Don’t use a password
C. Use your friends password 625. Asymmetric encryption uses only 1 key.
627. Vrais au faux(true or false) Nhs was af- 632. What does a messaging system on a so-
fected by the wanna cry virus cial networking site do?
C. Phishing B. Spies
D. Encryption C. Spyware
D. Spider
631. Which of the following is not a sign of a
phishing email? 636. Any software used to disrupt computer
operation, gather sensitive information, or
A. Spelling mistakes
gain access to private computer systems is
B. Persuasive & threatening language known as?
C. Prize offers A. Malware
D. Email program crashes when loaded B. Operating System
NARAYAN CHANGDER
validate your information. what is this an
example of? 642. The law regarding holding personal data
states that if a company holds personal
A. a security breach at your bank that
data it must:
needs to be resolved
A. keep the data secure
B. spam
B. keep the data accurate and up to date
C. ransomware
C. allow people to see what data is held
D. Phishing
about them
638. The process of recovering passwords D. all of the above
from data that have been stored in or
transmitted by a computer system, most 643. A technician is configure a SOHO router.
often through brute-force or dictionary at- Which of t following would be the purpose
tacks. for updating the router’s firmware?
D. All of the above 645. Acts as a guard between your device and
any other device trying to access it on the
640. What one is a type of verification? web.
A. Phishing A. Phishing
B. Trojan Horse B. Digital Footprint
C. CAPTCHA C. Spyware
D. VERY D. Firewall
646. Which of the following Computer Science B. must delete the data when you leave
Fields are covered by Cyber Security? C. must register with the Data Protection
649. Which of the following devices is not a 654. What’s the name given to the malicious
part of the Internet of Things? software that threatens to publish the vic-
A. A watch that allows you to measure tim’s data or perpetually block access to it
and track your activity through a mobile unless a ransom is paid?
app A. Spam
B. A security system that lets you re- B. Ransomware
motely monitor your home C. Denial of Service (DoS)
C. A physical combination padlock for D. CyberBullying
your bike.
D. A refrigerator that shows you what you 655. Which technique uses emails or texts con-
need to buy. taining a link to a fake website to then
steal your security or login details?
650. An organisation such as a school holds A. Phishing
personal data about you. The organisa-
tion: B. Pharming
656. What is a risk that users may face while 661. Viruses
playing games online? A. Can infect and spread but need human
A. They can be exposed to online preda- assistance Can in
tors. B. Compromise computers under the con-
B. They can increase their gaming trol of an attacker
scores. C. cannot be cured with antibiotics
C. They can play with family members. D. are safe!
NARAYAN CHANGDER
D. They can communicate with friends 662. Which username tells too much about the
from school. person?
657. Which type of malware needs to be A. JoeBrown2008
opened to become active? B. Goldfish23
A. Virus C. paperbag2222
B. Worm D. HappyZebra8
C. Trojan 663. Someone who wants to gain personal in-
D. Spyware formation from you via a fake email to ob-
tain your details for fraudulent and theft
658. Data must be unaltered during tran- activities.
sit (being sent between people) and not A. Scammer
changed by unauthorised entities. B. Phisher
A. Confidentiality C. Insider
B. Integrity D. Cyber Criminal
C. Availability
664. What a good way to have faster internet
D. none of above speed
A. WI-FI
659. The act of gaining unauthorized access to
a computer system B. Ethernet
A. pharming C. Router
D. USB Cable
B. smishing
C. hacking 665. Any information available on the Internet
is an intellectual property, which is legally
D. cracking owned by the person who created it. The
owner of an intellectual property has the
660. A program that appears to be harmless,
exclusive rights to control the use of this
but harmful in destroying data.
information.
A. Roman Horse A. hacker
B. War Machine B. firewall
C. Trojan Horse C. administrator
D. Grasshoppers D. intellectual property
666. Companies which generate income from D. Letting a colleague know your pass-
sharing their knowledge or information word.
from hackers of cyber vulnerabilities to
676. Controls which person has access to 680. What type of attack uses a fraudulent
which part of the network server with a relay address?
A. Penetration Testing A. NTLM
B. Network Forensics B. MITM
C. Strong Passwords C. NetBIOS
NARAYAN CHANGDER
681. The illegal copying of software
677. You’re just leaving school for the day,
when you stumble upon a USB stick on the A. Copyright
floor. What do you do? B. Intellectual Property
A. Pick it up and plug it in to try and find C. Software License
an indication of whom it belongs to, so you
D. Piracy
can return it.
B. Leave it where it is. It’s not your prob- 682. A computer set up as a decoy for attacks
lem. to detect and deflect cyber attacks.
B. Virus D. VPN
695. What is the purpose of using a for loop 700. Tick all examples of Monoaplhabetic Ci-
in code? phers:
A. To do something if a condition is true A. Caesar Cipher
B. To do something while a condition is B. Vigenere Cipher
true C. Keypad Cipher
C. To repeat something a fixed number of D. Morse Code Cipher
times
NARAYAN CHANGDER
701. Phishing is?
D. To make programs run faster
A. Sending a virus via Email
696. What is a type of attach where a pro- B. Trying to extract personal information
gram tries different combinations of pass-
words until a match is found? C. A virus acting as something else
D. An infected Email
A. Phishing
B. Trojan 702. Standalone malware computer program
that replicates itself in order to spread to
C. Brute Force other computers. Often, it uses a com-
D. none of above puter network to spread itself, relying on
security failures on the target computer to
697. What is a common way in which compa- access it.
nies gain access to your data?
A. Malicious Code
A. You agree to the terms and conditions
B. Computer Worm
without reading them
C. Anti Virus Software
B. Hacking into your accounts illegally
D. Computer Virus
C. They review your computer cookies
703. An Internet security protocol that en-
D. Monitor your web searches on Google
sures secure data communication by en-
Chrome
crypting the information transmitted. The
698. stays on your computer until an expi- SSL protocol certifies that a Web site is
ration date is met. genuine and ensures that the data pro-
vided to the site is not misused.
A. Session cookie
A. decrypt
B. Secure cookie
B. encryption
C. Persistent cookie
C. Secure Sockets Layer (SSL)
D. Third-party cookie
D. hacker
699. The feeling of protection arises once 704. An accumulation of all the digital tracks
someone has enough . you leave behind.
A. Harm A. Phishing
B. Danger B. Digital Footprint
C. Assurance C. Spyware
D. Confidence D. Firewall
705. What is included in McAfee’s ID Theft Pro- 711. Which of these will not put you at risk of
tection Service? (Select all that applies) malware attacks?
NARAYAN CHANGDER
network components:devices, media and C. Encryption
services. Which of these is considered D. User Access Levels
to contain the physical parts of the net-
work? 722. With whom can you share your password
A. Devices with?
B. Malware hidden inside other software 730. Small files that Websites put on your
that appears to be harmful. computer hard disk drive when you first
visit
735. A set of rules governing the exchange or 740. To keep your browser private, you can
transmission of data between devices. use the mode.
A. Latency A. incognito
B. Redundancy B. confidential
C. Packet C. encrypted
D. Protocol D. deception
NARAYAN CHANGDER
736. Software file that contains fixes for prob- 741. If someone suspects that a company
lems found by other users or the software holds inaccurate information about them:
developer A. they have a right to see what data the
A. Antivirus company holds about them
B. they can log on any time to find out
B. Malware
what data is held about them
C. Update
C. they can correct the data themselves
D. Spyware
D. they will be unable to get the data cor-
737. Which of the following is not a type of rected
scanning? 742. Fake e-mail message appearing to be
A. Xmas Tree Scan from a trusted business asking for per-
sonal information such as passwords?
B. Cloud scan
A. Farming
C. Null Scan
B. Pharming
D. SYN Stealth
C. Phishing
738. A computer program that can intercept D. Fishing
and log traffic passing over a digital net-
work is known as? 743. What type of symmetric key algorithm
A. Packet Sniffer using a streaming cipher to encrypt infor-
mation?
B. Malware
A. RC4
C. Phishing
B. Blowfish
D. none of above
C. SHA
739. Which of the following is protecting UK’s D. MD5
critical services, wider public sector, indus-
try and SMEs from Cyber attacks and pro- 744. Alice and Bob need to exchange some pri-
vides incident response? vate data online. To do this, Alice creates
an algorithm that will encrypt and decrypt
A. NCA data. They secretly meet to share the algo-
B. Cyber Resilience Centre rithm, then they each use the algorithm to
encrypt their messages and decrypt each
C. ICO
other’s messages.What kind of encryption
D. NCSC process is this?
E. None of the above A. Symmetric
754. What the name given to a code that C. Access Control Logs
uniquely identifies a device on a network D. Access Control List
A. IP address
760. Viruses, worms, and trojans are com-
B. Email address
mon security threats that are often used
C. URL in spreading. What is the name for them
D. Postcode all?
NARAYAN CHANGDER
A. Passing text thorough a maths algo- B. malware
rithm to scramble text C. downloads
B. Changing the letters by a set number D. passwords
(Caesar Cipher)
C. Changing to ASCII code 761. What port number is Internet Message
Access Protocol ver. 4 (IMAP4)?
D. Converting text to hex
A. tcp 143
756. What does malicious mean?
B. tcp 21
A. Something intended to do harm
C. tcp 443
B. Something that makes you ill
D. tcp 389
C. Something good
D. Tasty 762. Antivirus Software
A. Referring to the copying of data on a
757. Monitors inbound and outbound traffic to
computer
identify suspicious traffic.
B. Made to destroy computer viruses
A. Network intrusion detection system
(NIDS) C. How much data can be transferred in
an amount of time
B. Distributed intrusion detection system
(DIDS) D. None of the above
C. Host intrusion detection system
763. Which of the following would not be con-
(HIDS)
sidered a Data Domain?
D. Intrusion prevention system
A. Google
758. What are the most ideal privacy settings B. Facebook
to have on your social networking site?
C. Twitter
A. Default
D. Kahoot
B. Recommended
C. Custom 764. What is provisioning?
D. none of above A. An open-source virtualization platform
from Oracle.
759. ACL stands for
B. Computing in an isolated place to test
A. Access Condition List and deploy applications and configura-
B. Anti-Control List tions.
774. Unauthorized access to control over com- D. “Completely Automated Public Tur-
puter network security systems ing test to tell Computers and Humans
A. Security Apart”)
NARAYAN CHANGDER
775. What did Charles Babbage invented?
B. Cyber Terrorist
A. ENIAC
C. Cyber Criminal
B. Difference Engine
D. Scammer
C. Electronic Computer
D. Punched card 780. Like “HTTPS, “ Secure Socket Layer, or
SSL helps to
776. Which of these help make a strong pass- A. Keep a computer from getting viruses.
word? (Choose all that apply)
B. Protect users who share personal in-
A. Contains Uppercase letters
formation online.
B. Contains Lowercase letters
C. Prevent a computer from crashing.
C. Is at least 8 characters long
D. None of the answers are correct.
D. Is short
E. Contains special characters 781. What is software that aims to gather in-
formation about a person or organization
777. What is cyberbullying? without their knowledge and that may
A. A person who is ignoring people he send such information to another entity
doesn’t like. without the consumer’s consent, or that
asserts control over a computer without
B. A bully who is embarrassing people the consumer’s knowledge?
during gym class.
A. Spyware
C. Any online behavior that embarrasses
or hurts feelings. B. Spoofing
D. A school website that allows posting of C. Trojan
cruel messages. D. none of above
778. CAPTCHA stands for 782. The process of converting a ciphertext
A. “Confidently Automated Piece of Tur- into plaintext.
ing testing to tell Computers and Humans A. encryption
Apart”
B. decryption
B. “Completely Automated Public Turing
test to tell Criminals and Happy people C. plaintext
Apart” D. cryptography
C. “Completely Assisted Presence Tutor
tests to tell Computers and Humans 783. What are the different ways to intrude?
Apart” A. Buffer overflows
NARAYAN CHANGDER
C. Public key cryptology A. Spamming
D. Intellectual property B. Phreaking
795. What is 1111 1101 in decimal? C. Cracking
A. 253 D. Phishing
B. 200
800. If the same key is used to encrypt and
C. 121 decrypt a message, this is known as?
D. 257 A. Symmetric encryption
E. 293 B. Encryption doesn’t exist!
796. Which of the following is/are considered C. Asymmetric encryption
as a digital literacy tool? I. Mobile phones D. Same-key encryption
II. Smart objects III. Wireless Internet
A. I only 801. What’s the name given to harassment us-
ing electronic forms of contact?
B. II only
A. Spam
C. II and III only
B. CyberBullying
D. I, II, and III
C. Denial of Service (DoS)
797. What does the “https://” at the be-
D. Ransomware
ginning of a URL denote, as opposed to
“http://” (without the “s”)? 802. To avoid your computer being infected by
A. That the site has special high definition malware, you should not:
B. That information entered into the site A. Download music or software from ille-
is encrypted gal sites
C. That the site is the newest version B. open emails from people you don’t
available know
D. That the site is not accessible to cer- C. open email attachments
tain computers
D. post personal details on social net-
E. None of the above working sites
798. A unique string of characters that a user 803. Who are Hackers?
types in as an identification code. It is a
security measure used to restrict access to A. They are benign computer experts
computer systems and sensitive files. B. They are malicious computer criminals
NARAYAN CHANGDER
817. The best way to back-up your files.
A. active content A. cloud
B. cache memory B. external hard drive
C. cookie C. 123 backup plan
D. spam D. 321 backup rule
C. Term for cookies trying to invade your C. A complicated password you may for-
computer and implement viruses. get.
831. To ensure your device and data remain se- 835. Who was the latest victim of cyber crime
cure and safe, when you install a new app A. British Airways
it is good practice to
B. Foxconn
A. Not use too many apps as the smart-
phone will become less secure C. Google
D. Facebook
B. Block all the app downloads and just
use the standard one already on your E. Snapchat
phone
NARAYAN CHANGDER
836. What is phishing?
C. Scrutinize permission requests when
using or installing smartphone apps A. scams through websites
B. scams through emails
D. none of above
C. scams through phone calls
832. Which of the following most accurately D. scams through text messages
describes the Internet of Things?
A. Malicious hackers intent on stealing 837. A sudden increase in line voltage, which
confidential information like credit card may lead to the damage of electronic de-
numbers or email addresses vices, such as computers.
C. A certification in managerial skills for 855. What type of firewall is also known as a
cyber security proxy server?
D. none of above A. application-level
NARAYAN CHANGDER
856. Which of the following do Cyber attack-
C. Virus ers commonly target for fetching IP ad-
D. none of above dress of a target or victim user?
A. emails
851. The process of scrambling data to make it
unreadable to those without a secret key. B. ip tracker
A. cryptography C. websites
B. cyphertext D. web pages
C. decryption
857. Which of these comes under the advan-
D. encryption tage of Circuit-level gateway firewalls?
852. CP 07-102 is A. They maintain anonymity and also inex-
pensive
A. The GD Corporate Policy for Cyber Se-
curity B. They are light-weight
B. The GDMS Policy on Cyber Security C. They’re expensive yet efficient
C. The GDMS-C Cyber Security Process D. They preserve IP address privacy yet
expensive
D. Just a bunch of letters and numbers
C. Access control, file permission C. A wall that burns all insects that get
too close to the computer.
D. Network, system
D. Something that tells you when there is
854. How did the reporters gain access to a fire.
peoples voicemail in mobile phone hacking
scandal in 2012? 859. Firewall examines each that are en-
tering or leaving the internal network.
A. They spoke to the victoms
A. emails users
B. They hacked their computers
B. updates
C. They tried using the default PIN num-
ber which was frequently unchanged C. connections
D. They used white box testing D. data packets
860. IT security in any firm or organization is 864. Which of the following hackers was pur-
maintained and handled by sued by US Marshals?
863. Which capability of a Zero-Trust seg- 868. A method for determining a solution to a
mentation platform uses a combination of problem by sequentially testing all possi-
anti-malware, intrusion prevention, and ble solutions.
cyberthreat prevention technologies to A. brute force
provide comprehensive protection against B. relative frequency
both known and unknown threats, includ-
ing threats on mobile devices? C. cipher
NARAYAN CHANGDER
A. restrict unauthorized access to and backup, which of the following should be
use of a creative work done NEXT?
B. Hack to help a company with its own A. Verify the backup
program, find problems
B. ‘Delete the original file to clear space
C. Attempt to break system and publicly for the next backup
disclose info about it C. Duplicate the backup
D. Taking someones work as your own D. Schedule the next backup
871. What is a black hat hacker? 876. Which of the following usually observe
each activity on the internet of the victim,
A. They are authorized hackers
gather all information in the background,
B. They look for vuneralibities without su- and send it to someone else?
pervision A. Malware
C. They hack systems without any author- B. Spyware
ity
C. Adware
D. All of the above
D. All of the above
872. A computer virus may: 877. A Script Kiddie is
A. overwrite your files and corrupt your A. a student learning how to hack.
data B. a threat to an organization’s security
B. steal important information from your or data that comes from within.
computer C. anyone who exploits weaknesses in a
C. use a lot of memory and slow down computer system or network.
your computer D. someone who lacks programming
D. all of the above knowledge and uses scripts or programs
developed by others to attack computer
873. The type of malware that is triggered systems.
by the user. code automatically makes
878. Viruses, worms, and trojans are common
copies of itself.
know as?
A. Virus A. Malware
B. Worm B. Formalware
C. Keystroke logger C. Scams
D. Toolbar D. The Spreading attackers
879. This can be used so that authorized users 884. Unauthorized access to computer net-
don’t make accidental changes to data. work security systems.
880. Why is it important to always log off 885. What should you be aware of when set-
your account when you have no use for the ting your privacy settings on social me-
computer? dia?
A. So the computer won’t lose battery A. Allow everyone to see my location
B. So the account would be safe from get- B. Location services are switched off
ting hacked C. Post photo’s of where I am when I am
C. So you don’t forget the password on my holiday
889. What type of self-replicating program 894. Heidi teaches piano lessons in her spare
copies to other computers on a network time. She has been building a digital foot-
without any user intervention and con- print to promote her business. She likes to
sumes bandwith and computer resources? post short videos of her students perform-
A. Virus ing, on her social media accounts. When
she does, she never gives out the home lo-
B. Trojan Horse cation or full name of the student. This is
C. Worm an example of:
NARAYAN CHANGDER
D. backdoor
A. a publicity practice.
890. An individual who develops contact with
B. a privacy concern.
Internet users, through chat rooms, online
forums, or e-mail, to exploit them finan- C. a marketing policy.
cially or involve them in dangerous rela-
tionships. D. a copyright violation.
A. encryptor
895. What is the most common age for people
B. online predator who start committing into cyber crime
C. firewall
A. 15-20
D. computer security
B. 21-25
891. Which of the following is “personal data”
which may be held about someone on the C. 26-30
computer system of a supermarket?
D. 30+
A. Their address
B. The amount they spent last year at the 896. A fraudulent email which is trying to ob-
supermarket tain your username and password for a
C. Their loyalty card number particular site will typically:
D. All of the above A. have a heading with a logo which ap-
892. Why do hackers hack? pears genuine
A. To make discoveries B. address you by name
B. To protect information C. offer large sums of money
C. To steal information
D. appear to come from a friend
D. To expose corruption
E. All of the above 897. Extra copies of computer files that can be
893. A software program that attempts to used to restore files that get lost or dam-
identify and neutralise software that has aged.
a malicious intent (malware) on a system. A. Back-up files
A. Anti-malware software
B. Antivirus software
B. Firewall
C. Hacker C. Operating Software
D. Security incident management policy D. Poogies
898. While Trish was playing an online game, C. Extranet based VPN
a pop-up appeared, prompting her to click
D. Country-to-country VPNs
on the flashing lights to receive more
907. Which are examples of social engineering B. Data Integrity (data protected from be-
A. Phishing ing changed during transit)
NARAYAN CHANGDER
E. Calling someone pretending to be IT A. Suspension, expulsion or other school-
support to steal confidential data related penalties
908. What is Copyright Infringement? B. A fine, jail time, a criminal record or
A. anyone who uses someone work with- other legal penalties
out permission C. Loss of friendships, even between best
B. a copy of someone work friends
C. anyone who uses copyright owners D. All of the answers are correct
work with permission
913. Which of the following is an example of
D. a picture of someone work a “phishing” attack?
909. What options should you choose on Face- A. Sending someone an email that con-
book with regards to who you share your tains a malicious link that is disguised to
information with? look like an email from someone the per-
son knows
A. Friends
B. Creating a fake website that looks
B. Custom
nearly identical to a real website in order
C. Everyone to trick users into entering their login in-
D. Only me formation
C. Sending someone a text message that
910. Which of the following is a phishing
contains a malicious link that is disguised
email? ?
to look like a notification that the person
A. You have won a lottery!! Follow this has won a contest
link to claim it!!
D. All of the above
B. Your bank account has been compro-
mised. Login here to protect yourself. 914. What can we use to protect our computer
C. Help.I am stuck aboard and urgently from hackers
need money transferred to me to get A. fire wall
home.
B. a picture which says “stay away”
D. All of the above. Be careful.
C. Using a non approved VPN
911. Hashing functions like MD5 and SHA are D. all of the above
used in IPSEC to provide which of the fol-
lowing services: 915. The response time and transit time is
A. Data confidentiality (privacy from used to measure the of a network.
eavesdropping) A. Security
B. Longevity B. Worm
C. Reliability C. Trojan
NARAYAN CHANGDER
C. is data copied to a suitable storage
medium then stored safely C. Distributed Domain Or Service
D. a high capacity storage device that can D. Distributed Denial Of Service
be used to backup data or move large
932. Which type of computer is 100% virus-
amounts of data between machines
proof?
927. When receiving an email from an un- A. Mac
known contact that has a link, you
should? B. Windows-based
A. Trojan D. Modding
B. Worm 935. When email is sent what can be used to
C. Spyware prevent other recipients seeing the other
members’ email addresses?
D. Virus
A. CC
930. Which act would make it illegal to gain
B. BCC
unauthorized access to computer mate-
rial? C. Secure CC
A. Data protection act D. HTTPS
936. This software can capture information 940. What is the best password policy?
like Web browsing habits, e-mail mes- A. Always write the same passwords in
sages, usernames and passwords, and
937. Which of the following are clauses of the A. Prevent hackers from internet
Computer Misuse Act 1990? B. Virus protection
A. It is an offence to look at someone C. To access network remotely
else’s computer files without their permis- D. Control traffic between internal net-
sion work and internet
B. 2-people cannot be logged on to 1- 942. You work for an IT company and want to
computer complete some work at home. You take
C. It is an offence to modify or change the a copy of the documents. Which of the
content of computer files without permis- following would be the best to do before
sion leaving the office?
D. You cannot have the password, ‘pass- A. Copy the data onto two memory sticks
word1234’ in case you lose one
B. Email the files to your personal email
938. A technician wants to configure multifac- address
tor authentication for a standalone PC that
C. Copy the data onto a CD and label it
contains confidential information. The PC
clearly
already requires a PIN.which of the follow-
ing should the technician implement? D. Password protect the files, then en-
crypt the files on the memory stick
A. A finger print scanner
943. GDMS reserves the right to monitor, col-
B. Challenge and response
lect, audit, access and inspect any data
C. Single sing on password within the network in the following circum-
D. passphrase stances (hint, check IT-POL-3). Check all
that apply
939. What port number is HTTPS (Hyptertext A. To collect evidence pertaining to com-
Transfer Protocol Secure)? pliance issues or validation with GDMS
A. tcp 161 policies
B. To detect malware on devices or mov-
B. tcp 80
ing through the network
C. tcp 22
C. To ensure GDMS sensitive data in not
D. tcp 443 being exfiltrated
NARAYAN CHANGDER
C. AMEX Bank Heist safe practices, unauthorised access by
employees.
D. India Central Bank heist
C. software that has not been updated,
945. It can be a software program or a hard- writing down your password.
ware device that filters all data packets D. overloading power sockets, accidently
coming through the internet, a network, using a USB storage device that is in-
etc. it is known as the : fected with a virus.
A. Antivirus
950. A hacker uses hundreds of different IP ad-
B. Firewall dresses to overrun a bank’s website with
C. Cookies requests. This effectively shuts down the
website and prevents any Internet users
D. Malware
from accessing it. Which of the following
946. How many members does the club have? is the name for this kind of attack?
NARAYAN CHANGDER
D. SDMA communication technologies
4. Radio Transmitters, receivers and remote A. Cellular WAN
controls are commonly referred to as B. Bluetooth
A. Wireless Technology C. Infrared
B. Telecommunication Industry D. Ethernet
C. Telecommunication Systems E. Wi-Fi
D. none of above
10. TWO (2) types of touchscreens
5. causes Reflection. A. Resistive
A. Large buildings, earth surface and ob- B. Conductive
jects with large surface area
C. Capacitive
B. Obstacles with dimensions in order of
D. Summative
wavelength
C. Surfaces with rough textures such as 11. When all the radio channels are in use in a
Foliage, lamp posts, street signs, walking trunking system
pedestrian, etc. A. The user is blocked
D. none of above B. The queue may be provided
6. Up to ‘X’ Bluetooth devices can be con- C. The access to the system in denied
nected together at any one time. What is D. All the above
‘X’?
12. In dynamic channel assignment strategy,
A. five
base station requests channel from
B. seven
A. Neighbouring Cell
C. eight
B. Neighbouring Cluster
D. ten
C. Neighbouring base station
7. Why neighbouring stations are assigned D. MSC
different group of channels in cellular sys-
tem? 13. What is a cluster in a cellular system?
A. To minimize interference A. Group of frequency
B. To minimize area B. Group of Cells
C. To minimize throughput C. Group of Subscribers
D. To minimize capacity of each cell D. Group of Mobile Systems
14. How do FM waves travel? 19. Unlike Large scale models, small scale
models do not characterise the pathloss,
A. As changes in the frequency of the
but it characterises the (CO1) (B1)
24. How can cell phones make long distance C. Coherence time = Symbol period
calls? D. none of above
A. Strong Wifi signal
30. The signal strength as the distance
B. Good reception
between the transmitter and receiver in-
C. Satellite telephone systems creases. (CO1)(B2)
D. The government A. increases
25. What is a cell in cellular system B. remains same
NARAYAN CHANGDER
A. A group of cell C. decreases
B. A group of subscribers D. becomes zero
C. A large group of mobile systems 31. In Frequency selective fading,
D. A small geographical area
A. Coherence time < Symbol period
26. Which of the following technology dis- B. Coherence time > Symbol period
tributes the coverage of the cell and ex-
C. BW of signal < BW of Channel
tends the cell boundary to hard-to-reach
places? D. BW of signal > BW of Channel
A. Cell Sectoring 32. The difference between the effective
B. Cell Splitting transmitted power and effective received
C. Micro cell zone concept power when expressed in dB scale, it is
termed as (CO1)(B1)
D. Scattering
A. Path loss
27. In fixed channel assignment strategy, each B. Transmission Loss
cell is allocated a predetermined set of
C. Receiver Loss
A. Voice channel
D. System Loss
B. Frequency
C. Base station 33. Why the shape of the cell is not circle
D. Control Channel A. small area
38. Which of the following is the drawback for 43. The is defined as, “the difference (in
cordless telephones? dB) between the effective transmitted
power and the received power, and may or
A. Security
may not include the effect of the antenna
B. Wireless technology gains“.
C. Limited coverage area A. Power Loss
D. Mobile B. Path Loss
39. What is the use of detector in wireless C. Path factor
communication? D. Noise figure
A. To detect the audio signals
44. Which of the following is not a character-
B. To rectify and filter the radio frequency
istic of Wireless Connection?
C. Both (i) & (ii)
A. Has become the de-facto standard for
D. none of above access in offices/homes
40. Doppler shift is directly proportional to B. Expensive to install and maintain
A. Velocity of the mobile device C. Enables to connect to the Internet
B. Height of antenna D. none of above
NARAYAN CHANGDER
B. Borrowing channels from neighbour-
46. distribution describes random shadow- ing cluster
ing effects which occur over a large num-
C. Borrowing channels from same cell
ber of test locations which have same T-R
distance but different levels of clutters in D. Borrowing channels from other bases-
the propogation path. tation in same cell
A. Log-Normal
51. Interference in cellular system is caused by
B. Log-periodic
A. Two base station operating in samefre-
C. Poisson’s quency band
D. Exponential B. Leakage of energy signals by noncellu-
47. An is an ideal antenna which radiates lar systems into cellular frequencyband
power with unit gain uniformly in all direc- C. Two calls in progress in nearby mo-
tions, and its gain is often used as refer- bilestations
ence antenna gains in wireless system.
D. All the above
A. anisotropic antenna
B. ionising radiator 52. In what frequency spectrum is divided into
smaller spectra and is allocated to each
C. isotropic radiator user
D. entropy antenna
A. FDMA
48. Which type of transmission technique is B. CDMA
employed by paging system?
C. CGMA
A. Multicasting
D. TDMA
B. Unicasting
C. Hybrid 53.
D. Simulcasting causes Scattering.
A. Surfaces with rough texture such as
49. The of a transmitting antenna is de- Foliage, lamp post, street signs, walking
fined as, “the region beyond the fraun- pedestrian, etc.
hofer distance (df), which is related to the
largest linear dimension of the transmit- B. Large buildings, earth surface and ob-
ter antenna aperture and the carrier wave- jects with large surface area
length”. C. Obstacles with dimensions in order of
A. Far field wavelength
B. Near field D. none of above
NARAYAN CHANGDER
65. The propagation model that estimates ra-
C. Effective Amplification
dio coverage of a transmitter is called
D. Cummulative Aperture
A. Large scale propagation model
B. Small scale propagation model 71. Select THREE (3) major types of wireless
adapters are used in laptops.
C. Fading model
A. Mini-PCI
D. Okumura model
B. Midi-PCIe
66. The techniques used to improve the capac- C. PCI Express Micro
ity of cellular systems are D. Mini-PCIe
A. Sectoring
72. are typically characterized by very
B. Splitting small system especially in very densely-
C. Random access Protocol populated area
D. Micro cell zone approach A. 2.5G
B. 2G
67. What are p oints on a standing wave
C. 3G
where the amplitude of the wave is zero?
D. 3.5G
A. Antinodes
B. Nodes 73. causes Diffraction.
A. Large buildings, earth surface and ob-
C. Refraction
jects with large surface area
D. Reflection
B. Obstacles with dimensions in order of
68. What is orbiting Earth that receive radio, wavelength
television, and telephone signals and then C. Surfaces with rough textures such as
transmit them around the world? Foliage, lamp posts, street signs, walking
A. GPS pedestrian, etc.
D. none of above
B. Communication Satellite
C. Transmitter 74. represents the maximum radiated
power available from the transmitter in
D. Cell Phone Tower the direction of maximum antenna gain
69. The basic GSM is based on traffic chan- A. Effective Isotropic Radiated Power
nel B. EffectiveRadiated Power
A. Connection less C. Effective Isotropic Power
B. Connection Oriented D. Effective Power
75. Select the time dispersion prameters from C. connecting to another database to
the following. share a network connection.
D. connecting to another mobile device or
NARAYAN CHANGDER
A. Franklin distance
87. Which of the following is a universally
adopted shape of cell? B. Frii’s distance
A. Hexagonal C. Fraunhofer distance
B. Square D. Fergussion distance
C. Circle 90. Which of the following is associated with
D. Rectanguler the handoff in first generation analog cel-
lular systems?
88. What is the main reason to adopt hexagon
shape in comparison to square and trian- A. Breathing cell
gle? B. Locator receiver
A. Small Area C. MAHO
B. Largest Area D. Cell dragging
15. You are a member of a club that deals with 20. A network of cash machines is connected
computer networks. The club has to take a in a .
project to build a MAN. Where would this A. LAN
project likely take place?
B. WAN
A. A small building/organization C. PAN
B. University or college D. none of above
C. Home 21. A large company wants to be able to share
NARAYAN CHANGDER
D. None of the above confidential documents between it’s head
offices in the UK and USA. What type of
16. www.google.com is an example of network will they use for this?
A. Web browser A. PAN
B. Website B. LAN
C. WAN
C. Application
D. VAN
D. Game
22. network connection is a dedicated net-
17. Which of these is a an ADVANTAGE of a work used for data storage.
PAN? A. SAN
A. As the devices are in a small area they B. PAN
cannot be hacked C. LAN
B. Data is automatically synchronised be- D. WAN
tween devices
23. it acts as an intermediary between you
C. The range is very short which removes and the internet
any interference from other devices
A. firewall
D. Removes the need for Local Area Net-
B. vpn
works completely
C. proxy server
18. How far can Wi-fi reach? D. none of above
A. Around 50 meters 24. What connection type is best if you want
B. Around 70 meters to move around inside?
C. Around 20 meters A. 4G
B. Wi-fi
D. Around 100 meters
C. Ethernet
19. Which of the following can be al- D. Fibre optics
lowed/disallowed in a firewall
25. Device of Network
A. domain names
A. hub
B. ip addresses B. cable
C. keywords C. Router
D. all of the above D. 1, 3
26. Which of these is an example of a device B. They use wi-fi and Bluetooth to con-
which would be used in a PAN? nect radio towers to phones
NARAYAN CHANGDER
43. Which of these is NOT a benefit of having
B. Metropolitan Area Network
a network?
C. Multi-Area Network
A. You can share files easily.
D. Multi Acces Networking B. You can make nice posters.
38. It is the arrangement of the elements of a C. You can share a printer, this saves
communication network. money!
A. Network Topology D. It is easy to back up all the data as it
is stored on the server.
B. Bus Topology
44. The school wants to use a wired connec-
C. Metropolitan Area Network
tion for their network. What type of con-
D. Computer Network nection will they likely use?
59. A network infrastructure which is very 65. A computer network is a set of connected
personal to a user and it is considered as A. computers
the smallest network of all types.
B. routers
A. SAN
C. cables
B. PAN
D. topologies
C. WLAN
66. Which is listed from slowest to fastest?
D. WAN
NARAYAN CHANGDER
A. Wifi, ethernet, Fibre optics
60. A home computer network is sometimes B. Fibre optics, 4G, ethernet
also called a C. Fibre optics, bluetooth, 4G
A. LAN D. 4G, fibre optics, ethernet
B. WAN
67. We use internet to
C. Internet
A. eat
D. PAN B. to share information
61. The W in WAN stands for. C. Jump
A. Welsh D. Type
B. West 68. Allow communication between hosts on
C. Wide different networks. They act as gateway
to other networks.
D. Word
A. Hub
62. technology is used in PAN. B. Switch
A. Bluetooth C. Routers
B. router D. None of the Above
C. modem 69. Which type of network will use external
D. none of above hardware such as dedicated connections
(e.g. telephone lines)?
63. A computer network is? A. LAN
A. a collection of information B. WAN
B. A group of connected computers C. CAN
C. a collection of nets D. DAN
D. something that works 70. Allows users to log in from anywhere in
the organization, offering easy sharing of
64. The smallest network is a . peripherals, files and applications.
A. LAN A. LAN
B. PAN B. WLAN
C. WAN C. PAN
D. none of above D. MAN
71. A person who secretly gains access to a 77. Which of the following networks is a
computer in order to gain information or WAN?
cause damage.
82. The amount of data that can be transmit- 88. Which type of network covers a small ge-
ted in a given period of time is known as ographical area?
what?
A. WAN
A. Data collisions
B. PAN
B. Latency
C. DAN
C. Bandwidth
D. none of above D. LAN
NARAYAN CHANGDER
83. It connects similar networks 89. creates a network but broadcasts the data
A. repeater packets to all computers connected to the
network
B. gateway
A. router
C. bridge
D. none of above B. hub
98. How many MAIN types of network are B. Local Area Network
there? C. Wide Area Network
A. 1 D. Personal Area Network
NARAYAN CHANGDER
C. Keyboard
105. What is acronym of LAN D. none of above
A. Local Area Network
111. Switches use
B. Local Acces Network
A. IP address
C. Line And Networking
B. MAC address
D. Line-Less Networking
C. MCA adress
106. What software is able to block unwanted D. 1.3
connections to the network?
A. Firewall 112. Home networks are more likely to use
a
B. Snowywall
A. router
C. Rainwall
B. switch
D. Flamewall
C. hub
107. Which of the following devices has access D. none of above
control list
A. proxy server 113. Which is the shortest network covering
network?
B. firewall
A. WAN
C. hub
B. LAN
D. none of above
C. PAN
108. Which of these statement are true about D. MAN
LAN
A. A LAN connects computers in a small 114. Network in limited geographical area
area such as an office such as school or office
109. Connects geographically separated com- 115. Which is the largest network connec-
puters or LAN’S into one virtual network. tion?
A. WAN A. WAN
B. SAN B. WLAN
B. Discovery D. Router
A. It is cheaper. C. WAN
126. Brett uses a smartwatch to track the ex- 131. It is a network that serves a large city
ercise he does each day. He wants to
A. LAN
sync this data with his smartphone though.
What type of network will he use here? B. MAN
A. PAN C. WAN
B. LAN D. none of above
C. WAN 132. Mr John is a small businessman that runs
NARAYAN CHANGDER
D. VPN a Hardware, he has been experiencing
problem with his small accounting depart-
127. Which of these is most likely to use a ment which he depends on to provide him
WAN? with the sales reports. Mr John want to be
able to shared information between his 7
A. School
computer station and have on central print-
B. University ing area, what type of network would you
C. Multi-National Company recommend to Mr John?
130. What type of network is a home net- 135. What are the three common types of com-
work? puter networks
A. PAN A. ROM, MAN, LAN
B. DAN B. RAM, WAN, LAN
C. LAN C. MAN, LAN, WAN
D. WAN D. NON OF THE ABOVE
NARAYAN CHANGDER
D. both a and b
C. PAN
148. A unique number assigned to a network D. DAN
interface card when it is manufactured.
A. OP Address 154. It is two devices connected to each other
B. Mac Address with a physical medium, such as wire or
radio signals.
C. IP Address
A. Network
D. IM Address
B. Local Area Network
149. A computer network is where two or
more devices are connected together so C. Wide Area Network
they can share D. Metropolitan Area Network
A. people
155. What kind of Network does our ICT lab
B. resources
has?
C. cables
A. LAN
D. none of above
B. WAN
150. What type of network is the internet?
C. MAN
A. LAN
D. none of above
B. WAN
C. PAN 156. Which of the following is the advan-
D. DAN tage/s of proxy server
A. it saves bandwidth
151. A wide area network (WAN)
B. hides your ip address
A. connects two or more LANs together
B. means Wi-Fi can be used C. both a and b
C. is easier to use than a LAN D. none of above
D. connects two or more computers to-
157. A group of connected computers is a
gether
A. Computer network
152. Computer networks can be connected via
cables or B. Network
A. wirelessly C. Topology
B. plumbing D. none of above
NARAYAN CHANGDER
C. Ring topology
5. What are the 5 types of network topol-
D. Bus topology
ogy?
A. Mesh and Hybrid Topology 11. All devices have to be connected to by two
or more links in a network topology
B. Mesh, Star, Hybrid, Bus, Ring Topology
A. true
C. Star and Ring Topology
B. false
D. Bus and Star Topology
C. none of the above
6. Ring Topology Disadvantages “choose 2”
D. none of above
A. Requires more cables
B. Data packets travel at great speed 12. What type of topology is this? A topol-
ogy which is a type of networking where
C. Easier to fault find all nodes cooperate to distribute data
D. A break in the ring will bring it down amongst each other.
A. 8 C. RING TOPOLOGY
B. 9 D. STAR TOPOLOGY
C. 10 21. Which is a network where each computer
D. 11 is linked to the next, and the last is linked
to the first? ?
16. Which network topology has exactly two
A. Bus
neighbours for communication purpose?
B. Ring
A. Bus
C. Star
B. Ring
C. Star D. none of above
25. This is a technical term that describes the 31. Which device broadcasts any data to all de-
layout of connections in a network. vices on a network?
A. Network Topology A. Router
B. Standalone Computer B. Switch
C. Network Node C. Hub
D. Workstation
D. WAP
NARAYAN CHANGDER
26. The path that data travels between com-
puters (what you cant see) in a network 32. In Star Topology maximum numbers of
is called computers are
28. A modem is a device that allows a com- C. Physical connection between devices
puter to connect to the internet using a (a) D. A circuitboard with the components to
A. telephone line send/receive data
B. ethernet cable 34. Which law is this an example of:A(B+C) =
C. optic fiber cable (A.B)+(A.C)A+(B.C) = (A+B).(A+C)
D. none of above A. Associative
29. what are the types of topology? B. Commutative
A. physical & modenial C. Absorption
B. logical & soliloquiy D. Distributive
C. physical & logical
35. I have 8 computers and 2 electronic de-
D. none of above vices connected as a network but split in
a two floored storey building. Which type
30. A series of number used as address for a
of network is this?
device in a network .
A. IP Address A. Wide Area Network
36. covers which network technology? 41. which Topology use switch /hub
A. Ethernet with a ton of subcommittees. A. Star
A. Bus B. WAN
B. Star C. MAN
C. Ring D. PAN
D. none of above 43. IT TRANSMITS DATA ONLY IN ONE DIREC-
TION.
38. Who is the best in terms of speed?
A. BUS TOPOLOGY
A. Star
B. RING TOPOLOGY
B. Bus
C. HYBRID TOPOLOGY
C. Ring
D. STAR TOPOLOGY
D. none of above
39. -if the bus cable gets broken, it splits the 44. What is Ring Topology?
network into separate parts.Since the sep- A. Topology is a network configuration
arated networks don’t have terminators where device connections create a circu-
at both ends of the bus. There will be a lot lar data path.
of reflected signals which can shut down
B. Is a type of networking where all
the entire network.
nodes cooperate to distribute data
A. Bus amongst each other.
B. Star C. Topology is the arrangement of the el-
C. Ring ements of a communication network.
D. none of above D. none of above
40. The hub usually sends the message to all 45. IN THIS TOPOLOGY, EACH COMPUTER IS
devices inside the network. This process CONNECTED TO ONE ANOTHER IN THE
is called: FORM OR SHAPE OF A RING OR CIRCLE.
A. Multicasting A. EXTENDED TOPOLOGY
B. Broadcasting B. HYBRID TOPOLOGY
C. Unicasting C. BUS TOPOLOGY
D. Selective Forwarding D. RING TOPOLOGY
NARAYAN CHANGDER
D. I’ll be back. C. Printers
D. Tablets
47. What is the central node called in a star
network? 53. Which of the three main topologies rely on
A. Server a single main cable to transmit data pack-
ets?
B. Switch
A. Ring
C. Node
B. Star
D. Cable
C. Bus
48. What letters does hexadecimal use?
D. none of above
A. A-F
54. A signal containing the address of the in-
B. A-D
tended receiving machine travels from a
C. P-W source machine in both directions to all ma-
D. A-Z chines connected to the bus until it finds it
intended recipient
49. Each NIC has a unique
A. RING TOPOLOGY
A. IP Address
B. BUS TOPOLOGY
B. MAC Address
C. TREE TOPOLOGY
C. Postal Address
D. STAR TOPOLOGY
D. HTTP Address
55. Select three hardware that allows you to
50. What type of network does the Studio connect to a Network.
School have?
A. Router
A. LAN
B. CPU
B. WAN
C. NIC
C. MAN
D. Transmission media
D. PAN
56. Which Topology is Unidirectional?
51. Can the ring topology have a second con-
nection between the nodes? If yes, what A. Mesh Topology and Star Topology
is it called? B. Hybrid Topology
A. Yes, Mesh Topology C. Ring Topology and Bus Topology
B. Yes, Double-Ring Topology D. Ring Topology
57. Which device will only send data packets C. Ring Topology
to the intended recipient?
D. Hybrid Topology
NARAYAN CHANGDER
D. Hub provides centralized management connectors usually represent the physical
network cables, and the nodes represents
69. It illustrates how data flows within a net- usually the physical network devices (like
work. switches)
A. Network A. logical topology
B. LAN B. physical topology
C. Physical Topology C. Local Area Network
D. Logical Topology D. Virtual network
70. Question 10:Which of these components is
75. Which 2 are Disadvantages of a Star Topol-
internal to a computer and is required to
ogy?
connect the computer to a network? (1-4)
A. Requires additional hardware such as
A. Wireless Access Point
the central hub or switch
B. Network Interface card
B. if the main cable is damaged or fails
C. Switch the whole network fails
D. Hub C. More collisions with lots of machines
71. Networked computers can share (select on the network
which one is true) D. If the central device fails the whole
A. Hardware, software and data network goes down.
B. Optical discs, software and data 76. What are the advantages of a bus net-
C. Hardware, software and Clients work?
D. none of above A. Easy to set up and install
72. The layout that computers are connected B. Simple to add new devices
in a network is called C. Good for temporary networks
A. Geographical Topology D. High data transfer speeds
B. Network Topology
77. What is TCP stands for in TCP/IP
C. Logical Topology
A. Transmission central protocol
D. Physical topology
B. Transfer control Protocol
73. One of my workstations has gone down
C. Transmission control protocol
and my entire network has gone down.
Which topology am I using? D. none of above
78. , the most popular LAN technology, has 83. You have learned that there are three
many advantages, including ease of instal- types of network topology. Which one is
lation, scalability, media support, and low NOT network topology?
NARAYAN CHANGDER
B. Bus
C. Mesh 95. What is point-to-point topology
D. WiFi A. This is the most complex topology that
consists of a permanent link between two
90. Bus Topology Advantages “Choose 2” topologies. Because it’s a very popular
A. Use less cable than other topologies WAN topology.
B. Data packets travel at great speed B. This is the simplest topology that con-
C. Inexpensive to install sists of a permanent link between two
topologies. its very rare to see this WAN
D. One cable failure does not bring down
topology.
the entire network
C. This is the simplest topology that con-
91. Which is a network which is linked by a
sists of a permanent link between two
shared cable?
topologies. Because it’s a very popular
A. Bus WAN topology.
B. Ring D. This is the most complex topology that
C. Star consists of a permanent link between two
D. none of above topologies. its very rare to see WAN topol-
ogy.
92. Which was the earliest type of network
used? 96. Networks are easy to set up, which net-
A. Star work is harder to modify?
B. Ring A. BUS
C. Bus B. RING
D. BT Cellnet C. STAR
93. what is logical topology D. none of above
A. How the connection between the
nodes appears to the data link layer. 97. Which device routes a data packet to the
specific node to which it is addressed?
B. How the connection between the
frames appears to the data link layer. A. A Switch
C. How the connection between the net- B. A Bridge
work appears to the data link layer.
C. A Hub
D. How the connection between the me-
dia appears to the data link layer. D. A Server
98. What is a disadvantage of a Mesh net- C. Carrier Signal Multiple Access with
work Collision Detection
C. No single point of failure 104. What are the disadvantages to a star net-
work?
D. Expansion doesn’t disrupt the network
A. If the central node fails, the entire net-
99. Connects a similar network together like work will fail
LAN and LAN
B. It is expensive to set up
A. Moderm
C. Expensive to add new devices
B. Router
D. Very poor data security
C. Bridge
105. What’s a “stand-alone” computer?
D. Gateway
A. A smelly computer that nobody wants
100. What are the disadvantages to a bus net- to be next to
work? B. A single computer in a room by itself
A. Data only travels in 1 direction C. A single computer in a network
B. Poor data security D. A computer not joined in a network
C. If the backbone breaks, every follow-
ing device loses connection 106. Which of the following is valid IP ad-
dress?
D. Very expensive to set up
A. 12.0.0.1
101. Networked computers can share B. 168.172.19.39
A. Hardware, software and data C. 192.168.24.43
B. Optical discs, software and data D. none of above
C. Hardware, software and clients
107. What is the device called that serves out
D. none of above the wireless signals in our school?
102. HTTP stands for. A. Wireless access point
A. . Hyper Technology Transmission B. Wireless thing
Piece C. Wireless router
B. Hypertext Transfer Protocol D. Wireless switch
C. Hypertext Talking Package
108. The disadvantages of this topology it is
D. Hypertext Transfer Program expensive and impractical for large net-
work
103. CSMA/CD stands for
A. RING TOPOLOGY
A. Carrier Sense Multiple Access with Col-
umn Dexterity B. STAR TOPOLOGY
NARAYAN CHANGDER
A. network topolgy
110. What is a network Topology?
B. star topology
A. A network topology is the pattern in
which nodes are connected to a meme C. ring topology
B. 420 kush meister D. mesh topology
C. A network topology is the pattern in 115. Which of the TCP/IP model layers is re-
which nodes are connected to a local area sponsible for breaking down the message
network (LAN) or other network via links. into packets?
D. A network topology is the pattern in A. Network
which nodes are connected to Mr Fields
brain cells B. Application
C. Transport
111. A Topology is essentially the layout of
the network. Networks can be arranged D. Internet
in lots of different topologies. The ones
you need to know about are 116. A LAN usually (Select which one is true)
A. STAR A. Used by international organisations
B. BUS B. Is only used by one computer
C. MESH C. Usually operates on a single site
D. RING D. none of above
112. + Very few data collisions on a 117. In the centre of a STAR topology there
network compared with other network will be a
topologies (layouts)
A. hub
A. Bus
B. switch
B. Star
C. server
C. Ring
D. terminator
D. none of above
118. A problem with a star network is
113. It is the arrangement of network devices
and nodes to form a logical or physical A. There are data crashes
structure. This topology deals with net- B. It stops if a single computer stops
work protocols that are used to control the working
data flow across the network. The ether-
net protocol is the most common protocol C. It is expensive
used for logical topology. D. You can’t add a printer
119. Question 2:Which of these is a character- 124. Which of these is an advantage of a Ring
istic of a LAN? (3-6) network?
121. The amount of information in a network 126. The client PC doesn’t have to store any
transmission (headers, acknowledgments, data because the server PC store all the
retransmissions) that isn’t part of the ap- data . Based on the statement above .
plication data. Which network architecture is that?
A. throughput A. Peer to peer
B. overhead
B. Bus topology
C. goodput
C. Star topology
D. multipath
D. Client server
122. Network computers can do the following
(which is correct)? 127. An operational mode for Wi-Fi networks,
A. Use Video conferencing, play games in which wireless stations connect through
and write emails a wireless access point before they can be-
B. Use Video conferencing, play games, gin communicating with other devices.
send emails A. hotspot
C. Use Video conferencing, create B. omnidirectional antenna
games, send emails
C. unidirectional antenna
D. none of above
D. infrastructure mode
123. What advantage does a Bus have over a
Ring? 128. Which network topology uses a server?
A. If one computer fails, the network
A. Star
keeps working
B. It’s only £4 for a Day Saver B. Mesh
129. What is Hybrid Topology? B. Ensures devices over a wide range can
A. Easy to design and implement. all connect
B. a type of network topology that uses C. Does not rely on a network of cables
two or more differing network topologies D. Very high security
C. It is a type of network expensive.
135. Which of the following is a disadvantage
D. he arrangement of the elements of a
of a star network topology?
communication network
NARAYAN CHANGDER
A. If the central switch or server fails, the
130. A ring network: whole network is down
A. is reliable B. Requires a high performance switch or
B. is fast server in the centre as all traffic passes
C. requires additional software to func- through it.
tion efficiently C. Extra hardware such as hubs and
D. none of above switches may be needed
D. All 3 of them
131. It is a network topology where every pe-
ripheral node is connected to a central node 136. How many types of network topologies
called a hub or switch. are there?
A. Tree Topology
A. 8
B. Star Topology
B. 10
C. Ring Topology
C. 5
D. Hybrid Topology
D. 7
132. DIS:if the main cable fails, network data
can no longer be transmitted to any of the 137. Why would you use a fiber optic cable in-
nodes (work stations) stead of a ethernet cable?
A. Star A. Distance
B. Bus B. Speed
C. Ring C. Cost
D. none of above D. Distance and Speed
133. What are the “Common Physical Compo-
nents of a Network”? 138. Definition:An electrical component called
a “resistor, “ placed at the ends of a phys-
A. Electric Power ical bus network to absorb the signal in-
B. MS Windows stead of allowing it to bounce back up the
wire.
C. Switch, PC, cables.
D. none of above A. logical topology
B. signal bounce
134. What are the advantages of a mesh net-
work? C. wireless bridge
A. Suitable for large wireless networks D. terminator
150. What is cloud computing? (1-4) 155. Which BEST describes a computer net-
A. Storing large amounts of data on a sin- work?
gle computer A. 1 or more computers connected to-
gether
B. Using the internet to store and access
data and programs remotely B. 2 or more computers connected to-
gether
C. Storing hard copies of data as a
backup C. 3 or more computers in the same room
connected with a cable
NARAYAN CHANGDER
D. Using the internet to communicate
with other users D. 3 or more computers in the same room
connected wirelessly
151. In this topology all traffic must past
156. Which network topology cannot use WiFi
through the hub or switch.
technology?
A. STAR TOPOLOGY
A. Mesh
B. RING TOPOLOGY
B. Star
C. MESH TOPOLOGY C. Partial Mesh
D. TREE TOPOLOGY D. Every topology can use WiFi
152. It is the placement of the various compo- 157. Which of the following are uses of Hybrid
nents of a network. Topology:
A. Network A. Found in large enterprises
B. LAN B. Found in smaller enterprises
C. Physical Topology C. Used in places that require scalability
and flexibility
D. Logical Topology
D. Used in areas that have an electrical
153. What is the most commonly used Net- shortage and lack amenities
work Topology?
158. A BUS topology is (Which one is cor-
A. Mesh Topology rect)?
B. Tree Topology A. Easy to set up
C. Star Topology B. Expensive to set up
D. none of above C. Hard to set up
154. What type of network is this? In this D. none of above
network all the workstations, servers and 159. IN THIS TOPOLOGY, EACH COMPUTER
printers are joined to one main cable. At IS CONNECTED DIRECTLY TO A CENTRAL
each end of the cable a terminator is fitted CONNECTION POINT WHICH IS USUALLY
to stop signals reflecting back down. A SWITCH, ROUTER, ETC.
A. Ring Network A. STAR TOPOLOGY
B. Star Network B. HYBRID TOPOLOGY
C. Bus Network C. STRING TOPOLOGY
D. Mesh Network D. TREE TOPOLOGY
160. To which class the following IP address A. If one computer fails, the network
belongs to:192.168.20.50 keeps working.
NARAYAN CHANGDER
ripherals attached to it
B. Bus topology D. A computer that is used by only one
C. Start person
D. Hybrid star bus
177. Google chrome is
172. Which of the following networks will al- A. utility software
low an Internet connection?
B. operating system software
A. star
C. application software
B. mesh
C. all of the above D. Non of the above
C. Path can be fix or Changing to reach a 195. Points to point links make fault identifi-
Device over a network cation easy, this is Advantage of:
D. none of above A. Hybrid
191. WHAT ARE THE FIVE NETWORK TOPOLO- B. Tree
GIES C. Star
A. MESH TOPOLOGY, STAR TOPOLOGY, D. Mesh
HYBRID TOPOLOGY, EXTENDED TOPOL-
NARAYAN CHANGDER
OGY, RING TOPOLOGY 196. Select the correct use for Bus Topology
B. BUS TOPOLOGY, RING TOPOLOGY, A. It is used for each device that has ex-
STAR TOPOLOGY, EXTENDED TOPOLOGY, actly two device for communicating rea-
MESH TOPOLOGY sons
C. BUS TOPOLOGY, RING TOPOLOGY, B. It is used for small or temporary net-
TREE TOPOLOGY, EXTENDED TOPOLOGY, work when not relying on the large or high
MESH TOPOLOGY data transfer speed
D. BUS TOPOLOGY, TOKEN RING TOPOL- C. Topology for a Local Area network in
OGY, STAR TOPOLOGY, EXTENDED TOPOL- which all nodes are individually connected
OGY, MESH TOPOLOGY to a central connection point
192. Question 7:Which of these is the correct D. none of above
definition of a router? (1-4) 197. What is an advantage of creating a net-
A. Forwards data packets along a net- work?
work
A. It’s expensive
B. Corrects errors that are found in data
B. Share peripherals
packets
C. Share virusses
C. A type of transmission media that pro-
vides the greatest bandwidth D. Share routers
D. A server within a network 198. A star topology will cause a network fail-
193. What does a Hub do? ure if
200. Advantage of Bus Topology C. All devices are equal but some are
A. Only one wire-less expensive more equal than others
205. Which of these statements is correct 210. Which network topology is the hardest
when referring to P2P networks? to add a new computer to?
A. All devices are equal A. Ring
B. There is one central device B. Star
C. Bus C. Ring
D. none of above D. none of above
211. Which of these is an advantage of a Star 216. Which gate only has an output of 1 if both
network? inputs are 1?
A. No extra hardware needed A. OR
B. Reliable B. NAND
C. AND
NARAYAN CHANGDER
C. Cheap
D. none of above D. NOR
212. -if there is a problem with the switch or 217. The way network are designed to commu-
server then the whole network is affected. nicate.The above statement refer to
A. Bus A. Network topology
B. Star B. Network architecture
C. Ring C. Peer to peer network
D. none of above D. Client server network
213. What is hub and spoke 218. -To try and avoid data collisions, devices
must wait for the bus cable to be avail-
A. VLAN version of the star topology in able before they can send any data, this
which a central site interconnects branch can slow the network down.
sites using point-to-point links.
A. Bus
B. WLAN version of the star topology in
which a central site interconnects branch B. Star
sites using point-to-point links. C. Ring
C. WAN version of the star topology in D. none of above
which a central site interconnects branch
219. I don’t have a server in my network.
sites using point-to-point links.
What type of network is this?
D. LAN version of the star topology in
A. Mesh
which a central site interconnects branch
sites using point-to-point links. B. Star
C. Client-Server
214. ADV:No problem with collisions, each sta-
tion has its own cable to the server. D. Peer-2-Peer (P2P)
A. Star 220. IN THIS TOPOLOGY, ONE OR MORE
B. Bus STAR TOPOLOGIES HAVE AN ADDITIONAL
NETWORKING DEVICE THAT IS CON-
C. Ring
NECTED TO A MAIN NETWORKING DE-
D. none of above VICE.
215. -the switch itself is also an expensive A. STARS TOPOLOGY
piece of hardware. B. HEART TOPOLOGY
A. Bus C. RING TOPOLOGY
B. Star D. EXTENDED TOPOLOGY
221. A device designed to filter and transfer IP 226. The Internet is an example of which topol-
packets between dissimilar types of com- ogy:
puter networks is called: A. mesh
232. Which of the following is NOT an advan- 237. DIS:performance degrades with heavy
tage of a star network topology? traffic
A. There is no central node to fail A. Star
B. Simple to add or remove a node as it B. Bus
has no effect on any other node C. Ring
C. Good security-no workstation can in- D. none of above
teract with another without going through
238. + Tends to have better performance that
NARAYAN CHANGDER
the server first
other network layouts. Data goes straight
D. Very few data collisions as each node to the central device so all devices can
has its own cable to the server transmit data at the same time.
233. What is considered the easiest topology A. Bus
to design and implement. B. Star
A. Star Topology C. Ring
B. Tree Topology D. none of above
C. Mesh Topology 239. Which class of IP address has the maxi-
mum amount of host addresses available
D. Bus Topology
by default?
234. Which network topology is the strongest A. A
against damage? B. B
A. Star C. C
B. Mesh D. D
C. Ring 240. Select the three advantages of RING
D. none of above TOPOLOGY.
A. It is easy to install extra network de-
235. A software or hardware used to prevent vices
unauthorised access to the network.
B. The addition of new nodes has no ef-
A. Hub fect on the network’s performance
B. Firewall C. Each node is linked independently, a
C. Modem failure of one node or its link transmission
media has no effect on any other nodes
D. Router
D. Each computer has equal access to re-
236. The term used when electricity bounces sources
off the end of a cable and back in the other
241. The actual arrangements of cables and
direction is called (or “reflection”).
nodes on a network is called
A. signal propagation A. Geographical Topology
B. signal bounce B. Network Topology
C. physical star topology C. Logical Topology
D. network backbone D. Physical topology
242. Question 9:Which type of transmission 247. What topology provides the most fault
media is the least expensive to manufac- tolerance?
ture? (6-9)
NARAYAN CHANGDER
B. Files can be shared
253. ADV:Consistent performance, even when C. Software can be installed on a the
the network is being heavily used. server and shared
A. Star D. Networks are easy to set up
B. Bus
259. + Relatively cheap to set up when com-
C. Ring pared with other topologies. As total
D. none of above length of wiring needed is much less, and
the hardware you need(the central cable
254. Wi-Fi networks can operate in one of two and terminators) is cheaper than switches,
modes:infrastructure and both to buy and maintain.
A. hotspot A. Bus
B. ad hoc B. Star
C. fiber C. Ring
D. channels D. none of above
255. + IF a device fails or a cable is discon- 260. According to the associative law of addi-
nected the rest of the network is unaf- tion,
fected.
A. A + B = B + A
A. Bus
B. A = A + A
B. Star
C. (A + B) + C = A + (B + C )
C. Ring
D. A + 0 = A
D. none of above
261. What is processor speed measured in?
256. In which topology does data move in only A. Hertz
one direction to prevent collisions?
B. Watts
A. Star
C. Amps
B. Mesh
D. Volts
C. Ring
D. Bus 262. Which topology has terminators?
A. Bus
257. Which of the following devices broad-
casts a signal to all other devices on a net- B. Ring
work? C. Star
A. A Hub D. Terminal
266. DIS:may be costly to install because of 271. The best use of powerline connections is
the length of cable required. for
NARAYAN CHANGDER
data from/to clients.
A. the network is a local network topol- A. Star Topology
ogy in which the infrastructure nodes con-
nect directly B. Tree Topology
275. Which of the following are disadvantages C. Stores the CPU and RAM
of the star topology? D. Stores the CPU, RAM and the HDD
A. The whole network is affected if the
279. What is the correct answer? Each node
central point fails because no node can
is directly connected to every other nodes
communicate
in the network.
B. It is expensive to implement because
A. Definition of Star Topology
each device connects directly to every
other device in the network B. Definition of Hybrid Topology
C. Data collisions never occur because C. Definition of Mesh Topology
the devices are connected by a central D. none of above
switch
D. Wired networks can be expensive if 280. ADV:Inexpensive to install, as it requires
you need to connect lots of devices less cable and no additional hardware.
A. Star
276. What is the core of a fiber optic cable
made of? B. Bus
A. Copper C. Ring
B. Wire D. none of above
2. Ethernet is a protocol for data transmis- 7. Which layer does the IP protocol belong
sion in a in?
A. Layer 1-Physical
13. Which type of transmission media is the A. You can use it in a range of ‘hard to
least expensive to manufacture? reach’ locations making users more mo-
bile
A. Coaxial
B. It is simple to join a WiFi network
B. Twisted pair cable
C. It reduces Health & Safety issues by
C. Plastic
removing wires
D. Fibre Optic D. It can transmit signals over very long
NARAYAN CHANGDER
distances (> 1 mile)
14. What is a Standard?
A. A set of programs that enable commu- 19. Before data transmission begins, devices
nication send messages to one-another, completing
a task called?
B. A set of specifications one must follow
to communicate A. Data Transmission
NARAYAN CHANGDER
tent mounted in racks.
34. Provides the rules for file transfer be- B. They define how messages are ex-
tween computers. changed between the source and the des-
A. FTP tination.
35. Which protocol(s) are used for web- 40. Which layer do HTTP, SMTP, FTP protocols
pages? belong in?
A. SMTP A. Layer 1-Physical
B. POP B. Layer 2-Data Link
C. HTTP C. Layer 3-Network
D. HTTPS D. Layer 4-Transport
E. Layer 5-Application
36. a means of putting datagrams together
A. Wifi 41. The difference between IMAP and POP
protocols:
B. IP
A. IMAP allows to download emails once
C. HTTP
the user access the email account while
D. TCP POP not
37. What process involves placing one PDU in- B. POP allows to download emails once
side of another PDU? the user access the email account while
IMAP not
A. encapsulation
C. Both protocols allow to download
B. encoding
D. Both protocols doesn’t allow to down-
C. segmentation load
D. flow control
42. Which two devices are intermediary de-
38. Which layer communicates using bits? vices? (Choose two)
A. Layer 1-Physical A. hosts
B. Layer 2-Data Link B. routers
NARAYAN CHANGDER
D. Hexadecimal
C. USD
55. Which of these is a correct definition of
DNS? D. URL
A. An internet service that is used to de- E. HTTP
tect errors
60. Which is the first of the four layers in the
B. An internet service that stores data in TCP/IP model?
large quantities for different companies
A. Internet
C. An internet service that provides a
messaging service for users to communi- B. Transport
cate C. Application
D. An internet service that translates al- D. Link
phabetic names into IP addresses
61. IMAP stands for:
56. Which of the following is NOT a network
protocol? A. Internet Message Access Protocol
C. They allow governments to maintain 69. A large corporation has modified its net-
complete control over the Internet work to allow users to access network re-
sources from their personal laptops and
NARAYAN CHANGDER
another across the internet C. a set of layers used on the internet
B. . accessing emails D. a standard by the International Stan-
C. . Sending emails from one server to dards Organisation
another
80. allows webpages to be shared across dif-
D. . having a conversation over the inter- ferent computers and browsers
net
A. HTTP
75. Select the network layer where IP ad- B. IP
dress/Packet Number/Error check is com-
pleted. C. SMTP
A. Application Layer D. FTP
B. Transport Layer 81. Which layer of the TCP/IP model splits
C. Internet Layer data into packets and reassembles them
at the destination?
D. Link/Physical Layer
A. Application
76. Which protocol governs the way we trans-
B. Transport
fer and load hypertext?
C. Internet
A. FTP
B. SMTP D. Network Access
84. An FTP protocol is used for 89. Transmission control protocol (TCP) splits
A. Copying files from one host to another data into
86. Which protocol holds the email only until 91. The checksum in a data packet is used
you receive it? to
NARAYAN CHANGDER
work B. It is an organization that enables indi-
D. A service that translates alphabetic viduals and businesses to connect to the
names into IP addresses Internet.
C. It is a standards body that develops
95. two common standards are Bluetooth and
cabling and wiring standards for network-
801.11
ing.
A. TCP
D. It is a protocol that establishes how
B. Wireless computers within a local network commu-
C. HTTPS nicate.
D. SMTP 100. Which protocol would download the
email from to your computer and delete it
96. mail servers use this protocol to send and
from the server?
receive mail messages, mail applications
typically use this only for sending mes- A. FTP
sages to a mail server.
B. SMTP
A. SMTP
C. POP3
B. HTTP
D. HTTP
C. IP
D. Wifi 101. What does Protocol mean?
A. Rules
97. What is meant by a data packet?
B. Security
A. A unit of data that travels along a net-
work C. Services
B. The number of error found in data D. Orders
when it has been transmitted
C. The data a computer needs to connect 102. Provides the rules to be followed by a
to a network web server and a web browser when re-
questing and supplying data.
D. A connection point in a network that al-
lows data to be shared A. FTP
B. SFTP
98. Which email protocol keeps a copy of the
email on the mailserver? C. HTTP
A. POP D. HTTPS
B. SMTP E. SMTP
103. DNS is an address book mapping to 108. The OSI model consists of layers
A. 3
NARAYAN CHANGDER
provide IP addresses to network comput-
B. To control which devices on a network ers?
are able to access the Internet
A. DNS
C. To request a specific web page from a
B. HTTP
web host and display the results
C. DHCP
D. To allow the user to create their own
web pages D. ARP
A. to take the large network and filter it, 15. Which cloud storage are being describe be-
without changing the size of the network. low:Combination of both cloud; some re-
B. to check messages are sent to the sides in private cloud, while less sensitive
right device. data can be access from public cloud
NARAYAN CHANGDER
C. hub two LAN’s together that uses the same
D. country protocol?
A. Hub/Switch
17. A computer that gains itself of the services
B. Router/Modem
provided by servers.
C. Bridge
A. Cable
D. Server
B. Server
C. Client 23. Is an electronic device that connects to
the Internet via an ISP (Internet Service
D. Mainframe
Provider). It converts digital data to ana-
18. This type of network is used to transmit log signals for transmission over a phone
data between Europe and North America. line.
A. WAN A. Modem
B. LAN B. Hub
C. WLAN C. Repeater
D. none of above D. Switch
19. Routing tables of a router keeps track of 24. What is the function of Network Interface
Cards?
A. MAC address of assignments A. connects the clients, servers and pe-
ripherals to the network through a port
B. Port assignment to network devices
B. allows you to segment a large network
C. Distribute IP addresses to network de- into smaller, efficient networks
vices
C. connects networks with different pro-
D. Routes to use for forwarding data to tocols like TCP/IP
its destination
D. boost the signal between two cable
20. What does the data get broken down in to segments or wireless access points
allowing it to travel across a network such
as the internet? 25. A group of computers and other devices
connected together is called a network,
A. Packets and the concept of connected computers
B. Pieces sharing resources is called
C. Parts A. Networking
D. Points B. Inter-Network
35. Which of the following can be changed on a 40. What should you configure to improve
managed switch by an administrator? (Se- wireless security?
lect all that apply.)
A. Enable the SSID
A. Duplexing B. IP spoofing
B. VLAN assignment C. Remove repeaters
C. Routing table D. MAC filtering
D. Port speed
NARAYAN CHANGDER
41. Your boss asks you to limit the wireless
36. Connects multiple computers together in a signal of a WAP from going outside the
network. Shares data between all comput- building. What should you do?
ers A. Put the antenna on the exterior of the
A. Router building
39. is an Internet standard protocol 44. Which network device are being describe
used by email clients to retrieve email mes- below:Take any data packet received at
sages from a mail server over a TCP/IP one of its port and broadcast it to every
connection. computer in the network
A. IMAP A. Hub
B. HTTP B. Switch
C. FTP C. Bridge
D. POP3 D. Router
45. In email terminology, what does CC stand 50. Which is the correct answer to the be-
for? low:”A computer that does not communi-
cate with other devices”
55. A small computing device, typically small 60. A host wants to send a message to
enough to be handheld another host that has the IP address
115.99.80.157. IP does not know the
A. PDA
hardware address of the destination de-
B. WAP vice. Which protocol can be used to dis-
C. POE cover the MAC address?
D. Workstation A. ICMP
NARAYAN CHANGDER
B. DHCP
56. What does e-mail stand for?
C. DNS
A. Electric Mail
B. Electron Mail D. ARP
A. Coaxial C. Macroblogs
B. STP D. B-blog
C. UTP
64. They are high-powered business comput-
D. Fiber optic ers. They are designed for specialized,
high-end applications like engineering pro- 69. Its task is to send network traffic to its
grams such as CAD (Computer Aided De- correct destination. It works by reading
sign). They are used in 3-D graphics de- the destination network address within
NARAYAN CHANGDER
C. Gateway computing?
D. All of these A. Saves storage space on your PC
75. A device that amplifies a signal as it B. Gives you access to files from any com-
passes through it to counteract the effects puter
of attenuation. C. Protects your files from being lost due
to PC failure
A. Server
D. Completely protects your information
B. Client from cloud hackers
C. Cable
80. Which network device are being describe
D. Repeater below:This device checks the incoming
data packet and works out the destination
76. Which connector is used for UTP cabling on address and sends the data packet to the
a network? computer with that address only
A. RF-11 A. Hub
B. BNC B. Switch
C. RS-232 C. Bridge
D. RJ-45 D. Router
77. You are the network administrator for a 81. Each computer has a unique , like a tele-
small organization. Recently, you con- phone number for the internet.
tracted with an ISP to connect your organi- A. Meme
zation’s network to the internet to provide B. Graphic Card
users with internet access. Since doing
C. IP Address
so, it has come to your attention that an
intruder has invaded your network from D. Network Pin
the internet on three separate occasions.
82. Client computers
What type of network hardware should
you implement to prevent this from hap- A. sharing internet connections
pening again? B. these are the normal computers that
A. Switch user can use it to get their work done.
C. can Sharing hardware, such as print-
B. Firewall
ers.
C. Router
D. can Control who can or cannot have ac-
D. CSU/DSU cess to the network.
83. A network device has several ports and 88. The most basic networking device that
refers to a table of MAC addresses to de- links multiple computers or other network
termine which port to use to forward the devices together.
85. They are computers used primarily by 90. network that allows information to be
large organizations for critical applica- shared between devices over LAN
tions, bulk data processing such as cen- A. wifi
sus, industry and consumer statistics, en-
B. hotspots
terprise resource planning and transaction
processing. C. ethernet
A. Mainframe D. server
B. Print Server 91. network type that covers the network con-
C. Desktop nection of an entire city or connection of a
small area .
D. Laptop
A. WAN
86. Which cable sends data as light? B. LAN
A. Copper C. MAN
B. Fibre Optic D. PAN
C. Ethernet
92. Which of these is a disadvantage of the
D. none of above ring topology?
87. RFID in Internet of things stands for? A. If one cable is disabled the whole net-
work can crash
A. Radio Frequency Infrared Device
B. If the central hub crashes the whole
B. Repeated Free Induction Decay network breaks
C. Request For Implementation Date C. Only four computers can be attached
D. Reduced-Fat Informed with Details to the ring
E. Radio-frequency identification D. Everyone has to sit facing each other
93. An infrastructure device designed for con- 98. Which of the following is the unauthorized
necting wireless/wired client devices to a access of information from a Bluetooth de-
network is commonly referred to as: vice?
A. Captive Portal A. Bluejacking
B. Access Point B. Bluesnarfing
C. IDF C. Deep Blue
D. Active Hub D. The Blue Brothers
NARAYAN CHANGDER
94. Select 3 reasons for using a network 99. many businesses use this Wi-Fi technology
to allow the public an access point to a
A. Increased security-user access to the wireless network
network is controlled
A. hotspots
B. Data transfer can be controlled
B. coldspot
C. Sharing resources and devices
C. satellites
D. Centralisation of data D. bluetooth
95. .dynamically assigns an IP address and 100. Which of the following are true regarding
other network configuration parameters bridges? (select two)
to each device on a network so they can
communicate with other IP networks A. Bridges are used to separate one part
of a subnet from another.
A. HTTPS
B. Bridges can connect two segments
B. FTP that use different types of network archi-
C. DNS tecture.
105. allows computers, smartphones, or other 110. What device can be described as a hub for
devices to connect to the Internet or a wireless network?
communicate with one another wirelessly
within a particular area A. Bridge
A. wifi B. Switch
B. html C. Access Point
C. LAN D. Firewall
D. ftp
111. Which topology allow to connect comput-
106. The amount of data that can be trans- ers including server in a ring?
ferred over wires or fibre optic cable or
wireless-usually measured in megabits per A. Star
second. B. Tree
A. Light C. Ring
B. Switch
D. LAN
C. Bandwidth
D. Router 112. Which of the following hardware devices
links multiple networks and directs traffic
107. A device that can be used to to connect between networks?
dissimilar types of Network is
A. Repeater
A. repeater
B. bridge B. Router
C. gateway C. Hub
D. router D. Bridge
113. Hafsa thinks that the main disadvantage 118. Which of these is an advantage of the bus
from using this device results from a fact topology?
that any incoming signal on any of its ports A. It is easy and cheap to set up
is re-created or copied and sent out on all
connected ports, B. It is useful for large companies
NARAYAN CHANGDER
D. Bridge scribe below:Customer and cloud storage
provider are different companies
114. What is drawback of hub A. Public Cloud
A. Bluetooth and infrared B. Private Cloud
B. Poor security C. Hybrid Cloud
C. Intelligent device D. none of above
D. none of above
120. Network devices called concentrators be-
115. What is TCP responsible for doing on a cause they serve as a central connection
network? point for a LAN. It extends the range of
A. It breaks up messages from com- a signal by receiving then regenerating it
puters into small packets to send them and sending it out all other ports. Allows
across the network for collisions on the network segment and
are often not a good solution.
B. It finds computers on the network
A. switch
C. It helps send messages to the correct
computer B. Computer
D. It directs traffic on a network, even if C. Router
part of the network is broken D. Hub
116. What is the name of the type of network 121. Which network device are being describe
that doesn’t have a server? below:This device will convert analogue
A. Client/Server data into digital data and vice-versa
B. Peer to Peer A. Switch
C. Server to Server B. Modem
D. Client to Client C. Router
D. Bridge
117. Which network is able to connect and
send data to each computer via central hub 122. disadvantages of a Network
or switch without looking where the data A. share files, resources
is sent?
B. hare resources such as printer, scan-
A. Star ner and internet connections.
B. Router C. Store data centrally (by using server)
C. Bus for ease of access and backup
D. LAN D. The computer is vulnerable to hackers
123. A type of network device that amplifies 128. Which network component connects a de-
received signal so it can be transmitted vice to transmission media and allows the
over greater distance without loss in qual- device to send and receive messages?
125. Which of the following, when removed, D. Covers topics of global interest
can increase the security of a wireless ac- 130. On the base of which address switch de-
cess point? cides where to send the packet?
A. MAC filtering A. IP address
B. SSID B. ARP address
C. WPA C. Post code
D. Firewall D. MAC address
126. Which of these is an advantage of cloud
131. WAP stands for
storage?
A. Wired Access Point
A. The user has no control over their data
B. Wireless Access Point
B. Many programs can be run at the same
time, regardless of the processing power C. Whatsapp
of your device D. Wireless Account Permission
C. Accessible anywhere with an internet
132. URL is short for
connection
A. Uniform Resource Locator
D. Portability
B. Unicorn Riding Laser
127. What type of device could allow a vehi-
C. Unlikely Reference Look-up
cle to place a show a warning on the dash-
board, which might also notify the car’s D. Nothing Just URL
manufacturer?
133. In almost all cases, this device is respon-
A. digital network sible for sending out WIFI signals in your
B. generator home for you to connect to.
C. smart phone A. Router
D. sensor B. Hub
A. IP Address A. Switches
NARAYAN CHANGDER
C. MAC address C. Hubs
137. Several networks connected together us- 141. Cable consists of color-coded pairs of in-
ing a router. sulated copper wires.
A. WAN A. UTP
B. WLAN B. STP
C. LAN C. TPC
138. Which of the following devices does NOT 142. Which of the following is a valid MAC ad-
operate at the network layer of the OSI dress?
model? A. 192.168.12.15
A. Router B. 34-9A-86-1G-B3-24
B. Firewall C. 83-5A-5B-0B-31-55-F1
C. Access Point D. C0-34-FF-15-01-8E
D. Layer 3 Switch E. 255.255.255.0
D. STP A. DSL
B. Router
153. Which of the following is an unauthorized
wireless router that allows access to a se- C. Dial-up modems
cure network? D. None Of The Above
A. Rougue access point 159. This network device connects one LAN to
NARAYAN CHANGDER
B. Evil twin another LAN that uses the same protocol.
C. War-driving A. Hub
D. AP isolation B. Switch
C. Bridge
154. Below are examples of good email neti-
quette except for D. Router
A. Always check spelling and grammar 160. How many wires are connected in a RJ
B. Use capital letters to highlight com- 45 connector?
ments A. 4
C. Do not send spam B. 8
D. Respect people’s privacy C. 2
155. A network in which the nodes are located D. 16
within a small geographic area. 161. What device is used to connect a number
A. MAN of computers together to make a LAN?
B. NOS A. Hub/Switch
C. WAN B. Bridge
D. LAN C. Router/Modem
D. Server
156. designed to connect devices over large
distances like states or between countries. 162. small device that connects computers to-
A. WAN gether
B. LAN A. wifi
C. MAN B. server
D. PAN C. queue
D. hub
157. Each pair is wrapped with an additional
metal shield, then all pairs are wrapped in 163. If all devices are connected to a central
a single outer plastic sheath. hub, then topology is called
A. UTP A. Bus Topology
B. STP B. Ring Topology
C. Fiber optic C. Star Topology
D. Coaxial D. Tree Topology
B. MAN B. Cable
C. WAN C. ADSL
D. NET D. HTTPS
173. What is the main reason for adding some- 178. Provide network access to wireless de-
body into the BCC list for an email? vices such as laptops and PDAs. Use radio
waves to communicate with radios in com-
A. It keeps them updated
puters, PDAs, and other wireless devices.
B. It adds them to the conversation Have limited range of coverage.
C. It adds them privately and hides them A. Routers
from view
B. WAP
D. It allows them to see older messages
NARAYAN CHANGDER
C. Switches
174. What type of connector do twisted pair D. Servers
cables on computer networks use?
179. How do switches and bridges learn
A. RJ-11 where devices are located on a network?
B. RJ-30 A. When a frame enters a port, the
C. RJ-45 source IP address is copied from the
frame header.
D. NONE OF THE ABOVE
B. When a frame enters a port, the des-
175. networks connect computers to- tination IP address is copied from the
gether over relatively small distances, frame header.
such as within a single building or within C. When a frame enters a port, the des-
a small group of buildings. tination MAC address is copied from the
A. WAN (Wide Area Network) frame header.
3. What would you need to construct before 8. The part of the internet that users can ac-
NARAYAN CHANGDER
building your website? (KLO 3.1b) cess using web browsers such as Google
Chrome is called the?
A. A storyboard
A. World Wide Web
B. A wireframe
B. The Intranet
C. A prototype
C. HTTP
D. A protocol
D. The Deep Web
4. A type of network where no one outside
an organisation is allowed access is called 9. What is the name of the software you
a(n): need to view web pages?
A. telnet A. A router
B. A network interface card
B. extranet
C. A web borwser
C. intranet
D. A firewall from a single external css
D. internet
file The same html code can be displayed
on many different screen sizes and de-
5. These are actions that happen on the
vices without alterationEasier to allow vi-
user’s end inside their web browser (or
sually impaired people to personally ad-
client). HTML, CSS and Javascript are all
just the way the page looks for specific
client side technologies in that they don’t
CSS properties. All browsers support the
depend on the web server to function.
original CSS1 properties. But later ver-
A. Client Side sions such as CSS3 have less support, es-
B. Domain/subdomain pecially for browsers on non-desktop com-
puters such as smart phones and tablets.
C. Domain Registrar
10. A is a graphic organizer in the form
D. Angular
of illustrations or images displayed in se-
E. Java quence for the purpose of pre-visualizing a
motion picture, animation, motion graphic
6. What does DOM stand for? or interactive media sequence. (KLO 3.1a)
A. Document Object Model A. Wireframe
B. Dimensional Object Modifier B. Navigation Map
C. Document Object Modifier C. Storyboard
D. Document Open Model D. None
15. When constructing a website, using HTML, C. CSS structures a webpage. HTML
which of the following editor would you strictly provides styling.
use? (KLO 2.1) D. There is no difference.
NARAYAN CHANGDER
C. 403 Error plates throughout a website.
D. 180 Error A. Global Module
E. 001 Error B. Smart Content
C. RSS
21. The system of files and directories is called
D. 404 Error
A. File system E. Sub-page
B. File directory 26. This is a fairly loose term that’s thrown
C. File Manager around a lot. In general, it’s a collection
of code (classes, libraries, etc.) that is
D. File dataset reusable for future projects.
22. This is when a website doesn’t follow con- A. Framework
ventional scrolling top to bottom but in- B. XML
stead only a piece of the page moves while
you scroll. C. 301 Redirect
A. Scroll-Jacking D. Scroll-Jacking
29. is the language used to add style to docu- you about the design, look, and feel of
ments created with HTML. the website alongside brief explanation?
(KLO 3.1a)
30. The most popular front-end framework for 34. is an acronym for HyperText Markup Lan-
building websites and applications. It was guage. It is the standard language used to
originally developed by some developers create web pages. It provides a way to
at Twitter and is free and open source. make structured documents using a series
of element tags.
A. Bootstrap
B. Production A. HTML
33. Suppose you start building a website for 37. A platform where anyone has the ability
AlRajhi bank, and they ask you for the to write applications for it, or a piece of
blueprints of the website with an expla- software for which source code is made
nation. Then, you would provide them available for free, allowing for redistribu-
with their website’s wireframe. However, tion and the ability to modify that code.
what would you provide if they asked A. Open Source
NARAYAN CHANGDER
A. Resources transferred via the Hyper- 43. Which of the following is not a loop state-
text Transfer Protocol (HTTP) and are pub- ment?
lished by a software application called a
A. for loop
web server.
B. while loop
B. an information system where docu-
ments and other web resources are iden- C. do.while loop
tified by Uniform Resource Locators.
D. beef loop
C. same as the internet.
44. A(n) CSS style is contained in a style sheet
D. None of the above
separate from the webpage.
39. DNS maps human, readable domain names A. inline
into actual
B. linked
A. IP addresses.
C. box model
B. domain names.
D. separated
C. servers.
D. caches. 45. are HTML elements that don’t appear vis-
ibly for the user on a webpage, but give
40. Used by expert HubSpot CMS developers the web browsers additional information
to create customized functionality above about the page keywords, author of the
and beyond the out of the box capabilities document, last modified, etc.
of the platform. A. Meta Elements
A. Custom Module B. User Persona
B. Library C. User Flow
C. XML D. Value
D. 301 Redirect E. Domain/subdomain
E. Template
46. Computer web pages are written in type
41. What does HTML stand for? (KLO 3.2a) of language which is(KLO 2.3c)
A. Hyper Text Markup Language A. hypertext
B. Hyperlink and Text Markup Language B. multimedia
C. Home Tool Markup Language C. hyperlinks
D. None D. assembly
56. Recent surveys indicate that the most pop- 61. Not used as frequently as it once was a
ular browser is few years ago, but a portal refers to the
A. Internet Explorer login environment of any given software.
B. Bing A. Portal
C. Chrome B. RSS
D. Firefox C. 404 Error
57. A property in CSS is the part of a web D. Parallax
NARAYAN CHANGDER
pages foundational HTML code (font size, E. Navigation Map
color, margin) whose appearance or style
is changed by CSS. 62. Which tag should be used to create a main
A. Property heading on a page?
B. Sitemaps A. <h1>
C. IIS/Microsoft Server B. <head>
D. SSL C. <main>
E. Node.js D. <heading>
58. When creating a table in HTML, which of
63. In Architecture, to improve efficiency,
the following tags would you NOT use?
servers normally store requested files in
(KLO 3.2d)
a cache in (KLO 2.2)
A. <tr>
A. Server
B. <tbhr>
B. Domain
C. <table>
C. WebServer
D. <th>
D. Memory
59. Any page that is not your homepage. An-
other way to think of this is any page on 64. All HTML elements can be consider as
a URL that is a sub-folder of your main do-
main. A. boxes
A. Sub-page B. styles
B. Wireframe C. functions
C. Opening Tag And Closing Tags D. scripts
D. Self-Closing Tag
65. is a wireless technology standard for
E. Property exchanging data over short distances from
fixed and mobile devices, and building per-
60. What is this an example of? /* This is a
sonal area networks (PANs).
multi-line comment */
A. Syntax A. Infrared
B. Property B. WIFI
C. Value C. Bluetooth
D. Comment D. 4G
NARAYAN CHANGDER
A. HTML5
C. Through DOCTYPE.
B. IIS/Microsoft Server
D. Through the table tags.
C. SSL
77. Technology that carry information, such as D. Name Server
sound, by systematically modulating prop- E. JSON
erties of electromagnetic energy waves
transmitted through space. 82. A method to prevent outside computers
A. Transistors from accessing a local network. This helps
with security threats from outside enti-
B. Radio Waves ties.
C. Telephone Cables A. Firewall
D. Wi-Fi B. ASP/.Net
78. ISP exchanges internet traffic between C. IP
their networks with help of (KLO 2.1d) D. AJAX
A. internet exchange point E. JavaScript
B. subscriber end point 83. A method by which a web server can redi-
C. ISP end point rect traffic from a given URL to another
URL. This tells the search engines that this
D. internet society
is a “permanent redirect” and to update
79. When you think about target audience, their indexing of the original URL.
you think about people. Which of the fol- A. 301 Redirect
lowing is not an example of a group of tar- B. User Experience (UX)
get audience? (KLO 3.4a)
C. Hero
A. 9-13+
D. Mood board
B. Gender-Time
E. Meta Elements
C. Teens-Adults
84. What is the viewport?
D. None of the above.
A. The viewport is the user’s visible area
80. A is one of a small set of data holding of a web page.
places that are part of the computer Pro-
B. A physical port located on the front of
cessor. (KLO 2.1c)
a display screen.
A. Domain C. A menu option to change the appear-
B. Path ance of your screen.
D. It’s a HTML tag element. 89. CSS helps us bring life and color to our
websites. Which of the ways listed be-
85. Which of the following is an advantage of low is NOT a form of enabling CSS into an
NARAYAN CHANGDER
C. Through an information booth. world (WordPress, Drupal, etc) it’s one
D. Through telephone. of the most common technologies on the
Internet.
94. A computer on internet is identified A. PHP
by(KLO 2.1a)
B. Java
A. email address
C. Joomla
B. street address
D. Global Module
C. IP address
E. Production
D. server address
99. is the underlying protocol used by the
95. are outlines or maps of the pages that
World Wide Web and this protocol defines
make up a website.
how messages are formatted and trans-
A. Sitemaps mitted, and what actions Web servers and
B. CSS3 browsers should take in response to vari-
ous commands. (KLO 3.2)
C. Client Side
A. HTML
D. Web Host / Web Server
B. XML
E. Media Query
C. IP
96. Which CSS concept describes how the or-
D. HTTP
der and placement of rules in the style
sheet affect the application of styles? 100. What statement are used frequently in
A. cascade theory scripts to set up a block of statements that
repeat?
B. inheritance theory
A. Conditional
C. descendant theory
B. Function
D. specificity theory
C. Loop
97. is a markup language that sets a collection
of rules to define the encoding format for a D. Arithmetic
document type. It’s goal, as with JSONis 101. What is the correct HTML for creating a
to be easily readable by humans as well hyperlink? (KLO 3.2g)
as machines.
A. <a name=http://www.w3schools.com>WeSchool.com<
A. Extensible Markup Language
B. Sitemap B. <a url=http://www.w3schools.com>W3Schools.com</
C. User Experience (UX)
C. <a href=http://www/W3schools.com>W3Schools.com”>W3Schools</a>
B. Firewall
C. TTL (time-to-live)
112. How can you make a bulleted list? 117. is the path typical users take when start-
ing on a website and moving toward an
A. <ol>
action on the site. Creating a smooth path
B. <ul> that is intuitive for users to follow is part
C. <list> of user experience (UX) design.
NARAYAN CHANGDER
C. VPN
interests or goals into specific groups or
communities D. Firewall
A. Ajax E. DNS
B. .jvs D. Staging
131. Suppose you are about to startup a busi- 135. An online journal created by an individual
ness that is all about providing education or an organization that can cover a wide
to students who are unable to purchase range of topics
books worth thousands of SARs. While
A. Mashup
doing so, you want to ensure that your em-
ployees have full access to data, communi- B. Wiki
cation, and interaction within the company. C. Podcast
To do this, what type of network would
you install? (KLO 1.2a) D. Blog
NARAYAN CHANGDER
A. Extranet 136. When connecting to a hotspot, what
B. Private would be the first thing that usually ini-
C. Intranet tiates the use of a hotspot? (KLO 3.2h)
NARAYAN CHANGDER
149. Along with HTML and CSS, JavaScript is B. Declaration
one of the three essential technologies of
websites, known as the programming lan- C. Value
guage of the web. D. Boogers
A. JavaScript
154. HubSpot’s CMS that is an add-on to the
B. Drupal core marketing platform. It differs greatly
C. Global Group for most of its competitors in that it fully
integrates into your marketing and sales
D. Library
automation platforms.
E. 301 Redirect
A. HubSpot CMS
150. What is a scripting language designed B. Global Module
specifically for use on the web. It has fea-
tures to aid you in programming the tasks C. Portal
needed to develop dynamic web applica- D. Production
tions? E. Sticky Nav/Persistent Nav
A. Javascript
155. A local telephone network is an example
B. PHP
of a network.
C. HTML
A. Packet switched
D. CSS
B. Circuit switched
151. What is a way to store information C. Bit switched
(in variables) to be used across multiple
pages? D. Line switched
157. are parts of CSS code where a property 162. Collection of documents stored on a com-
and value for the selector are displayed puter which is permanently connected with
inside a pair of curly brackets. {font- internet around the world is called (KLO
C. Parallax A. Infrared
D. Sub-page B. WIFI
D. Worm A. Python
B. CSS
167. is a computer system that processes
requests via HTTP, the basic network pro- C. Open Source
tocol used to distribute information on the D. Content Management System (CMS)
World Wide Web. (KLO 2.3a)
NARAYAN CHANGDER
E. RSS
A. Web server
B. Mail Server 172. HTML stands for?
185. are HTML elements that provide informa- that behavior can lead to a better website
tion to the web browser processing the experience and design.
page as well as the developer building it.
A. User Research
These like <header>, <section>, and <arti-
cle> define their content in their name. B. Attributes
A. Semantic Elements C. Property
B. User Research D. HTML5
NARAYAN CHANGDER
C. Front End E. ASP/.Net
D. Elements
190. Name of domain is domain name of node
E. Firewall at top of the (KLO 2.1c)
186. Web page that integrates content and A. Sub Tree
script from multiple Web sites to create
B. Main Tree
new applications
C. Leaf Node
A. Mashup
B. Semantic web D. Bottom Tree
198. A Web feed format for downloading au- 203. Who is making the Web standards? (KLO
dio or digital media files that can be syn- 2.1a)
dicated, subscribed to and downloaded au-
tomatically as new content is added. A. Microsoft
A. Ajax B. Google
B. Wiki C. The World Wide Web Consortium
C. RTF D. Mozilla
204. Which of the following devices provides 209. Self-closing tags are opening tags that
access to the internet? don’t have a corresponding closing tag but
instead close themselves with a forward
A. Adapter
slash before the right angle bracket.
B. Modem
A. Self-Closing Tag
C. Router B. Declarations
D. Switch C. Wireframe
NARAYAN CHANGDER
205. This type of internet connection Offers D. Sitemaps
high-speed Internet connections over the E. SSL
cellular radio network to computers and
devices with built-in compatible technol- 210. Content Delivery Network. This is the
ogy (such as 3G, 4G, or 5G) or a wireless practice of hosting website assets across a
modem or other communications device global network of servers versus a single
web server.
A. Mobile Broadband
A. CDN
B. Fiber to the Premises (FTTP)
B. Angular
C. Wi-Fi C. Python
D. Digital Subscriber Line (DSL) D. Java
206. Who runs/own the internet? E. Global Module
224. What is coaxial cable used for? 229. Why online collaboration useful nowa-
days?
A. Transmitting TV and Broadband sig-
nals A. Actions can’t be done quickly
B. Connecting LANs B. Need to be in the same place at the
same time together
C. Connecting WANs
C. Allows working together virtually
D. Connecting clients to a server
D. Documents are stored in multiple
NARAYAN CHANGDER
225. A collection of related webpages and as- places
sociated items, such as documents and pho-
230. As a user, who has just booked the next
tos,
flight to Dubai for a meeting, you are in
A. Webpage dire need of an internet connection on your
B. Website way to the airport. You are in a public bus
full of people using their phones. What
C. Homepage would you need to connect to an encrypted
D. Pagesite hotspot? (KLO 3.2h)
A. You need to get the security key and
226. Body tags are used; the network name (SSID).
A. Used for only the header B. You need to get a password only.
B. Used only for the paragraph C. You need to hack into the network in
order to use it.
C. element that wraps everything that is
visible on the page. D. All of the above.
D. Not used in HTML 231. What is the correct HTML for adding a
background color? (KLO 3.2a)
227. is the CSS code that defines the settings
for for a CSS property. A. <background>yellow</background>
A. Value
B. <body style=”background-color:yellow;”>
B. VPN
C. Firewall C. c. <body bg=”yellow”>
D. TTL (time-to-live) D. None
E. mySQL 232. For your document to be displayed as
transformed text, instead of ordinary
228. A page or collection of Web pages that text, you need a code of text that appears
can be viewed and modified by anybody to display a series of things based on what
with a Web browser and access to the In- it is instructed to display. What do you
ternet need to start this code? (KLO 3.3)
A. Ajax A. Objects
B. Wiki B. Tags
C. Blog C. Hyperlinks
D. Mashup D. Document Readers
NARAYAN CHANGDER
243. What contains a list of files and the infor- 248. What type of signals are transmitted
mation needed for the operating system to across fibre optic cables?
find those files?
A. Electric
A. System
B. Light
B. Folder
C. Sound
C. Directory
D. Radio
D. Database
249. is a dedicated computer or a software
244. An application that enables users with system running on a computer that acts
an Internet connection to access and view as an intermediary between an endpoint
webpages on a computer or mobile device. device, such as a computer, and another
A. Browser server from which a user or client is re-
questing a service. (KLO 2.3c)
B. Surfer
A. Proxy Server
C. Search Engine
B. Mail Server
D. Subject Directory
C. Web Server
245. PHP uses settings in a file named to D. None
control some of its behavior
250. is a coding language and web-app frame-
A. php.ini
work mostly maintained by Google that is
B. PHP Session used to address challenges encountered in
C. PHP Server developing single-page web apps.
D. PHP Post A. Angular
B. mySQL
246. Since a protocol is a set of rules that
govern a conversation between a client C. CSS
and server, which of the following would D. Open Source
be correct about an HTTP protocol? (KLO E. Smart Content
2.1a)
251. What for statament parameter sets
A. HTTP is a transportation layer proto-
starting value?
col.
A. counter
B. HTTP is not part of the OSI layers, it is
just a protocol. B. condition
C. HTTP is not used on a web server or a C. increment/decrement
web client. D. do-while
252. A(n) CSS style is applied directly in C. Web Host / Web Server
the line of code of an HTML element. D. CDN
255. are sketches of the key information that 259. Microsoft’s server-side programming lan-
goes on each page of a website, essen- guage. It’s a direct competitor to PHP and
tially showing the site skeleton. is most commonly used in business appli-
A. Wireframe cations.
B. Selector A. ASP/.Net
E. CDN D. JSON
E. Drupal
256. Microsoft’s version of a web server.
Though not as popular as Apache it’s often 260. When a client sends a request to a server,
used for business applications. browser looks for it in the (KLO 2.2)
A. IIS/Microsoft Server A. Addresses
B. Client Side B. Cookie Directory
NARAYAN CHANGDER
B. intranet B. Blog
C. extranet C. Wiki
D. none of above D. Ajax
262. Which tag would correctly display an im- 267. Characteristics of Unicode
age called logo.jpeg?
A. is a text encoding, representation, and
A. <image = logo.jpeg/> handling standard for most of the world’s
B. <img = logo.jpeg/> writing systems.
C. <href = “logo.jpeg/> B. is a universal character encoding that
D. <img src = “logo.jpeg”/> is used to process, store, and exchange
text data in any language.
263. In HTML, there are various instances
C. maintains the standard, which in-
where a programmer would want to em-
cludes 143, 859 characters that encom-
bed a file or a website into another web-
pass 154 present and historic scripts, as
site. How is that possible? (KLO 3.2c)
well as symbols, emoji, and non-visual
A. Through the wireframe. control and formatting codes.
B. Through CSS. D. ALL OF THE ABOVE
C. Through iFrames.
268. Domain Name System. See the entry
D. Through hyperlinks. “Name Server” on this point.
264. When promoting a business, that uses A. DNS
web marketing, which of the following B. AJAX
would be an essential technique in order to
drive more traffic to your website? (KLO C. HubL
1.1) D. JavaScript
A. SEO E. Custom Module
B. CEO
269. TRUE OR FALSE? The most common
C. CFO languages used for Web programming
D. CBE are:XML HTML JavaScript Perl 5 PHP
A. TRUE
265. What type of webpage that changes its
content upon interacting with the user? B. FALSE
A. Dynamic website C. MAYBE
B. Static Website D. none of above
270. According to HTML defaults, page back- 275. What is the correct HTML element for in-
ground color is usually serting a line break? (KLO 3.2a)
271. is a very popular database choice for de- 276. are individual HTML components of an
veloping web apps. It is a central piece document or webpage. For example, a
of the LAMP stack (Linux, Apache, MySQL, paragraph in an HTML document is an el-
Perl/PHP/Python). ement.
A. mySQL A. Elements
B. HubL B. HTML5
C. JavaScript C. Server Side
D. WordPress D. ASP/.Net
E. Framework E. AJAX
272. An information repository is place where 277. Which word is not used in HTML struc-
programmers, or database managers, can ture?
do which of the following? (KLO 1.12
A. footer
A. Deploy a second tier of data storage.
B. body
B. Have only one storage technology.
C. head
C. Runs on a specific operating system.
D. arm
D. Unorganized your files for further man-
agement. 278. includes all the parts of a website, app,
computer, smartphone, etc. that the user
273. Which format usually works best for pho- can manipulate and interact with.
tos?
A. User Interface (UI)
A. JPEG
B. Meta Elements
B. DOC
C. Mood Board
C. GIF
D. Selector
D. WAV
E. Client Side
274. JavaScript can be written-( may select
279. Which Direction of Data Flow does this
multiple answers)
situation represents? Nicholas noticed
A. directly into JS file and included into that listening to the radio there is no direct
HTML way we would engage with the signals
B. directly into HTML pages apart from receiving it on the radio and
is curious to know what form of transmis-
C. directly on the Server Script sion is happening or its direction of data
D. None of these flow.
NARAYAN CHANGDER
B. Caribbean Area Network D. User Experience (UX)
C. Campus Area Network E. Mood board
7. What type of storage would be most suit- 12. Used to store digital data, a common stor-
able for a business directory? age format used for audio.This description
refers to
A. CDR
A. Blue Ray Disc (BD)
B. Cloud storage
B. Compact Disc (CD)
C. USB
C. Digital Video Disc (DVD)
D. Paper D. none of above
NARAYAN CHANGDER
8. What might be stored in RAM? 13. The methods and structures that an op-
erating system uses to organize files on
A. The instructions to do a power-on-self-
a storage device like a hard drive. File
test
systems often use directory structures to
B. The instructions of the operating sys- keep track of files.
tem A. File System
C. The instructions to load the operating B. Compression
system
C. Encryption
D. The instructions not needed at present D. File Permissions
by the CPU, currently in the virtual mem-
ory 14. What is a Memory Card an example of?
A. Magnetic Storage
9. What kind of media is most commonly
B. Optical Storage
used when large amounts of data need to
be archived on a regular basis? C. Flash Memory
A. Tape D. Primary Storage
B. The personal computer user 16. What is the meaning of the acronym HDD
18. What type of storage device are you most B. Heat-Assisted Magnetic Recording
likely to find in a mobile phone? C. 3D Flash Memory
B. Cloud Hard Disk D. You might find that you do not have
enough of the appropriate connectors
C. Solid State coming from the power supply for the de-
D. Blu-Ray vices that you have installed.
21. Which of the following refer to examples 25. Servers commonly use what type of sec-
of optical disc drives? (Select 3 answers) ondary storage?
A. CD-ROM drive A. SSD
B. Microdrive B. HDD
C. CD-ROM drive C. external SSD
D. Floppy disk drive D. USB Drives
E. CD-ROM drive 26. A type of storage medium that consists of
a flat, round, portable disc made of metal,
22. Type of drive that allows bits of data to
plastic and lacquer that is written and read
become smaller and more tightly packed
by a laser.This description refers to
together while still retaining data. It uses
a tiny laser to briefly heat the recording A. Solid State Drive (SSD)
surface of the hard drive to write the data B. Hard Disk
making it more receptive to the effects of
magnetism, which allow writing on much C. USB Flash Drive
smaller areas than were possible before. D. Memory Card
A. External Hard Disk Drives E. Optical Disc
27. Which of the following statements about C. Concentric Circles called Tracks
dual-rail power supplies is LEAST true?
D. EEPROM
A. Dual-rail power supplies have electri-
cally separate 12VDC connections. 32. A flash memory storage device that con-
B. Dual-rail power supplies typically sup- tains its own processor to manage its stor-
port more cumulative amperage than age. This description refers to
single-rail supplies. A. Solid State Drive (SSD)
NARAYAN CHANGDER
C. Dual-rail power supplies are less likely B. Hard Disk
to be overdrawn by connected compo-
nents. C. USB Flash Drive
D. Dual-rail power supplies feature most D. Memory Card
of the same connections as a single-rail E. Optical Disc
supply.
28. A removable flash memory storage de- 33. What method does an SD card use for stor-
vice that you insert and remove from a ing data?
slot in a computer, mobile device, or card A. Magnetic disks and platters
reader/writer.
B. Non-volatile memory chips
A. Memory Slot
C. Magnetic tape
B. Memory Cards
D. Reflective surface and optical readers
C. SSD
D. Blue-ray 34. In optical disks, which plastic disk do they
use?
29. A contains no moving parts, but uses
Non-Volatile Flash Memory called NAND A. the plastic which can reflect the laser
Flash Memory using EEPROM chips. beam
A. Magnetic Hard Drive B. Magnetic storage is read-write, which
makes it possible to re-use the storage
B. Solid State Device
capacity over and over again by deleting
C. ROM BIOS Chip older data
D. Floppy Diskette C. 1, 099, 511, 627, 776 bytes
30. A consists of 1024 Bytes. D. 1GB to 32GB depending on the price
A. Kilobyte paid
36. Which of the following is not one of the 40. Which of the following is the least
three major components of a hard disk portable and durable form of storage?
drive system?
NARAYAN CHANGDER
46. Why do computers have secondary stor- A. All your files are located on your local
age computer only
A. Primary Storage might be full B. All your files can be backed-up auto-
B. To give another option where to save matically
files C. Collaboration on files is possible in
C. Main memory is volatile real-time
D. none of above D. All your files are located on many re-
mote servers
47. Which of the following technologies are
NOT considered hot swappable nor hot 52. CD’s, DVDs and Blu-Ray are classified as
pluggable? what type of storage?
A. SATA HDD A. Cloud
B. USB Flash Drive B. Optical
C. RAID Storage C. Solid state
D. Standard EIDE HDD D. Magnetic
50. Storage holds data, instructions and in- 55. Why would a user choose to swap their
formation for future use. The statement hard disk for an SSD?
refers to the definition of A. It has a quicker access speed
57. Why does blu-ray have more storage than 62. A desktop PC with an internal single drive
other optical disks? of 16TB is likely to be:
A. Because it uses blue lasers which have A. Optical
shorter wavelengths. B. Magnetic
B. to make the copy of original data to in C. Solid state
case you lose your original data.
D. ROM
C. it is a disk with bumps can be read by
laser 63. This storage has to be copied to RAM be-
fore it can be processed by the CPU.
D. allowed you to store a lot of data, very
fast transfer data A. ROM Storage
B. Secondary Storage
58. discs such as CDs, DVDs, and Blu-
ray discs are a storage medium that uses C. Teritary Storage
lasers for both reading and writing infor- D. Primary Storage
mation. They store information through
pits in their reflective coating. 64. To connect devices that make and control
sound-such as synthesizers, samplers, and
A. Optical computers.Which adapter card related to
B. Hard this function?
C. Solid A. Bluetooth
D. Flash B. MIDI card
59. Connects to high-speed USB ports.Which C. Modem card
adapter card related to this function? D. Sound card
A. TV Tuner card E. Network card
65. What kind of technology does the optical 69. On a hard disk, what is the storage capac-
drive use? ity of each sector?
A. laser beam reflect technology A. 512 bytes
B. the plastic which can reflect the laser B. 512 KB
beam C. 64 MB
C. Magnetic storage is read-write, which D. 32 GB
makes it possible to re-use the storage
NARAYAN CHANGDER
capacity over and over again by deleting 70. List three (3) advantages of Solid State
older data Drive (SSD).
D. 1, 099, 511, 627, 776 bytes A. Have lower storage capacities than
hard disks
66. IS A THIN SHINY CIRCULAR DISK THAT
CAN STORE UPTO 700 MB OF DATA AND B. Fast transfer rate
MEASURES 4.7 INCHES IN DIAMETER . C. More durable
A. CD D. Lighter weight
B. DVD E. Cost is higher per gigabyte
C. BLU RAY DISC
71. Which of these is not a negative to cloud
D. HARD DISK computing?
A. Uses storage space on your PC
67. The smallest container within a computer’s
storage system that is used to store in- B. Can cost money
formation such as data, settings, and com-
C. There is a risk of your information be-
mands used in a computer program. A file
ing hacked
is the smallest container that can be copied,
deleted, or moved within a file system. D. Requires an internet connection
A. File 72. Which of these is an advantage of physical
B. File Format storage?
74. The hardware that records and/or re- 79. Birefringence is a problem with what type
trieves items to and from storage media of optical media?
75. Which type of storage medium uses elec- 80. The process of tracking changes to a file
tric circuits? so that a file can be repaired or restored
A. Magnetic in case of file corruption or data loss.
84. Secondary storage is considered 89. All of these devices are optical
A. IAS A. CD R
B. L1 Cache B. CD RW
C. SSD
C. HDD
D. DVD RAM
D. USB
90. Optical storage devices save data as pat-
E. SSD terns of dots that can be read using
NARAYAN CHANGDER
85. The process of converting information so A. Laser Light
it cannot be understood without decrypt- B. Solar light
ing it using a key, especially to prevent C. Magnetic field
unauthorized access.
D. none of above
A. Compression
91. What does the acronym ‘ROM’ stand for?
B. Encryption
A. Rapid Only Memory
C. File Permissions B. Read Online Memory
D. Journaling C. Read Only Memory
D. Random Only Memory
86. What is the world’s largest computer net-
work? 92. Which is NOT an example of flash mem-
ory?
A. Facebook
A. SD Card
B. Google
B. Solid state drive (SSD)
C. iCloud
C. USB drive
D. Internet D. Magnetic hard disk drive (HDD)
87. Which of the following types of storage de- 93. What is optical disk
vices uses pits and lands to store its data? A. it is a disk with bumps can be read by
A. Cloud laser
B. allowed you to store a lot of data, very
B. Solid state
fast transfer data
C. Magnetic C. SSD is faster than HDD when transfer-
D. Optical ring data
D. portable, higher capacity of storing
88. Which of these statements is true about data, very durable, faster performance
Flash Memory compared to Magnetic Hard
Disks? (Choose Two) 94. Hard disks are classified as what type of
storage?
A. More Durable
A. Magnetic
B. Holds more data B. Solid state
C. Less expensive C. Cloud
D. Faster data transfer D. Optical
95. Which of the following is the most 100. Capacity is the number of bytes (charac-
portable form of storage? ter) a storage media can hold. This state-
ment refers to the
105. Give two (2) advantages of Memory WHICH TYPE OF DISK WOULD BE THE
compared to Storage? MOST SUITABLE FOR THIS PURPOSE?
A. Fast data access. A. CD
B. Limited data access. B. DVD
C. Contents are directly accessible by the C. BLU RAY DISC
processor. D. PEN DRIVE
D. Slow data access.
NARAYAN CHANGDER
111. Which technology is based on flash mem-
106. CDs are cheap and very reliable, so why ory and is intended eventually to replace
don’t we use them for carrying work conventional hard disk drives that have
around? moving discs and other mechanisms?
A. It’s a lie. Blank CDs are really expen- A. USB flash drives
sive B. Memory cards
B. You’d need about 20 CDs instead of C. Solid-state drives
one memory stick
D. Optical drives
C. CDs are very fragile
D. CDs are easily ‘wiped’ by magnets 112. What type of storage device is the fol-
lowing a description of? Data is recorded
107. An image is 20 x 20 pixels and each pix- by making marks in a pattern that can be
els is coded with 4 bits read back with the aid of light, usually a
beam of laser light precisely focused on a
A. The whole image is 400 bytes
spinning disk.
B. The whole image is over 1 kilobyte
A. Paper
C. The whole image is 50 bytes
B. Optical
D. The whole image is 200 bytes
C. Magnetic
108. A compact, portable storage device that D. Solid State
uses special memory chips to store data.
113. The use of user and file attributes that
A. Hard Disk Drive (HDD)
control which users can read, write, move,
B. Optical Drive or delete each file.
C. Flash Storage A. File Permissions
D. Solid State Devices (SSD) B. Journaling
115. Which of these storage options is best D. Storing data on the hard disk when
for storing games external to a portable main memory runs out of space
games console, thereby minimising the
NARAYAN CHANGDER
125. Which of the following is not an advan- C. The manufacturer’s trademark
tage of a solid state drive? D. Parity
A. Cheaper than hard drives
131. CDs have a spiral track. A laser beam re-
B. Storage capacity flects off it to read binary data as ‘burnt’
C. Robust spots (or not ‘burnt’) as the disk spins
D. Portable round.
A. False-CDs don’t actually spin
126. What is the physical component where
data is stored in a HDD? B. False-you can’t use lasers, it is danger-
ous.
A. Read/write head
C. True-and you can fit about 650 million
B. Platter bits on a CD
C. Sector D. False-there is no spiral track, but the
D. Cluster rest is correct
127. This storage has can be directly accessed 132. Which of the following refer to SSD form
by the CPU factors? (Select 2 answers)
A. Flash Storage A. SATA
B. Secondary Storage B. M.2
C. Teritary Storage C. NVMe
D. Primary Storage D. mSATA
B. Drive C. 1 billion
C. Partitioning D. 1 quadrillion
137. Which of the following is NOT an exam- 142. Connects to a digital video camera.Which
ple of a shared information access device? adapter card related to this function?
A. Database server A. TV Tuner card
B. Smart TV B. USB card
C. Cloud storage C. Video card
D. Data centre D. Video capture card
138. A typical use for a DVD-R could be:
143. Hardware RAID Level 0:(Select 3 an-
A. Storing the operating system swers)
B. Transferring data between home and A. disk striping
school
B. Is suitable for systems where perfor-
C. Storing instructions in use by the CPU mance has higher priority than fault toler-
D. Storing archive files ance
144. Type of ROM that uses electrical charges B. A physical material on which computer
A. RAM keeps data, information, programs, and
applications
B. PROM
C. Holds data, instructions, and informa-
C. EPROM tion for future use.
D. EEPROM D. none of above
145. Secondary storage is used for 150. When parts of a single file, program, or
NARAYAN CHANGDER
A. Storing data being used by the com- application are stored in different areas of
puter a physical disk.
B. Storing programs to be used immedi- A. Drive
ately by the arithmetic and logic unit B. Partitioning
C. Long-term storage of data C. Fragmentation
D. Storing programs being executed D. Defragmentation
146. Which of the following are examples of 151. What is the purpose of the jumper pinout
hot-swappable drives? (Select all that ap- on a magnetic EIDE hard drive?
ply)
A. To set the primary drive to master.
A. USB drive
B. To set the secondary drive to slave.
B. PATA drive
C. To allow the master/slave relationship
C. SATA drive to be based on Cable Select setting.
D. IDE drive D. All of the above
E. eSATA drive
152. Secondary storage gets its name
147. List two (2) advantages of USB Flash because
Drive. A. It is secondary to main memory
A. Small and light weight B. It is mostly used in secondary schools
B. Difficult to transfer documents C. It is fast-things load in a second
C. Easy to transfer documents D. none of above
D. Data recovery is difficult
153. Which of these would most closely match
148. Which SATA revision operates at a data a hard drive in a laptop
transfer rate of 3Gbps? A. 800 kilobytes
A. SATA 1 B. 50 megabytes
B. SATA 2 C. 500 megabytes
C. SATA 3 D. 500 gigabytes
D. None of the above 154. What is cloud storage?
149. Define storage medium. A. Storing data on the server of another
A. Hardware that records (writes) and/or company, accessible through the Internet
retrieves (reads) items to and from stor- B. Storage accessible anywhere with an
age media. internet connection
NARAYAN CHANGDER
B. USB card
165. A personal, portable blood pressure mon-
itor has some internal secondary storage. C. Video card
Which of these is it likely to be? D. Video capture card
A. Magnetic
170. What type of storage medium is a hard
B. Cloud
drive?
C. Optical
A. Paper
D. Solid state
B. Optical
166. What are the disadvantages of Optical
Storage Media C. Solid State
167. Temporary sections of the hard disk cre- 172. Which of the following usually stores the
ated by the operating system when RAM most data?
is full.
A. SSD
A. Virtual Memory
B. Magnetic Hard Disk Drive
B. Random Access Memory
C. Blu-Ray
C. Read Only Memory
D. Memory Stick
D. Cache Memory
168. It is a flash memory storage that users 173. Which is not a benefit of SSD over HDD
insert and removes from a slot in personal A. Lighter
computer, smartphone, digital camera or
card reader/writer. B. More reliable
A. Flash drive C. Lower power use
B. Memory card D. Longevity
174. Some companies keep all there back up 178. How many of the following statements
files on magnetic tape. ARE correct? (choose 1-4 answers)
NARAYAN CHANGDER
C. RAID 1 189. What storage media would you choose
D. RAID 10 for:Storing the operating system for a
computer
E. RAID 0
A. Cloud Hard Disk
184. What does the e stand for in eMMC?
B. Hard Disk/Solid State
A. Embedded
B. Enhanced C. DVD-R
C. Extended D. Blu-Ray
D. External
190. Ssecondary Storage is also called:
185. A portable flash memory storage device A. Back up memory
that you can plug in a USB port.This de-
scription refers to B. Main memory
A. Solid State Drive (SSD) C. Auxiliary memory
B. Hard Disk D. External memory
C. USB Flash Drive
D. Memory Card 191. Which of the following statements refer
to the characteristic features of magnetic
E. Optical Disc drives? (Select 3 answers)
186. Examples of storage media include all of A. High capacity
the following except
B. Low device cost
A. monitors and printers
C. High performance
B. floppy disk and hard disk
C. CD and DVD D. Low performance
D. Tape and PC Cards E. High device cost
187. Used mainly as video and data storage, 192. The/an retains the data stored on it
holds over 7 times a CD’s capacity.This de- even if the power goes off
scription refers to
A. RAM
A. Blue Ray Disc (BD)
B. Compact Disc (CD) B. LED
193. What type of media are used in a com- 198. Room 102 has solid state drives in all the
puter Hard drive? computers
203. Which of these is not an example of cloud 208. All of these devices are solid state
computing? A. USB Flash memory
A. Dropbox B. SSD
B. iCloud C. HDD
C. Facebook D. DVD
D. All are examples of cloud computing 209. Why you cannot store your own data
with CD-ROM or DVD-ROM?
NARAYAN CHANGDER
204. If you keep your work to a memory
A. because they are read only
stick
B. laser beam reflect technology
A. Don’t worry-it is safe now.
C. the plastic which can reflect the laser
B. Watch out, these devices often fail af- beam
ter a while
D. Magnetic storage is read-write, which
C. DON’T drop it, it will break easily makes it possible to re-use the storage
capacity over and over again by deleting
D. Don’t do it. They are really bulky to
older data
carry around
210. Why is SSD better than HDD? (give 4 rea-
205. Which primary storage is non-volatile? son)
A. RAM A. portable, higher capacity of storing
B. CACHE data, very durable, faster performance
B. small capacity (most CDs < 1GB ca-
C. ROM
pacity) & although they are fairly reliable
D. VRAM and durable but they can be easily dam-
aged
206. what is the term used to refers collec-
C. because they are read only
tively to hard disks and SSDs?
D. laser beam reflect technology
A. hard drive
211. Flash memory and USB memory sticks
B. SSD
are classified as what type of storage?
C. HDD A. Optical
D. Hard Disk B. Cloud
213. A storage device that uses light instead C. There are two kinds of ROM-DROM
of magnetism to store information. This in- and SROM
clude CD-ROM, DVD, and Blu-ray devices.
NARAYAN CHANGDER
A. Gigabyte C. 10, 000 rpm
B. SATA hard drives most often use the A. Create new apps and services, analyze
same type of power connector that PATA data, embed intelligence, test and build
hard drives use. applications
234. A desktop PC user wants to maximise the D. Solid State Devices (SSD)
speed of loading and using their operating
system (OS), which has frequent updates. 239. What color laser do CD/DVDs use?
Which configuration would work best? A. Red
A. OS stored on ROM, applications on B. Blue
hard drive
C. Green
B. OS stored on solid state drive, applica-
D. Colorless
tions on hard drive
C. OS stored on hard drive, applications 240. This card uses a landline telephone to con-
on solid state drive nect to Internet service provider
D. OS stored on ROM, applications on A. Network Card
solid state drive
B. Bluetooth Card
235. What does RAM do? C. Modem Card
A. Save data for later use D. none of above
B. Backing Up whole computer systems
241. Circuit board that connects everything in-
C. Storing Films, Games side your computer together
D. To store data and programs in current
A. RAM
use by the computer
B. ROM
236. Which of these types of storage is limited
C. Motherboard
by the maximum number of write times be-
fore it fails? D. CPU
A. DVD-RW
242. is two corresponding tracks on a
B. Solid state drive fixed disk.
C. Cloud storage A. Track
D. Blu-Ray B. Sector
237. Flash memory is: C. Cylinder
A. Solid state D. Platter
243. Which of the following is not an advan- 248. From highest to lowest speed, what is
tage of SSDs over HDDs? the correct order for these devices?
A. Low power consumption A. CD-R, solid state drive, hard disk
B. Small and light B. Solid state drive, hard disk, CD-R
C. Durable C. CD-R, Hard disk, solid state drive
D. Inexpensive D. Hard disk, CD-R, solid state drive
249. Type of ROM that can be written MORE
NARAYAN CHANGDER
244. Types of adapter cards slots
THAN ONCE using an ultraviolet light
A. Accelerated Graphics Port
A. RAM
B. Bluetooth card
B. PROM
C. MIDI card C. EPROM
D. Modem card D. EEPROM
245. What is the major advantage of a travel- 250. What type of memory is RAM?
ling sales rep using cloud storage for stor-
A. Temporary memory
ing files?
B. 1 and 3 are correct answers
A. Access the most recent files anywhere
as long as there is an internet connection C. Permanent storage
B. It is a cheap solution to getting access D. All of the above
to the files 251. Which type of storage medium uses mag-
C. Only has to take one copy of the files netised dots?
on a USB flash memory stick A. Magnetic
D. The read/write times to cloud storage B. Optical
are fast
C. Solid state
246. A circuit board that enhances functions of D. none of above
component of a system unit and/or pro-
vides connection to peripherals (external 252. Contains one or more inflexible, circu-
device) lar platters that use magnetic particles to
store data, instructions, and information
A. Adapter
A. Optical Disk
B. Adapter card
B. Usb Flash Memory
C. Network card
C. Hard disk
D. none of above D. SSD
247. Which of the following is type of Storage 253. The process of transferring items from a
interface? storage medium into memory
A. UAB A. Writing
B. SATA B. Drawing
C. SCSI C. Fetching
D. SD D. Reading
254. A FLASH DRIVE IS POPULARLY KNOWN 259. Why does the computer need ROM?
AS
A. Good features
256. Which of the following best describes a 261. The software is free (don’t need to pay)
hybrid drive? A. Free Software
A. A drive that has a SATA interface as B. Open and Start Computer
well as one other
C. Open Source
B. A drive that has both HDD and SSD
components D. Proprietary
C. A drive that can be used with Windows 262. an Internet service that provides remote
or Mac OS storage to computer users.
D. A drive that is partially internal and A. Backup
partially external
B. Cloud Storage
257. Which are called primary memory C. World Wide Web
A. ROM D. none of above
B. RAM
263. How do the magnetic disk save the
C. SSD data?
D. HDD
A. Magnetic storage is read-write, which
E. USB makes it possible to re-use the storage
capacity over and over again by deleting
258. What is a disadvantage of cloud comput- older data
ing?
B. 1, 099, 511, 627, 776 bytes
A. It is vulnerable to hacking
C. 1GB to 32GB depending on the price
B. The storage can be easily expanded paid
C. Portability D. Cost, durability, capacity, speed, relia-
D. All of the above bility, portability
NARAYAN CHANGDER
D. Encryption same time.
265. Is RAM Volatile Or Non-Volatile? B. More instructions can be processed at
A. Volatile once.
B. Configure the device ID using a jumper C. It generally has a much larger capacity
C. Complete a low-level format of the D. Before it fails you usually get de-
drive tectable anomalies
D. Use the 4-pin molex power connector. 272. What storage media would you choose
for:The main storage on a school network
267. Which storage technology provides fault
tolerance, called disk mirroring? A. DVD-R
A. CDR B. Compression
B. DVD C. Encryption
C. CD RW D. File Permissions
D. Solid State Drive (SSD) 279. How many bytes are in a terabyte?
E. Hard Disk A. 1, 099, 511, 627, 776 bytes
284. Which of these is an optical storage de- 290. Which optical media has the greatest
vice? storage capacity?
A. Hard disk A. Compact disc
B. Cloud B. Dual-layer, Single-sided DVD
C. DVD-RW C. Dual-layer, Double-sided DVD
D. Flash memory
D. Single-layer, Single-sided Blu-ray disc
285. Which from followingis not example of
NARAYAN CHANGDER
solid state storage media 291. List three (3) types of optical disc.
288. A school with a limited budget is likely 293. An EIDE hard drive uses a power con-
to use what type of storage on its file nector and a data ribbon cable.
servers? A. 4-pin mini molex, 10-pin
A. Optical
B. 4-pin molex, 40-pin
B. Solid state
C. 15-pin SATA, 7-pin SATA
C. Magnetic
D. None of the above
D. Cloud
294. Which of these is not a property of flash
289. Which of the following is a magnetic stor-
memory?
age devices?
A. Solid state drive A. Durable
B. Hard Disk B. Solid state
C. Flash Device C. Slower than a hard disk
D. DVD D. Stores the BIOS
298. HDD latency is defined as:The time it 303. Enhances the sound-generating capabili-
takes for a specific ties of a personal computer.Which adapter
card related to this function?
A. file to download.
A. Bluetooth
B. block of data to rotate on a data track
B. MIDI card
to read-write head.
C. Modem card
C. sector on the HDD to be moved.
D. Sound card
D. none of above
E. Network card
299. Which of the following contains circu-
304. Choose all correct features about a solid
lar platters that use magnetic particles to
state hard drive (SSD)
store data, instructions, and information,
‘0’ and ‘1’ data Depend on how the mag- A. Very durable (less likely to break)
netic particles are aligned? B. Very portable (easy to carry around)
A. SSD C. High storage capacity
B. HDD D. Unlimited storage
305. Which of these would match a typical C. Because it uses blue lasers which have
memory stick (flash memory) shorter wavelengths.
A. 2 megabytes D. to make the copy of original data to in
B. 500 megabytes case you lose your original data.
NARAYAN CHANGDER
306. A typical mp3 track needs about 50
megabytes of space B. Microsoft Azure
A. No-they are more like 3 megabytes C. iCloud
B. Yes-that’s about right D. All of the above
C. No-they’re more like 200 megabytes 311. Flash Memory Sticks are a form of what
D. No-they’re more like 1 gigabyte type of storage?
A. Optical
307. How do we measure CPU speed?
B. Solid state
A. Megabyte
C. Sequential
B. Gigahertz
D. Magnetic
C. Gigabyte
D. Megahertz 312. an ultra-small flash memory card de-
signed to provide high-capacity memory
308. What is a purpose of the ROM? in a small size. It’s used in many small
A. To store instructions for embedded portable devices such as digital cameras.
systems A. Flash Disk
B. To store the results of calculations B. SD card
from the ALU
C. CD
C. To store the operating system on a
D. Blue-ray
modern PC
D. To store instructions for applications 313. A police officer has a body worn video
software on a PC camera (BWV). Which is the most likely
secondary storage medium for this de-
309. What can you use to judge the quality of vice?
a secondary storage device?
A. Cloud
A. Cost, durability, capacity, speed, relia-
bility, portability B. Solid state
NARAYAN CHANGDER
videos is on a computer screen.
A. Printer A. Keyboard
B. Scanner
B. Mouse
C. Digital camera
C. Printer
D. keyboard
D. Earphones
10. Pick the correct answer. A computer is a
type of 16. A finger print sensor on an iPhone is a
11. I am a storage device which stores many 17. Which of these would be Found in shops?
files, photos, and videos.
A. scanner
A. USB Drive
B. Barcode reader
B. Monitor
C. Computer
C. Keyboard
D. all of the above
D. Speakers
18. What data does a webcam transmit into a
12. Which one of these is a STORAGE device? computer?
A. Headphones
A. Pictures/Videos
B. Speaker
B. Sound
C. Mouse
C. Letters and numbers
D. USB
D. Clicks and movement
13. If I wanted to send images into a computer
I would use an. 19. A CD is a
A. INPUT device A. INPUT device
B. OUTPUT device B. OUTPUT device
C. STORAGE device C. STORAGE device
D. none of above D. none of above
20. Which of these is an Internal peripheral De- 25. It controls movement of cursor or pointer
vice? on screen.
NARAYAN CHANGDER
C. printer 37. GUI stands for
D. keyboard
A. Guide For User Intelligence
31. A TV screen is a B. Graphical User Interface
A. INPUT device C. Gimp User Interface
B. OUTPUT device D. none of above
C. STORAGE device
38. An iPad touch screen is a
D. none of above
A. INPUT device
32. A mouse is a
B. OUTPUT device
A. INPUT device
C. STORAGE device
B. OUTPUT device
D. INPUT AND OUTPUT device
C. STORAGE device
D. none of above 39. Input devices are .
A. devices which stores data.
33. A U.S.B is a device used for what?
B. devices which display processes data.
A. saving and storing data such as files,
photos and video. C. devices used with machines
B. to make music and change the volume. D. device which accept data and send it
C. to type letters and numbers. to the CPU
D. I don’t know. 40. Select all of the ways that peripheral de-
vices can be attached to a device?
34. What is used to save photos on a camera?
A. Bluetooth
A. a flash
B. Wifi
B. a memory card
C. Cords
C. a usb cable
D. I don’t know D. Magic
35. How many type of peripheral? ? 41. The buttons on an iPad are a
A. 2 A. INPUT device
B. 3 B. OUTPUT device
C. 4 C. STORAGE device
D. 5 D. none of above
42. What could you use as an input device to 48. Which one is your favorite subject?
move the cursor on a screen? A. math
47. What could you use as an input device to 53. I am a device that allows a user to touch
write on a device? me to input information, but also outputs
images of what my system is doing.
A. Mouse
A. Mouse
B. Headphones B. Monitor
C. Camera C. Touch Screen
D. Touchscreen D. Headphones
54. Pick the peripheral device from the choices 60. MICR stands for
below. A. Magnetic Ink Character Recognition
A. computer B. Mini In Close River
B. ipad C. Michigan Care Improvement Registry
C. earphones D. none of above
D. software app.
61. Distribute electricity to all parts inside the
NARAYAN CHANGDER
55. An Xbox controller is a computer.
A. INPUT device A. Heat Sink
B. OUTPUT device B. Power Supply
C. STORAGE device C. Computer Processor
D. none of above D. Motherboard
NARAYAN CHANGDER
A. Track pad
A. Thunderbolt
B. Mouse
C. Touch pad B. VGA
D. Trackball C. DVI
E. Stylus D. HDMI
E. Svideo
10. A technician is hired to install network ca-
ble in a crawl space running the length of 15. Which of the following features are incor-
a hallway. To do so without a fire code porated in USB 3.0 standard? Each cor-
violation, which of the following types of rect answer represents a complete solu-
cable should the technician run? tion. Choose all that apply.
A. Plenum A. Full-duplex communication
B. Fiber B. Backward compatibility with USB 2.0
C. Shielded and 1.1
D. Coaxial C. Maximum data transfer rate of 480
Mbps
11. Which of the following is used for parallel
applications? D. Enhanced power efficiency
NARAYAN CHANGDER
into a terminating device and can be re-
A. Cat 6 moved just by pulling the connector from
B. RG-58 the terminating device?
C. Cat 3 A. ST
D. RG-59 B. LC
C. SC
27. Which of the following connections are typ-
ically on the external PC chassis? Each D. BNC
correct answer represents a complete so- 32. What kind of peripheral is used to read
lution. Choose two. credit cards to initiate financial transac-
A. IEEE 1394 tions? Each correct answer represents a
complete solution. Choose two.
B. IDE
A. Signature pad
C. SATA
B. Barcode reader
D. eSATA
C. Chip reader
28. VGA cables use what type of signal be-
D. Magnetic reader
tween the adapter and monitor?
A. Digital 33. Which of the following devices will allow
a technician to use a single set of input de-
B. Analog vices on several computers?
C. Composite A. iSCSI
D. Compressed B. Layer 3 switch
29. What is the single, fixed resolution of an C. KVM switch
LCD called? D. PoE
A. Native resolution E. Docking Station
B. Aspect ratio 34. James, a technician, is upgrading the
C. Default resolution firmware on an older KVM switch. The
D. Refresh rate specifications call for a serial port to con-
nect to the computer on one side, and an
E. Burned-in resolution Ethernet jack to connect to the switch on
30. Which of the following connector types is the other side. Which of the following con-
typically not associated with hard drive nectors does he need for this cable?
use? Choose 2 A. MT-RJ
A. eSATA B. DB-9
NARAYAN CHANGDER
9.1 Scientific and Engineering Applications
1. Because they reproduce rapidly and are chemical use. It is also a branch of engi-
easy to grow, now produce a host of neering that combines physical science, life
important substances useful for health and science, math economics (a)
industry.
A. Electrical Engineering
A. Transgenic Plants
B. Aerospace Engineering
B. Transgenic Bacteria
C. Chemical Engineering
C. Transgenic Animals
D. none of above
D. none of above
5. What type of education is required to be
2. What is the Fahrenheit equivalent for-40 an engineer?
degrees Celsius?
A. Bachelors degree at a credited school
A. -38.28 degrees Fahrenheit
B. Exams-Fundamentals of Engineering
B. -40 degrees Fahrenheit
Test-Engineering in Training
C. -16.23 degrees Fahrenheit
C. Practice for 4 years-principles and
D. -87.33 degrees Fahrenheit practice exam-licensed engineer
NARAYAN CHANGDER
let B. Electrical
D. Blue, Green, Yellow, Violet, Orange, C. Aerospace and Structural
Red
D. All of the above
19. The current through a conductor between
two points is directly proportional to the 25. What applications can gel electrophoresis
potential difference across the two points. be used for?
20. Who do engineers interact with? (a) 26. Puts limits on what can be done and how
it will effect the society and economy and
A. Scientists if it is needed and how it will effect the
B. Technicians environment
C. Craftsman A. Describes the social impact of techni-
D. All of the above cal process, product, or system
B. Describes the economic impact of a
21. A 3 view drawing (a)
technical process, product, or system
A. Inexhaustible Energy
C. Describes the enviromental impact of
B. Engineering a technical process, product, or system
C. Isometric Drawing D. All of the above
D. Orthographic Drawing
27. Which is the correct statement of Ohm’s
22. What is the Celsius equivalent for-18 de- Law?
grees Fahrenheit? A. R = IV
A. 17.65 degrees Celsius B. V = R/I
B. -43.78 degrees Celsius C. All are correct
C. -22 degrees Celsius D. V = IR
D. -27.78 degrees Celsius
28. Research, design, develop, and test com-
23. The sum of all numbers in a list divided by puter systems and computer-related equip-
how many numbers make up the list (a) ment (a)
A. mock-up A. Chemical Engineering
B. Agricultural Engineering 34. What was the first animal that was
C. Computer Software Engineering clonned?
D. When bacterial DNA combines with a 44. They interlock and flow from another in a
virus’ DNA smooth process to get to the answer
A. Steps to the Engineering Design Pro-
39. What is the earliest example of engineer-
cess
ing? (a)
B. How to develop details of a solution
A. Screwvdriver
C. How parts of a system work together
B. Archimedes Screw
D. How to interpret aspects of design
NARAYAN CHANGDER
C. Nailvgun
45. Plan the design, construction, and mainte-
D. none of above nance of various civil structures (a)
40. A person who designs products, structures, A. Computer Hardware Engineering
or systems to improve people’s lives (a) B. Inexhaustible Energy
A. Designer C. Civil Engineer
B. Technologist D. Isometric Drawing
C. Engineer 46. What is the process of input, process, out-
D. Architect put, and feedback (a)
A. Mock-up
41. These people work out the production de-
B. Technology
tails and design the system for manufac-
turing a product (a) C. EDP (Engineering Design Process)
51. What important milestones have occurred 56. Solve enviromental problems related to
during the progression of the engineering pollution, water use, materials, and en-
field? ergy use, waste treament, etc. (a)
A. Henry Ford’s Assembly Line A. Aerospace Engineering
B. Wright Brother’s First Flight B. Chemical Engineering
C. Thomas Edison’s Light Bulb
C. Electrical Engineering
D. Robert Goddards’s Liquid Fuel Rockets
D. Enviromental Engineering
E. All of the above
57. Has more than one resistor (anything that
52. In the engineering the design process, the
uses electricity to do work) and has multi-
first step is (a)
ple (parallel) paths to move along.
A. identify the problem
A. Parallel Circuit
B. procedure
B. Series Circuit
C. hypothesis
C. Compound Circuit
D. trial
D. none of above
53. Well-founded on evidence and corresponds
accurately to the real world (a) 58. Measurement in voltage.
A. Technology A. Ohms
B. Mock-Up B. Farad
C. Scale Model C. Volts
D. Valid D. Ampere
54. What is the purpose of gel electrophore-
sis? 59. Measuring instrument used to measure the
electric current in a circuit.
A. helps cut DNA
A. Ammeter
B. count the genes in DNA
B. Pyrometer
C. separates DNA based on size
C. Oscilloscope
D. allows for an exact replicated organ-
ism D. Multimeter
NARAYAN CHANGDER
61. Current goes through every component of C. Volts
the circuit.
D. Ohms
A. Parallel Circuit
65. What is an example of genes that can be
B. Compound Circuit
used in plants to make them better?
C. Series Circuit
A. Natural Insecticide
D. none of above
B. Disease Resistance
62. What are the simple machines? (a) C. Resistance to herbicides
A. Pulley and Lever D. Drought Tolerance
B. Wheel and Axel
66. What major functions do engineers per-
C. Wedge and Screw form? (a)
D. Plane A. Research & Development
E. All of the above B. Design & Production
63. Which of the following colors of the elec- C. Construction & Operations
tromagnetic spectrum is the coolest. D. Sales & Management & Consulting
A. Red E. All of the above
7. What option can you configure on your 11. Hackers without any affiliation to a com-
workstation to increase security when you pany who attempt to break into a com-
leave your desk? pany’s network but risk the law by doing
so
A. file encryption
A. Gray Hats
B. multi factor authentication
B. Script Kiddies
C. single sign-on
C. Hacktivits
D. Screensaver password
NARAYAN CHANGDER
D. Blue Hats
8. Unwanted windows that designed to cap- 12. What type of software should you install
ture your attention and lead you to adver- to protect yourself from worms?
tising sites: A. software firewall
A. Popups B. antispyware
B. Spams C. Antivirus
C. Virus D. antispam
NARAYAN CHANGDER
D. Someone who logins in with their own ation:
details
A. DoS/DDoS
26. An email sent from unknown source dis- B. Spoofing
guised as a source known to the message
receiver is an example of:(Select 2 an- C. Man-in-the-middle
swers) D. DNS poisoning
A. Spoofing 31. It unknowingly attack the system after a
B. Dictionary attack client received a document.
C. Social engineering A. Malicious email attachment
D. Trojan horse B. Botnets
E. Brute-force attack C. Cyber Threats
D. Adware
27. What 2 places do scammers commonly use
information from to create targeted spear 32. Which of these might be considered to be
phishing attacks? [Choose 2] an external attack?
A. Social Media A. Spyware
B. Identification Cards B. Ransomware
C. Online public records C. Social engineering
D. Libraries D. Employee sabotage
28. Which of the following statements is true E. Unauthorised employee access to se-
regarding web browser plugins, toolbar, cure areas
and extensions? 33. What is data encryption?
A. they should be updated to the newest A. Making data unreadable by anyone
versions
B. Scrambling data so it is only readable
B. they are dangerous and should be to authorised people
deleted
C. Putting a password on data files
C. they will be detected and removed by
antivirus software D. none of above
D. they only function in internet explorer 34. Software designed to detect, disable, and
remove viruses, worms, and Trojans
29. Malicious software performing unwanted
and harmful actions in disguise of a legiti- A. Firewall
mate and useful program is called: B. Antivirus
NARAYAN CHANGDER
A. Delete files
Jane, an employee, has left the company?
B. Cause inappropriate adverts to appear
A. Rootkit
C. Spy on what you are doing
B. Logic Bomb
D. Steal your information
C. Worm
D. Botnet 51. What is a man in the middle attack
A. attack is a general term for when
46. Mona is the data security manager for a someone positions themselves in a con-
governmental organisation. One her de- versation between a user and an applica-
sired goals of security is to ensure that the tion. Either to eavesdrop or to imperson-
data can be accessed only by those who ate one of the parties, making it appear
are allowed to see it. This is known as as if a normal exchange of information is
data underway.
A. confidentiality B. another term for piggy in the middle.
B. integrity C. someone who hacks someone for a fi-
C. availability nancial gain but acts as someone talking
D. publicity to them
D. none of above
47. Harmful programs used to disrupt com-
puter operation, gather sensitive informa- 52. Which of these is not associated with a
tion, or gain unauthorized access to com- DDoS attack?
puter systems are commonly referred to A. Stolen data
as:
B. Prevent an internet site from function-
A. Trojans ing properly
B. Malware C. Flood a web server or other online re-
C. Viruses source with so many requests that it can-
D. Spyware not cope
D. A botnet
48. The perpetrator use Denial-of-Service
(DoS) Attack to make network resource 53. How configuration weakness is ex-
unavailable by? ploited?
A. Disrupt services A. Firewall holes
B. Restart computer B. Default settings
C. Give access C. Unwritten policy
D. Delete everything D. Lack of continuity
B. Impersonation C. Phishing
D. Logging on
C. Shoulder surfing
D. Whaling 63. What virus emerged from the Philippines
and traveled around the world via email?
58. Compensation paid to individuals who
A. Zombies
have been negatively affected by a com-
pany being hacked, is an example of what B. Common Cold
type of loss? C. ILOVEYOU virus
A. Operational Loss D. IHATEYOUvirus
64. Which type of malware generally infects 69. A program has been discovered that in-
files on a network and attempts to make fects a critical Windows system exe-
a system unreliable? cutable and stays dormant in memory.
A. Worm When a Windows mobile phone is con-
nected to the host, the program infects
B. Virus the phone’s boot loader and continues to
C. Bot target additional Windows PCs or phones.
Which of the following malware categories
D. Adware
BEST describes this program?
NARAYAN CHANGDER
65. What social engineering technique in- A. Zero-day
volves someone pretending to need your
information to confirm the identity of who B. Trojan
they are talking to? C. Virus
A. Pretexting
D. Rootlet
B. Baiting
C. Quid pro quo 70. Threat that attacks the systems using ma-
licious coding to exploit critical data.
D. none of above
A. Privilege escalation
66. It is the layer that offers a physical ad-
dress so a device’s data can be sent on the B. Insider Threats
network: C. SQL injection
A. Data-Link Layer D. Unauthorized access
B. Network Layer
C. Transport Layer 71. It is a type of malware that propagates
by inserting a copy of itself and becoming
D. Physical Layer part of another program.
67. A computer program containing malicious A. Computer virus
segment that attaches itself to an applica-
B. Computer worm
tion program or other executable compo-
nent is called: C. Trojan
A. Adware D. none of above
B. Spam
72. Your manager just got a new workstation
C. Virus
and is not part of a domain.he wants to
D. Flash cookie know which user account he should disable
to increase security. what should you telll
68. It is a stand-alone software and does not him?
require a host program to spread.
A. Guest
A. Computer virus
B. Computer worm B. users
73. Several desktops in your organization are 78. A collection of techniques used to deceive
displaying a red screen with the message internal users into revealing of informa-
“Your files have been encrypted. Pay 1 tion.
83. Phishing scams targeting selected individ- B. The person who is able to gain access
uals/groups of users are referred to as: to equipment or a network by tricking peo-
ple into providing the necessary access in-
A. Vishing
formation
B. Spear phishing C. It is any technical effort to manipulate
C. MITM attack the normal behavior of network connec-
tions and connected systems
D. Whaling
D. The unauthorized real-time intercep-
NARAYAN CHANGDER
84. Software written to cause loss of data tion of a private communication, such as
a phone call, instant message, and video
A. Malware conference or fax transmission
B. Social Engineering
88. HTTP layer works at Layer:
C. Phishing A. 2
D. Brute-force attack B. 3
C. 6
85. “A type of crime in which your private in-
formation is stolen and used for criminal D. 7
activity.” is called
89. Types of malware that can destroy data?
A. internet scam A. Trojan horse
B. identity theft B. Worms
C. private information C. Virus
D. phishing D. Adware
90. Which of the following are characteristics
86. Trojan:
of remote-access Trojans
A. It is named for its method of getting A. They can be deployed through mal-
past computer defenses by pretending to ware such as worms
be something useful
B. They allow attacks to connect to the
B. It is a self-replicating program that system remotely
uses the network to duplicate its code to
C. They give attackers the ability to mod-
the hosts on the network
ify files and change settings
C. Software program that displays adver- D. All of the above
tising on your computer, often displayed
in a pop-up window 91. Eavesdropping is:
D. It is unsolicited email that can be used A. The unauthorized real-time intercep-
to send harmful links or deceptive content tion of a private communication, such as
a phone call or video conference
87. Penetration is: B. The ways in which you can lose your
A. The practice of testing a computer sys- hardware and data
tem, network or Web application to find C. It is any technical effort to manipulate
vulnerabilities that an attacker could ex- the normal behavior of network connec-
ploit tions and connected systems
D. The use of a computer or its data for 96. Which of the following would BEST deter
unapproved or possibly illegal activities an attacker trying to brute force 4-digit
PIN numbers to access an account at a
101. Malicious software collecting informa- to gather personal and financial informa-
tion about users without their knowl- tion.Which kind of exploit has been used
edge/consent is known as: in this scenario?
A. Logic bomb A. Domain name kiting
B. Adware B. Man-in-the-middle
C. Computer Worm C. DNS poisoning
D. Spyware D. Reconnaissance
NARAYAN CHANGDER
102. A user in your organization is having is- 106. Which of the following is an example of
sues with her laptop. Every time she active eavesdropping?
opens a web browser, she sees different A. Spoofing
pop-ups every few minutes. It doesn’t
B. Zero-day attack
seem to matter which websites are be-
ing visited-the pop-ups still appear. What C. Spear phishing
type of malware does this sound like D. MITM
A. Adware
107. Operational Loss is.?
B. Virus
A. Damages of the operating capability of
C. Ransomware an organisation.
D. BitLocker B. The loss of trust and lowered opinion
of people to a business.
103. A social engineering technique whereby
attackers under disguise of legitimate re- C. Where product designs or trade se-
quest attempt to gain access to confiden- crets are stolen.
tial information they shouldn’t have ac- D. Damages to the wealth of an organisa-
cess to is commonly referred to as: tion.
A. Phishing 108. Which of the following BEST describes a
B. Privilege escalation cyber terrorist?
C. Backdoor access A. Desires some kind of financial reward
or revenge
D. Shoulder surfing
B. Exploits internal vulnerabilities to
104. If you throw documents with personal in- steal information
formation on them away without shred-
C. Disrupts network-dependent institu-
ding them you are at risk of what?
tions
A. Shoulder surfing
D. Downloads and runs attacks available
B. Dumpster diving on the internet
C. Trojan horse
109. An attacker sets up 100 drone comput-
D. Viruses ers that flood a DNS server with invalid
requests. This is an example of which kind
105. An attacker uses an exploit to push a of attack?
modified hosts file to client systems. This
hosts file redirects traffic from legitimate A. Replay
tax preparation sites to malicious sites B. Backdoor
C. Spamming B. PC
D. DDoS C. Hub
NARAYAN CHANGDER
a legitimate program (to trick the system),
D. Gaining a black, grey or red hat
but actually causes harm, potentially pro-
viding hackers with a back door access to 124. If a virus attacks the boot sector of your
the system. hard drive as well as files in the file sys-
B. A type of malware that deletes pro- tem, what type of virus is this?
grams on the system each time replacing A. polymorphics
them with itself.
B. multipartite
C. A type of malware that deletes impor-
tant files and features of a computer sys- C. companion
tem. D. macro
D. A type of malware that removes and
sends all of your files to a third party, over 125. What is unauthorised access?
time so you don’t notice. A. is a type of eavesdropping attack that
occurs when a malicious actor inserts him-
120. Rose just installed a new search en- self as a relay/proxy into a communica-
gine on her laptop. Now whenever she tion session between people or systems.
searches the Internet, she gets several
pop-up windows directing her to websites B. when an employee logs onto there
to buy products. What does Rose have? companys website with permission
A. Ransomware C. unauthorised access refers to individu-
als accessing an organisation’s networks,
B. Spyware
data, endpoints, applications or devices,
C. Adware without receiving permission.
D. Trojan horse D. none of above
121. One of the following security fea- 126. What can you download to help protect
tures cannot be provided through web your computer from malware?
browsers:
A. Super secret plans of the President
A. Virus checking
B. Anti-Malware software
B. Web sites blocking
C. Dead By Daylight
C. Popup blocking
D. More RAM
D. Network monitoring
137. A computer that hosts a website is B. A threat actor whose main goal is fi-
known as a nancial gain.
A. Web storage server C. The most organized, well-funded, and
B. hard disk dangerous type of threat actor.
D. Any individual whose attacks are polit-
C. Web server
ically motivated.
D. computer server
E. A threat actor who lacks skills and so-
phistication but wants to impress their
NARAYAN CHANGDER
138. You are using google chrome and you
want to browse a website but not have friends or garner attention.
the website stored in your browsing his- 142. A set of program instructions that at-
tory.what should you do? taches itself to a file, reproduces itself,
A. log in to someone else to browse the and spreads to other files on the same com-
site puter
B. configure independent browsing A. Malware
C. use inprivate B. Computer virus
D. use google C. Computer worm
D. Trojan Horse
139. When a DDOS attack happens on a web-
site, what are other users likely to expe- 143. Which of the following best describes a
rience? script kiddie?
A. Their data will be stolen from a A. A hacker willing to take more risks be-
database cause the payoff is a lot higher
B. Nothing will happen at all B. A hacker whose main purpose is to
draw attention to their political views
C. Abusive text will appear on the home-
page C. A hacker who uses scripts written by
much more talented individuals
D. The website might crash and nothing
loads D. A hacker who helps companies see the
vulnerabilities in their security infrastruc-
140. Which of the following are a com- ture
mon form of sabotage from an external
144. Exploiting vulnerabilities of humans
source?
A. Malware
A. Phishing
B. Social Engineering
B. Denial of Service Attacks
C. Phishing
C. Distributing Malware
D. Brute-force attack
D. Accidental Loss of Equipment
145. How does a worker in a company con-
141. Which of the following is the BEST defini- tains a critical data?
tion of the term hacker?
A. Firewall
A. A general term used to describe any
B. IoT Devices
individual who uses their technical knowl-
edge to gain unauthorized access to an or- C. Insider Threats
ganization. D. Mobile Hardware
NARAYAN CHANGDER
B. Looking over someone’s shoulder in or- D. none of above
der to get information
161. Every ACME computer comes with the
C. Gaining unauthorized access to re- same account created at the factory.
stricted areas by following another per- Which kind of vulnerability is this?
son
A. Backdoor
D. Manipulating a user into disclosing
B. Misconfigurations
confidential information
C. Default accounts and passwords
158. An employee at your organization is con- D. Weak passwords
cerned because her ex-spouse “seems to
know everything she does.” She tells 162. This software is designed to disrupt the
you her ex keeps accessing her e-mail functioning of the computer, gain unautho-
and social media accounts even after she rised access and gather information with-
has changed her passwords multiple times. out the users knowledge-what is it?
She is using a laptop at home that was a A. Applications sofware
gift from her ex. Based on what you’ve B. Systems software
been told, you suspect the laptop has what
C. Malicious software
type of malware loaded on it
D. Utility software
A. Adware
163. Someone was recently caught sifting
B. Keylogger
through your company’s trash looking for
C. Logic Bomb confidential information. What is this an
D. Ransomware example of?
A. Trash snooping
159. Which of the following malware types B. Dumpster diving
may require user interaction, does not
hide itself, and is commonly identified C. Phishing
by marketing pop-ups based on browsing D. Social engineering
habits?
164. Computer threats can be or .
A. Botnet While computer security attacks can be
B. Rootkit or .
A. internal-external-physical-data
C. Adware
B. physical-internal-external-data
D. Virus
C. physical-data-internal-external
160. What is meant by a ‘black hat hacker’? D. external-physical-internal-data
A. Application B. virus
B. Kernel C. worm
D. trojan
C. Firmware
D. Virtual 171. This is using finger, hand, face, or iris
scans to gain access.
166. Any program that is designed to enter
A. software piracy
a computer without notice and disrupt its
normal operations B. Trojan Horse
A. Malware C. worm
B. Computer virus D. biometric protected
NARAYAN CHANGDER
this? D. multifactor login redirection
A. macro 180. At the lowest abstraction level of the
B. phage digital domain, that implement Boolean
functions using 0’s and 1’s
C. Retrovirus
A. architecture
D. armored
B. components
176. Property loss is.?
C. integrated circuits (IC chips)
A. Damages to the wealth of an organisa-
D. logic gates
tion.
B. Where product designs or trade se- 181. What is meant by the term ‘White Hat
crets are stolen. Hacker’
C. The loss of trust and lowered opinion A. Illegal hacker-intent on doing harm
of people to a business. B. Doesn’t steal but may access without
D. Damages of the operating capability of permission
an organisation. C. paid by companies to test their sys-
tems fro vulnerabilities.
177. Which type of software will help pro-
tect your computer from malicious net- D. none of above
work traffic?
182. Ann an employee is visiting Joe, an em-
A. Software firewall ployee in the Human Resources Depart-
B. password complexity tool ment. While talking to Joe, Ann notices a
spreadsheet open on Joe’s computer that
C. antispyware
lists the salaries of all employees in her
D. antivirus department. Which of the following forms
of social engineering would BEST describe
178. An administrator is instructed to disable this situation?
IP-directed broadcasts on all routers in an
organization. Which of the following at- A. Impersonation
tacks does this prevent? B. Dumpster diving
A. Pharming C. Tailgating
B. Smurf D. Shoulder Surfing
C. Replay 183. An attacker crafts a message that ap-
D. Xmas pears to be from a trusted source, but in
reality it redirects the recipient to a mali- 188. An attempt to flood the bandwidth or
cious site where information is harvested. resources of a targeted system so that
The message is narrowly tailored so it is it becomes overwhelmed with false re-
NARAYAN CHANGDER
A. Internal B. Doesn’t necessarily steal but may ac-
B. External cess IT systems without permission which
C. Physical is still illegal.
C. signatures A. Cyberbullying
D. formats B. Identity Theft
A. Malware D. Phishing
A. Worms D. Vishing
211. The act of masquerading as a trustwor- 216. A type of virus that can move itself be-
thy website or email to acquire user infor- tween systems and doesn’t need human
mation; identity theft is the intent intervention is called a
A. Worm A. worm
B. Spyware B. trojan
C. Phishing C. ransomware
NARAYAN CHANGDER
217. AAA stands for
212. You were browsing the web on a ques-
tionable website, and now you get a pop- A. AvailabilityAuthenticationAuthoriza-
up window stating that if you do not pay tion
$100 within one hour, all files on your B. Authorization Authentication Account-
computer will be destroyed. What is this ing
an example of?
C. Accounting Availability Administration
A. heistware
D. APTActorsAdvanced Persistent
B. theftware Threats
C. extortionware 218. Ahmad is trying to set a new password
D. Ransomware for his online bank account. He knows that
the more complex the password is, it will
213. The protocol that is known to be be secure against a password cracking
connection-oriented: attack, but that it will be the usable .
A. TCP A. less, least
B. UDP B. less, most
C. IP C. more, least
B. Spyware A. autofill
C. Keyloggers B. Bluetooth
D. Backdoor C. polo
D. FFC
224. In your role as a security analyst, you
need to stay up to date on the latest 228. Which type of denial-of-service (DoS)
threats. You are currently reviewing the attack occurs when a name server re-
latest real-time updates on cyberthreats ceives malicious or misleading data that
from across the world.Which of the follow- incorrectly maps host names and IP ad-
ing resources are you MOST likely using? dresses?
A. Threat hunting A. Spam
B. Threat feeds B. DNS poisoning
C. Intelligence fusion C. SYN flood
D. Advisories and bulletins D. ARP poisoning
NARAYAN CHANGDER
C. Maintenance Software their card for the day. Which of the fol-
D. Malicious Software lowing is the administrator using to gain
access to the server room?
231. What am I? I try to get users to input
important information into a fake website A. Man-in-the-middle
often through an email or text link. B. Tailgating
A. Phishing
C. Impersonation
B. Pharming
D. Spoofing
C. Quid pro quo
D. Baiting 236. Non-repudiation occurs when you have
proof that someone has taken an action
232. A trojan is an example of
A. Malware A. Accounting
239. While port scanning your network for 243. A wireless access point configured to use
unauthorized systems, you notice one of Wired Equivalent Privacy (WEP) is an ex-
your file servers has TCP port 31337 open. ample of which kind of vulnerability?
D. Spyware A. Technology
B. Configuration
240. The unauthorized practice of obtaining
C. Administration
confidential information by manipulating
people into disclosing sensitive data is D. Security Policy
known as:
245. Sara finds a message on her phone that
A. Zero-day attack she thinks might be a scam. She should:
B. MITM attack A. Forward the message to her friends to
see if they think it’s a scam too.
C. Social engineering
B. Reply and ask the sender not to send
D. Backdoor access
more mail.
241. You receive an email from your bank, C. Delete the message.
telling you that your account has been com- D. none of above
promised and you need to validate your ac-
count details or else your account will be 246. It is a kind of backup that starts with full
closed. you are supposed to click a link to backup then it only backup the data that
validate your information. What is this an has changed since the previous backup
example of? A. Full backup
A. a security breach at your bank that B. Incremental backup
needs to be resolved
C. Differential backup
B. spam
D. short-term backup
C. ransomware
247. What does spyware do?
D. Phishing
A. Shut system down
242. Which of these would be the safest pass- B. Restore hardware
word? C. Delete personal data
A. Password D. Gathers personal information
B. 9As5w0rD!
248. Which of the following are considered
C. Drowssap characteristics of a strong password?
D. PPAASSWWOORRDD A. Long
NARAYAN CHANGDER
leave you alone. EXCEPT
C. delete the email without opening it. A. Filtering spams
D. delete your email account. B. Protect against harmful attachments
250. You notice some unusual network traffic C. Avoid losing real email by mistake
and discover several systems in your orga- D. Enable encryption on your email
nization are communicating with a rather
dubious “market research” company on a 255. Black hat hackers usually hack for
regular basis. When you investigate fur- A. Fun
ther you discover that users of the af-
B. Their own gain
fected systems all installed the same piece
of freeware. What might be happening on C. Free WiFi
your network D. To persecute blameless frogs
A. These users unwittingly installed spy- 256. Which of the following is the best defini-
ware tion of a vulnerability?
B. These systems are all infected with
A. A short-coming
ransomware
B. An advantage
C. This could be normal behavior and
nothing to worry about C. A weakness
D. These systems are infected with logic D. An ecosystem
bombs 257. Which of the password attacks listed be-
251. Which the most common DoS attack that low takes advantage of a predefined list
sends more traffic to a device than what of words?
the program can accept. A. Replay attack
A. Buffer Overflow Attack B. Birthday attack
B. SYN Flood Attack C. Brute-force attack
C. Ping of Death Attack D. Dictionary attack
D. Teardrop Attack
258. The most common transport layer proto-
252. Which of these is the strongest? cols:
A. australiarunningplantmonkey A. TCP, IP
B. westernreligionpeeps B. TCP, UDP
C. drawingpictures C. IP, IPX
D. ignorethis D. IPX, SPX
259. Hackers who are part of a crime group 264. A piece of malware is infecting the desk-
that is well-funded and highly sophisti- tops in your organization. Every hour
cated more systems are infected. The infec-
A. Backdoor C. phage
269. OSI model consist of seven layers, they 273. A network administrator needed to re-
are:Physical- - -Transport-Session- strict the internal network to access some
- websites. Which rules he has to set?
A. Data Link-Network-Presentation- A. Inbound rules
Application B. Outbound rules
B. Network-Presentation-Data Link- C. Internet rules
Application
D. Web rules
NARAYAN CHANGDER
C. Application-Data Link-Network-
Presentation 274. One of the following ways can be used
D. Presentation-Application-Data Link- to secure wireless access:
Network A. Use Biometrics
C. looking for possible security breaches 276. Identify which of the following is an at-
of a company either for a malicious gain tack?
or for good. A. Cyber Terrorist
D. none of above B. Hacker
272. Which of the following BEST describes an C. Denial of Services (DOS)
inside attacker? D. Industrial Spies
A. A good guy who tries to help a company
see their vulnerabilities. 277. It is malicious software meant to gain
access, disrupt computer operation, or
B. An attacker with lots of resources and gather sensitive information.
money at their disposal.
A. Spyware
C. An unintentional threat actor. This is
the most common threat. B. Hacker
278. A is a software program that is de- C. upgrade your browser to the newest
signed to copy itself from one computer to version
another, without human intervention.
287. What is a DOS (Denial of Service) at- 292. A colleague has been urging you to down-
tack? load a new animated screensaver he has
A. Where a server is bombarded with re- been using for several weeks. While he
quests which it can’t keep up so it crashes is showing you the program, the cursor on
his screen moves on its own and a com-
B. When a group of hackers break into a mand prompt window opens and quickly
large organisation closes. You can’t tell what if anything was
C. When a hacker breaks into a network displayed in that command prompt win-
dow. Your colleague says “It’s been do-
NARAYAN CHANGDER
and steals personal data and leaves a
virus to break the server ing that for a while, but it’s no big deal.”
D. When a hacker attacks a server by Based on what you’ve seen, you suspect
sending a virus. the animated screensaver is really what
type of malware
288. Your password should contain the follow- A. A Worm
ing:
B. A Trojan
A. letters, numbers, symbols
C. Ransomware
B. letters only
D. Adware
C. numbers only
D. symbols only 293. What malware is used specifically to get
unauthorised remote administrator access
289. What technology is usually used by ran- to a computer or network?
somware to prevent you from accessing
A. Spyware
your computer system?
B. Randomware
A. Encryption
B. Lock & Key C. Rootkit
C. Passwords D. Worm
306. A script kiddie is a threat actor who 310. Which one of the below passwords is the
lacks knowledge and sophistication. Script least usable for Amna for the user to enter
kiddie attacks often seek to exploit well- on a mobile phone?
known vulnerabilities in systems.What is A. Password
the BEST defense against script kiddie at-
tacks? B. MyPasswordConsistsOf50CharactersAnd8CapitalLetters
NARAYAN CHANGDER
vention and protection. D. Amna@2008
B. Implement email filtering systems. 311. An example of something NOT a security
C. Properly secure and store data back- risk or threat to a computer is:
ups. A. Malicious Code
D. Have appropriate physical security B. Authorized Access
controls in place.
C. Theft
E. Keep systems up to date and use stan-
D. System Failure
dard security practices.
312. Sending emails as if they are from rep-
307. Which of the following can be used by a utable companies
security administrator to successfully re-
cover a user’s forgotten password on a A. Malware
password protected file? B. Social Engineering
A. Cognitive password C. Phishing
B. Password sniffing D. Brute-force attack
C. Brute force 313. Which external threat does this aim to
D. Social engineering protect against? ”Angle your computer
to ensure others cannot see what you are
308. A cyber attack that redirects users to a typing. Protect your details as you type”
fake website is known as: A. Pharming
A. Phishing B. Social Engineering
B. Pharming C. Shoulder surfing
C. Spoofing D. Man-in-the-middle attacks
D. TikToking 314. Malware that encrypts important data on
a computer but leaves the operating sys-
309. Which type of hacker can be prosecuted tem untouched (computer running but not
under UK IT legislation? working) is called
A. Black hat A. crypto-malware
B. Grey hat B. worm
C. White hat C. trojan
D. none of above D. RAT
315. Alia opened a file that was on her USB file server and backup server crash at
drive at work. Immediately her computer exactly the same time. Examining the
slowed and did not function as expected. servers, it appears that critical operat-
B. Worms A. Crypto-malware
319. A disgruntled administrator is fired for 323. It is a software that looks real but it ac-
negligence at your organization. Thirty tivates and attacks the host when loaded.
days later, your organization’s internal A. Computer virus
NARAYAN CHANGDER
C. Shoulder surfing
C. Steal time D. Brute-force attack
D. Data loss
329. If IT equipment is damage intentionally or
E. Disruption of service accidentally is an example of what type of
325. Occurs when a user is given access to a security threat?
certain piece of data or certain areas of a A. Internal
building
B. External
A. Availability
C. Physical
B. Accounting
D. none of above
C. Authorization
D. Administration 330. Which of these types of hackers?
A. White Hats
326. Malware engineers sometimes take
steps to prevent reverse engineering of B. Blacks Hats
their code. A virus, such as Zeus, that C. Green Hats
uses encryption to resist reverse engineer-
D. Red Hats
ing attempts is what type of malware
E. Elite
A. Armored Virus
B. Rootkit 331. Sara, a user, downloads a keygen to in-
C. RAT stall pirated software. After running the
keygen, system performance is extremely
D. Cryptolocker slow and numerous antivirus alerts are dis-
327. While using the internet, you type the played. Which of the following BEST de-
URL of one of your favorite sites in the scribes this type of malware?
browser. Instead of going to the correct A. Logic Bomb
site, the browser displays a completely dif-
B. Worm
ferent website. When you use the IP ad-
dress of the web server, the correct site is C. Trojan
displayed.Which type of attack has likely D. Adware
occurred?
A. Spoofing 332. It is the process of enforcing poli-
cies:determining what types or qualities of
B. Hijacking activities, resources, or services a user is
C. Man-in-the-middle permitted
D. DNS poisoning A. Authentication
335. Differentiate a computer worm from a 339. Salem opened an email attachment, but
computer virus immediately after opening it, his computer
froze, and all his files were encrypted . A
A. Written to look like something else
few minutes later, a message appeared on
that in fact is an attack tool
the screen demanding that he pay 20, 000
B. Require human interaction to facilitate AED to remove the encryption!
the spread of malicious code
A. Trojan horse
C. Use a variety of tools, scripts and pro-
B. Scareware
gram to launch attacks against network
D. Execute arbitrary code and installs C. Denial of Service (DOS)
copies of itself in the memory D. Ransomware
NARAYAN CHANGDER
A. Turn on firewall, Zone Alarm ProFire-
wall D. Using cryptography, Securstore
11. Which of the following are ways to make C. Disconnect from the Internet
a system more secure?
D. Use a firewall
NARAYAN CHANGDER
C. 235 16. This is the sender and receiver can con-
D. 225 firm each other’s identity and the ori-
gin/destination of the information.
11. Which of the following statements is IN-
CORRECT? A. Authentication
A. Original methods of encryption (such B. Non-repudiation
as the Caesar Cipher) do not need the use
of a key C. Integrity
B. Data can be encrypted using ciphers D. Confidentiality
and decrypted using a key
C. Users cannot read or understand en- 17. Events or attacks that steal, damage, or
crypted data without the use of a key destroy equipments.
D. The Caesar Cipher is an example of a A. Malicious Threats
substitution cipher
B. Accidental Threats
12. is the procedure used to convert data
C. Data Security Threats
from cipher text into plain text.
A. Decryption D. Physical Security Threats
B. Encryption
18. signs and encrypts email messages.
C. Cryptanalysis
D. none of above A. Wildcard certificate
B. Root certificate
13. PKI stands for
A. Public Key Interchange C. S/MIME certificate
B. Personal Key Infrastructure D. Self-signed certificate
C. Public Key Infrastructure
19. Which of the following is a NIST standard
D. Primary key interchange
that uses a discrete logarithm and is faster
14. key for data encryption and signature verifica-
A. algorithm for transforming plaintext to tion?
ciphertext A. ECC
B. info used in cipher known only to
B. DSA
sender/receiver
C. *recovering ciphertext from plaintext C. DH
D. *converting plaintext to ciphertext D. HMAC
NARAYAN CHANGDER
D. Stapling A. Asymmetric
31. Encryption strength is based on: B. Homomorphic
A. Strength of algorithm C. Stream
B. Secrecy of key D. Lightweight
C. Length of key 37. In Cryptography, original message, before
D. All of the above being transformed, is called
A. Simple Text
32. When put a message into code what do we
call it? B. Plain Text
A. Encipher C. Cipher Text
B. Decipher D. Filled Text
C. Mix up 38. Algorithm used for asymmetric encryption
D. Distribute A. RSA
33. which is not a way to decode a message B. MD5
A. frequency analysis C. C19
B. brute force D. MIA
C. crib usage 39. What are the DRM achieve their core ob-
D. slice and dice jectives
A. Encryption
34. Which of the following is not a reason to
revoke an SSL certificate? B. Governance
A. The validity period has ended. C. Enforcement
B. The website is no longer in service. D. Authentication
C. The domain name has been changed. 40. Which of the following terms applies to
D. The private key has been compro- the concept of obfuscation?
mised. A. Encryption
41. Which cryptographic service ensures that 46. A primary requirement for a good crypto-
the original sender cannot deny sending graphic hash function is that the function
data or engaging in a digital transaction should not have collisions. A collision in a
NARAYAN CHANGDER
an attacker?
52. Which is the largest disadvantage of the A. Confusion
symmetric Encryption? B. Diffusion
A. 1.More complex and therefore more C. One-Time Pad
time-consuming calculations.
D. Transposition
B. 2.Problem of the secure transmission
of the Secret Key. 57. Crypto Inc wants to decrypt the following
C. 3.Less secure encryption function. ciphertext “HVVH OTHVTQHAF” into a
plaintext.Table: ABCDEFGHIJKLMNOPQRSTUVWXY
D. 4.Isn’t used any more. THE QUICKBROWNFXJMPDVRLAZY
53. Before computers why were messages A. ATTACK AT DAWN
usually encrypted? B. HELLO WORLD
A. They weren’t encrypted before com- C. I LOVE GAMES
puters
D. CODING ROCKS
B. So in war Commanders/leaders could
communicate safely with their troops 58. The DES function has components
C. To share messages with people who A. 2
were clever enough to solve them B. 3
D. All of these reason C. 4
72. the caesar cipher is a type of 77. What is the point of binary?
A. monoalphabetic cipher A. It represents how computers interpret
electrical signals
B. polyalphabetic cipher
B. Because we like to make you do extra
C. bill cipher maths ;-D
D. enigma cipher C. For the lulz
D. Because it describes star systems
73. Which 128-bit block cipher encryption al-
NARAYAN CHANGDER
gorithm does the US government use to 78. Which of the following is the best certifi-
protect classified information? cate format that commonly uses the web
A. Skipjack of trust model?
A. ASN.1
B. Vignere
B. Bridge
C. Caesar
C. OpenPGP
D. AES
D. X.509
E. 3DES
79. A vulnerability of the Diffie-Hellman’s Key
74. What famous code was designed by a man Exchange is a lack of
named Samuel Morse? A. authentication
A. ala mode code B. integrity
B. horse code C. key exchange
D. secrecy
C. morse code
D. code 80. The full form of SSL is
A. Serial Session Layer
75. Flooding a server with useless traffic B. Secure Socket Layer
causes servers to become overloaded pre-
venting them responding to legitimate C. Session Secure Layer
client-server requests from users. D. Series Socket Layer
A. Malware 81. Which of the following enables processing
B. Surfing data in an encrypted form?
A. Diffusion
C. Denial of service attack
B. Homomorphic encryption
D. Configuration
C. Obfuscation
76. Which of the following answers refers to D. Hashing
a solution designed to strengthen the se-
curity of session keys? 82. These are are created with malicious intent
and sent by attackers
A. ECB
A. Trojan Horse
B. PFS B. Worm
C. EFS C. Virus
D. PFX D. none of above
83. Today’s secure communications are en- 88. How many different ways of setting up
crypted using bit keys. the machine was there said to be?
84. Trial and error method used by programs 89. What are the examples of weak/deprecated
to decode encrypted data such as pass- cryptographic solutions? Choose all that
words or Data Encryption Standard (DES) apply.
keys, through exhaustive effort rather A. WEP
than employing intellectual strategies.
B. AES
A. Brute force attack
C. SSL
B. Theft
D. DES
C. DoS
E. PGP
D. Phishing
90. In cryptography, the order of the letters in
85. This is the information cannot be under- a message is rearranged by
stood by anyone for whom it was unin-
tended. A. transpositional ciphers
93. Examples of means that provide random- 98. What Era of Cryptography begins with
ization during the encryption process in- Claude Shannon, the Father of Mathemati-
clude:Choose all that apply. cal Cryptography?
A. Cryptographic nonce A. Deciphering Cryptographic Messages
B. Obfuscation B. Classical Cryptography
C. Salting C. Modern Cryptography
D. Initialization Vector (IV) D. Middle Age Cryptography
NARAYAN CHANGDER
E. Shimming
99. encipher
94. What is the name for the issuer of an SSL
A. converting plaintext to ciphertext
certificate?
A. a certificate issuer B. coded message
B. a certificate authority C. *study of principles/methods of deci-
phering ciphertext without knowing key
C. a root authority
D. study of encryption principles/methods
D. the man in the middle
95. Hashing is 100. A security administrator discovers an im-
age file that has several plain text docu-
A. The interception of a key that is used ments hidden in the file. Which of the fol-
to decrypt data lowing security goals is met by camouflag-
B. The transformation of a string of char- ing data inside of other files?
acters into a fixed length value or key that
A. Integrity
represents the original input string
B. Confidentiality
C. When data from a database is misman-
aged C. Steganography
D. When minor changes in the original D. Availability
string can completely change the hash
value 101. This is the study of ciphertext, ciphers
and cryptosystems with the aim of under-
96. Which of the following refers to the con- standing how they work.
tents of a rainbow table entry?
A. Cryptology
A. Hash / password
B. Cryptography
B. IP address / domain name
C. Cryptanalysis
C. Username / password
D. Cryptographic
D. Account name / hash
97. Which of the following authentication sys- 102. “PLAINTEXT” has been encrypted with
tems makes use of a KeyDistribution Cen- Caesar cipher to “AWLTYEPIE”. The key
ter? used was:
A. Secutiry tokens A. 16
B. CHAP B. 12
C. Kerberos C. 11
D. Certificates D. 19
103. Which cryptographic attack relies on the 108. A combination of an encryption and de-
concepts of probability theory? cryption algorithm is called a
104. It help prevent attackers from monitoring 109. The is the message after transforma-
or recording traffic between resources and tion
computers. A. ciphertext
A. Data Encryption B. Secret-text
B. Firewall C. plaintext
C. Antivirus D. None of the above
D. none of above 110. What is the art of breaking cryptosys-
tems?
105. Instructions that can be understood and
followed by a machine, A. Cryptanalysis
A. Crowdsourcing B. Cryptogram
B. Algorithm C. Cryptology
C. Program D. Cryptography
106. Encrypted information can only be 111. The field that covers a variety of com-
viewed by those who have been provided puter networks, both public and private,
the key that are used in everyday jobs.
A. Artificial Intelligence
A. Integrity
B. ML
B. Confidentiality
C. Network Security
C. Availability
D. IT
D. Authenticity
112. This person, known as the father of Com-
107. Encryption is used to puter Science, invented the CAPTCHA.
A. Write more effective algorithms in pro- A. Alan Turing
grams
B. Vigenere
B. Debug programs more effectively
C. Bill Gates
C. Protect sensitive information being
sent digitally D. Cliff Stoll
D. Make the internet faster when loading 113. Which of the following is used in conjunc-
information tion with the assumption that the output
NARAYAN CHANGDER
in a particular order, used to scramble data
to make it private or gibberish to out-
114. cryptography
siders.
A. *study of principles/methods of deci- A. Key
phering ciphertext without knowing key
B. Lock
B. *study of encryption princi-
C. Anchor
ples/methods
D. none of above
C. *field of both cryptography and crypt-
analysis 120. Which of the following ciphers would be
D. *coded message BEST used to encrypt streaming video?
A. RC4
115. Which best describes how the Caesar Ci-
B. RSA
pher works?
C. SHA1
A. You muddle up all the letters in the al-
phabet D. 3DES
B. You replace letters with numbers 121. What was the name of the man who
C. You reverse the letter of the alphabet led the team that cracked the German’s
“Enigma Code” in WW2?
D. You rotate the letters around the alpha-
A. Tim Berners-Lee
bet, but they stay in the right order
B. Alan Turing
116. How many keys are used in asymmetric C. Stephen Hawking
encryption?
D. Bill Gates
A. 2
122. Encrypted text that will appear to be a
B. 1
random string.
C. 0 A. Encryption
D. none of above B. Plaintext
117. What is a Ciphertext? C. Ciphertext
B. Text used to encrypt messages 123. If the received cipher text is C = 49, what
is the corresponding plaintext (suppose (n,
C. Message sent by sender to recipient
d) = (55, 3) is the private key of an RSA
D. Decrypted message cryptosystem)?
124. Your employer demands a copy of all pri- D. Changing data so that it can no
vate keys used on the devices you use longer be understood without a decryp-
for work since regulatory requirements tion(decode) key
require them to be able to decrypt any
official communications when legally re- 128. What is a method of defeating cryptogra-
quested. Which of the following is ex- phy scheme that tries every possible key?
plained in the scenario? A. Encryption Attack
A. Key escrow B. Brute Force Attack
B. Key recovery C. Substitution Attack
C. PKI hierarchy D. Cryptography Attack
132. Which of the following concepts is en- 137. Who was the first know user of the Cae-
forced by certifying that email communica- sar Code?
tions have been sent by who the message
A. Caesar Romanus
says it has been sent by?
A. Key escrow B. Julius Caesar
NARAYAN CHANGDER
D. Hashing
138. This is the practice of hiding a file, text,
133. What is the name of the electro- image or video inside another file.
mechanical device used by British cryptol- A. Substitution cipher
ogists to help decipher German Enigma-
machine-encrypted secret messages dur- B. Hide and seek
ing WWII? C. Pictogramography
A. Bomba D. Steganography
B. Bomby
C. Bombe 139. A 4X5 matrix cipher was used to encrypt
“good morning everyone”. What will it be
D. Bomb output?
134. Examples of key stretching algorithms in- A. GMIVOOONENORGREDNEY
clude:(Select 2 answers)
B. GOGYOREOONVNDIEEMNR
A. ROT13
C. GDRNVYEOMNGEOOOIERN
B. Twofish
D. none of above
C. Bcrypt
D. DSA 140. What are the characteristics of Elliptic
E. PBKDF2 Curve Cryptography (ECC)? Choose all
that apply.
135. One commonly used public-key cryptog-
raphy method is the algorithm A. Asymmetric encryption
142. The number of unique substitution boxes 147. Which algorithm uses two keys to en-
in DES after the 48 bit XOR operation are crypt and decrypt?
143. In cryptography, which of the five basic 148. Company A submitted a bid on a contract
protections ensures that the information is to do work for Company B via email. Com-
correct and no unauthorized person or ma- pany B was insistent that the bid did not
licious software has altered that data? come from Company A. Which of the fol-
lowing would have assured that the bid
A. Confidentiality was submitted by Company A?
B. Availability A. Digital signature
C. Encryption B. Encryption
D. Integrity C. Hashing
D. none of above
144. When you want to take a secret code and
decode it, this is known as 149. What must a user need to decrypt a file?
A. Encryption A. Coin
B. Decryption B. Key
C. Translation C. Token
D. Algorithm D. Graph
145. Which of the following terms applies to 150. Suppose the RSA cyrptosystem is used
the concept of data integrity? with public key (35, 7). What is the cor-
responding cipher text when the plaintext
A. MFA
“2” is sent?
B. Digital certificate
A. 27mod35
C. Hashing
B. 23
D. Security through obscurity C. 12
E. Encryption D. 72mod35
146. two private keys are required in the fol- 151. Sending requests to a single server using
lowing cipher hijacked machines
A. caesar A. Phishing
B. vigenere B. DoS
C. symmetrical C. Worms
D. asymetrical D. Virus
152. If you encrypted the word lesson using a 157. The science of encrypting and decrypting
Caesar cypher with a key of 1 which would information is called
it be?
A. Cartography
A. mgvvqr
B. Cryogeny
B. mfttpo
C. Cryptography
C. kdttph
D. none of above
D. kjdfkj
NARAYAN CHANGDER
158. Study of letters or groups of letters con-
153. What key is used if a Caesar cipher is
tained in a ciphertext in an attempt to par-
used to encrypt the message “QUICK” to
tially reveal the message is called:
a plain text “TXLFN”
A. 2 A. Frequency analysis
B. 3 B. Cryptography
C. 4 C. Encription
D. 5 D. Decription
E. 6 159. It is a science that applies complexmath-
154. This is the information cannot be altered ematics and logic to design strong encryp-
in storage or transit between sender and tionmethods.
intended receiver without the alteration A. Cryptosystem
being detected.
B. Cryptography
A. Authentication
C. Encryption
B. Non-repudiation
D. none of above
C. Integrity
D. Confidentiality 160. Hashing
155. In a trapdoor function, the function is A. Changes data before it reaches the
easy to: spreadsheet records to be compared to
C. Twofish C. Obfuscation
D. Blowfish D. Collision
173. An intranet is behind a network device, 178. Which of the following terms applies to
which gives some protection against hack- the concept of confidentiality?
ers, viruses, and so on. Which is the net- A. Hashing
work device?
NARAYAN CHANGDER
B. Encryption
A. Proxy server
C. Security through obscurity
B. VPN
D. MFA
C. Firewall
E. Digital certificate
D. None of the three
179. Which is not the duty of the CA in the PKI
174. is a process of converting en- (Public Key Infrastructure)?
coded/encrypted data in a form that is
readable and understood by a human or a A. issuing certificates
computer B. revoking certificates
A. Cipher text C. revoking licenses
B. Cryptanalysis D. issuing public-private key pairs
C. Encryption
180. Cryptography means
D. Decryption
A. Encrypt algorithm
175. Man-in-the-middle attacks affect which
B. Decrypt algorithm
part(s) of the CIA triad?
C. Plaintext into ciphers text
A. Confidentiality only
D. none of above
B. Integrity only
C. Availability only 181. It is also called as private key cryptogra-
D. Confidentiality and Integrity phy.
A. Symmetric Cryptosystem
176. What type of key or keys are used in
symmetric cryptography? B. Asymmetric Cryptosystem
183. is the study of secure communications 189. The asymmetric cryptography algorithm
that allow only sender and intended recip- most commonly used is:
ient of a message to view the contents
194. What is chipper text 199. Which of the algorithms listed below
does not fall into the category of asym-
A. Encryption data
metric encryption?
B. Encrypted data
A. RSA
C. Data Decrypt B. GPG
D. none of above C. DSA
195. Who introduced the public key cryptosys- D. AES
NARAYAN CHANGDER
tem? E. PGP
A. Diffie 200. is the practice and study of tech-
B. Adleman niques for secure communication in the
presence of third parties called adver-
C. Shamir saries.
D. Rivest A. Cryptography
E. Xander Ford B. Cryptoanalysis
C. Cryptology
196. is the science and art of transform-
ing messages to make them secure and im- D. either Cryptography or Cryptoanalysis
mune to attacks.
201. As we saw in class, WEP is vulnerable at-
A. Cryptography tacks that allow an active attacker to flip
B. Cryptoanalysis bits in the and unauthorized modifications
to the message received by the recipient.
C. neither Cryptography nor Cryptoanaly- What be the best defense against this kind
sis of attack?
D. either Cryptography or Cryptoanalysis A. Use a different key for each direction
and for each wireless device.
197. When solving a code, we need a letter or
B. Protect the ciphertext using a MAC.
a word to help us get started, what is this
often referred to as? C. Encrypt using AES in Cipher Block
Chaining (CBC) mode
A. Help
D. Encrypt using AES in Electronic Code
B. Support Book (ECB) mode.
C. Key E. Prepend a random 32-bit nonce to the
D. Answer packet before applying the CRC and en-
crypting it
198. Which of the following ciphers uses dis-
202. What are three examples of administra-
tinct keys for encryption and decryption?
tive access controls? (Choose three.)
A. Shift
A. encryption
B. RSA B. hiring practices
C. Vigenere C. background checks
D. Caesar D. guard dogs
E. Buknoy E. policies and procedures
203. Both parties use the same key to encrypt C. Original image is converted into dupli-
and decrypt the messages cate image
C. Encryption 210. the set of rules that you are using to en-
D. Security through obscurity code the information
A. cipher
E. Hashing
B. key
205. What is data encryption standard (DES)?
C. encoding
A. block cipher
D. deciphering
B. stream cipher
211. A hash function takes an input of any
C. bit cipher length and converts it into an output of a
D. byte cipher fixed length. What term is used for this
output?
206. is the property that the sender and re-
ceiver are guaranteed that no third party A. field
can make any changes in the message dur- B. digest
ing the transmission. C. password
A. Non-repudation D. message
B. Authenticity
212. The following word was encrypted using
C. Confidentiality a Caesar cipher with a shift of 2:ecguct.
D. Integrity What word is it?
E. Honesty A. julius
B. caesar
207. Multiplication is an example of a
C. romans
A. Cryptographic function
D. cipher
B. One-way function
213. A browser running a secure connection
C. Autonomous function
will be using which transport protocol?
D. Encryption algorithm
A. https
208. Stenographer is B. http
A. Cover images C. csma/ca
B. Original images D. gsm
214. Which three devices represent examples 219. The Rail Fence Cipher is a cipher that uses
of physical access controls? (Choose columns. The plaintext is written down-
three.) wards and starts a new column when the
A. firewalls bottom is reached. This technique used in
the Rail Fence Cipher is an example of:
B. locks
A. a product cipher
C. routers
B. a stream cipher
D. video cameras C. substitution
NARAYAN CHANGDER
E. swipe cards D. transposition
215. Which cipher uses the inverse alphabet to 220. Uses a number of computers over a net-
create encrypted messages? work of infected machines which send req
A. Atbash uests to a website which would bring it
offline
B. Caesar’s
A. SQL
C. Random Substitution
B. DoS
D. RSA
C. WLAN
216. Which of the following algorithms does D. USB
not belong to the category of symmetric
ciphers? 221. is the process of using an algorithm to
transform data from plain text to a cipher
A. RC4 text in order to protect the confidentiality,
B. DES integrity, and sometimes the authenticity
of the message.
C. RSA
A. Encryption
D. AES
B. Decryption
E. 3DES
C. Cipher
217. Which of the following MUST Matt, a se- D. Cryptanalysis
curity administrator, implement to verify
both the integrity and authenticity of a 222. How is the public key of the customer’s
message while requiring a shared secret? digital certificate signed?
A. RIPEMD A. Using the customer’s private key
224. Why are computers better than humans 229. Which of the following is an extension
at breaking encryptions such as the Vi- of the Diffie-Hellman key exchange into
genere? a complete discrete logarithm cryptosys-
C. Modulo B. PFS
C. EFS
D. Remainder
D. PFX
227. A is a variable in a cipher used to en-
crypt or decrypt a message. 232. The process of using an algorithm to
transform information into a format that
A. Key cannot be read is
B. Cipher A. Encryption
C. Algorithm B. Decoding
D. Key Space C. Encoding
228. What term is used to describe concealing D. Decryption
data in another file such as a graphic, au- 233. A process for creating a unique “signa-
dio, or other text file? ture” for a set of data
A. masking A. Symmetric key Cryptography
B. obfuscation B. Asymmetric key Cryptography
C. steganography C. Hashing Cryptography
D. hiding D. none of above
NARAYAN CHANGDER
235. What are MD4 and MD5? B. Polyalphabetic Cipher
A. Symmetric Encryption Algorithms C. Classical Crytography
B. Asymmetric encryption Algorithms D. Modern Cryptography
C. Hashing algorithms
241. Which of the following terms illustrate
D. Digital certificates the security through obscurity concept?
(Select all that apply)
236. Which of the following provides the
strongest authentication security on a A. Code obfuscation
wireless network? B. Steganography
A. MAC filter C. SSID broadcast suppression
B. WPA2 D. Encryption
C. WEP
242. Which of the following offers the LEAST
D. Disable SSID broadcast secure encryption capabilities?
237. An algorithm in encryption is called A. Twofish
A. Cipher B. PAP
B. Algorithm C. NTLM
C. Procedure D. CHAP
D. Module
243. What cryptographic algorithm is used by
238. Crypto Inc wants to share messages se- the NSA and includes the use of elliptical
curely to it’s client. What should be im- curves for digital signature generation and
plmeneted? key exchange?
A. Cryptanalysis A. ECC
B. Digital signature B. AES
C. Cryptography C. IDEA
D. All of the above D. RSA
239. A warning banner that lists the negative 244. DES follows
outcomes of breaking company policy is A. Hash Algorithm
displayed each time a computer user logs
in to the machine. What type of access B. Caesars Cipher
control is implemented? C. Feistel Cipher Structure
A. detective D. SP Networks
256. What was one of the first, well known 261. Who is the mathematician responsible for
encryption methods? inventing the machine that helped break
A. Caesar’s Cypher the German enigma code?
NARAYAN CHANGDER
257. Encryption used by RADIUS is BEST de-
scribed as: E. Mimiyuuuh
A. Quantum
262. A(n) is a keyless substitution cipher
B. Elliptical curve with N inputs and M outputs that uses a
C. Asymmetric table to define the relationship between
the input
D. Symmetric
A. S-box
258. This is a tool used to change normal or
plain text into something that is unread- B. P-box
able and then back into readable text. C. T-box
A. Encryption D. None of the ementioned
B. Translation tool
263. What is the problem with the following
C. Watermark plain text to encrypt with a Caesar Cipher?
D. Cipher Is your birthday 9/30/1998?
259. Choose the True statement that define ci- A. Numbers cannot be encrypted
pher text. B. It would be relatively easy to decipher
A. converting encoded/encrypted data in after encryption
a form that is readable and understood by C. Symbols cannot be encrypted
a human or a computer.
D. all of the above
B. study of ciphertext, ciphers and cryp-
tosystems 264. Which one of the following statements is
C. unreadable output of an encryption al- FALSE?
gorithm. A. Cracking the Enigma Code shortened
D. uses algorithms to scramble your in- WW2 by at least two years and saved mil-
formation lions of lives
260. This person discovers weaknesses and B. Alan Turing was the first person to
vulnerabilities in solutions. come up with the idea of a programmable
machine
A. Cartographer
C. Alan Turing was one of the pioneers of
B. Computer forensic analyst modern computing
C. Cryptanalyst D. Polish mathematicians were the first
D. Cryptographer ones to crack the Enigma Code
265. What encryption algorithm uses one key B. Ensure message is not altered while in
to encrypt data and a different key to de- transit between communicating partners
crypt data?
B. Virus C. Games
276. Which term describes the technology that 281. What term is used to describe the tech-
protects software from unauthorized ac- nology that replaces sensitive information
cess or modification? with a nonsensitive version?
NARAYAN CHANGDER
B. copyright B. masking
C. watermarking C. retracting
D. trademark D. hiding
E. whiteout
277. DES is a(n) method adopted by the
US government. 282. When confidentiality is the primary con-
A. symmetric-key cern, and a secure channel for key ex-
change is not available, which of the fol-
B. asymmetric-key
lowing should be used for transmitting
C. Nither symmetric-key nor asymmetric- company documents?
key
A. Digital Signature
D. Both symmetric-key and asymmetric-
B. Symmetric
key
C. Asymmetric
278. Sara, a security engineer, is testing en-
D. Hashing
cryption ciphers for performance. Which
of the following ciphers offers strong en- 283. What is the name of the method in which
cryption with the FASTEST speed? letters are rearranged to create the cipher-
A. 3DES text?
B. Blowfish A. enigma
C. Serpent B. transposition
D. AES256 C. substitution
285. The DES Algorithm Cipher System con- 290. During asymmetric encryption, if Allie
sists of rounds (iterations) each with sends a message to Nicholas, she will use:
a round key
NARAYAN CHANGDER
cure exchange of symmetric keys?
C. 111
A. RC4
D. 100
B. Bcrypt
301. Which of the following is the private key
C. Diffie-Hellman of an RSA cryptosystem with public key (n,
D. RIPEMD e) = (55, 7)? Suppose p = 5 and q = 11.
315. This type of symmetric encryption is 320. It is a value that is known to the sender.
faster and usually implemented in soft-
A. Decryption Key
ware for larger amounts of traffic.
A. stream cipher B. Encryption Key
B. stream chain C. PKI
C. block chain D. none of above
D. chain surge
NARAYAN CHANGDER
321. What are the objectives of encryption?
316. Agnes is sending a secure message to
Barry. Which key should she use to en- A. Non-repudation
crypt the message so that only Barry can B. Authenticity
decrypt it?
C. Confidentiality
A. Agnes’s Public Key
B. Agnes’s Private Key D. Error-detection
C. Barry’s Public Key E. Error-correction
D. Barry’s Private Key
322. A cryptographic standard for digital sig-
317. This is the creator/sender of the informa- natures is known as:
tion cannot deny at a later stage his or her
A. DSA
intentions in the creation or transmission
of the information. B. PFS
A. Authentication C. DES
B. Non-repudiation
D. RSA
C. Integrity
D. Confidentiality 323. Joe must send Ann a message and pro-
vide Ann with assurance that he was the
318. The following letter as encrypted using a actual sender. Which of the following will
Caesar cipher with a shift of 2:e. What Joe need to use to BEST accomplish the ob-
would this letter be in plain text? jective?
A. j
A. A pre-shared private key
B. c
B. His private key
C. y
C. Ann’s public key
D. b
D. His public key
319. Which of the following algorithms do not
fall into the category of asymmetric en-
324. What are the characteristics of a session
cryption?
key? Choose all that apply.
A. RSA
A. Used during a single session
B. GPG
C. DSA B. Asymmetric key
336. In asymmetric key cryptography, the pri- D. Any change in the message will invali-
vate key is kept by date the digital signature.
A. Sender 341. Stream ciphers means
B. Receiver A. Encrypt digits
C. Sender & Receiver
B. Encrypt letters
D. All connected devices to the network
C. Encrypt digits or letters
337. Protecting data by hashing the data with
NARAYAN CHANGDER
D. none of above
a hashing function addresses which part(s)
of the CIA triad? 342. Which three processes are examples of
logical access controls? (Choose three.)
A. Confidentiality only
B. Integrity only A. swipe cards to allow access to a re-
stricted area
C. Availability only
B. biometrics to validate physical charac-
D. Confidentiality and Integrity teristics
338. Suppose (n, d) = (55, 3) is the private C. firewalls to monitor traffic
key of an RSA cryptosystem. If the re-
D. intrusion detection system (IDS) to
ceived ciphertext is C = 49, what is the
watch for suspicious network activity
corresponding plaintext?
E. fences to protect the perimeter of a
A. 4
building
B. 3
343. Which of the following refer to obfusca-
C. 10
tion methods? Choose all that apply.
D. 14
A. Encryption
E. 6
B. Steganography
339. (also known as secret-key encryp- C. XOR cipher
tion, pre-shared key, or private-key en-
cryption) uses only one key to encrypt and D. Password salting
decrypt data. E. ROT13
A. Symmetric-key encryption 344. What was the code name for Bletchley
B. Asymmetric-key encryption Park?
C. Hashing A. Station A
D. none of above B. Bletch
340. Why use digital signature? C. Station Z
A. Private key is unique to the sender so D. Station X
that recipients can be sure of the source
of messages. 345. Which of the following terms applies to
the concept of non-repudiation?
B. Signature can be forged easily
A. Security through obscurity
C. Sender cannot deny that he sent the
message if he had signed with his private B. Digital certificate
key. C. MFA
B. DES C. Data-in-use
C. SHA D. none of above
D. MD5
361. Name for when both peers agree that the
356. Which type of cipher is able to encrypt a other is who they claim to be.
fixed-length block of plaintext into a 128- A. Multifactor authentication
bit block of ciphertext at any one time?
B. Mutual authentication
A. transform
NARAYAN CHANGDER
C. Twofish authentication
B. hash
C. block D. Access authorization
NARAYAN CHANGDER
dahs. B. Collision resistance
A. Caesar Cipher C. One-to-one mapping of input to output
B. Morse Code D. None of the above
C. Venn Diagram 382. Pseudo-random data added to a pass-
D. none of above word before hashing is called:
386. What cipher system did the Germans use C. The receiver’s private key
to transmit Enigma encoded messages? D. Receiver’s public key
6. Advertising software that can automati- 11. A new dialog box that appears on your
cally download files or link to websites. It screen, sometimes without you requesting
is often unasked-for and can contain mal- it.
ware.
A. virus
A. network topology
B. adware
B. trojan horse
C. popup
C. adware
D. operating system
NARAYAN CHANGDER
D. WAN
12. In cybersecurity terms, a vulnerability is a
7. does not remember information about weakness in a system that allows an at-
previously passed packets through fire- tacker to gain unauthorized access.
wall.
A. WAN
A. stateful firewalls
B. vulnerabilities
B. stateless firewall
C. worm
C. antivirus
D. backdoor
D. IDS
13. An agreed-upon method for communica-
8. What is ‘Phishing’ tion.
A. Using spoof emails to get information A. firewall
B. A strong Password B. router
C. A type of Virus C. server
D. A way to get free SD Cards D. protocol
9. A network device that controls and filters 14. A way for a computer to identify specific
data between networks, either wired or programs and manage their activity.
wireless. It is a specific type of “gate-
A. port
way”, a device that acts as a gate be-
tween two networks. B. router
A. backdoor C. server
B. server D. network topology
C. router 15. Anti virus software generally uses two
D. protocol techniques to help identify malware.
Which one of the following is not one of
10. What does Firewall Do? those methods?
A. Prevents Hackers A. Virus Signature
B. Install Viruses B. Heuristics
C. Give you SD cards C. Hash Functions
D. Blocks all content D. none of above
16. Hyper-text transfer protocol; the rules of 21. A small local area network of computers
communication that web sites use to ex- and devices.
change data. A. LAN
A. Router B. extranet
C. internet
B. Network
D. DMZ
C. Proxy Server
D. File Server 23. Firewalls focused primarily on
A. antivirus
18. Software that is spread by people, specif- B. data control
ically user actions, usually through emails,
websites, and chats. A virus infects your C. service control
computer, causing a wide variety of prob- D. system software
lems.
24. Which of the following filters based on ap-
A. backdoor plication, program or service?
B. services A. Context Aware Application Firewall
C. worm B. Application Level Firewall
D. virus C. Host-based Firewall
D. Network Level Firewall
19. A computer shared by multiple users
across a network. It usually contains re- 25. The arrangement of the various elements
sources such as files, computer applica- (computers, routers, switches, etc) of a
tions, or large databases. network.
A. router A. services
B. server B. LAN
C. LAN C. WAN
D. network topology
D. firewall
26. A computer that delivers files forming
20. Enhancements, improvements, and prob- web pages across a network to requesting
lem fixes for software. clients.
A. operating software A. router
B. updated B. server
C. worm C. web server
D. services D. encrypted
27. Software that can stop malware from en- 32. Software that secretly collects information
tering a network, computer, or device. about you. It usually resides on a website
A. network topology or in a service such as your email program.
B. virus A. spyware
C. malware B. trojan horse
D. firewall
C. worm
28. Where is the optimal place to have a proxy
NARAYAN CHANGDER
D. virus
server?
A. In between two private networks 33. What technology can you use temporarily
B. In between a private network and a to connect networks from two different
public network companies?
C. In between two public networks A. VPN
D. On all of the servers B. HTTP
29. Malicious software that bypasses the nor- C. DHCP
mal, secure, or restricted access.
D. passive router
A. worm
B. backdoor 34. Can spyware be seen on your computer?
C. trojan horse
A. Yes
D. spyware
B. No
30. Service can have two meanings in com-
puter terminology:a) A service can be a C. Sometimes
specific application or function such as D. With specialist software
email, chat, etc. b) A service can refer to
a specific part of an application, such as
35. Firewall protect your computer from
transmitting the data of a web page
A. network topology A. Hacker
B. LAN B. Viures
C. services C. Hacker and Viures
D. short message service (SMS)
D. none of above
31. Choose ALL the answers for “what is the
best description of what tracking cookies 36. What Can’t a Firewall Do?
do? ”
A. Can’t protect against viruses.
A. can slow down your computer’s func-
tion B. Stop hackers from accessing your com-
puter.
B. they are a virus and can be destructive
C. keep track of your searches and web- C. Determines which programs can ac-
sites visited cess the Internet.
D. help target ads for your interests D. none of above
37. A process that converts human-readable pages so that it can provide those more
text or data into a coded from. It is usu- quickly in the future?
ally used to protect data from being easily
NARAYAN CHANGDER
A. Gain access to accounts ing your computer.
B. Steal your money C. Firewall determines which programs
C. See what you are typing can access the Internet.
D. Insert Malware onto your computer D. none of above
49. A malicious program disguised as legiti- 54. Which type of firewall blocks packets
mate software. Users intentionally install based on rules that are based on IP ad-
a Trojan horse, thinking they are installing dresses or ports?
valid software. A. packet filtering
A. LAN B. stateful packet inspection
B. backdoor C. NAT filtering
C. worm D. Application-level gateway
D. trojan horse
55. Software that runs on your computer,
50. A file that contains an official record of ac- looking for many different types of mal-
tivities that occur on a computer. ware from many different sources.
A. log files A. router
B. My Documents files B. port
C. Google files C. log files
D. Network files D. antivirus
51. You have a router that is configured as 56. Protect an internal network from external
a firewall. The router is a layer 3 de- attacks
vice only. Which of the following does the A. Antivirus
router use for identifying allowed or de-
nied packets? B. VPN
A. IP ADDRESS C. Firewall
B. VPN D. AVIRA
C. TUNNEL 57. Software that supports a computer’s basic
D. HTTP functioning.
A. operating system
52. The following are anti virus software ex-
cept B. backdoor
A. Comodo C. network topology
B. Bit Defender D. update
3. Here are five ways to reduce the environ- D. A stakeholder is the person who cre-
mental impact of your use of technology 1. ates the legislation that governs the buy-
Cut down on Content delivered to your ing and selling of products
device over the internet consumes a lot of
electricity. 7. A software is any error that, if not re-
moved, could cause a software system to
A. upload
fail to meet its users’ needs.
B. streaming
A. version
C. recycle
B. defect
D. time
C. quality
4. NORMATIVE, FACTUAL and CONCEPTUAL
are the 3 types of D. liability
A. Moral issues
8. Why should you ask yourself how your be-
B. Legal issues havior would look in the real world?
C. Enquiries
A. We live in the real world.
D. Inquiries
B. I may be asked to be on The Real World
5. Allison has noticed her 16-year-old son, TV show.
Jeffrey, has been spending a lot of time on
C. It will help me recognize unethical or
the Internet recently. Which of the follow-
criminal behavior.
ing should Allison NOT do in order to pro-
tect Jeffrey from potential Internet dan- D. While I wouldn’t do it face-to-face, I
gers? have the freedom to do it online.
9. A thing is safe if its risks are judged to be 13. is a software a user can download
with in from the internet free of charge. No fees
is associated.
A. appreciable levels
A. Free Software
B. acceptable levels
B. freeware
C. measurable levels
C. shareware
D. realisable levels
D. none of above
NARAYAN CHANGDER
10. Which is the correct definition of the 14. STATE THE AREA OF COMPUTER
term:Ergonomics ETHICS:DUMPING OLD COMPUTER IN AT
A. Environmentally sound policies that DESIGNATED RECYCLING PREMISES.
prescribe energy efficiency, recycling, A. CODE OF CONDUCT
and eco-friendly disposal of electronic
equipment. B. INTELECTUAL PROPERTY RIGHTS
C. GREEN COMPUTING
B. Employees using their company’s inter-
net connection for personal use on com- D. INFORMATION PRIVACY
pany time.
15. Below are some of the ethics in computing.
C. The study of how people function most EXCEPT
effectively in their work environment.
A. Employee monitoring
D. Publishing the private contract infor-
B. Hackers defaced website
mation of one’s political opponents online.
C. DoubleClick sued for planning reveal
11. This is copyrighted software available for web users identities
purchase. D. Watching movie in certified cinema
A. Site License
16. The term used to descibe when a person
B. Commercial Software does not have legal rights to copy some-
one else’s work is called?
C. Share Ware
A. Privacy Invasion
D. Adware
B. Copyright
12. Entering a computer system or obtaining C. Intellectual Property
data from it to be able to commit another
crime. D. Trolling
A. Unauthorised access to computer ma- 17. Which of the following security threats
terial secretly accesses a user’s computer, acts
without a user’s knowledge and changes
B. Unauthorised access with the intent to
the operations for malicious intents
commit a further crime
A. Cyber attack
C. Unauthorised modification of data
B. Malware
D. Making, supplying or obtaining any-
thing which can be used for computer mis- C. Online scams and frauds
use D. Botnets
18. Typing in all capitals in electronic communi- as the Internet, that is used to attack other
cation means: networks, usually for nefarious purposes
27. Which of the following actions is NOT 32. Parcel scam, love scam, black money scam
a parent’s responsibility to prevent their are examples of
children from being victims of online preda-
A. botnet
tors?
B. online scams and frauds
A. educate children about online preda-
tors C. Hacking and cracking
B. ask for police protection D. Cyberextortion
NARAYAN CHANGDER
C. limit children’s online activity
33. Which of the following is the correct reac-
D. be a good role model tion when someone you do not know asks
you to add him or her as a friend on Face-
28. What is the main purpose of a copyright?
book?
A. To protect the user of a copyright?
A. politely reject the request
B. To protect the buyer of a creative
work. B. accept this person as a friend
C. To protect the creator of a creative C. Ask how this person knows you
work. D. Ask your friends whether any of them
D. To protect the copier of a creative know this person
work.
34. “Law enforcement agencies take advan-
29. System that captures a live face image and tage of the vast amount of data available
compares it with a stored image to deter- from traffic cameras, surveillance footage,
mine if the person is a legitimate user and social media postings. By analyzing
A. Face recognition system this data, they can engage in “predictive
policing” to prevent crimes before they are
B. Hand geometry system
actually committed. Critics argue, how-
C. Signature verification system ever, that using technology in this way
D. Voice verification system leads to more racial profiling and invasive
government surveillance.” Which area of
30. Two of the most pressing concerns in com- concern is this?
puter ethics today are questions of
A. Health and Productivity
A. Intellectual Property & Privacy
B. Social Justice
B. Demographics & Copyright
C. Green Computing
C. Privacy & Ethics
D. Net Neutrality
D. Copy Right & Privacy
31. According to this segment, approximately 35. When a paper is already submitted to
how many sex offenders are there in the a publication, no submission to another
United States? should be done.
46. Sometimes, the managements have not 50. Which of the following is not a contribu-
been willing to disseminate the full infor- tory factor in the digital divide
mation about the project or product be- A. Income
yond the legal requirements, because of
the fear of B. Location
NARAYAN CHANGDER
C. potential competitors 51. is the failure to do what a reasonable
person would do, or doing something that
D. societal views
a reasonable person would not do.
47. Copyrighted computer software which is A. Whistle Blowing
made available for use free of charge. B. Negligence
A. Fair Use C. Green Computing
B. Shareware D. Fraud
C. Freeware
52. Whether something is right or wrong in so-
D. none of above ciety or the workplace
C. The use of symbols, phrase, image, 54. Process of converting data that is readable
logo, identity, designs or combination of by humans into encoded characters to pre-
any used by firms to identify particular vent unauthorized access
products, brands or services. A. Encryption
D. unique and original works such as B. Technology ethics
ideas, inventions, art, writings, pro-
cesses, company and product names and C. Plaintext
logos D. Cypher
55. The ACM/IEEE Software Engineering Code your actions as you work with computers
of Ethics aims to: and interact with others
NARAYAN CHANGDER
A. Access control
C. Antivirus
B. Passphrase
D. Uninterruptable Power Supply (UPS)
C. Password
70. What year was the copyright and patents
D. Username
act released?
66. Network controller which connects net- A. 1998
work devices and allows effective commu-
nication between these devices B. 1990
A. Router C. 1988
73. Choose the best e-commerce category 78. There are 3 steps in strategy for Approach-
which belongs to non-commercial transac- ing Cyberethics Issues. which one is true?
tions
NARAYAN CHANGDER
C. Digital signature 89. An important network security tips is to
always set up a on your WiFi.
D. Encryption
A. switch
84. AN exclusive right granted for an inven- B. password
tion, which is a product or a process that
provides a new way of doing something. C. hacker
A. Copyright D. security
94. is an effort to attract public attention 99. The principle of means respecting and
to a negligent, illegal, unethical, abusive, honoring the inherent worth and right to
or dangerous act by a company or some privacy of other people.
B. 1990 D. cyberextortionist
NARAYAN CHANGDER
C. 1988 110. Which of the following are ways of steal-
D. 2000 ing information? I. phishingII. plagiaris-
mIII. plottingIV. pharming
105. Online or internet based illegal acts such
A. II and III
as distributing malicious software or com-
mitting identity theft B. I and IV
A. Cybercrime C. I and II
B. Hacker D. All of the above.
C. Online perpetrator
111. No copying, reselling, lending, etc. is le-
D. Script kiddie gal without the owner’s permission refers
106. refers to any work that is a result of to
a person’s creativity and is unique to that A. public domain
person B. shareware
A. copyright
C. copyright laws
B. Trademark
D. none of above
C. Intellectual Property
D. none of above 112. Changing or deleting data.
A. Unauthorised access to computer ma-
107. refers to a company selling or buying
terial
products or services to/from other compa-
nies. B. Unauthorised access with the intent to
commit a further crime
A. B2B
C. Unauthorised modification of data
B. B2C
C. C2C D. Making, supplying or obtaining any-
thing which can be used for computer mis-
D. Digital Middleperson use
108. The author (owner) will let you download
113. Which of the following is NOT one of the
it, and if you like it and want to use it, you
possible results of inappropriate Internet
are expected to pay a fair price for it
use?
A. Software Licence
A. Your computer can be attached by
B. Free ware viruses
C. Shareware B. your personal information can be used
D. open source software by hackers
C. your identity can be stolen 119. The encryption process, the unencrypted,
D. your computer can have hardware readable data is called
B. Borrowing and installing a copy of 122. An often used prewritten hacking and
unauthorized software from a colleague. cracking programs
C. Installing and selling unauthorized A. hacker
copies of software on new computers.
B. cracker
D. Installing more copies of a software
C. script kiddie
than you have licenses for.
D. cybrextortionist
118. In testing, special software programs
called static analyzers are run against the 123. An has a goal of destroying data or
new code stealing information.
A. Static A. hacker
B. Dynamic B. cracker
C. Black Box C. script kiddie
D. White box D. cyber extortionist
124. Objective of Code of conducts could be 129. Originally refers to someone who is an
expert at computer programming and who
A. Aspirational is able to solve computer problems, but
also means someone who illegally gains
B. Advisory access to others’ computer for their own
C. Disciplinary profits
D. All of these A. Hacker
125. CFC’s once used in many household prod- B. Firewall
NARAYAN CHANGDER
ucts contributed to the creation of a(n) C. Cyberbullying
A. Acid rain D. none of above
B. temperature inversion
130. What is the name of the game that
C. smog cloud Alan Turing invented to test machine intel-
D. hole in the ozone layer ligence by seeing if a human can be con-
vinced he is talking to a human and not a
126. Security tools that can be used include computer?
A. Spyware remover A. Limitation Game
B. Firewall B. Imitation Game
C. Honeypot C. Mutation Game
D. All of the above D. Manipulation Game
127. It occurs when an intruder computer fools
131. In DOS the attacker may be able to pre-
a network into believing its IP address is
vent a user from
associated with a trusted source.
A. accessing their emails
A. IP Spoofing
B. accessing websites
B. Email Spoofing
C. accessing social networking forums
C. IP Stealing
D. encrypting data encrypting data
D. Phishing
132. The use of a computer or network with-
128. Ethics and morals relate to “right” and
out permission
“wrong” conduct. While they are some-
times used interchangeably, they are dif- A. Access controls
ferent. Which of these TWO are correct? B. Software piracy
A. Morals refer to an individual’s own C. Unauthorized access
principles regarding right and wrong
D. Unauthorized use
B. Ethics refer to rules provided by an ex-
ternal source, e.g., codes of conduct in 133. Choose the correct definition of Copy-
workplaces or principles in religions right:
C. Morals refer to rules provided by an A. To copy the information the right way.
external source, e.g., codes of conduct in B. Copyright is a protection given to au-
workplaces or principles in religions thors, copyright owner and performer of
D. Ethics refer to an individual’s own prin- their copyright work and performances as
ciples regarding right and wrong prescribe under the Copyright Act 1987.
C. Permit the owner to “include” others 138. Engineers have to show the to obtain
from making, using, selling, offering for and properly gauge all the information re-
sale, and importing a product or service lated to meeting one‘s moral obligations.
NARAYAN CHANGDER
D. none of above
A. Data Protection Act
144. The act of Computer Ethics boils down to B. Computer Misuse Act
for others.
C. Copyright and Patents Act
A. Respect
D. Regulation of Investigatory Powers
B. Service Act
C. Contempt
150. A friend offers to share a video stream-
D. Sympathy ing service with you if you’ll split the
cost of the annual subscription. You know
145. System that compares live speech with
the service contract forbids people in dif-
their stored voice pattern
ferent households from sharing one ac-
A. Digital forensic count.What question should you ask your-
B. Hand geometry self before responding ethically to your
friend’s offer?
C. Signature verification system
A. How much will it cost me?
D. Voice verification system
B. Is my friend making money on this
146. When did the Computer Ethics Institute scheme by making the same offer to oth-
publish a code of ethics for computer ers?
users?
C. Could I explain my actions to a court?
A. 1995
D. What happens if my friend gets mad at
B. 1999 me and changes the login?
C. 1988
151. The standards of right and wrong that ap-
D. 1998 ply to your professional behavior.
147. Ideas of behavior that are commonly ac- A. resume
ceptable to society is B. dress codes
A. ethics C. professional ethics
B. cyber society D. networking
C. computer ethics
152. In the , right conduct for an individual
D. ethical principles is regarded as whatever directly benefits
148. Which term is not used when creating oneself.
your personal code of ethics? A. pre-conventional level
A. Net Neutrality B. conventional level
NARAYAN CHANGDER
B. Off-site
C. trademark
C. Offline
D. industrial design
D. Online
169. Sabrina sent a video to her friend; Har-
164. A code of conduct for computers is: vey. However, he uses the video to
A. a law restricting the circumstances in spread false rumours about Sabrina by
which a computer may be used posted it online.Based on the above situa-
tion, what is the code of conduct that Har-
B. a set of rules defining what can and
vey has violated?
cannot be done with computers*
C. a set of rules defining how software A. User may not interfere with others’
may be distributed computers
167. Which of the following is an example of 171. respecting the privacy and dignity of
intellectual property? other human beings is
A. Inventions A. civility
B. Ideas B. Confidentiality
A. Avoid harming others. 177. David’s friend told him she was cyberbul-
B. Protect yourself. lied. What should David NOT do?
NARAYAN CHANGDER
C. a classmate D. Having knowledge about computers.
D. a friend from summer camp
186. According to Sharron Davis, how long af-
182. Which of the following can provide pro- ter losing a child can the parents start to
tections to Nike®’s slogan “Just Do It”? find a new normal?
A. Copyright A. five years
B. Trademark B. seven years
C. Patent C. eight years
D. ten years
D. Industry design right
187. Any software that covertly gathers user
183. Without it would be easy to design
information through the user’s internet
a bot that could register a billion different
connection without his or her knowl-
online email addresses that could be used
edge:usually for advertising purposes.
to send spam, for instance.
A. Trojan Horse
A. CATCHA
B. Free Ware
B. CAPTCHA
C. Computer Cookie
C. CAPCHA
D. Spyware
D. CATCH
188. Service Learning refers to
184. Used fairly, lawfully and transparently A. learning the service policies, proce-
(openly). dures, norms, and conditions, other than
A. Data Protection Act the trade practices
B. Regulation of Investigatory Powers B. knowledge on online trading
Act C. knowledge on insurance policies
C. Freedom of Information Act D. knowledge about social services
D. Protection of Freedoms Act 189. As a child, you may have been taught a
E. Privacy and Electronic Communica- principle along the lines of “don’t lie, cheat
tions Regulations or steal or have anything to do with those
who do”.This is the example of
185. What is Values?
A. Integrity
A. Provides the basis for your code of B. Generosity
ethics. They identify the beliefs and ideals
that guide your actions as you work with C. Honesty
computers and interact with others. D. Loyalty
190. An engineer wants to know things C. Potential for loss of jobs in the local
work. high street due to less footfall
199. Names, titles, short phrases and colours a photograph from the internet, a quote
are not generally considered unique or sub- from a book)
stantial enough to be covered, but a cre- A. Unauthorized Use
ation, such as a logo, that combines these
elements may be B. Software Piracy
NARAYAN CHANGDER
C. Copyright, Designs and Patents Act
fected by an action or issue
D. Equality Act
A. Stakeholders
E. Freedom of Information Act
B. Benefactors
200. Parents are powerful role models for chil- C. Sponsors
dren. If parents are engaging in com-
puter practices themselves, they will have D. Shareholders
a hard time convincing their children to 205. Annette has downloaded “Doctor
stay out of trouble. Strange” from a website to watch it with
A. respectful her friends later .Which of the following
area of computer ethics involved in the
B. unlawful
situation above?
C. common
A. Codes of conduct
D. unsafe B. Information privacy
201. CAPTCHA, biometric devices, Usernames C. Software piracy
and passwords/passphrases are exam- D. Green computing
ples of
A. Back up 206. Disciplinary code of conducts are
A. Advisory
B. Encryption
B. legaly binding
C. Access control
C. Imaginary
D. Digital signatures and certificates
D. non mandatory
202. In the world of computing, the good val-
ues and practices while we work on the 207. Malware is short for software
internet is called is? A. malignant
A. Internet ethics B. malicious
B. legal law C. malevolent
C. security requirement D. malady
D. business demand 208. Computer program which replicates and
spreads itself from one computer to an-
203. If you use copyrighted material in a re- other
port or project you should always give
credit to the author or illustrator of work A. Hacker
you are using (examples-when you use B. Botnet
NARAYAN CHANGDER
219. A legal agreement that allows multiple A. Decomposition
users to access the software on the server B. Algorithm
simultaneously
C. Abstraction
A. Network license
D. Pattern Matching
B. Program activation
C. Digital signature 225. Colby spent a lot of his free time in a lo-
D. Plaintext cal coffee shop, where the Internet access
is free. However, the coffee shop owner
220. Which legislation governs the act of hack- has not set up a password for the Wi-Fi
ing? (1-4) network. Which of the following online ac-
tivities is safe for Colby to do at the coffee
A. The Freedom of Information Act
shop?
B. The Data Protection Act
A. buy textbooks using his credit card
C. The Creative Commons License
B. check one of this social media sites
D. The Computer Misuse Act
C. conduct academic research
221. An area of computer science dedicated to
creating software that can be taught to D. check his online bank account
perform complex procedures
226. The principle of means observing
A. Information Technology rules of “netiquette” that promote cour-
B. Artificial Intelligence tesy and respect in online settings.
C. Robotics A. human dignity
D. none of above B. civility
222. Which of these special characters are C. confidentiality
valid in a Password? D. digital property rights
A. Tilde
227. A program that replicates itself and clogs
B. Underscore
computers and networks.
C. Ampersand
A. Virus
D. All of these
B. Worm
223. According to Stephanie Winters, how
C. Trojan horse
many students ages 13 to 19 are engag-
ing in sexting? D. Denial-of-service attack
228. Which of these is NOT an AI technology 233. When you follow the fair use principle
and you do not need to get permission
A. Facial recognition
from the copyright holder, you should al-
B. Public domain software 236. These are some of the ethic in computing.
EXCEPT
C. Software Policy
A. Employee monitoring
D. Site License
B. Plagiarism
232. The ozone layer is damaged by C. Hacker
A. CFCs D. Retrieve data
B. Increase in greenhouse gases
237. Go to regularly used websites directly
C. Increased global temperatures rather than for them using Google.
D. Sulfuric and nitric acids A. communicating
NARAYAN CHANGDER
no treatment and is called the ‘controlled B. Regulation of Investigatory Powers
group’. But they are placed in the same Act
environment as the other group A. this is C. Freedom of Information Act
known as
D. Protection of Freedoms Act
A. process control
E. Privacy and Electronic Communica-
B. engineering control tions Regulations
C. experimental control
243. The golden rule of Netiquette is:
D. management control A. Remember the human!
239. Any event or action that could cause loss B. A smiley face in every message.
or damage to computer mobile device hard- C. Don’t follow the rules of netiquette.
ware, software, or data
D. none of above
A. computer crime
244. Which of these is considered a digital se-
B. DDoS curity risk?
C. DOS A. hardware theft
D. digital security risk B. software theft
240. An experienced researcher should impart C. virus attack
knowledge to his or her students D. all of the above
A. Responsible Publication 245. Simon Vallor, 22 created a programthat
B. Non-Discrimination copied itself to everyone in youremail con-
tacts list. The programwould then corrupt
C. Respect for Colleagues
data on yourhard drive.
D. Responsible Mentoring
A. Data Protection Act
241. The is a trade group that represents B. Computer Misuse Act
the world’s largest software and hard- C. Copyright and Patents Act
ware manufacturers.
D. Regulation of Investigatory Powers
A. Business Software Association (BSA) Act
B. Business Software Alliance (BSA)
246. is a process of moving technology to
C. International Business Software (IBS) a new setting and implementing it wher-
D. International Software Association ever required.
(ISA) A. Technology Transfer
D. Borrow it from another school, copy it, 255. What is a renewable resource?
and send it back promptly
A. one that can be replaced quickly
251. Which legislations governs the act of in-
B. one that is man-made
tellectual property theft?
C. one that comes from the sun
A. The Copyright, Designs and Patents
Act D. one that will never run out
NARAYAN CHANGDER
D. User Liability
A. hackers and phishers
257. How do you know that a website uses B. electricity and viruses
SSL?
C. environmental waste and spam
A. Your computer shows a message say-
D. electricity and environmental waste
ing it does
B. There is a ‘s’ in the ‘https’ of the URL 262. How do hackers use viruses? (1-3)
C. All websites use SSL by default A. To make a computer unusable
D. It checks for a certificate B. To get someone’s personal informa-
tion
258. You receive an e-mail message. The C. To find out card details
sender of the message claims to be a bank
executive and wants your personal infor- D. All of the above
mation to open an account for you. Which 263. Which of the following is an example of
one of the following terms describes this a positive effect of the computer on the
activity? environment?
A. Phishing A. Computer disposal
B. Pirating B. Energy consumption
C. Spyware C. Allows work from home culture
D. Hacking D. Production of computers
259. The law that allows you to use a limited 264. Their codes of practice advise individuals
amount of copy righted material for educa- and organisation on how to avoid breach-
tional use. ing the law
A. Freeware A. Computer Misuse Act
B. Fair Use B. Information Commissioners Office
C. Vires C. Copyright, Designs and Patents Act
D. none of above D. Equality Act
NARAYAN CHANGDER
A. Intellectual Property
A. A government policy that required In-
ternet Service Providers to allow equal ac- B. Green Computing
cess to all web content. C. Doxing
B. A network of encrypted content that al- D. Principles
lows users to engage in untraceable activ-
ity. 280. Which of the following is not safety
C. Malicious attacks on networks and equipment in a computer laboratory
websites for the purpose of promoting so- A. Surge protector
cial change, regarded by some civil dis-
obedience and others cyberterrorism. B. Metal detector
D. When somebody enters your comput- C. Smoke detector
ers data without permission. D. Fire extinguisher
276. What is Blue Light 281. Imagine a footballer sets up his own
A. a light that comes from space that is company to sell his own range of clothes.
blue What type of intellectual property can he
B. a popular app that old people use use to show that the clothes are made by
his company?
C. a illness from staring at blue stars in
the sky A. copyright
D. visible light spectrum, typically used to B. geographical indications
refer to light emitted from electronic de- C. patents
vices
D. trademarks
277. Jack made copies of a movie that just
came out. He mostly like committed 282. What should be included in your personal
code of ethics?
A. Pirate
A. Values, Principles, Net Neutrality, Blue
B. Piracy
Light.
C. Rights
B. Personal Responsibility, Cyberloafing,
D. Legalities Computers, Values.
278. Do not assume that all the information on C. Legal Compliance, Principles, Per-
the Internet is under which areas of com- sonal Responsability, Values.
puter ethics? D. Legal Compliance, Cyberloafing, Hard
A. Green computing Drive, Internet.
NARAYAN CHANGDER
computer company
D. none of above A. the periodical feedback on the
progress and the lessons from other
293. Confidentiality of a participant is best sources.
exemplified in which of the following ac- B. expert’s opinion
tions?
C. engineer’s wish
A. Asking the participant to write his or
her name in the questionnaire D. Government’s policy
B. Not mentioning his or her name in the 298. When harmful substances build up in the
Participants of the Study section air to unhealthy levels it is known as
C. Introducing himself or herself in an in- A. unfortunate
terview B. air pollution
D. Taking his or her picture and placing it C. chemicalization
in the appendix
D. water pollution
294. What does the acronym VIRUS stands
for? 299. observing rules of “netiquette” that pro-
mote online courtesy and respect.
A. Viral Information Research Under
Siege A. Confidentiality
you have failed to adhere? What law has A. A right to request the data an organi-
been broken? sation holds about them without paying a
A. Data Protection Act fee
B. A right to request the data an organi-
B. Copyright, Designs and Patents Act
sation holds on them for a fee
C. Computer Misuse Act
C. A right to request the data an organi-
D. none of above sation holds about anyone without paying
a fee
NARAYAN CHANGDER
311. Brendan had installed a pirated version
of a software into his laptop as he could D. A right to request the data an organi-
not afford to purchase the original version. sation holds about anyone for a fee
What kind of threat that his action is asso- 315. The following are ways to secure per-
ciated with? sonal data except by
A. Physical theft A. installing personal firewall
B. Human error B. using Virtual Private Network to surf
C. Malware the web
D. Virtual theft C. filling in any information on warranty
and registration form.
312. What are the suggestions for green com- D. having unlisted telephone number.
puting? I. install personal firewall.II. do
not leave the laptop running overnight.III. 316. TLS is a more recent security system than
use video conference and VoIP for meet- SSL. It has
ing.IV. use LCD monitors instead of CRT A. three layers
monitors.
B. two layers
A. I, II and III
C. five layers
B. II, III and IV
D. four layers
C. I, II and IV
317. The protects people from the effects
D. I, III and IV
of too much ultraviolet radiation.
313. Which of the following is NOT one of the A. ozone layer
Ten Commandments of Computer Ethics? B. smog layer
A. Thou shalt not use or copy software for C. cloud cover
which you have not paid.
D. temperature inversion
B. Thous shalt think about the social con-
sequences of the program you write. 318. Which of the following is not considered
as personal information?
C. Thou shalt not interfere with other peo-
ple’s computer work. A. Full Name
D. Thou shalt not use a computer to do B. Date of birth
something fun. C. Both
314. What does the Data Protection Act give D. None of the above
an individual the right to do? E. Nothing
321. involves viewing the software unit C. They don’t know that what they are do-
as a device that has expected input and ing is wrong.
output behaviors but whose internal work- D. They think that they are better than ev-
ings are unknown eryone else.
A. White box testing 326. Stealing is as good as robbery
B. Black-box testing A. sensitive information
C. Integrated testing B. equipments
D. Block testing
C. food
322. The rights cover:Broadcast and public per- D. none of above
formance, copying, adapting, issuing, rent-
ing and lending copies to the public. In 327. A person who uses existing computer
many cases, the creator will also have the scripts or codes to hack into computers,
right to be identified as the author and to lacking the expertise to write their own
object to distortions of his work. code.
A. Computer Misuse Act A. Black hat hackers
B. Information Commissioners Office B. White hat hackers
C. Copyright, Designs and Patents Act C. script kiddie
D. Equality Act D. Grey hat hackers
E. Freedom of Information Act 328. Cut down on the amount of you use
323. theory emphasizes on the character your devices.
rather than the rights or duties A. upload
A. Duty Ethics B. communication
NARAYAN CHANGDER
cludes words, logos, pictures, names, let- A. zombie
ters, numbers or a combination of these. B. zonbie army
B. The ornamentation or shape of a func- C. bot
tional object, such as a chair
D. malward
C. The right to prevent others from copy-
ing or modifying certain works 334. What is the definition of intellectual prop-
erty right?
D. A monopoly to make, use, or sell an in-
vention A. unique and original property such as
ideas and inventions.
330. Which of the following is NOT the im- B. unique and original works such as
portant reason for a business to recognize ideas and inventions.
what is intellectual property?
C. unique and original intellectual rights
A. Because of its tangible nature, intel- such as ideas and inventions.
lectual property is an attractive target for
D. none of above
theft and resale
B. The intellectual property of a business 335. Using a source without giving credit to
often represents its most valuable asset the original author is known as
C. To avoid unintentional violations of in- A. Plagiarism
tellectual property laws. B. Cheating
D. Intellectual property can be licensed C. Copying/Pasting
or sold, providing valuable licensing in- D. Paraphrasing
come
336. Viruses that pretend to be helpful pro-
331. is defined as the amount of output grams but destroy your data are
produced per unit of input
A. Spyware
A. Reliability
B. Trojan Horses
B. Productivity C. Worms
C. Quality D. Adware
D. Liability
337. Used in a way that is adequate, relevant
332. Which of the following is a safety mea- and limited to only what is necessary.
sure in the computer laboratory A. Data Protection Act
A. Illumination in the computer labora- B. Regulation of Investigatory Powers
tory Act
C. Freedom of Information Act 342. What is the name given to the test to see
D. Protection of Freedoms Act whether a computer system could be de-
scribed as intelligent?
B. They only target adults. 343. This crime usually involves online or Inter-
C. They are relatively harmless. net banking whereby the fraudsters will
send dubious e-mails or create spoof web-
D. They use messages that look official. sites hoping to entice users to hand over
339. what are the different types of e com- their credit card or banking details.Above
merce transactions? statement TRUE for
NARAYAN CHANGDER
C. Intranet 353. is determined by currently available
D. none of above data, as measured actuarially for insur-
ance premiums.
348. Which of the following is NOT a network
A. Projected risk
security device?
B. Statistical risk
A. router
B. ethernet cable C. Perceived risk
C. patents C. Mining
D. trademarks D. Recycling
361. This legislation is intended to give cre- 365. provides the framework through
ators of a wide range of material economic which learning attitudes are encouraged.
rights, enabling them to control the use of
their material in several ways. A. Authority
366. Turn your devices when you are not 371. Which of the following did Greg Bazar
using them. use as a analogy to describe a router?
A. on A. dock
B. off B. island
C. pause C. traffic light
D. communication
D. street
NARAYAN CHANGDER
367. Victoria received a semi-nude picture of
someone she knows through her cell phone. 372. is publishing the private contact infor-
Which of the following is an appropriate mation of one’s political opponents online.
reaction? A. Doxing
A. post it on Facebook B. Cyberloafing
B. tell others about it C. Hacktivism
C. forward it to other friends
D. Ethics
D. delete it immediately
373. SPAM refers to
368. A backup is a of a file, program, or
media that can be used if the original is A. Unsolicited emails or messages; may
lost, damaged, or destroyed contain links or attachment with malware
A. encasing B. Official-looking emails sent to try to ob-
tain personal or financial information
B. duplicate
C. delition C. Hacking phone networks for free calls
or have calls charged to another account
D. scanning
D. None of the above
369. is referred to as unique and origi-
nal works such as ideas, inventions, art, 374. refers to methods within the develop-
writings, processes, company and product ment cycle designed to guarantee reliable
names, logos operation of the product
A. copyright A. Cost Factor
B. Intellectual property B. Flexibility
C. piracy C. Quality assurance (QA)
D. none of above D. Liability
370. employs modern telecommunications
375. Copying or downloading music, games
and information technologies to provide
and movies that you haven’t paid for is
medical care to people who live far away
called
from healthcare providers
A. Telework A. a good idea
B. Telemedicine B. piracy
C. EHR C. free
D. OLPC D. Robbery
378. This is a destructive code that gains ac- 383. This is copyrighted software that is dis-
cess to a computer disguised as some- tributed free of charge on a trial basis. A
thing such as a desirable software pro- normal fee is charged if the user decides
gram. Once inside the computer, it can do to keep it.
damage but it cannot spread from disk to A. Share Ware
disk or computer to computer. B. Site License
A. Computer worm
C. Adware
B. Adware
D. Free Ware
C. Trojan Horse
384. Reducing Electricity use and environmen-
D. Computer Bomb
tal while using computer known as?
379. This is destructive code that is set to ac- A. ECO-freindly user
tivate at a certain time or when a specific
B. Tech Conservation
action is taken.
C. Environmental Computing
A. Spyware
D. Green Computing
B. Adware
C. Computer Bomb 385. Which is the correct scenario to describe
D. Computer Virus information accuracy?
A. Carol fills in only necessary informa-
380. What is another word for ethics? tion on a registration form.
A. Loyal B. Ben clears her history file when she
B. Character finished browsing.
C. George checks whether the web page 391. The engineer recognizes that the greatest
is trustworthy or not. merit is the work and exercises his profes-
sion committed to
D. none of above
A. a business
386. Turning characters into readable data
B. work hard
A. Upcryption
C. be physically fit
B. Decryption D. serving society
NARAYAN CHANGDER
C. Encryption
392. In the world of computing, the essential
D. Noncryption elements that controls how computer are
used is?
387. These are computer related morals, prin-
cipals, and values. A. ethic
A. Computer Abuse B. legal law
B. Computer Ethics C. security requirement
keep the data secure. Hackers are con- a decision, HOW should he/she make a
stantly searching for system vulnerabili- good ethical decision?
ties that allow them to steal credit card
NARAYAN CHANGDER
(choose 4)
408. Software you can download and use for
A. data must be processed fairly and law-
free
fully
A. Software Licence
B. Unauthorised access of computer ma-
terial B. Site Licence
C. Unauthorised access with intent to C. Shareware
commit a crime D. Free ware
D. Unauthorised modification of com-
puter material 409. According to the Cyberbullying Research
Center, how many students ages 11 to 18
E. Making or supplying or obtaining any- admitted they have bullied others through
thing which could be used in computer the Internet?
misuse acts
A. 20.1 percent
405. Eric just purchased a new computer & B. 18.9 percent
would like to protect his computer from
viruses. Which of the following actions C. 22.3 percent
should Eric take? D. 21.2 percent
A. install an anti-virus software
410. Any participants to any research activ-
B. open attachments through an un- ity must not be forced to take part in the
known e-mail study.
C. visit an unknown website A. Voluntary Participation
D. start defragmentation on the com- B. Informed Consent
puter
C. Risk of Harm
406. Which of the following terms can be de- D. Social Responsibility
fined as “crime which occurs when some-
one’s personal & financial information is 411. is the process of converting data that
stolen in order to impersonate him or her is readable by human into encoded charac-
for financial gain? ” ters
A. advanced fee scheme A. CAPTCHA
B. identity theft B. Honeypot
C. Internet auction fraud C. Encryption
D. investment fraud D. Transcription
412. The study usually covers risk identifica- to demonstrate the net benefits of a pro-
tion, risk analysis, risk assessment, risk cess to an user
rating, suggestions on risk control and risk
422. Which of the following statements de- 426. Malware is a software used for com-
fines sexting? puter and computer systems.A. B. C. D.
A. Creation, distribution or forwarding of A. Damaging
a message which includes sexually ex- B. Disrupting
plicit materials through a computer, cell
phone or other electronic devices C. Disabling
D. All of the above
B. Fraud which involves stealing personal
information for financial gain through e-
NARAYAN CHANGDER
427. The term emphasizes on the invest-
mail ment, orientation of technology, develop-
C. Use of computers, cell phones or other ment and functioning of organizations to
electronic devices to deliberately & re- meet the present needs of people and at
peatedly harm another person through the same time ensuring the future genera-
the Internet tions to meet their needs.
A. licensed B. value
B. sponsored C. rules
C. associated D. act
441. Technique intruders use to make their net- D. All of the above
work or Internet transmission appear le-
gitimate to a victim computer or network 446. Which of the following statements about
hackers is NOT correct?
A. Botnet
B. Firewall A. a hacker can refer to someone who is
good at solving computer problems
C. Password
B. there are white hat hackers & black hat
D. Spoofing
hackers
NARAYAN CHANGDER
442. are guidelines for specific group of C. a hacker can refer to someone who
professionalism to help them perform their illegally accesses someone else’s com-
roles; to know how to conduct themselves; puter
and to know how to resolve around vari-
ous ethical issues. D. all hackers are trying to break into oth-
ers’ computers for their financial benefit
A. The codes of ethics
B. The codes of physics 447. Adult Internet user who uses social net-
C. The codes of laws working sites, chat rooms or other cy-
berspace to approach and eventually hurt
D. The codes of banks other people, usually for sexual or other
443. or is the discovery, collection, abusive purposes
and analysis of evidence found on comput- A. Online Predator
ers and networksI. cyber forensicsII. evi-
dence forensicsIII. web forensicsiV. digital B. Piracy
forescis C. Computer Virus
A. I only D. none of above
B. I and II
448. Potentially damaging program that af-
C. I, II and III fects, or infects, a computer or mobile
D. I and IV devices negatively by altering the way
the computer or device works without the
444. Only add friends to your social media
user’s knowledge or permission
accounts and restrict access to your online
profiles. A. Botnet
A. secret B. Spyware
B. school C. Virus
C. respected D. Worms
D. trusted
449. All the data to be reported should include
445. are good security practices. all facts with accuracy.
A. Scan files and media for malware A. Honesty
B. Keep antivirus and computer software
B. Objectivity
updated
C. Competence
C. Be careful of unsolicited emails and
text messages D. Care
450. focuses on defining, measuring, and B. It provides better image quality than
refining the quality of the development real life.
process and the products developed during
459. This is to protect software against un- 463. Which of the following statements is
wanted or illegal duplication by writing false about proprietarysoftware?
computer code within the programs that A. The software cannot be copied, modi-
prevents simple copying. fied or shared
A. Intellectual Property B. The software can be copied, modified
B. Share Ware or shared
C. Copy Protect C. A fee is usually required to purchase a
NARAYAN CHANGDER
software license
D. Trojan Horse
D. An example of the software is the Mi-
460. Green computing is one of the areas of crosoft Office suite
computer ethics that involves reducing the
electricity and environmental waste while 464. How you act when no one is looking.
using a computer. What are the reasons to A. Cute
go green? I. to reduce electricity consump- B. Open Source
tion.II. to change the we work into being
eco-friendly.III. to recycle computer parts C. Ethics
and components.IV. to stop destroying en- D. none of above
vironment or creating global warming.
465. Who wrote the following:A robot may
A. only I not injure a human being or, through in-
B. II and IV action, allow a human being to come to
C. I and IV harm.A robot must obey orders given it
by human beings except where such orders
D. II and III would conflict with the First Law.A robot
must protect its own existence as long as
461. Hackers are unethical people who
such protection does not conflict with the
A. Access databases that they have no First or Second Law
right to be in.
A. Gary Kasporov
B. Create programs intending to destroy B. Rimsky Korsakov
other computer systems
C. Isaac Asimov
C. Do not respect the rights or privacy of
others. D. Nikola Tesla
D. Are out to destroy other people’s com- 466. What year was the computer misuse act
puter systems. released?
E. All the listed A. 1998
B. 1990
462. What is Netiquette?
C. 1988
A. Rules for face-to-face conversation.
D. 2000
B. Responsibility for the actions of others
on the internet. 467. Which Do you think is worst, cyber ter-
C. The correct or acceptable way of com- rorism or cyber warfare.
municating on and using the internet. A. Cyber terrorism
D. none of above B. Cyber warfare
C. They are both good actually. 472. Ethics come from all of the following EX-
D. They are equally bad. CEPT
NARAYAN CHANGDER
A. To understand the moral values that
C. copyright & trademark ought to guide the Engineering profession,
D. trademark
B. To resolve the moral issues in the pro-
478. What is Confidentiality?
fession, and
A. Observing rules of “netiquette” that
C. To justify the moral judgment concern-
promote online civility.
ing the profession
B. Protecting confidential data and infor-
D. All the above
mation.
C. Respecting the privacy and dignity of 483. Which of the following did Greg Bazar
other human beings. use as a analogy to describe a switch?
D. Refusing to violate the intellectual A. dock
property rights of others. B. island
479. A preventive measure for protecting your C. traffic light
computer is: D. street
A. Backing up your data
484. All of the following are protected by
B. Installing anti-virus software
trademarks EXCEPT
C. Using firewall protection
A. Logos such as the Apple on Apple’s
D. All of the above product
480. The following are ways of taking care of B. A video of a play created and per-
computer except formed by a college drama class
A. Computer should be covered when not C. Number and letter combinations like
in use 3M
B. Computer should be kept in a cool dry D. Unique product shapes as long as they
place have no bearing on the product function,
such as the famous curved bottle of Coca
C. Used contaminated devices such as
Cola
flash drive
D. The repair man should be called to re- 485. According to Sharron Davis, which of the
pair any faulty parts following is a parent’s responsibility to cy-
berbullying?
481. Encrypted code that a person, website, or
organization attaches to an electronic mes- A. Educate children about the conse-
sage to verify the identity of the message quences of cyberbullying.
sender B. Contact the parents of the cyberbully.
494. A student accesses a school network and 499. This is a program that contains destruc-
changes their exam score. Which laws tive code with copies itself onto other com-
have been broken? puter files.
A. Data Protection Act 1998 A. Computer Bomb
B. Creative Commons License B. Computer Virus
C. Computer Misuse Act 1990 C. Spyware
D. Copyright, Designs and Patents Act D. Computer Cookie
NARAYAN CHANGDER
1988
500. The followings are among the categories
495. means integration of countries of security threat, EXCEPT:
through commerce, transfer of technology, A. Interruption
and exchange of information and culture. B. Interpretation
A. Digitization C. Interception
B. Communalisation D. Modification
C. Nationalisation
501. Which of the following can be protected
D. Globalization by copyright law?
D. Device which monitors network activi- 508. Which is not a basic rule of Netiquette?
ties for malicious attacks & produces re-
A. Do not use all caps.
ports to a management station
513. What is the biggest concern with our D. All of the above
health?
517. are software programs designed to
A. Observing and recording the activities invade your computer and damage your
of employees, sometimes without their di- data.
rect consent.
A. Spyware
B. The use of electronic devices for a long
B. Trojans
period of time can be bad for your health.
C. Worms
C. Light emitted from electronic devices,
NARAYAN CHANGDER
which can lead to eyestrain, headaches, D. Adware
fatigue, and long-term vision problems. 518. hides within a program that looks le-
D. A network of encrypted content that al- gitimate; not capable of replicating itself.
lows users to engage in untraceable activ- A. Worms
ity.
B. Virus
514. Which of the following statements is C. Spyware
false about privacy and the internet?
D. Trojan
A. An organisation must make their pri-
vacy settings easy to find and manage 519. Technology can damage the environment
and it is important to understand the
B. An individual has the right to use en-
environmental impacts so that we can each
cryption technology to encrypt their per-
take steps to them.
sonal data
A. minimise/negative
C. An individual has the right to freedom
from deformation of their character B. time/minimise
D. When an individual deletes data from C. negative/minimise
their social media account the data must D. recycle/negative
be permanently removed from the servers
of the organisation 520. This legislation is intended to give certain
groups the legal right to carry out digital
515. Someone who stands to gain or lose, de- surveillance and access digital communica-
pending on how a situation is resolved is tion held by a person or organisation.
called a . A. Data Protection Act
A. negotiator B. Computer Misuse Act
B. figurehead C. Copyright and Patents Act
C. stakeholder D. Regulation of Investigatory Powers
D. philanthropist Act
522. Any event or action that could cause a 527. What should be the first step taken by a
loss of or damage to computer or mobile user when s/he receives information from
device hardware or software the Internet?
NARAYAN CHANGDER
537. The discovery, collection, and analysis
B. cyberterriost
of evidence found on computers and net-
C. cybercrime works
D. cyberwarfare A. Digital forensic
B. Network license
533. Someone who demand payment to stop
an attack on an organization’s technology C. Software piracy
ifrastructure D. Software theft
A. cybercrime
538. Someone who access a computer or net-
B. cyberterrorist work illegally
C. cyperextorinoist A. Cybercriminals
D. cyberwarfare B. Cyberextortionist
C. Hacker
534. Hayley has designed a new web app. She
thinks another company is changing her D. Trojan horse
idea. Which act would Hayley use to stop
this person from doing this? 539. Which is true about information accu-
racy?
A. Creative Commons Licence
A. Do not assume that the information
B. Computer Misuse Act provided on the web page is correct.
C. Copyright designs and Patents Act B. User relies on the web page to get in-
D. Freedom of Information Act stant information.
C. Assume the news on the social media
535. Sharron’s computer was infected by is posted by a valid party.
viruses. Which of the following could be
D. Use other’s computer resources with-
a possible cause?
out authorisation.
A. Sharron scanned her computer for
virus 540. Safety measures to be observed when us-
ing the computer includes all of the follow-
B. Sharron copied a file from her com- ing except
puter to an external hard drive
A. use of antiglare protector
C. Sharron connected her computer to a
printer B. sitting posture
551. What year was the data protection act 556. A computer room contains the following
released? except
A. 1998 A. monitor
B. 1990 B. printer
C. 1988 C. Sewing machine
D. 2000 D. UPS
NARAYAN CHANGDER
552. Maximum penalty for being found guilty 557. When you see a malicious comment about
increasing to a prison sentence of 14 years yourself, but do not know who sent it, re-
and the possibility of a fine. port it to the content , such as Face-
A. Computer Misuse Act book, YouTube, and ask them to delete the
comment.
B. Information Commissioners Office
A. restriction
C. Copyright, Designs and Patents Act
B. service
D. Equality Act
C. provider
E. Freedom of Information Act
D. creator
553. telemedicine involves acquiring data,
sound, images, and video from a patient 558. In 1770, at Schaunbrunn Palace, the
and then transmitting everything to a med- world was introduced to the first Artifi-
ical specialist for later evaluation cially Intelligent machine, it was a hoax,
but tricked people by playing
A. Live
A. Scrabble
B. EHR
B. Checkers
C. Store-and-forward
C. Draughts
D. OLPC
D. Chess
554. Etiquette on the Internet is known as
559. Which of the following statements de-
A. Intiquette fines plagiarism?
B. Netiquette A. Use of computers, cell phones or other
C. Etiquette electronic devices to deliberately and re-
peatedly harm another person through
D. Webiquette the Internet
555. Turning unreadable characters into read- B. Use of other people’s words, thoughts
able information or ideas without crediting the source
A. Decryption C. Unauthorized reproduction or distribu-
tion of copyrighted materials
B. Uncryption
D. Fraud which involves stealing personal
C. Noncryption
information for financial gain through e-
D. Encryption mail
560. treats the software unit as a device 565. is group of compromised computers
that has expected input and output behav- or mobile devices connected to a network.
iors but whose internal workings, unlike
NARAYAN CHANGDER
and respecting the intellectual property of B. copying a file from a flash drive to a
others, including online data, login infor- computer
mation, creative works, and other digital C. visiting an unknown website
assets.
D. clicking a link through an unknown e-
A. human dignity mail
B. civility
576. Advisory code of conducts are
C. confidentiality
A. Mandatory
D. digital property rights
B. Self binding
572. Your father left the room without logging
off his bank’s website. What should you C. Imaginary
do? D. Legal
A. Ignore the temptation to peek at those
577. What is information privacy?
financial records.
A. The right of individuals and companies
B. Find out if there is enough money in
to let the government access all of your
there to cover a DVD player.
personal information
C. Peek at his bank balance, and then
B. The right of individuals and companies
share the news with my friends.
to deny or restrict the collection and use
D. Slip over to the computer and see how of information about them
much money he has. As a member of the
family, I have a right to know. C. The right of individuals and companies
to censor others for expressing their own
573. Which of these does NOT use machine opinions about them
learning/AI? D. The right of individuals and companies
A. driverless cars to deny or restrict their First amendment
B. SIRI/Alexa rights.
C. Sonos wireless speakers 578. is the crime of obtaining goods, ser-
D. facial recognition on your phone vices, or property through deception or
trickery.
574. Any illegal activity involving the use of a
A. Conflict of interest
computer or related device is referred to
as a B. Breach of contract
A. cybercrime C. Fraud
B. computer crime D. Misrepresentation
579. Software firewall that detects and pro- 584. I.A.B. stands for
tects a computer and its data from unau- A. Interactive Advertising Bureau
thorized intrusions
NARAYAN CHANGDER
C. Shareware
590. In general terms of information this al-
lows certain bodies to share with the gov- D. Free ware
ernment.
595. Why do students need to learn about dig-
A. Data Protection Act ital security?
B. Regulation of Investigatory Powers A. To learn how to protect themselves
Act from online threats
C. Freedom of Information Act B. Because it is required for them
D. Protection of Freedoms Act C. To learn how to give personal informa-
E. Privacy and Electronic Communica- tion out to online users
tions Regulations D. none of above
591. According to the Online Predators and
596. Law that protects an author’s work
Safety segment, approximately how many
sex offenders are there in the United A. License Agreement
States? B. Copyright Laws
A. 271, 000 C. Civil Rights Laws
B. 645, 000 D. License Laws
C. 389, 000
597. Which of the following is not a natural
D. 532, 000
cause of water pollution?
592. The main job of the central processing A. Volcanoes
unit (CPU) in a computer?
B. Animal waste
A. It stores data and instructions that the
computer will need C. Oil spills
B. It transfers data between the various D. Silt from storms and floods
components of the computer
598. A numeric password, either assigned by
C. It executes the instructions from a pro- a company or selected by a user that pro-
gram stored in memory vide security
D. none of above A. Biometrics
593. What is the full name for netiquette? B. Keygen
A. Network etiquette C. Password
B. Computer etiquette D. PIN
601. Unique combination of characters, such as 606. Risk management in an IT industry is re-
letters of the alphabet or numbers, that sponsibility of the
identifies one specific users A. Client
A. Passphrase B. Investor
B. Password C. Developer
C. PIN D. Project Team
D. Username E. Production Team
602. The Act aims to provide security protec- 607. All of the following are ways of making
tion to online transactions. . It only legal- personal data more private, except
izes on one technology namely private key-
A. clear your history file when you have
public key Cryptography (PKP). Above is
finished browsing.
TRUE about
B. fill in only necessary information on
A. Communication and Multimedia Act
warranty and registration form.
1998
C. have unlisted telephone number.
B. Copyright (Amendment) Act 1997
D. purchase goods through online plat-
C. Computer Crimes Act 1997
forms.
D. Digital Signature Act 1997
608. Resource Crunch, Opportunities and Atti-
603. Which one is a term of cyberethics tude relates to
A. communication device A. Variety of moral issues
B. interactions with the physical world B. Variety of legal issues
NARAYAN CHANGDER
B. To make sure their work has a patent
C. observing rules of “netiquette” that
promote online courtesy and respect. C. To make sure they are able to legally
sell their work
D. respecting the privacy and dignity of
other human beings D. To give the public the right to share,
use and build upon work they have cre-
610. A provides an organization with vi- ated
sion and leadership in the area of business
conduct. 615. Which of the following is NOT an offence
under the Computer Misuse Act?
A. spiritual leader
A. unauthorised access to someone
B. corporate ethics officer
else’s files
C. disseminator
B. unauthorised access to someone
D. disturbance handler else’s files with intent to commit further
criminal offences
611. Code of morals of a particular person,
group, or profession C. copying software and trying to sell it to
A. Behavior someone for a profit
and accords with the exclusive marketing 622. Which of the following are ways of mak-
rights for the time period of 5 years ing personal data more private except
627. is a term applied to a variety of ef- 631. Government organisations block content
forts directed toward the efficient design, related to extreme politics. This is an ex-
manufacture, operation, and disposal of IT- ample of
related products A. Privacy issues
A. Whistle Blowing B. Censorship
B. Misrepresentation C. Monitoring
C. Green computing D. Legal issues
NARAYAN CHANGDER
D. Quality Factor
632. The subject under test/experiment
should be given all relevant information
628. Some important network security devices
needed to make the decision to participate.
include (three):
this is known as
A. Router
A. Informed arguement
B. Botnet B. Informed consent
C. Firewall C. proposed consent
D. Anti-virus D. classified consent
E. Switch
633. The following are some of the conditions
629. Choose the correct importance of intel- required for registration as a Professional
lectual property right.I. To protect exclu- Engineer except
sive rights, preventing others from using A. A citizen or permanent resident of
the same brand identity.II. To protect any Malaysia;
original work that created by individual B. Graduated with a CGPA of 2.0 or
person or companyIII. To protect programs higher.
containing confidential data from unautho-
rized intrusion. IV. To protect any material C. Registered as a Graduate Engineer
form of expression, if a copyright infringe- with BEM
ment occur. D. Achieved the training requirements of
A. I, II and III BEM;
640. The illegal use, copying or distributing 645. What law makes organisations look after
of software without ownership or legal your personal data properly?
rights. A. Data Privacy Act
A. Counterfeiting B. Data Protection Act
NARAYAN CHANGDER
B. Reliability B. Computer Misuse Act
C. Redundancy C. Copyright Designs and Patents Act
D. Critical Quality D. Creative Commons License
647. The researcher should be fully equipped
with research skills when conducting the 652. which is not one of the basic ethical prin-
study. ciples discussed in the video
A. competence A. Digital property rights
B. confidentiality
B. Human dignity
C. legality
C. Confidentiality
D. openness
D. Ergonomics
648. is an effort by an employee to attract
attention to a negligent, illegal, unethical,
abusive, or dangerous act by a company 653. According to Stephanie Winters, which of
that threatens the public interest. the following is true?
A. Professional malpractice A. More boys than girls are sending sexts
B. Conflict of interest B. Sexts cannot be distributed to other
C. Whistle-blowing schools or other cities
D. Business intelligence C. Sexting can result in fines from you cell
649. Step by step instructions for solving a phone company
problem. D. Most sexts are sent between
A. Decomposition boyfriends & girlfriends
B. Algorithm
C. Abstraction 654. Which of the following is not a measure
to protect computer security?
D. Pattern Matching
A. Encrypting data
650. The following are the risks in developing
AI’s EXCEPT B. Restricting access
A. Loss of job C. Copying data and storing it at a remote
B. Fraud detection location
C. Distribution of power D. Keeping the same password on all sys-
D. Cost of maintenance and repair tems consistently
655. STATE THE AREA OF COMPUTER 658. Which of the following methods is appro-
ETHICS:A BANK WORKER USING OFFICE priate to use to prevent predators from
COMPUTER TO STEAL CUSTOMERS INFOR- finding you online?
NARAYAN CHANGDER
original, non-commonplace design of the
A. The intellectual property right was shape of configuration of a product.
registered bysomeone who has since A. RIGHT OF FAIR USE
changed their name
B. DESIGN RIGHT
B. The intellectual property right relates
to a writtenwork registered by an author C. COPYRIGHT
dead 70 years D. PATENT
C. The renewal fee on the intellectual 12. One way that humans have attempted to
property rightwas not paid after the initial deal with new technologies, with varying
ten-year period expired success, is by
D. The intellectual property was never A. Passing laws
valid becausethe essential requirements
for registration weren’t met B. Voting
C. Making Laws
7. The process of taking something apart in
D. All the answers
order to understand it, build a copy of it,
or improve it is called 13. Trade Secrets can be protected for how
A. Forward engineering much time?
B. Copy and print A. 10 years
C. Improvement and renovations B. 15 years
D. Reverse engineering C. Unlimited period
D. None of the above
8. The following can be patented
A. Machine 14. Samsung has taken the specification and
features of IPhone. Which of the follow-
B. Process
ing is an example of this statement?
C. Composition of matter
A. Trademark Infringement
D. All of the above
B. Patent Infringement
9. What is the most likely result of having no C. Trade secret Infringement
policy on intellectual property? D. Copyright Infringement
A. Confusion and mistakes.
15. What do you call the intellectual property
B. Increased efficiency. which is created by two (2) or more per-
C. Increased control. son?
D. Loss of business opportunity. A. Collective Work
16. Which of the following is Rights of a Copy- 21. Notice of the record shall be published in
right Owner? the (Sec. 19, P.D. No. 49a)
A. Publish their work and Perform their A. IPO Manual
work in public
B. IPO Gazette
B. Translate and Broadcast their work
C. IPO News
C. Prevent others from making unautho-
rized use of copyrighted work D. IPO FB
NARAYAN CHANGDER
27. Why would you want to license a patent?
B. Ms. Mary Anderson
A. Another group may be able to produce
the product faster than you. C. Ms. Miriam Benjamin
B. Another group may be able to produce D. Mr. John J Loud
the product in a greater quantity than you. 33. What is a trademark?
C. Another group may be able to produce A. A unique symbol, sign, logo or word
a better quality product than you that legally represents a business.
D. All the following B. A sign that represents a trade show in
the conference.
28. Who should assist us with avoiding break-
ing policies of intellectual property? C. A sign sometimes used by the company
to sell goods
A. A friend
D. The signage on numerous different
B. .Senior management & Human re-
products.
sources
C. Security 34. How long do patents usually last for?
A. 40 Years
D. Human resources only
B. 20 Years
29. Which of the following is not an example
C. 15 Years
of a literary work?
D. 10 Years
A. A shopping list
B. A character from a novel or story book 35. A patent related to safety pin was granted
to
C. A textbook
A. Mr. Hunt
D. Computer Program
B. Ms. Mary Anderson
30. A usually lasts for the life of the online C. Ms. Miriam Benjamin
creator plus 70 years. D. Mr.John J Loud
A. Patent
36. Which of the following cannot have a de-
B. Trademark sign right applied?
C. Copyright A. The design of a video game character
D. Trade secret B. Apple’s specific office design
31. A utility patent gives its owner negative C. The unique shape of a brand of furni-
rights that stop anyone from copying, us- ture
ing or selling the defined invention for D. All can have it applied
37. What are intellectual property rights? 42. Which type of patent would be applicable
to something like “Amazon.com” one-click
A. Patent, trademark, copyright, trade-
ordering system or “Trivago.com” model
39. Which of the following are considered as 44. There has to be some element of
trade secret? A. Originality
A. Personal information B. Loyalty
B. Negative information C. Novelty
C. Financial information D. Bauble
NARAYAN CHANGDER
48. Which is NOT in the intellectual property
C. Copyright
categories?
D. Trade secret
A. PATENT
B. TRADEMARKS 53. In order to protect the name Un-Moja
C. HUMAN RIGHTS Blends should be used.
NARAYAN CHANGDER
D. hosting “conjure up” means:
69. Which of the following is NOT a Literary A. A magic trick
and Artistic Work? B. To make you think of the original
A. Painting C. Slightly refers to the original
B. Book D. None of the following
C. Pamphlet
75. What is in the seal which is not found in
D. Bonsai the logo?
70. What protects the intellectual property A. color
created by inventors? B. line
A. Patents C. name of the company
B. Copyrights D. symbols
C. Trademarks
76. Describe what is widely considered to be
D. Registered Designs the first copyright law.
71. is any word, name, symbol, or de- A. Grant ownership rights to individual
vice used to identify the source or origin authors
of products or services and to distinguish B. Statue of Anne
those products or services from others
C. Publishers or printers
A. Patent
D. All answer
B. Trademark
C. Copyright 77. A logo can be made exclusive property of
a company by registering a
D. Trade secret
A. Trademark
72. The rights of a patentee are B. Copyright
A. Sell C. Patent
B. License D. Industrial Design
C. Assign the IP to others
78. Licensing a patent simply means that the
D. All of these patent owner grants to another indi-
73. For works made for hire, terms last for vidual/organization to make, use, sell etc.
from publication or from the date his/her patented invention
of creation, whichever is shorter. A. Access
89. What kind of material can be covered on 94. A Design Right would be required for
“Copyright”? which of the following:
A. Books and plays A. An app on a new phone
B. photographs and movies B. The brand of the maker of the phone
NARAYAN CHANGDER
90. What happens after trademarks are regis- 95. Complete Specification contains
tered?
A. Title of invention
A. No one else can use that trademark for B. Description of invention
those products.
C. Claims
B. The business makes a lot of money.
D. All of these
C. Other businesses can still use that
trademark for their products. 96. Coca-Cola and McDonald’s have symbols
that identify their company. What term is
D. The business gets new customers. used to identify their symbols?
91. What is NOT a deciding factor in Trade- A. Patent
mark infringement? B. Service mark
A. The similarity of marketing channels C. Trademark
used D. none of above
B. The similarity of the price 97. A patent related to windshield wiper was
C. The similarity of the marks granted to
D. The strength of the mark; A. Mr. Hunt
B. Ms. Mary Anderson
92. How many years is the protection in-
C. Ms. Miriam Benjamin
tended protection for trademark once you
have submitted the certificate of use? D. Mr. John J Loud
100. Amirul has designed a uniquely shaped 104. Assume a company’s marketing Vice
walker for senior citizens, which can be President leaves to become the marketing
collapsed and, with the aid of two levers, Vice President of another company, and
A. True C. Copyright
D. Trade secret
B. False
C. case to case 106. A patent grants exclusive rights to the
inventor for a period of-
D. no idea
A. 13 years
102. is the transfer of possession of the
B. 15 years
original or a copy of a work or sound
recording for a limited period? C. 20 years
A. Publication D. 5 years
B. Public Performance 107. is an artistic creation with utilitarian func-
C. Published work tions or incorporated in a useful article,
whether made by hand or produced on an
D. Public lending industrial scale.
103. The process of extracting knowledge or A. Original Trainer
design information from anything man- B. Hand made model-
made and re-producing it or reproducing
anything based on the extracted informa- C. work of applied art
tion is known as: D. Work of Music
A. Regular Thinking
108. What is the primary objective of intellec-
B. Reverse Engineering tual property?
C. Regular Engineering A. Increasing our stock of knowledge
D. Reverse Thinking B. Promote the progress of science
NARAYAN CHANGDER
A. invention
C. Designer
B. industrial design
D. Inventor
C. creative work
110. in the case of a work other than an
D. patent
audiovisual work, is the recitation, play-
ing, dancing, acting, or otherwise perform- 115. Which of the following is NOT an exam-
ing the work ple of trade secret?
A. Showmanship
A. A method or technique that would give
B. Collective work an enterprise an edge over its competi-
C. Public Performance tors.
D. Published work B. Manufacturing techniques
121. Which of the following is NOT a basic re- 126. A is a form of protection for intellec-
quirement for a patent? tual property that does not require any dis-
closures or the filing of an application.
A. It must be extraordinarily creative
A. Copyright
B. It must have utility
B. Patent
C. It must be novel
C. Trade secret
D. It must be not obvious to a person of
ordinary skill in the field D. Trademark
122. The inventor of smell-o-vision will most 127. Fact based:-When is World Intellectual
likely require this: Property Day observed?
A. Copyright A. July 16th
B. Patent B. December 21st
C. Design Right C. April 26th
D. Trade Secret D. September 30th
128. Employees should be policies and pro- 133. If the song is protected using the Inter-
cedures to follow them. national Standard Music Number of ISMN,
A. It is known by public what is for magazines and journals?
NARAYAN CHANGDER
129. Sale, licensing, or otherwise dealing, es-
pecially with a view to profit, of a copy- 134. Defence to a claim of copyright infringe-
right that is done without the authority of ment whereby permission from the artist
the person who possesses the copyright. is not required so long as usage of that
artist’s work is reasonable and limited.
A. RIGHT OF FAIR USE
A. DESIGN RIGHTS
B. PASSING OFF
B. INTANGIBLE PROPERTY RIGHTS
C. UNAUTHORISED USE
C. RIGHT OF FAIR USE
D. INFRINGEMENT OF RIGHTS
D. COPYRIGHT
130. How many years is the protection of the
industrial design? 135. UPOV is:-
A. 1 year A. Convention for plant variety
B. 7 years B. United states patent
C. 25 years C. Convention for patent
D. 50 years D. None of the above.
131. In the case of work created by an author 136. In the case of a work commissioned by
during and in the course of his employment, a person other than an employer of the
utilizing the time and facilities, the copy- author and who pays for it and the work
right shall belong to: is made in pursuance of the commission,
the person who so commissioned the work
A. the company
shall have of work, the copyright
B. author thereto shall
C. both A. Commissioned work is owned by the
D. no one person who paid
B. The copyright of the artwork paid by
132. SEC. 180. Rights of Assignee 180.1. The the commissioner goes to the artist
copyright may be assigned in whole or in
part. Within the scope of the assignment, C. None of these
the assignee is entitled to which the as- D. all of these
signor had with respect to the copyright.
137. Exclusive right granted to authors of cre-
A. all priveledges and obligations ative works to control the use of their orig-
B. all financial gains and loans inal works.
C. all the rights and remedies A. COPYRIGHT
D. all the offers and liabilities B. DESIGN RIGHTS
NARAYAN CHANGDER
tection is granted to the owner of a work
agrees not to sue the other over patent of authorship, and requires the work to be
infringement. in tangible form?
A. Plant breeder’s rignts A. Patent
B. Copyright B. Trademark
C. Trademark C. Copyright
D. Cross-licensing D. Trade secret
149. When an electrical technology student
154. criminal sanction may be taken against:
wanted to get a business permit, what is
the first IPO requirement? A. An employee who uses a patented in-
vention without right.
A. company name
B. An employee who listens to music at
B. shop location
work.
C. budget
C. An employee who registers an inven-
D. all of these tion that already has a patent
150. Title II of the amends the Copyright D. An employee who sells copies of pro-
Act by adding a new section that enables tected works on company property.
a website operator that allows users to
post content on its website to avoid copy- 155. Where can we register an intellectual
right infringement if certain “ safe harbor property?
“ provisions are followed. A. PESURUHJAYA HAK ASASI MANUSIA
A. Communications Decency Act (CDA) MALAYSIA (SUHAKAM)
B. Digital Millennium Copyright Act B. SURUHANJAYA PILIHAN RAYA (SPR)
(DMCA) C. KEMENTERIAN PENDIDIKAN
C. Child Online Protection Act (COPA) MALAYSIA
D. Children’s Internet Protection Act D. PERBADANAN HARTA INTELEK
(CIPA) MALAYSIA (MYIPO)
151. A translation of a book into another lan- 156. Intellectual property rights protect the
guage is a: use of information and ideas that are of
A. Patent A. Social value
B. Trademark B. Ethical value
C. Copyright C. Commercial value
D. Trade secret D. Moral value
157. James protects his new invention by ap- 162. This Act shall be known as the Intellectual
plying for which type of protection? Property Code of the Philippines.
A. RA 8192
161. Legal interest or claim in things which can 167. If a company develops a new technology
not be touched. that improves its product, what type of IP
they use to stop others from copying?
A. DESIGN RIGHT
A. Patents
B. INTANGIBLE PROPERTY RIGHTS B. Copyrights
C. COPYRIGHT C. Trademarks
D. RIGHT OF FAIR USE D. Trade Secrets
168. Plagiarism can be defined as D. The patent does not disclose the inven-
A. paraphrasing another’s ideas with ex- tion clearlyenough for it to be performed
plicit attribution to the author by a person skilled in the art
NARAYAN CHANGDER
own B. Moral Value
C. Commercial Value
169. When trade secrets are improperly ac-
quired, this is called: D. Ethical Value
A. copyright infringment 174. The most visible Intellectual Property
B. unfair competition is
C. misappropriation of trade secrets A. Creative work
189. What is covered by intellectual prop- 191. Patent law protects inventions, and
erty? law protects authored works.
A. Hardware A. Copyright
B. Equipment. B. Trademark
C. Invention. C. Registered design
NARAYAN CHANGDER
192. A music business will utilize this form of
190. What protects the intellectual property protection for new music being released by
created by designers? its newest signing
A. Patents A. Copyright
B. Copyrights B. Patent
C. Trademarks C. Trade Secret
D. Registered Designs D. Design Right
C. Hacking into DNS files on hospitals. 19. How can we prevent Malware attacks?
D. a form of computer hacking in which (Select 2)
corrupt Domain Name System data is in- A. Install Anti-Virus
troduced into a DNS resolver’s cache, B. Make sure we have strong passwords
causing the name server to return an in-
correct IP address, which results in divert- C. Run regular scans
ing traffic to the attacker’s computer. D. Don’t access personal info with public
Wi-FI
NARAYAN CHANGDER
15. What’s Email Spoofing?
20. What can malware do to your device? (Se-
A. Adding inappropriate pictures to
lect 3)
emails.
A. Stop from running properly
B. The creation of email messages with a
forged sender address. B. Can crash, reboot or slow down
C. Fact checking emails. C. Ruin the hardware on the device
D. sending emails to people you don’t D. Slow down internet connection
know.
21. What type of malware reproduces itself
16. What is the BEST definition of grayware? and doesn’t need user input to spread to
other computers?
A. Place where undesirable material is
found in the computer A. trojan
B. spyware
B. Place where instant storage is located.
C. scareware
C. Malicious software or code that is con-
sidered to fall in the area between normal D. worm
software and a virus
22. Name An Anti-Virus Software.
D. a set of instructions secretly incorpo-
A. McAfee
rated into a program so that if a particular
condition is satisfied they will be carried B. Gorilla
out, usually with harmful effects. C. Bing
17. What is a buffer overflow? D. none of above
A. A software 23. What is the purpose of trackware?
B. A new operating system A. tracks system activity
C. A computer anomaly B. gathers system information
D. A virus C. tracks user habits then relays this in-
formation to a third party
18. Which virus groups computers together to
D. All of the above
create a network?
A. Trojan 24. What is email spoofing
B. Botnets A. Email spoofing is the forgery of an
email header so that the message ap-
C. Malware pears to have originated from someone or
D. Adware somewhere other than the actual source.
B. A virus that is designed to slow down B. Trojan, is any malicious computer pro-
your computer gram which is used to hack into a com-
puter by misleading users of its true in-
27. What does a computer virus do? B. Put computers in a network to control
33. Most viruses stay active until you 38. What is Greyware?
turn the computer. A. Software that enables a user to obtain
A. Off secret information about another com-
puter’s activities.
B. On
B. malicious software or code that is con-
C. None of the above
sidered to fall in the “grey area” between
D. none of above normal software and a virus.
NARAYAN CHANGDER
34. Name a type of malware: C. Grey malware.
A. Caterpillars D. malware that is often disguised as le-
gitimate software.
B. Worms
C. Lions 39. What is the full word for malware
NARAYAN CHANGDER
11.1 Cloud Computing
1. SaaS supports multiple users and provides variances-chunk size of 100 MB, block size
a shared data model through model. of 1 MB. A file of size 1 TB needs to be
A. single-tenancy stored on this file system. How many
chunk servers will be needed, if the file is
B. multi-tenancy replicated thrice on chunk servers capable
C. multiple-instance of hosting 200 GB on each?
D. all of the mentioned A. 10
A. Infrastructure as a Service C. 20
7. You have been asked to design a “Open 12. What’s the most popular use case for pub-
File System” which is derived from lic cloud computing today?
GFS / HDFS architecture with following
B. Encryption can be used to solve the B. You pay a company to host your web-
data segregation issue. site on a local computer to you
C. Data being processed is always en- C. Data is saved onto an external com-
crypted. puter for people to access externally
D. Encryption for data in transit has a D. More prone to viruses and hacking
speed/strength tradeoff.
22. An advantage of cloud software is that
18. I have local network and data centre, But A. It is always free
NARAYAN CHANGDER
i like to integrate them into cloud account. B. It cannot be hacked
What type of solution you will prefer for
it? C. It is updated automatically
D. It is only ever stored locally on your
A. Hybrid
computer
B. Private
23. WHICH OF THE FOLLOWING IS NOT A
C. Public PHASE OF KEY MANAGEMENT
D. Local network A. CREATION
19. What is the process of using third party B. VERIFICATION
servers to store data and run online appli- C. MONITORING
cations?
D. DESTRUCTION
A. Data Center Processing
24. Which of the following are correct tech-
B. Cloud Computing nologies working behind the cloud comput-
C. Networking ing platforms?
D. Internet Usage A. Virtualization
B. SOA
20. What is the best explanation about net-
work component? C. Grid Computing
27. Windows Azure and Force.com are exam- 32. What extra things can you do on Cloud
ple of? Computing?
NARAYAN CHANGDER
A. Software as a Service (SaaS). decrease the computing requirement as per
B. Infrastructure as a Service (IaaS) need.
C. Platform as a Service (PaaS) A. space savings
D. none of above B. cost savings
C. Accessibility
39. All of these are types of cloud services ex-
cept D. Scalability
A. Public cloud 45. “cloud”in cloud computing represents
B. Segregated cloud what?
A. Wireless
C. Hybrid cloud
B. Hard drives
D. Private cloud
C. People
40. When companies store data using cloud D. Internet
technologies, to keep things secure, the
data will be 46. Users are able to provision cloud comput-
A. Qualified ing resources without requiring human in-
teraction.
B. Decrypted
A. On-demand self-service
C. Protected
B. On demand action
D. Encrypted
C. Self service console
41. If your laptop uses the cloud for every- D. Automated service
thing, your hard drive must be
47. A payment method for cloud computing
A. empty that charges based on usage.
B. high tech A. Pay as you grow
C. fast B. Pay on demand
D. full C. Cash on delivery
42. Rapid elasticity D. Credit scoring
59. EC2 stands for? 64. Which option describes the benefit of vir-
A. Elastic Compute Cloud tualized servers?
NARAYAN CHANGDER
to services and applications that typically than physical servers
run on a distributed network through vir-
tualized resources? 65. Which cloud computing feature allows the
A. Distributed Computing service to change in size or volume to meet
user needs.
B. Cloud Computing
A. Security
C. Soft Computing
B. Scalability
D. Parallel Computing
C. Cost savings
61. Cloud computing model that provides vir-
tualized computing resources over the in- D. Virtualization
ternet.
66. GHZ radio frequency has than 2 GHZ
A. IaaS radio frequency because there are fewer
B. PaaS devices that operate at 5 GHZ
NARAYAN CHANGDER
C. Larger customer base sets, helpsprovide flexible IT capacity, and
D. Game developers can reduce their provides realtimeallocation of IT resources
costs in line with demand frombusiness pro-
cesses?
E. Customers normally pay less for a
game A. elasticity
99. What is a single-tenant cloud 104. Cloud computing shifts capital expendi-
A. Only one customer is hosted on a tures into expenditures.
server and is granted access A. operating
B. Multiple customers hosted on a server B. service
and is granted access
C. local
C. None of the above
D. none of the mentioned
D. none of above
NARAYAN CHANGDER
105. Benefits of cloud computing include
100. Consider the following state-
(choose two)
ments:Statement 1:Volatility refers to the
data velocity relative to timescale of event A. Everyone has the same version of the
being studiedStatement 2:Viscosity refers software
to the rate of data loss and stable lifetime B. It can be used offline
of data
C. Changes within the document can be
A. Only statement 1 is true tracked by who made them.
B. Only statement 2 is true D. You always have a backup stored on
C. Both statements are true your local device.
D. Both statements are false
106. How many types of Cloud are there in De-
101. Servicing multiple customers using the ployment Models?
same physical resources. A. 3
A. Resource pooling B. 2
B. Rapid elasticity
C. 4
C. Resource elasticity
D. 5
D. Rapid pooling
107. Nimbostratus and cumulonimbus clouds
102. A disadvantage of cloud computing is can signal what type of upcoming
A. You need an internet connection to ac- weather?
cess the data or software A. fair skies
B. You need an internet connection to ac-
B. hot, sunny weather
cess your LAN
C. windy weather
C. You cannot use a device that is con-
nected to the internet D. rainy weather
D. You need local storage to manage the 108. In a Classical Algorithm of Ring Election,
data backups what will be the message complexity for
103. The term “IDaaS” stands for? N labelled processes?
A. Interoperability-as-a-Service A. (N-1) messages
B. ID-as-a-Service B. (2N-1) messages
C. Intranet-as-a-service C. (3N-1) messages
D. Identity-as-a-Service D. (4N-1) messages
109. Which of them is not an advantage of cloud provider and to pay for thoseser-
Cloud? vices as they are used. The cloud provider
manages theinfrastructure and any appli-
NARAYAN CHANGDER
C. IaaS
during the summer tourist season
D. XaaS
B. Rural medical practice with four em-
120. Which of the following is not an exam- ployees
ples of Type 1 hypervisors? C. Law enforcement agency
A. VMware ESXi D. A new company start-up that manufac-
B. Citrix XenServer tures watercraft
C. VMware Player 126. Cloud computing embraces many concepts
that were previously touted as the next
D. Microsoft Hyper-V hypervisor
big thing in information technology. Which
121. Type of Cloud Deployment beneficial of of these are an antecedent of the cloud?
organisation having very sensitive data A. Software as a services
A. Public B. Utility computing
B. Private C. Remote hosted services
C. Hybrid D. Desktop computing
D. Any of the above 127. The vendor provides every level of sup-
port in this type of cloud computing.
122. Managed IT services are based on the
concept of? A. IaaS
A. Virtualization B. PaaS
C. SaaS
B. SOA
D. XaaS
C. Grid Computing
D. Utility Computing 128. You are the IT director for a retail cloth-
ing outlet. Your competitors are using
123. Google App Engine (often referred to as Internet-delivered inventory, storage, and
GAE or simply App Engine) is backup solutions from a specific provider.
A. Is a Platform as a Service You conclude it is best that your com-
pany use the same services from the same
B. Is a Software as a Service provider. What type of cloud will you be
C. Is a Infrastructure as a Service subscribing to?
D. All of the above A. Community cloud
B. Retail Cloud
124. Which of the following architectural stan-
dards is working with cloud computing in- C. Private Cloud
dustry? D. Public Cloud
131. Consumer doesn’t manage individual ap- 136. In , the first standard for Wi-Fi de-
plication capabilities in vices was released
A. Sssa A. 1989
B. Pas B. 1999
C. IasS C. 1979
D. None of them D. 1997
132. Which compute service would be consid-
137. Which is responsible for the operation
ered IaaS?
of a collection of computers that are c
A. Compute Engine connected via high speed local area net-
B. Cloud Functions works?
C. App Engine A. Computer Manager
D. Google Kubernetes Engine B. Cloud Manager
133. What is a federation Cloud? C. Cluster Manager
A. Cloud from a particular country D. None of these
B. collaboration between Clouds
138. Which of these options is not a PaaS of-
C. military Cloud fering?
D. international Cloud A. IBM App Mix
134. Which of the following benefit is related B. Azure App Service
to creates resources that are pooled to-
C. AWS Elastic Beanstalk
gether in a system that supports multi-
tenant usage? D. Google App Engine
NARAYAN CHANGDER
A. 500 B. Mouse
B. 1000 C. Speakers
C. 1500 D. none of above
D. none of the mentioned
145. What is the biggest disadvantage of com-
140. Broader model of cloud computing. Any- munity cloud?
thing as a Service. A. Collaboration has to be maintained
A. IaaS with other participants
B. PaaS B. Less security features
C. SaaS C. Cloud is used by many organisation for
different purposes
D. XaaS
D. Organisation losses business auton-
141. The wider the bandwidth the omy
A. larger amount of data that can be 146. Technically, what is the drawback of
trensfered cloud computing in industry or other envi-
B. lesser amount of data that can be ronment?
transferred A. The absence of hardware
C. No effect on data transfer B. The need for high speed internet ac-
D. none of above cess
142. What is the main feature of a private C. The management of data and products
cloud? D. The wide connection of networks
A. Customers, or tenants, maybe differ- 147. When files are held on two devices, are
ent individuals or groups within a single updated to make sure they have the same
company content
B. Customers, or tenants, maybe differ- A. Uploading
ent individuals or groups from different
companies. B. Downloading
159. Which feature of cloud computing allows C. Accessible from anywhere (with an In-
the service to change in size to meet the ternet connection)
users needs? D. Can work without Internet connection
A. Security E. You have to be in the office
B. redundancy
164. Which of the following cloud concept is re-
C. Scalability lated to pooling and sharing of resources?
D. Dont click this button A. Polymorphism
NARAYAN CHANGDER
160. How many bits are needed to represent B. Abstraction
128 values? C. Virtualization
A. 6 D. None of the mentioned
B. 7
165. Putting copies of data on multiple servers
C. 8 is a process called
D. 9 A. Cloning
D. All of the options are examples of 174. ensures the ability to exchange/ ob-
cloud computing tain the information to be consumed
179. Which of the following is built on top of a 184. A single instance of a software applica-
Hadoop framework using the Elastic Com- tion serves multiple customers.
pute Cloud?
A. Multi-tenancy
A. Amazon Elastic MapReduce
B. Tenancy scaling
B. Amazon Mechanical Turk
C. Elastic tenancy
C. Amazon DevPay
D. Multi-scalable
D. Multi-Factor Authentication
NARAYAN CHANGDER
180. Which one of the following can be consid- 185. The ability to continue to function at a
ered as the example of the Front-end? high level of performance as workflow vol-
ume increases.
A. Web Browser
A. Scalability
B. Google Compute Engine
B. Self service
C. Cisco Metapod
D. Amazon Web Services C. Elasticity
D. Measured service
181. You want a cloud subscription model that
is the least expensive way to access ser- 186. Essential componets of cloud auditor
vices that are strictly hosted by a cloud ser-
vice provider. Which cloud model describes A. security, Privacy impact, performance
this? B. Privacy impact, performance
A. Public cloud C. security,
B. Private cloud D. Privacy impact
C. Hybrid cloud
D. Cumulonimbus cloud 187. What is one benefit of a cloud computin-
genvironment?
182. What are the types of cloud services? A. It improves server performance
A. Public, private and hybrid clouds
B. It minimizes network traffic to the vir-
B. Personal area (PAN), Local area (LAN), tual machines
Campus area networks (CAN)
C. It automatically transforms physical
C. Infrastructure as a service (IaaS), servers into virtualmachines
platform as a service (PaaS), software as
a service (SaaS) D. It maximizes server utilization by im-
plementingautomated provisioning
D. Mail server, collaboration server, web
server, application server 188. Which one of the following refers to the
user’s part of the Cloud Computing sys-
183. Which of the following is considered as
tem?
Web Service Platform Elements?
A. WSDL A. back End
B. SOAP B. Management
C. UDDI C. Infrastructure
D. All of the mentioned D. Front End
189. Which of the following CANNOT be of- 194. For which of the following operations is
fered as a service via Cloud Computing? NO communication with the NameNode re-
quired?
191. What branch of Information Technology 196. Which of the following is a structured
protects computer systems? data store that supports indexing and data
queries to both EC2 and S3?
A. Cybersecurity
A. CloudWatch
B. Hacking
B. Amazon SimpleDB
C. Database Management
C. Amazon Cloudfront
D. none of above
D. All of the mentioned
192. A node acts as the Slave and is re-
sponsible for executing a Task assigned to 197. What is the parallel efficiency(Eff) of an
it by the JobTracker algorithm? Where a task takes time T in
uniprocessor system, P is number of pro-
A. MapReduce cessors, M is time taken by each proces-
B. Mapper sor.
C. TaskTracker A. Eff = (T*P)/M
D. JobTracker B. Eff = T*(M/P)
C. Eff = T/(P*M)
193. With Network as a service (STaaS)
D. Eff = T*P*M
A. Users can back up data and hard
drives. 198. Using things like Google Docs are useful
B. Programmers use cloud-based devel- to because (choose two)
opment tools to develop online applica- A. No need to install anything on the com-
tions that run on many platforms. puter
C. Interconnections link private net- B. You need to install on the device
works. C. Accessible from anywhere (with an In-
D. none of above ternet connection)
199. What are security aspects provided by 204. method is completely OS and applica-
cloud services? tion agnostic method access to OS stats
and application logs
A. Zero infrastructure investment, just-in-
time infrastructure A. Black-box, Gray-Box
B. Gray-Box, Black-box
B. Access control, identity management,
NARAYAN CHANGDER
authentication and authorization C. Black-box, White-Box
C. Quick and easy setup, smooth organi- D. Gray-box, White-Box
zation system, single management envi- 205. Supplying two or more pieces of informa-
ronment tion to verify identity.
D. Calculable cloud architecture, provide A. single sign-on
manageable workload dynamics
B. two-factor authentication
200. describes a cloud service that can only C. security token
be accessed by a limited amount of people. D. password
A. Datacenter
206. Which resources are typically provided by
B. Private cloud anInfrastructure as a Service cloud comput-
C. Virtualization ing deliverymodel?
D. Public cloud A. applications
B. virtual machines
201. What are the benefits of cloud comput-
C. virtual private networks
ing?
D. middleware software stacks
A. Scalability and flexibility.
B. Security and privacy. 207. NIST stands for
A. National Institute of Science and Tech-
C. Total control over computing re-
nology
sources.
B. National Interaction of Science and
D. none of above
Telecom
202. How many types of dimensions exists in C. National Institute of Standards and
Cloud Cube Model? Technology
A. 1 D. National Institute of Science and
Space
B. 2
C. 3 208. . provides virtual machines, virtual stor-
age, virtual infrastructure, and other hard-
D. 4 ware assets.
203. Which of the following are the features A. IaaS
of cloud computing? B. SaaS
A. Security C. PaaS
B. Availability D. All of the mentioned
NARAYAN CHANGDER
and makes them available to customers C. Hybrid cloud
over the Internet. D. Community cloud
A. SaaS
226. Which of the following should be used
B. IaaS
considering factors shown in the fig-
C. Paas ure? cloud-computing-aws-interview-
D. Traditional model questions-answers-q1
A. SimpleDB
222. Select the NIST Cloud Agents? (Give in
check box) B. RDS
A. Cloud Consumer C. Amazon EC2d)
B. Cloud Provider D. All of the mentioned
C. Cloud Broker 227. Which of the following can be identified
D. Cloud Carrier as cloud?
A. Web Applications
223. Which of the following does not reflect
the self-service feature of cloud comput- B. Intranet
ing? C. Hadoop
A. Engineer A purchases an ECS from D. All of the mentioned
Azure CLOUD to meet his/her own re-
quirements 228. Which of the following can be referred
to the location and management of the
B. Engineer B changes the operating
cloud’s infrastructure?
system of the ECS purchased by him-
self/herself from Linux to Windows A. Service
C. Engineer C increases the number of B. Application
CPUs of the ECS purchased by him- C. Deployment
self/herself from 2 to 4.
D. None of the mentioned
D. Engineer D receives an SMS notifica-
tion from the ECS provider one week be- 229. Which of these is a managed environment
fore the ECS expires. for deploying containerized apps?
231. What does IP-Address stand for? B. Access and management of the com-
mercial software.
A. Interweb-protocol address
C. Centralization of software will elimi-
B. Internet-protocol address nate the need of downloading the updated
C. Internet-probable address versions.
D. Intranet-protocol address D. All of them
232. Cloud Computing applications are typi- 237. Which one of the following is a kind
cally accessed through of technique that allows sharing the sin-
gle physical instance of an application or
A. Hardware on your computer.
the resources among multiple organiza-
B. A proxy server. tions/customers?
C. A web browser. A. Virtualization
D. An offline application. B. Grid Computing
233. Platform services are provided by a ven- C. SOA
dor while the customers are responsible D. Utility Computing
for their own applications and data in this
type of cloud computing. 238. The is something that you can obtain
under contract from your vendor.
A. IaaS
A. PoS
B. PaaS
B. QoS
C. SaaS
C. SoS
D. XaaS
D. All of the mentioned
234. According to research by Nasuni in 2013,
how much data is stored in the cloud? 239. Which of the following is a characteristic
of the SaaS applications?
A. 1 exabyte
A. SaaS applications are reliable
B. 1 petabyte
B. Non-reliable
C. 500 petabytes
C. SaaS applications are not customiz-
D. 1 yottabyte able
235. Which of the following SaaS platform is D. SaaS applications are customizable
with an exposed API?
240. From the standpoint of a it makes
A. salesforce.com no sense to offer non-standard machine in-
B. amazon.com stances to customers
NARAYAN CHANGDER
B. Pay-per-Use model
247. By default, this is the area in Google
C. virtual isolation Model Drive that shows your personal files.
D. SOA Model A. My Drive
242. Resource usage is monitored, measured, B. Shared with me
reported and billed based on use. C. Docs
A. Measured service D. My Stuff
B. Measured outcomes
248. The may arise when a process rolls
C. Pay as you grow back to its checkpoint after a failure and
D. Pay as you measure requests all the other affected processes
also to roll back
243. Point out the wrong statement:
A. Rollback
A. All applications benefit from deploy-
B. Phantom Effect
ment in the cloud
C. Domino Effect
B. With cloud computing, you can start
very small and become big very fast D. Livelock problem
C. Cloud computing is revolutionary, even 249. An authentication protocol that can oper-
if the technology it is built on is evolution- ate over PPP but serves only as the frame-
ary work and does not perform encryption or
D. None of the mentioned authentication on its own.
A. PAP
244. Google docs, Google sheets are examples
of B. CHAP
A. Cloud storage C. RADIUS
B. Cloud computing D. EAP
C. don’t know 250. The essential characteristics of cloud com-
D. none of above puting
A. On-demand self service, Broad Net-
245. enables batch processing, which greatly work service, Resource pooling, Rapid
speeds up high-processing applications elasticity, Managed Service
A. Scalability B. Rapid elasticity, Managed Service
B. Reliability C. Managed Service, On-demand self ser-
C. Elasticity vic
D. Utility D. Managed Servic
262. Which are disadvantages of external 267. A large collection of servers is know as a
hosting?
A. Ideal for local network users-less A. Network
bandwidth needed
B. Computer System
B. Expensive service
C. Server Farm
C. If servers go down it is out of your con-
trol D. Database
NARAYAN CHANGDER
D. Slow bandwidth connection 268. How many deployment models in cloud
computing?
263. Point out the correct statement in context
of YARN: A. 4
A. YARN extends the power of Hadoop B. 3
to incumbent and new technologies found C. 2
within the data center
D. 7
B. YARN is highly scalable
C. YARN enhances a Hadoop compute 269. What are two traits of a cloud computing
cluster in many ways architecture? (Choose two.)
D. All of the mentioned A. single tiered
272. Identify which statement is TRUE about 277. How many types of services are there
a bare metal hypervisor? those are offered by the Cloud Computing
to the users?
C. Soft C. Scalablility
D. Parallel D. Ubiquitous access
281. One problem with streaming movies and D. None of the above
music from the cloud is that
286. Which project identifier does not need to
A. Cloud services are expensive be globally unique?
B. You need internet access to watch or A. Project ID
listen
B. Project name
C. The cloud is not open to the public
C. Project number
D. You can’t keep the media on your de-
D. none of above
NARAYAN CHANGDER
vice
282. How can you upload content to Google 287. The option allows you to copy jars
Drive? locally to the current working directory of
tasks and automatically unjar the files.
A. Click New, File upload
A. archives
B. Click New, Folder upload
B. files
C. Drag files into the Drive window
C. task
D. You can use any of these methods to
upload files to Google Drive D. None of the mentioned
283. Consider the following state- 288. What is the fully automated, elastic third-
ments:Statement 1:The Job Tracker is wave cloud that consists of a combination
hosted inside the master and it re- of automated services and scalable data?
ceives the job execution request from A. Container-based architecture
the client.Statement 2:Task tracker is the B. On-premises
MapReduce component on the slave ma-
chine as there are multiple slave machines. C. Colocation
291. Which of the following statements are 296. refers to the location and manage-
true about key/value pairs in Hadoop? ment of the cloud’s infrastructure
301. Which is/are true regarding cloud com- C. Write down your password and store
puting? it in a secure physical location.
A. It provides on-demand network ac- D. Do not reuse passwords after they
cess have expired.
B. It does not provide ubiquitous access
306. What is the term for delivering an appli-
C. Resources can be released with no
cation over the internet called?
management effort
NARAYAN CHANGDER
D. None of these A. PaaS
B. Faas
302. Consider the following state-
ments:Statement 1:When two processes C. SaaS
are competing with each other causing
D. laaS
data corruption, it is called deadlock.
Statement 2:When two processes are
307. is a pay-as-you-go model matches re-
waiting for each other directly or indi-
sources to need on an ongoing basis.
rectly, it is called race condition.
A. Only statement 1 is true A. Utility
B. Only statement 2 is true B. Elasticity
C. Both statements are true C. Low barrier to entry
D. Both statements are false D. All of the mentioned
303. What is FE (hex) in binary?
308. Which is a fundamental attribute of cloud
A. 1101 1111 computing?
B. 1110 1111
A. Customers pay for allocated comput-
C. 1111 0101 ing resources whether they make use of
D. 1111 1110 them or not.
304. Programmers use cloud-based develop- B. Customers only get computing re-
ment tools to develop online applications sources when the cloud provider has avail-
that run on many platforms. ability.
305. Which of the following is NOT a sug- 309. Which are advantages of local hosting?
gested tip for making/keeping passwords A. Ideal for local network users-less
secure? bandwidth needed
A. Do not use any word that might appear B. Always on-cannot use sleep mode
in a dictionary.
C. Costs less than external hosting
B. Make the password longer than 8 char-
acters. D. Slow bandwidth connection
310. Below is a list of cloud infrastructure com- 315. is a new process by which the router
ponents except and the client exchange information to
determine the optimal path their signals
320. How many types of hypervisor are 325. A type of network model where all com-
there? puters on the network share responsibility
and there is no one central server.
A. 2
A. Peer to peer
B. 3
B. Client-server
C. 4
C. Mesh
D. 5
D. Virtual network
NARAYAN CHANGDER
321. Provides a platform allowing customers
to develop, run, and manage applications 326. The number of maps is usually driven by
without the complexity of building and the total size of
maintaining the infrastructure. A. inputs
A. PaaS B. outputs
B. IaaS C. tasks
C. SaaS D. None of the mentioned
D. AaaS
327. What is a Virtual Private Network
322. In private cloud customer control (VPN)?
C. IaaS A. Star
D. None B. Mesh
C. Client-server
324. Cloud Architecture
D. Peer to peer
A. Deployment Model, Service Model, Es-
sential Characteristics, Common Charac- 329. Which is not a major cloud computing plat-
teristics form?
B. Characteristics A. Google 101
C. Deployment model B. IBM Deep blue
D. Service Model C. Microsoft Azure
E. Common Characteristics D. Amazon EC2
NARAYAN CHANGDER
341. What is a benefit of Cloud Computing?
C. Runtime
A. Use your computers in any weather
B. Share Files D. Security
C. It does your work for you 346. What is an example of a WAN network?
D. Your files can fly A. Personal Hotspot
342. What advantage is there for an enter- B. Bluetooth
prise to adopt a virtual private cloud C. The Internet
model?
D. Router
A. Reduce costs by adopting a flexible
pricing model for the entire operation. 347. has many of the characteristics of
B. Reduce infrastructure costs since all what is now being called cloud computing.
data centers will be managed in a third A. Internet
party cloud.
B. Softwares
C. Manage sensitive data in a compliant
and secure manner and benefit from flex- C. Web Service
ible pricing models for select services or D. All of the mentioned
infrastructure.
D. Obtain maximum control over aspects 348. Which one of the following a technology
such as security and performance since works behind the cloud computing plat-
the entire infrastructure will be managed form?
within the IT department. A. Virtualization
343. What is the Need of Cloud Computing? B. SOA
A. Maintenance, Cost, Performance, Se- C. Grid Computing
curity
D. All of the above
B. Cost, Performance, Storage
C. Performance, Cost, Security, Storage 349. Which of the following does the most
commonly used set of protocols uses as the
D. Performance, Storage, Security messaging format?
344. Which of these is a lightweight, fully A. JSON
managed serverless execution environ-
B. BSON
ment for building and connecting cloud ser-
vices? C. XML
A. Compute Engine D. All of the mentioned
350. Which service provides raw compute, 355. Which of the following is an edge-
storage, and network capabilities, orga- storage or content-delivery system that
nized virtually into resources that are sim- caches data in different physical loca-
351. A cloud computing service that provides 356. What is the purpose of APIs offered by
developers with a framework that can be various Google Cloud services?
used for building custom applications A. APIs allow physical access to data cen-
A. PaaS ters.
B. IaaS B. APIs provide Cloud Console access
through a simple web-based graphical
C. SaaS
user interface.
D. FaaS
C. APIs allow code to be written to con-
352. Automatic backups are not provided au- trol Google Cloud services.
tomatically by drupal cloud reseller. D. APIs provide monthly pricing dis-
A. Platform.sh counts.
NARAYAN CHANGDER
plications
message in a form that will be understood
B. It is possible to exchange the data be-
by the receiving application.
tween applications of different vendors
A. Application without additional programming
B. Transport C. It offers computational resources on
C. Network demand as a metered service.
D. Data link D. Both a and b
361. function processes a key/value
366. Which of the following is a benefit of
pair to generate a set of intermediate
cloud computing?
key/value pairs.
A. Map A. The ability to make a backup copy of
your cloud computing software
B. Reduce
B. The reliability of locally installed appli-
C. Both Map and Reduce
cations
D. None of the mentioned
C. Scalable storage capacity
362. provides shared services as opposed
D. Needs to be installed on the computer.
to local servers or storage resources
A. Cloud Computing 367. Which of the following is related to ser-
B. Network Computing vice provided by Cloud?
C. Science Computing A. Sourcing
D. None of the choices B. Ownership
363. Which hash sizes are most popular to use C. Reliability
in SHA-2?
D. AaaS
A. 128
B. 160 368. as a utility is a dream that dates from
C. 256 the beginning of the computing industry it-
self.
D. 512
A. Model
364. Which command line tool is part of the
Cloud SDK? B. Computing
A. gsutil C. Software
B. Git D. All of the mentioned
D. Secure your application local storage 376. You want to leverage the cloud to host
virtual machines (VMs). Which type of
371. A short-range technology that con-
cloud service is this?
nects multiple devices, for example mo-
bile phones to speakers over a short A. Infrastructure as a Service (IaaS)
distance B. Platform as a Service (PaaS)
A. Internet
C. Software as a Service (SaaS)
B. Bluetooth
D. none of above
C. WiFi
D. 4G 377. Which of the following is the machinery
for interacting with Amazon’s vast prod-
372. Which is not an advantage of Grid? uct data and eCommerce catalog function?
A. Scalable A. Amazon Elastic Compute Cloud
B. uses unused computing power B. Amazon Associates Web Services
C. provide standard and high cpu C. Alexa Web Information Service
D. multi-tenancy D. All of the mentioned
373. Which of the following “cloudly” char- 378. which of the following is true about cloud
acteristics that cloud management service computing
must have?
A. it is always going to be less expensive
A. Billing is on a pay-as-you-go basis
and more secure than local computing
B. The management service is extremely
B. you can access your data from any
scalable
computer in the world as long as you have
C. The management service is ubiquitous internet connection
D. All of the mentioned C. only a few small companies are invest-
ing in the technology, making it a risky en-
374. Which one of the following offers the
ture
control structures and development frame-
works? D. none of above
NARAYAN CHANGDER
380. Which of these is an example of Cloud
Computing? B. Software as a Service
A. USB stick C. Application as a Service
B. Drop Box D. Infrastructure as a Service
C. SD Card 386. Which of the following describe Cloud
D. none of above Computing from the user view?
A. providing scalable infrastructure
381. Benefits of Virtualization
B. ubiquitous access to IT-infrastructure
A. Isolation
C. selling IT on pay-per-use basis
B. Encapsulation
D. virtualizing IT infrastrcture
C. Hardware Independence, Portability
D. Hardware Independence, Portability, 387. In the Planning Phase, Which of the fol-
Encapsulation, Isolation lowing is the correct step for performing
the analysis?
382. What is true about Virtualization?
A. Cloud Computing Value Proposition
A. In Virtualization, it is necessary to
B. Cloud Computing Strategy Planning
have well-compiled Multitenant.
C. Both A and B
B. In Virtualization, we analyze the strat-
egy problems that customer might face D. Business Architecture Development
C. It assign a logical name to a physical 388. data represents more than 50 per-
resource and providing a pointer to that cent of the data created every day.
physical resource when demanded.
A. Shadow
D. All of the above
B. Light
383. Cloud computing is a system and is C. Dark
one-way in nature. D. All of the mentioned
A. stateful
389. Which of the following entity is responsi-
B. stateless ble for making a service available to inter-
C. reliable ested parties?
D. none of above A. Cloud Monitor
390. What is it called when you connect up 395. Which of the following is a billing and ac-
multiple computers together to share print- count management service?
ers, and resources?
400. Which of these is not a major type of 405. Which of the following impose additional
cloud computing usage? overhead on clients and offer faster trans-
A. Hardware as a Service fer?
B. Platform as a Service A. Block storage
C. Software as a Service B. File Storage
D. Infrastructure as a Service C. File Server
401. What can be offered as a part of IaaS? D. All of the mentioned
NARAYAN CHANGDER
A. application software 406. Key requirement based on fact that
B. call-center services server workload in non-linear in nature
C. computing capacity A. Auto Scale
D. consulting B. Flexibility
402. which of the following is true about the C. Scale-ability
resource pooling feature of cloud comput-
D. none of above
ing?
A. The resource pooling feature of cloud 407. The term “Cloud Computing” is a
computing shields the difference between metaphor that originated in what?
resources of the same type. A. Graphical depiction of computer archi-
B. The resource pooling feature of cloud tecture
computing allows CPUs and disks to be
B. Meteorological symbolism
added to the same resource pool.
C. The resource pooling feature of cloud C. Worries about an unclear future for
computing is the prerequisite for the ubiq- computing architecture
uitous network access feature. D. The idea that computer user trust in
D. The resource pool feature of cloud magic
computing depends on the virtualization
408. Cloud storage can be provided as a ser-
technology
vice by allowing your data to be stored
403. Which of the following service provider A. remotely on the host company’s
provides the least amount of built in secu- servers
rity?
B. remotely on your local computer
A. SaaS
C. locally on your network
B. PaaS
C. IaaS D. locally on your remote computer
D. All of the mentioned 409. In which category of SaaS does CRM soft-
ware fall?
404. There are types of cloud computing.
A. two A. Consumer Services
B. four B. Communication Services
C. three C. Infrastructure Services
D. unlimited D. Business Services
410. Which of the following is NOT a potential 415. The rest state and motion of body are
advantage of Cloud Computing? A. non relative
414. Your company is running Microsoft Ex- 419. services are provided by the service
change Server 2007 and your employees provider on an on-premise or dedicated or
use Microsoft Office 2007. You need to hosted cloud infrastructure.
update your systems, but you want to min- A. IaaS
imize your CapEx impact. Which of the fol-
B. PaaS
lowing is the best solution?
C. SaaS
A. Purchase Exchange Server 2016 and
Office 2016 D. UIaaS
B. Purchase Exchange Server 2010 and 420. refers to the biases, noise and abnor-
Office 2010 mality in data, trustworthiness of data.
C. Subscribe to Microsoft 365 A. Value
D. none of above B. Veracity
NARAYAN CHANGDER
but always current.
B. file
C. Cloud computing is scalable, elastic
and reliable. C. disk
D. Cloud computing is cost effective but D. all of the mentioned
unreliable.
427. Name of the Cloud provided by Microsoft
422. Which of the following can be considered
PaaS offering? A. AWS
A. Google Maps B. App Engine
B. Gmail C. Azure
C. Google Earth D. Cloudera
D. All of the mentioned
428. What does the ‘S’ stand for in HTTPS
423. What happens to data when you stream
A. Security
a movie?
A. It gets deleted as you watch it B. Safe
B. It is saved on your computer C. Secret
C. It is saved on the cloud D. Secure
D. It gets deleted after you watch the
whole movie 429. Which of the architectural layer is used
as a front end in cloud computing?
424. What is Data Protection. A. client
A. The protection of all
B. cloud
B. The protection of a businesses sales
data. C. soft
C. How the government keeps our infor- D. all of the mentioned
mation safe.
430. Which one of the following options can
D. The protection of people’s personal in-
be considered as the Cloud?
formation.
A. Hadoop
425. Which one of the following is not pro-
tected by Data Protection. B. Intranet
A. A person’s address. C. Web Applications
B. A person’s date of date birth. D. All of the mentioned
431. A major advantage of Cloud Computing providers create a highly scalable data cen-
is the ability to have a resource known ter that hides the details of the underlying
as ‘ ’-which creates a copy of a file infrastructure from the consumer
434. Hardware services are provided virtu- 438. An application that needed storage
ally while customers are responsible for alone might not benefit from a cloud de-
their own application installations and ployment at all.
data management in this type of cloud com- A. online
puting.
B. offline
A. IaaS
C. virtual
B. PaaS
D. all of the mentioned
C. SaaS
439. Which of the following is the IaaS service
D. XaaS
provider?
435. The set of hardware, networking, stor- A. EC2
age, services, applications, and interfaces B. EC1
owned and operated by a third party
for use by other companies or individu- C. EC10
als is the public cloud. These commercial D. EC20
440. Messages whose ‘send’ is done but 445. Which is considered the most widely used
‘receive’ is undone due to rollback are cloudcomputing service?
called
A. Infrastructure-as-a-Service (IaaS)
A. In-transit messages
B. Platform-as-a-Service (PaaS)
B. Lost messages
C. Communication-as-a-Service (CaaS)
C. Orphan messages
D. Software-as-a-Service (SaaS)
D. Duplicate messages
NARAYAN CHANGDER
446. Which of the following software can be
441. Which of the following is a more sophis- used to implement load balancing?
ticated load balancer?
A. Apache mod balancer
A. workload managers
B. Apache mod proxy balancer
B. workspace managers
C. F6’s BigIP
C. rackserve managers
D. All of the mentioned
D. all of the mentioned
447. A company is considering a cloud environ-
442. Which of these is a managed compute
ment to improve theoperating efficiency
platform that lets you run stateless con-
for their data and applications. The com-
tainers through web requests or Pub/Sub
pany ispart of an industry where strict se-
events?
curity and data privacy issues areof the
A. Cloud Run highest importance. Which type of cloud
B. App Engine would be a goodchoice?
459. Which of the following is not a layer in 465. cloud is one where the cloud has been
the cloud architecture? organized to serve a common function or
A. User/Client Layer purpose.
NARAYAN CHANGDER
460. Which of the following is NOT a potential
risk of Cloud Computing? 466. Which of the following are true about the
A. security and legal issues cloud computing deployment modes?
B. lock-in A. The industry cloud generally has at-
tributes of a certain industry, which is
C. cross-over risks from other customers
a large private cloud” or “small public
D. dependance on physical location cloud”.
461. Which of the following is deployment B. The public cloud is generally con-
model? structed by carriers or cloud service
providers. It sells or leases services to
A. Public the public.
B. Private
C. The private cloud is deployed on the
C. Hybrid premises of enterprises and used by inter-
D. all of the mentioned nal employees.
D. all of the aboves
462. What type of storage device can a Desk-
top computer use? 467. Web services can be discovered using
A. USB Drive A. UDDII
B. Solid State Drive B. UDII
C. Hard Drive C. UDDI
D. All of the above D. UDDDI
463. The allows systems and services to 468. Google Apps
be accessible by a group of organizations.
A. SaaS
A. Public Cloud
B. PaaS
B. Private Cloud
C. IaaS
C. Community Cloud
D. None of these
D. Hybrid Cloud
469. The Cloud may be overloaded to serve a
464. How many characteristic of cloud? number of requests, and hence exhausted,
A. 5 which can cause
B. 4 A. Zombies
C. 3 B. DOS
D. 1 C. DDOS
479. Live & Regular migration are the tech- 484. Cellular network is an example of
niques of A. P2P computing
A. Virtual Machine
B. Distributed computing
B. Virtual Machine Migration
C. cloud computing
C. Security Isolation
D. collaborative computing
D. Resource Isolation
485. Which one of the following types of
NARAYAN CHANGDER
480. A service provider gets the same ben- risks cannot be mitigated solely with cloud-
efits from a composable system that a user specific security technologies?
does.
A. Identity management
A. CaaS
B. Virtual sprawl
B. AaaS
C. Denial-of-service attacks
C. PaaS
D. Intellectual property protection
D. All of the mentioned
E. Administrative access control
481. A company would like to leverage cloud
computing to provideadvanced collabora- 486. Choose the correct statement
tion services (i.e. video, chat, and webcon- A. With a pay-as-you-go, endlessly ex-
ferences) for its employees but does not pandable, and universally available sys-
have the ITresources to deploy such an in- tem, cloud computing realise the long-
frastructure. Which cloudcomputing model held goal of utility computing
would best fit the company needs?
B. use of the Internet enables the huge
A. Hybrid Cloud size of cloud computing systems
B. Public Cloud C. identity must be authenticated
C. Private Cloud D. All of them
D. Virtual Private Cloud
487. Although the Hadoop framework is imple-
482. What hardware component is responsible mented in Java, MapReduce applications
for managing running processes need not be written in
A. Hard drive A. Java
B. RAM B. applet
C. Monitor C. c
D. Graphics card D. c#
483. is not a disadvantage of Public Cloud 488. Who is believed to have invented cloud
storage?
A. Unreliability
A. Ada Lovelace
B. Susceptible for Hacking
B. J. C. R. Licklider
C. Variable broadband Internet Connec-
tion C. Bill Gates
D. Pay Per Use D. Steve Jobs
489. A hypervisor is sometimes also called a? 495. In Virtualization, which architecture pro-
A. VMA vides the virtual isolation between the
several tenants?
500. Identify the advantages of cloud comput- 505. An example of a file-sharing platform
ing from the options presented. that uses the cloud is:
A. Automatic Software Updates A. Facebook
B. Potential Downtime B. Twitter
C. Unlimited Storage C. Google Docs
NARAYAN CHANGDER
E. Cost Effective
and shrink the load-balancing capacity to
501. Which one of these is not Cloud Storage adjust to traffic demands
A. OneDrive A. Amazon Cloud-front
B. IOS B. Elastic Caches
C. Icloud C. Amazon RDS
D. DropBox D. Elastic Load Balancing
507. What is commonly meant for losing en-
502. dimension corresponds to two dif-
crypted data?
ferent states in the eight possible cloud
forms. A. lose the encryption standard
A. Physical location of data B. lose the keys
B. Ownership C. lose of account
D. all of them
C. Security boundary
D. None of the mentioned 508. In how many parts we can broadly divide
the architecture of the Cloud?
503. A network comprised of physical objects A. 4
capable of gathering and sharing electronic
information. B. 3
C. 2
A. Internet of Things ( IoT)
D. 5
B. Cloud computing
C. Data science 509. Who sorts the security and backups when
storing your files in the cloud?
D. none of above
A. You
504. Point out the correct statement. B. The hosting company
A. Google’s cloud includes perhaps some C. Someone else
10 data centers worldwide D. none of above
B. Flipkart.com’s infrastructure was built
510. What is SLA?
to support elastic demand so the system
could accommodate peak traffic A. Service Provider Assignment
C. Data centers have been sited to opti- B. Software level assessment
mize the overall system latency C. Service Level Agreement
D. All of the mentioned D. None of the above
NARAYAN CHANGDER
that users access via the internet?
C. Live Migration
A. IaaS
D. Server consolidation
B. PaaS
528. model attempts to categorize a cloud
C. SaaS network based on four dimensional fac-
D. FaaS tors.
A. Cloud Square
523. Cloud Computing refers to
B. Cloud Service
A. Accessing the Hardware
C. Cloud Cube
B. Configuring the Hardware
D. All of the mentioned
C. Manipulating the Hardware
529. Which of the following is not a NoSQL
D. All of the above database?
524. Cloud computing services such as storage A. HBase
and software B. SQL Server
A. Can be accessed on any device C. Cassandra
B. Are always free D. None of the mentioned
C. Can be accessed by any device that is 530. Which of the following is considered an
connected to a LAN essential element in cloud computing by
D. Can be accessed on any device that is CSA?
connected to the internet A. Multi-tenancy
525. Which of the following cloud is specifi- B. Identity and access management
cally designed to address the needs of the C. Virtualization
specific industry? D. All of the mentioned
A. Public Cloud
531. SWIGGY.IN formed a cloud for its all
B. Private Cloud branches but due to its limited resources it
C. Hybrid Cloud obtained theservices of AWS for extended
provisioning and thus modified its cloud ;
D. Community Cloud The cloud so formed is the example of
526. What model do most public cloud A. Private cloud
providers use for their customers? B. Public cloud
A. Single-tenancy C. Hybrid cloud
B. Multi-tenancy D. community cloud
532. Web services use to code and to de- 537. Which of the following OpenStack compo-
code data nent is used for networking services?
534. Which of the following is another name 539. UDDI Stands for
for the system virtual machine? A. Universal Development, Design and In-
A. hardware virtual machine tegration
NARAYAN CHANGDER
C. Computing B. Identity and Access Management
D. Resource C. Registration Authority
552. A service provider reselling a may 557. Which of the following describes
have the option to offer one module to cus- a message-passing taxonomy for a
tomize the information component-based architecture that pro-
D. IaaS C. Saas
D. No one
554. Graphical information that is stored in a
way that it can be used by devices such as 559. What is a possible disadvantage of cloud
smartphones and tablets to provide data computing?
about your location A. It is vulnerable to hacking
A. Geo-data B. The storage can be easily expanded
B. G-data C. Portability
C. Glob-data D. All of the above
D. Global-data 560. Point out the correct statement
555. Which of the following is not cloud ser- A. The use of the word “cloud” makes ref-
vice provider? erence to the two essential concepts
NARAYAN CHANGDER
which feature of cloud computing?
563. part of the MapReduce is responsible
for processing one or more chunks of data A. Pay per use
and producing the output results. B. on demand self service
A. Maptask C. elasticity
B. Mapper D. resource pooling
C. Task execution
569. In creating a new virtual machine, by us-
D. All of the mentioned ing a virtualization software, a user is
able to do following EXCEPT:
564. Virtual networks that are logically de-
fined for secure communication over public A. hardware settings such as how much
transmission systems. memory the VM should have.
A. Point-to-Point Protocol B. what hard disks should be virtualized
through which container files and what
B. Serial Line Internet Protocol
CDs are mounted,
C. Virtual Private Networks
C. devide the operating system into mul-
D. none of above tiple versions based on latest update.
565. The technology used to distribute service D. state information whether the Virtual
requests to resources is referred to as Machine is currently running and saved its
snapshots.
A. load performing
B. load scheduling 570. Swiggy.in formed a cloud for its all
branches but due to its limited recources it
C. load balancing
obtained the services of AWS for extended
D. all of the mentioned provisioning and thus modified its cloud;
The cloud so formed is the example of
566. Which of the these companies is not a
leader in cloud computing A. Private Cloud
A. Google B. Public Cloud
B. Amazon C. Hybrid Cloud
C. Raybiz D. Community Cloud
D. Microsoft 571. which of the architectural layer is used as
567. Real time data processing in a cloud func- front end in cloud computing
tion does not help in A. client
A. Video and image analysis B. cloud
NARAYAN CHANGDER
582. In order to participate in cloud-computing,
you can use the following OS . C. Platform, Hardware, Infrastructure
A. Windows D. none of above
B. Linux
588. Which of the following is NOT a Cloud
C. MAC computing challenge?
D. All of the above A. security and legal risks
583. Cloud computing is a kind of abstraction B. defining a contract
which is based on the notion of combining
C. hiring IT-specialists
physical resources and represents them as
resources to users. D. lock-in risks
A. Real 589. A system uses components to assem-
B. Cloud ble services that can be tailored for a spe-
C. Virtual cific purpose using standard parts.
NARAYAN CHANGDER
C. Infrastructure
D. Management B. The number of employees rarely
changes.
603. A simple example of SaaS is an online C. The number of employees changes of-
A. Email service ten.
B. Server D. The firm experiences unpredictable
C. Infrastructure service project spikes throughout the year.
D. Platform service 609. What does it mean when a public
cloud provider has the availability of five
604. How can data be secured in a database?
nines?
A. Decryption
A. No downtime
B. With a key
B. Unavailable for potentially five min-
C. Encryption utes a day
D. A padlock C. Unavailable for potentially five min-
605. Cloud providers ensure that data files are utes a month
stored online. D. Unavailable for potentially five min-
A. temporarily utes a year
B. permanently 610. Which billing model is based on the pack-
C. synchronized aging of computingresources (i.e. compu-
tation andstorage)and the amount ofthose
D. duplicated
resources used?
606. is used to convert your application A. metered
into Web-Application.
B. recurring
A. Browser Action
C. Subscription
B. Struts Services
D. per user based
C. Java Service
D. Web Services 611. which of the following does NOT rely on
cloud technologies?
607. CaaS vendor offer guaranteed QOS in
A. google drive
SLA to their clients .what does QOS stands
for? B. testout desktop pro
A. Quality operating system C. facebook
B. Quality in other services D. microsoft paint
612. When working in Google Docs, how do 616. What is Microsoft Azure?
you save your changes?
A. A cloud computing platform offered by
615. All cloud computing applications suffer 620. provides the run time environment
from the inherent that is intrinsic in their for applications, development and deploy-
WAN connectivity. ment tools, etc.
A. propagation A. IaaS
B. latency B. PaaS
C. noise C. SaaS
D. None of the mentioned D. IDaaS
621. What is pay-as-you-go model? 627. Choose the issues relates to cloud com-
A. You need to pay everything upfront puting.
B. No need to pay, until you use it A. Legal and compliance
C. Use and pay sometime later B. Security Issues
D. After use some functions in cloud, you C. Data Management Issue
need to pay immediately D. All of them
622. Which computing feature is related to util-
NARAYAN CHANGDER
itycomputing? 628. Cloud computing architecture is a combi-
nation of?
A. metering
A. a) service-oriented architecture and
B. security grid computing
C. multi-tenancy
B. b) service-oriented architecture and
D. virtualization event-driven architecture.
623. Which of the following is the most impor- C. c) virtualization and event-driven archi-
tant area of concern in cloud computing? tecture.
A. Security D. utility computing and event-driven ar-
B. Storage chitecture.
C. Scalability 629. Cloud computing is also a good option
D. All of the mentioned when the cost of infrastructure and man-
agement is
624. Cloud computing doesn’t require that
and software be composable. A. low
A. cloud B. high
B. database C. moderate
C. hardware D. none of the mentioned
D. all of the mentioned
630. How many types of services Cloud com-
625. Select the cloud services from cloud puting offers?
providers. A. 2
A. Dropbox
B. 3
B. AWS
C. 4
C. Google sheet
D. 5
D. All of them
626. Which of the following is the best-known 631. An operating system running on a Type
service model? VM is full virtualization.
A. IaaS A. 1
B. PaaS B. 2
C. SaaS C. 3
D. All of the above D. All of the mentioned
NARAYAN CHANGDER
nized?
644. What is the difference between HTTP and A. Organization node
HTTPS
B. Folders
A. HTTP is new
C. Zones
B. Websites don’t allow HTTP
D. Projects
C. HTTPs uses encryption
649. Which of the following is the deployment
D. SSL Certificates are required for HTTP
model?
645. Which delivery model is an example of a A. public
cloudcomputing environment that provides B. private
users withaweb based e-mail service?
C. hybrid
A. Software as a Service
D. All of the mentioned
B. Platform as a Service
650. Most of the cloud architectures are built
C. Computing as a Service
on this type of architecture.
D. Infrastructure as a Service
A. skeleton
646. Level Agreement (SLA) is the contract B. grid
for performance negotiated between you C. linear
and a service provider.
D. template
A. Service
B. Application 651. Which of the following is used to define
the service component that performs the
C. Deployment service?
D. All of the mentioned A. WSDL
647. Cloud Computing has below layers B. SCDL
A. 64-bit C. 128-bit
C. CoAP C. UDP
D. AMQP D. HTTP
11. The IoT platforms are mainly divided into 17. A benefit of IoT is:
how many types A. Increase my internet speed.
A. 3 types B. IoT depends on a reliable internet con-
B. 5 types nection.
C. 4 types C. Data can be access by hackers.
D. 2 types D. Industries can gather useful informa-
tion to improve their products.
NARAYAN CHANGDER
12. Which one is Smart home?
18. The Internet of Things (or IoT, for short)
A. smart home
refers to
B. good house
A. a network of hotel objects you can con-
C. safe house trol from smartphone
D. beautiful house B. a network of house objects you moni-
tor from CCTV
13. A smart Traffic camera device can:(more
then one answer) C. a network of every task in a factory in
controlling machines
A. Monitor road for traffic congestion.
D. a network of every day, usually house-
B. Monitor road for accidents. hold objects
C. Check weather conditions.
19. What is the direct benefit from the appli-
D. Provide navigation routes to cars. cation of internet of things:IOT technology
in agriculture?
14. Smart objects can be designed by means of
A. prevent the price of agricultural prod-
A. Arduino Board
ucts from falling
B. Beaglebone black
B. It creates a good image for agricul-
C. Raspberry Pie tural products.
D. All of the above C. Able to allocate land for agriculture
cost-effectively
15. When there is an excessive amount of data
flow, which the system cannot handle, D. Get information to analyze results in
attack takes place. agriculture.
A. Database crash attack 20. A Web 3.0 View
B. Data overflow Attack A. Publishing & Pushing Content
C. Buffer Overflow attack B. Publication to participation
D. Denial of Service attack C. Two way flow of information
D. Above All
16. Which is the software or a programming
language used for controlling of Arduino? 21. Who is “father” of Artificial intelligence
A. Assembly Language A. John McCarthy
B. C Languages B. Fisher Ada
C. JAVA C. Allen Newell
D. Any Language D. Alan Turning
22. A key IPV6 based network protocol 28. The operation of MQTT IoT Device or User
A. IP device that is interested in receiving news
from other devices must notify their inten-
33. In the near future IoT will be made up 39. Examples of “things” that are being man-
of ufactured that can hook up to the IOT
A. hundreds of billions of devices are (check all that apply)
B. billions of devices A. light bulbs
C. hundreds of millions of devices B. refrigerator
D. a single device C. car
34. What are the components of IoT? D. thermostat
NARAYAN CHANGDER
A. IoT Device E. none of the above
B. Sever
40. Information can be processed through
C. Gateway
A. Search engine
D. User Device
B. Data Analytics
E. Internet
C. Data Center
35. Which of the following could be an IOT de-
vice? D. None of the above
A. A Lamp 41. All of these statements are true about web
B. A Couch based learning except
C. A Pen A. Students need to be in the classroom
D. All of the Above setting to access the materials
NARAYAN CHANGDER
B. Smart Gateway technolgy
C. Smartphone A. Bluetooth
D. none of above B. HTTP
56. What types of things can you track and C. WiFi
adjust using telemetry? (select all that ap- D. UART
ply)
62. IOT stands for
A. Room temperature
A. Internet of Things
B. Shower temperature
B. Things of Internet
C. Location of household items
C. Internet of Nothing
D. Hours of electronics usage
D. Internet of Internet
57. What is the java extension file in IoT?
63. What are the advantages associated with
A. .jar Fog computing?
B. .c A. Reduction of network traffic
C. .exe B. Suitable for IoT tasks and queries
D. .py C. Low latency requirement
58. Identify which is not part of the features D. Scalability
of Internet of things technology. 64. What brings together all the gathered in-
A. Artificial Intelligence formation and provides a common lan-
B. Architecture guage?
A. Internet of Things Sorter
C. Geo-Location
B. Internet of Things Platform
D. Size Consideration
C. Internet of Things Provider
59. IoT is defined as a network of internet-
D. Internet of Things Helper
connected things with and are able to
talk to each other and collect or exchange 65. After the data is analyzed, the will be
data. sent to a smartphone.
A. Security A. connectivity
B. Senses B. data
C. Sensors C. information
D. none of above D. technology
66. What does MQTT stand for? 71. Identify the IoT communication pattern
A. Management Queue telephone Trans- which uses bidirectional, fully duplex com-
munication model that has a persistent
70. A method of representing data in a visual, 75. Following are among the examples of IOT
machine-readable form. Initially, barcodes being used across major industries.
represented data by varying the widths A. Retail industry and supply manage-
and spacings of parallel lines. ment
A. ZigBee B. Smart Home (Automation of Home
B. WIFI Equipment)
C. Barcode C. Health and Fitness
D. RFID D. Automotive & Logistics
E. Sensors and Smartphones E. Agriculture
76. DIO stands for 81. All these statements are true about IoT in
A. Data Input Output Education except
A. Learning can be more attractive
B. Data Information Object
B. Measure student’s progression and
C. DODAG Information Object
performances
D. DDOS Information Object C. Learning can be at anywhere and any-
77. IoT devices functioning steps are time
NARAYAN CHANGDER
D. Slows down the communication be-
A. Collect, Key Attributes, Transmit, Pro-
tween the teachers and students
cess, Information
B. Key Attributes, Collect, Information, 82. Why Edmodo can be regarded as one of the
Process, Transmit tools to implement IoT in education?
C. Transmit, Process, Collect, Key At- A. Because teachers can create interac-
tributes, Information tive and artistic story to enhance students’
speaking skills and writing skills.
D. Process, Collect, Key Attributes, Infor-
mation, Transmit B. Because teachers can create interac-
tive online videos by embedding formative
78. Which of the following language is pre- assessment in the video
ferred for IoT analytics? C. Because teacher can create online col-
A. Python laborative groups as a learning platform.
B. S D. none of above
85. What does the statement “industrial rev- 90. Client-Server scenario based communica-
olution 4.0” mean? tion model is
95. Cyber Physical Systems not including one C. the Cloud (servers)
of the following
D. none of above
A. Communication
B. Control 101. Data Validation means .
C. Cyber A. Authentication
D. Computation
B. Affirmation
96. Digital camera, vending Machines are ex-
NARAYAN CHANGDER
C. Renounce
amples of
A. Commercial Systems D. Authorization
B. Digital Systems
102. Robotic technology for use in the home.
C. Embedded Systems The automatic control of home appliances
D. Application Systems by electronic systems.
98. Physical Design of IoT (Bottom-up) 103. Enable Interoperability between ma-
A. Application Layer, Data Processing chines, enterprise system and mobile de-
Layer, Network Layer, Sensing Layer vices. What is the protocol described?
B. Sensing Layer, Network Layer, Data A. AllJoyn
Processing Layer, Application Layer
B. Data Connectivity Standard (DDS)
C. Network Layer, Application Layer,
Sensing Layer, Data Processing Layer C. WebSocket
D. Data Processing Layer, Network Layer, D. AMQP
Application Layer, Sensing Layer
99. oWPAN stands for 104. What are the benefits of 5G?
A. 6Low bandwidth PAN A. High speed data transmission and the
B. 6 Lossy Wireless PAN use of powerful computers is mandatory.
C. IPV6 enabled Low power PAN B. Has a low data transmission speed.
D. None of the above C. It has a high data transmission rate
per second without the aid of a computer.
100. the data exchange between devices in
IOT is stored in D. Makes VR streaming unlimited.
A. The central point E. 5G can render and return images in a
B. my computer few minutes to the user.
105. Which statement is true about IOT (Inter- B. Because of its high progress in the
net of Things)? area of computing, robotics and technol-
ogy distribution for companies, also giv-
115. are pre built circuit boards that fit on B. Medical sensors
top of Android
NARAYAN CHANGDER
C. laptop
A. Sensor D. none of above
B. Data types
C. Breadboard 121. IOT devices gather private information
about users. Which statement is most true
D. Sheilds about the security of that data?
116. Within the IOT, the process of utilizing A. User can ensure security of collected
sensors to monitor data and actuators data by encrypting it manually
instructing your devices to make adjust-
ments based off the data is called B. Users must rely on data collecting
agencies to securely store and transmit
A. Astrophysics
their data
B. Telemetry
C. User can sue data collecting agencies
C. Biology if their data is not held securely
D. Analytics
D. Most data gathered by IOT devices is
117. Meaning of Scalability in IoT safe because IOT devices are not a target
of hackers
A. Impenetrable
B. Expandable 122. One of the uses of IoT is?
C. Inflexible A. Smartphone
D. descendible
B. Factory Machines
118. The IoT Internet of Things is
C. Smart Home
A. A network of intelligent systems
(smart devices) exchanging data over the D. computer
internet. E. Laptop
B. A network of e-commerce websites
sharing product information. 123. . Which of the IoT uses is considered as
an example of how farming of the future
C. A very fast internet connection.
will be?
D. A social media website.
A. Infrastructure IoT
119. All device s of the Internet of Things can-
not be operated without B. Industrial IoT
124. One of the first business sectors that be- C. Loss of privacy and securities when
came interested in IoT technologies. sent assignments or assessments on the
network.
133. What can Smart Thermostats:Nest do? 139. What can Amazon Echo do?
A. Controlling home lighting from smart- A. Controlling home lighting.
phone. B. Analyzing home temperature
B. Customizing home temperature. C. Reading the news
C. Setting alarm and reading the news. D. Allowing us to talk with guests.
D. Allowing host to talk with guests.
140. It enables faster retrieval, perform com-
NARAYAN CHANGDER
134. The Protocol involves Message Queueing putations and eases processing for data
is analysis. What is it referred to?
A. MQPP A. Device management
B. AMQP B. NoSQL databases
C. CoAP C. Contextualize data
D. MQTT D. none of above
135. Which is the same meaning of ‘Things’? 141. An Internet of Things platform:
A. Objects A. provides services for accessing, using,
or participating in the Internet
B. Systems
B. allows for devices and apps to commu-
C. Involves
nicate with each other
D. Contains
C. allows individuals and organizations to
136. Applications of the Internet of Things are make their website accessible
as follows, except for any of them. D. none of above
A. Smart City
142. It is the network of physicalobjects-
B. Smart wearable devices, vehicles, buildings and other
C. Smart home items embeddedwith electronics, soft-
ware, sensors, and networkconnectivity-
D. CCTV sensor
that enables these objects to collect and
137. Physical Object + Sensor +? = Internet exchangedata.
of things A. Internet of Things
A. Cloud B. Network
B. actuator C. MAN
C. Internet D. Computer topology
D. Devices 143. What is the name of the CEO of GCR
138. IoT security management includes A. Andi Mulja
A. Security with hardware B. Tony Tsao
B. Data storage C. Andy Neo
C. Simple and fast installation D. Onno
D. Protocol abstraction E. Tony Neo
144. Lighting control system, such as turning A. Collect data received from each IoT
on/off or adjusting the brightness level in Device.
the house
NARAYAN CHANGDER
A. Layer 2 (Data Link) B. Skynet
B. Layer 3 (Network) C. Machine 2 Machine
C. Layer 1 (Physical) D. Bot 2 Bot
D. Layer 4 (Transport) 160. Static content provided by the site’s cre-
156. How does IoT work? ator/owner
164. What is the main advantage of the Inter- 169. Which of the following can be considered
net of Things? smart devices? More then one answer.
174. CoAP stands for B. Teachers can engage with the learning
A. Common Application Protocol materials for future references.
NARAYAN CHANGDER
A. A network of intelligent systems
(smart devices) exchanging data over the A. Makinsov
internet. B. Kevin Wetser
B. A very fast internet connection. C. Kevin Asthon
C. A network of e-commerce websites D. Mark Weiser
sharing product information.
D. A social media website. 181. Select examples where IoT can help hu-
mans:(Choose 4 answers.)
176. helps IoT by bringing together every-
day objects. A. Citywide traffic system
177. XMPP stands for 182. Which Layer is called a port layer in OSI
A. Extended Message point to point Model
B. Extensible Messaging and Presence A. Application
Protocol B. Presentation
C. Extended Medium point to point
C. Transport
D. Extensible Messaging Point Protocol
D. Session
178. How power supply is done to RPi?
183. Machine learning is
A. USB connection
A. The selective acquisition of knowledge
B. Internal battery
through the use of manual programs
C. Charger
B. The autonomous acquisition of knowl-
D. Adapter edge through the use of manual programs
179. Which statement is showing the incorrect C. The selective acquisition of knowledge
answer based the advantages of IoT to the through the use of computer programs
teachers? D. The autonomous acquisition of knowl-
A. Difficult to obtain students perfor- edge through the use of computer pro-
mances. grams
184. Internet of Things combines 190. According to the text (XR, VR & AR)
A. computer capabilities and data analyt- what is the correct alternative? 2019 was
a growth year for and augmented
NARAYAN CHANGDER
B. IPV4
has very long battery life.
C. CoAP
A. ZigBee
D. 6LowPAN
B. WIFI
C. Barcode 201. How does MQTT work for a device that
wants to share its information with oth-
D. RFID
ers?
E. Sensors and Smartphones
A. Subscribe
196. The IoTP stands for B. Publish
A. Internet of Things Platform. C. Topic
B. Internet of Things Processes. D. Transport
C. Internet of Things Process.
202. Which of the following is not a compo-
D. Internets of Thing Platform. nent of IoT?
197. Internet of Things is the evolution of A. IoT Device
connected to the Internet. B. Broker
A. cars, mobiles, and desktop computers C. Gateway
B. mobiles, homes and embedded appli- D. User people
cations
C. mobiles, streets, applications 203. What is the microcontroller used in Ar-
duino UNO?
D. none of above
A. ATmega328p
198. A device that detects or measures an
B. ATmega2560
event or physical property.
C. ATmega32114
A. Gateway
D. AT91SAM3x8E
B. Sensor
C. Big data 204. The following is not included in the cate-
gory of solution given by GCR
D. Wearables
A. Infrastructure
199. What type of device could allow a refrig-
B. SAS
erator to place a replacement order for an
item contained within it? C. Furniture
A. digital network D. IoT
209. This is the ontologies for knowledge rep- 214. states the effect of a telecommu-
resentation<br />(information collected nications network is proportional to the
by the objects, etc.) Objects (things) are square of the number of connected users
the resources. of the system (n2 ).
A. World Wide Web A. Reed’s Law
B. Semantic Web B. Sarnoff’s Law
C. Static Web C. Beckstrom’s Law
D. Dynamic Web D. Metcalfe’s law
215. According to the text (XR, VR & AR) 220. The Open System Interconnection (OSI)
what is the correct sequence? 5G OPENS to implement protocols in layers
NEW POSSIBILITIES FOR AND A. 6
A. XR and VR B. 7
B. XR and VR C. 8
C. AR and XR D. 4
D. AR and VR 221. A popular wireless networking technol-
NARAYAN CHANGDER
E. VR and AR ogy that uses radio waves to provide wire-
less high-speed Internet and network con-
216. More Customer engagement-people ex- nections. Widely used both in indoor and
pect something for their time outdoor environments.
A. Web 1.0 A. ZigBee
B. Web 2.0 B. WIFI
C. Web 3.0 C. Barcode
D. Web 4.0 D. RFID
E. Sensors and Smartphones
217. What statement suits the Internet of
Things best? 222. The huge numbers of devices connected
A. refers to the billions of devices around to the internet of things have to commu-
the world that are connected to the inter- nicate automatically, not via humans and
net. this is called as
225. What is embedded in a device to read 231. About Headsets it is correct to say that
data from the world around it? they are getting:
A. sensors
NARAYAN CHANGDER
B. A robot must resemble a human or hu-
manoid so that it can exist in harmony with A. Python
its creators
B. Machine Learning
C. A robot must protect its own existence
as long as such protection does not con- C. Java
flict with the First or Second Law. D. Computer Vision
D. A robot must obey orders given it by
7. By the housework done, we have time
human beings except where such orders
to further our studies.
would conflict with the FirstLaw
A. taking
2. My sister her ear pierced last week-
B. to have
end.
C. having
A. did
B. got D. to get
C. Build emotions, language and under- 16. The idea of Strong Artificial intelligence
stands mathematical problems. is
NARAYAN CHANGDER
D. Oliver B. Al is a threat if mismanaged or used
for bad intentions.
22. Color recognition:
C. AI replaces humans as it is more effi-
A. computer vision cient than humans.
B. robotics D. All of the above
C. Natural Language Processing
28. All keywords in Python are in
D. none of above
A. lower case
23. A human agent has hands, legs, mouth,
B. UPPER CASE
and other body parts for
C. Capitalized
A. Effectors
B. Sensors D. None of the above
43. NN is mostly used when there is an? 48. A computer method used to find the opti-
A. structured data mal path between two mapped locations.
A. Artificial Neural Network
B. unstructured data
B. A* Algorithm
C. Both structured data & unstructured
data C. Graph
D. None of the above D. Machine Learning
49. Which of these does not use NLP?
NARAYAN CHANGDER
44. What perceives it’s environment by sen-
sors and acts upon an environment by ef- A. Translation Tools
fectors? B. Email Filters
A. Robot C. Facial Recognition
B. A.I D. Autocomplete Feature
C. Agent 50. Pupils should have the doctor their
D. None of the above eyes regularly.
A. tested
45. In programming, what is the definition of
precision? B. test
A. How quickly your program can perform C. to test
tasks D. testing
B. How much you should trust the accu- 51. He has succeeded in his career in tele-
racy of your program vision.
C. How many math problems your pro- A. resurrect
gram can complete in a given time
B. to resurrecting
D. How well your program can perform
C. resurrecting
on a video game
D. resurrected
46. states that about every 2 years,
technology advances so that the speed of 52. Which is the type of AI in which we can
computers doubles. build emotional relationships?
54. SELECT ALL THAT APPLY.Which of the fol- 59. Which of the these machine learning types
lowing does a machine have to be able to uses a combination of labeled and unla-
do in order for it to have Artificial Intelli- beled data?
64. is a domain of AI that depicts the ca- C. It comprises systems with human-
pability of a machine to get and analyse level intelligence, reasoning, thinking, and
visual information and afterwards predict decision-making.
some decisions about it. D. It comprises systems that are faster
A. NLP than the smartest humans.
B. Data Sciences
70. Which of the following statements illus-
C. Augmented Reality trate the good effects of artificial Intelli-
NARAYAN CHANGDER
D. Computer Vision gence. I. Uplifts economic status due to
old invented AI machines II. Enables easy
65. Which of the following helps you in assess- and fast negotiations III. Helps the society
ing machine learning algorithms? in seeking solutions IV. Creates problems
A. K-Means Clustering due to misuse of technology
B. Linear Regression A. I, II
C. Data Analysis B. II, III
D. Performance Metrics C. III, IV
74. Applications of Machine Learning (Select 80. are parts of expert system
all that apply). A. User Interface
B. Unsupervised A. Art
C. Reinforcement B. Input
D. Deep Learning C. Design
A. Predictions A. erect
B. Accuracy B. illiterate
C. Reality C. generate
D. F1 Score D. exterminate
85. The process of imitating the working of a 91. Human face recognition:
human brain for processing data and used A. computer vision
to make decisions
B. robotics
A. Robotics
C. Natural Language Processing
B. Machine Learning
D. none of above
C. Deep learning
D. Decision Support 92. SELECT ALL THAT APPLY.Which of these
NARAYAN CHANGDER
are an example of gathering data?
86. What is the concept of reinforcement learn-
A. A computer tracking temperature
ing?
changes throughout the week
A. Learning from labeled data
B. A computer that categorizes people on
B. Learning from unlabeled data whether or not they like similar bands
C. Learning from environment C. A computer that tracks which friends
D. none of above like your posts the most.
87. A full pass over the training set, so every D. A computer that tracks the things that
data point has been examined once you purchase with your credit card.
106. DEEP LEARNING is often used in: A. When the machines mimic the cogni-
A. OBJECT DETECTION tive functions that humans ought to carry-
out
B. IMAGE PROCESSING
B. When a machine turns on
C. TO OVERCOME LIMITATIONS OF MA-
C. When a machine performs very well
CHINE LEARNING
D. When a machine becomes faulty
D. ALL OF THE ABOVE
112. AI is incorporated into a variety of differ-
NARAYAN CHANGDER
107. The canvas helps you in identifying ent types of technology. Here are some of
the key elements related to the problem. the examples EXCEPT
A. Problem scoping A. Automation
B. 4Ws Problem B. Machine vision
C. Project cycle C. SIRI
D. Algorithm D. Natural language processing
108. Which of the following would have a con- 113. Name any 2 methods of collecting data.
stant input in each epoch of training a Deep A. Surveys and Interviews
Learning model?
B. Rumors and Myths
A. Weight between input and hidden layer
C. AI models and applications
B. Weight between hidden and output
D. Imagination and thoughts
layer
C. Biases of all hidden layer neurons 114. Which of this is the most common type of
artificial intelligence use in the daily life?
D. Activation function of output layer
A. ASI (Artificial Super Intelligence)
109. Which is a not commonly used program- B. ANI (Artificial Narrow Intelligence)
ming language for AI?
C. AGI (Artificial General Intelligence)
A. Python
D. none of above
B. R
115. Machine Learning is a preferred approach
C. Perl
to:
D. Java
A. Medical Analysis
110. Deep learning techniques show a lot of B. Speech Recognition
promise for challenging natural language C. GPS Navigation Systems
processing problems.
D. Cleaning Robots
A. Deep learning techniques
116. Deep learning neural network training re-
B. logistic techniques
quires a lot of matrix calculations. Gener-
C. scientific techniques ally, we need to use hardware to enable
D. None of the above the computer to have parallel computing
capabilities. The following hardware de-
111. When is the term Artificial Intelligence ap- vices can provide parallel computing capa-
plied? bilities:
B. to test 123. What type of data is:a=[(1, 1), (2, 4), (3,
9)]?
C. test
A. Array of tuples
D. testing
B. List of tuples
119. Is Sophia Robot an example of AI? C. Tuples of lists
A. Yes D. Invalid type
B. No
124. Playing chess is a task that require
C. May be
A. Computer
D. none of above B. intelligence
120. Consider the following two statements:i) C. application
AI technology is the first truly safe tech- D. none of above
nology of 21st century ii) AI technology
provides best returns at minimum risks. 125. A theoretical type of AI where the ma-
Which of these statements is/are true? chine can outperform human intelligence in
every task
A. Only ( i )
A. Artificial general intelligence
B. Only ( ii )
B. Artificial narrow intelligence
C. Both ( i ) and ( ii )
C. Artificial super intelligence
D. Neither ( i ) nor ( ii )
D. none of above
121. What is the definition of Unsupervised
126. In training an Artificial Intelligence sys-
Learning?
tem, we need to provide a data set
A. The process of learning an action with sufficiently large amount of photos,
through feedback and practice until the speeches, or texts, etc. for the system to
action is completed.
NARAYAN CHANGDER
science test developed by the allen insti-
A. Google
tute?
B. Facebook A. deep blue
C. US department of defence B. deep learning
D. US department of justice C. aristo
D. sophiya
128. Training a pet with rewards and punish-
ments looks exactly like learning 133. I’d like to have my shoes at one.
A. Supervised A. repair
B. Unsupervised B. repairing
C. Reinforcement C. repaired
D. Deep D. being repaired
129. A computer program that improves its 134. Which of these does not belong to rein-
performance at certain tasks with experi- forcement learning?
ence. A. rewards
A. Artificial Neural Network B. agent
B. A* Algorithm C. environment
C. Graph D. labelled input
137. Which of the following is not an example 142. In the operation of computer, we need to
of Artificial Intelligence? tell a computer how to solve a problem by
designing the detailed steps in an
147. A.I. is used in? 152. Which one of these statements is cor-
rect?
A. Smart Phones
NARAYAN CHANGDER
B. Cars A. Machine learning is a technique where
computers can be trained to perform
C. Social media feeds tasks instead of needing to be given an ex-
D. Banking plicit set of steps to follow
E. Surveillance B. Machine learning is magic
148. Which one of these jobs COULD NOT be C. Machine learning means we don’t
taken by a robot with AI? need to think about problems any more be-
cause computers will think for us
A. Doctor
D. Machine learning has replaced the
B. Bank clerk need for us to learn how to code
C. Telephone sales person
153. Intelligent machines that can learn any
D. Shop worker
tasks that humans can do.
149. A percentage accompanying a prediction; A. Artificial general intelligence
it shows how confident the model is in its
output B. Artificial narrow intelligence
156. RNNs stands for? 161. In which year do you think the term ‘Ar-
A. Receives neural networks tificial Intelligence’ was coined?
166. Although machine learning is useful, 170. Which of these is not a Google Product?
there are barriers to implementation.
A. Pixel
What is one common obstacle faced by
businesses looking to use machine learning B. Echo
tools? C. Nest
A. Not enough data to perform machine D. Waymo
learning processes.
B. Lack of data science skills or data sci- 171. What would make a robot intelligent?
NARAYAN CHANGDER
entists. A. It responds to the environment.
C. No need for the big analytics process- B. It responds to the environment accord-
ing power in machine learning programs. ing to previous experiences.
C. It calculates mathematical problems
D. none of above faster than human minds.
167. is a widely used and effective ma- D. It can jump 1.5 meters higher than hu-
chine learning algorithm based on the idea mans.
of bagging.
172. refers to the field and practice of using
A. Regression algorithms that are able to “learn” by
B. Classification extracting patterns from a large body of
data.
C. Random forest
A. bias
D. decision tree
B. machine learning
168. Which of the following statements best
C. machine intelligence
describes the difference between robots
and humans? D. none of above
A. Robots move differently and made up 173. To find the you add up all the numbers
of metal. and then divide by how many numbers you
B. Robots do not have feelings and emo- have.
tions as compared to humans. A. Mean
C. Robots are too smart as compared to
B. Median
humans.
C. Mode
D. Robots are more effective than hu-
mans. D. Range
169. What is the role of Computer Science in 174. A computer can play chess, What type of
Machine Learning? learning is exhibited by the computer pro-
gram?
A. Solve problems
A. Supervised Learning
B. Collect data
B. Unsupervised Learning
C. Provide a model that solves the prob-
lem C. Reinforcement Learning
D. Cluster data D. Deep Learning
175. I can learn and understand like humans D. a machine that improves performance
A. Narrow AI based on watching a human do the same
task
186. What year do futurists believe A.I will 191. WHAT ARE AI’S FEEDED UP WITH?
meet adult human intelligence?
A. QUALITY DATA
A. 2025
B. JUNK FOOD
B. 2035
C. COMMON SENSE
C. 2040
D. none of above
D. 2029
192. In the Turing test, how can a computer
187. Can AI work in small, dark, airless
NARAYAN CHANGDER
considered as an intelligent, thinking en-
spaces?
tity?
A. Well
A. AI learns new behaviors; improve per-
B. Sure! formance as more experience is acquired.
C. Not really B. AI makes work easier and faster, far
D. Cannot at the moment more convenient than before.
190. system that mimic the expertise of an ex- 195. Artificial Intelligence is a machine spe-
pert is known as cialized in one task or area
206. There are Sustainable Development 211. Which is the last stage of AI Project Cy-
Goals cle?
A. 17 A. Evaluation
B. 19 B. Deployment
C. 20 C. Problem Scoping
D. Testing
D. 27
212. How many layers Deep learning algo-
NARAYAN CHANGDER
207. Many people question whether an AI can rithms are constructed?
make ethical decisions. What do we mean
by ETHICS? A. 2
B. 3
A. The laws of particular country
C. 4
B. The rules of behaviour imposed by a
programmer or the AI creator D. 5
C. The algorithm studies the data pat- with correct outcomes (e.g. types of ani-
terns and works out a conclusion based mals) for the machine to After learning
on the input and output training data. from the training data, a predictive model
NARAYAN CHANGDER
the training set of data. The machine B. Ability
learns by looking for patterns from the C. Natural Intelligence
training data set and then builds a
D. Cognition
A. pattern
B. module 231. Software designed to facilitate a conver-
sation between a computer and human
C. machine end-user?
D. model
A. Voice response
227. What means was devised to help work B. Walkie Talkie
out whether or not a computer can think
C. Chatbot
like a human?
D. Messaging
A. IQ test
B. AI test 232. The practice of learning from observation
C. Turing Test and making predictions about something:
235. Linguistics is the scientific study of lan- 240. I can solve complex problems that the hu-
guage which includes man cannot solve
NARAYAN CHANGDER
251. Which of the below is not supervised
D. Speech Recognition learning?
246. How is A.I. different from machine learn- A. Spam email identification
ing? B. House price prediction
A. Machine learning is slower. C. Clustering customers into different
B. Machine learning is smarter. groups of similarity
NARAYAN CHANGDER
C. numberous making a guess.
D. none of above A. a teacher
B. a dog
266. Is Python case sensitive when dealing
with identifiers? C. an adult
A. Yes D. a baby
276. They have just had air conditioning in 282. One of the following is not an example
their house. of A.I.
277. The unique characteristics of something 283. What is the most important difference be-
tween batch gradient descent, small batch
A. Supervised learning gradient descent, and stochastic gradient
B. Features descent?
C. Unsupervised learning A. Gradient size
D. none of above B. Gradient direction
C. Learning rate
278. Which of these objects is not an example
of the use of Artificial Intelligence? D. Number of samples used
A. Siri 284. It is a device module, or system used in
B. Cortana electronic gadgets and materials to detect
events and changes.
C. Alexa
A. Electrons
D. Electric buses
B. Motor
279. A human agent has eyes, ears, and other C. Sensor
organs for
D. detector
A. Effectors
285. The system that allows a computer to
B. Sensors make decisions, such as in health care and
C. Both A and B financial advice is called
D. None A. Experiment system
B. Expert system
280. AI duet is a game which uses
C. Random search generator
A. Natural language processing
D. none of above
B. Natural image processing
C. Computer vision 286. How does artificial intelligence become
useful to society?
D. None of these
A. It becomes helpful in completing tasks
281. You should have your car before go- quickly and efficiently thus producing
ing. more products
A. servicing B. It becomes helpful in completing tasks
quickly thus makes people lazy
B. to service
C. It becomes helpful in making task eas-
C. service ier and less efficient resulting to the boost
D. serviced of economy.
NARAYAN CHANGDER
C. Artificial super intelligence
C. Deep learning and machine learning
are both artificial intelligence but have no D. none of above
relationship with each other 290. Kelly wanted a live band at her wed-
D. None of the above ding.
9. What does a Quantum Computer use for B. It is the manipulation of matter at the
computing, unlike a classical computer? nanometer scale.
17. What is Quantum Computing for? 22. What does Quantum Computing use to sim-
ulate possible solutions?
A. it allows technological systems to per-
ceive their environment, to relate to it. A. Superposition and entanglement
B. It serves to later share those images B. Some hardware
on the same platform. C. It used magic
C. It is based on the use of qubits instead D. none of above
of bits, and gives rise to new logic gates.
23. Which company has a quantum computer
NARAYAN CHANGDER
D. It deals with the set of specifications that we can use through their website?
that serve to define how, when and what
is stored. A. Microsoft
B. IBM
18. When the information is between 0 and 1
C. Apple
in a quantum computer, what do we call
this? D. Google
A. Same position 24. Why are we not able to use quantum com-
B. Different position puters in our homes? Select TWO reasons.
A. It needs to be completely isolated
C. Superposition
B. It is too expensive
D. Ordinary position
C. It is too heavy
19. Who is the father of Quantum Comput- D. It has to be kept at absolute zero tem-
ing? perature
A. David deutsch
25. What can quantum computers be used for?
B. Charles Babbage Select TWO.
C. George Boole A. Homework
D. Gordon E Moore B. Artificial Intelligence
C. Google Docs and Slides
20. What do we call the pieces of information
in a quantum computer? D. Simulations/Predictions
A. Bits E. Computer games
NARAYAN CHANGDER
B. An ever-expanding VR community
where you can explore, create and defy 12. Once the Upload operation succeeds, a
physics and reality will be displayed on the screen.
C. An AR app that enhances the search ex- A. Picture
perience with digital directions on top of
the real world B. Image
16. Augmented reality experiences can be en- C. Window on world Virtual Reality
abled through which of these mediums? D. none of above
NARAYAN CHANGDER
D. A platform used to catch Pokemon
D. Limited Research
27. Do you see yourself using AR in your class-
rooms? E. Technology Learning Curves
A. Yes 32. When was augmented reality invented?
B. Maybe A. 2007
C. No B. 1854
D. What is AR?
C. 1979
28. Why does virtual reality enhance instruc- D. 1957
tion?
A. It tally’s rewards to help with class- 33. What was the author’s purpose in writing
room management this book?
35. Augmented reality (AR) provides features 40. Augment in latin word call?
that are A. Augere
NARAYAN CHANGDER
B. Augmented Reality
C. Genetic Engineering B. Fully-immersive virtual
D. Artificial Intelligence C. Non-immersive virtual
D. Map
47. A flight simulator allows a pilot to do all
these, except 52. Avatar
A. take off and land an airplane for real. A. is the changing the way we interact
B. recreate the landscape the pilot sees. with the world, one aura at a time along-
side their catalogue by embedding our
C. practice flying virtually in all kinds of technology into the argos app
weather.
B. A person’s online representation as a
D. to handle every sort of emergency. character, whether in the form of a 2-D or
48. What is one advantage of using virtual re- 3-D image or simply through text
ality in certain health care fields? C. Is the ability of the user to interact
with an application
A. Patients can work on their own ill-
nesses. D. Various technologies are used in Aug-
mented Reality rendering including optical
B. It is more accurate than non-virtual
projection systems, monitors, hand held
treatments.
devices, and display systems worn on the
C. Patients and doctors can review health human body
records together.
53. Read the central idea statements below.1.
D. Doctors’ visits can be like video
The Leaders Sport Business Summit met to
games.
discuss the future of mixed reality.2. The
49. A game based on which animated franchise development of mixed reality has the po-
propelled augmented reality (AR) into the tential to transform sports.3. New tech-
mainstream in recent years? nology can help athletes train and simulate
their experience for fans.4. New sensors
A. Super Mario
are making it possible to train athletes in
B. PokemonGo! sit-down sports as well.Which two state-
C. World of Warcraft ments accurately reflect the article’s cen-
tral ideas?
D. Fortnite
A. 1 and 3
50. Which popular on-demand video stream- B. 1 and 4
ing service has an app on the Gear VR
for watching all your favourite shows and C. 2 and 3
movies? D. 2 and 4
54. How are all types of digital reality the C. Immersive technologies that enable
same? users to experience digitally rendered
content in both physical and virtual
NARAYAN CHANGDER
D. VR(very real)
A. SketchUP
69. how is the headset connected to the com-
B. Revit puter?
C. Cinema 4D A. HDMI & USB
D. Blender B. USB
64. A person sees a 3D picture on the ID card C. HDMI
A. Hologram D. AUX
B. Fully-immersive virtual 70. Which of the following block/blocks
C. Non-immersive virtual is/are responsible for a same character
D. 3 D picture to do two different things, at the same
time?
65. How do most people use AR currently? A. Run independently
A. Their computers B. Run Parallel
B. Their phones C. Both of them
C. Their TV’s D. None of them
D. AR Goggles
71. The following is the correct statement re-
66. Which of the following is NOT a listed ben- garding Mixed Reality (MR).
efit of augmented reality (AR) in Educa- A. MR transports users into a Virtual Envi-
tion? ronment (VE) and allows them to interact
A. Bringing Opportunities for Collabora- within it
tion B. MR combines digital content with the
B. Increasing Accessibility to Educational real world in real time but there is no in-
Content teraction
C. Improving Student Academic Achieve- C. MR combines Virtual Reality and Aug-
ment mented Reality technologies
D. Appealing to Multi-Modal Learning D. MR is a software program or operating
system that requires internet
67. Which of the following is NOT a way for a
user to input information into Virtual Re- 72. Several 3D panoramas connected by tran-
ality? sitions are called
A. Hand Controller A. multimedia
B. Keyboard B. presentation
82. Which is not mentioned as one of the chal- 87. Augmented reality experiences can benefit
lenge students to (choose 3 elements)
A. Dissemination of fake information A. enhance engagement
B. Augmented reality can distort people’s B. raise attention
lives
C. add fun to study
C. Privacy problems of the Augmented re-
ality D. improve collaborative work
NARAYAN CHANGDER
D. Unrealistic Expectations E. practice sports
NARAYAN CHANGDER
102. What type of model is used to get the AR
effect? B. Alan Turing
A. 3D C. Rodrigo Santos
B. 2D D. Morton Heilig
C. animations
108. What is AR stand for?
D. 1D
A. Augmented realive
103. The AR works through successive
stages. B. Application reality
A. 3 C. Application realive
B. 2 D. Augmented reality
C. 4
109. Interactive Video
D. 5
A. A video with features, such as
104. is defined as the sense of being in an hotspots, that call for the user to inter-
environment. act with the video
A. Telepresence B. A video anchored in 3D space (typically
B. Immersion superimposed on an Image Target) while
maintaining the view of the physical envi-
C. Presence ronment as opposed to full screen play-
D. Perception back
111. The following is the correct statement re- A. Smartphones or tablets with internet
garding Augmented Reality (AR). connection
NARAYAN CHANGDER
C. Internet of Things
122. AR stands for what?
D. Internet of Thinking
A. Augmented reality
B. Application reality 127. How will we interact with technology in
the future?
C. Augmented realive
A. A Keyboard
D. Application realive
B. Voice
123. The main similarity of virtual reality and
C. Eyes
augmented reality is
D. Thoughts
A. they are designed to alter the view of
the world. 128. Which statement would Doug Liddle be
B. they are only used for entertainment. MOST likely to agree with?
C. people use them similarly. A. Experiencing space through virtual re-
ality is something everyone should have
D. none of them has potential future ap-
the chance to do.
plications.
B. Experiencing space through virtual re-
124. Augmented Reality vs Virtual Reality ality is not as cool as experiencing it the
A. One enhances one’s current percep- way astronauts do.
tion of reality, whereas in contrast, the C. Experiencing space through virtual re-
other replaces the real world with a stim- ality is not something that will happen for
ulated one. a long time.
B. Interaction with virtual environment D. Experiencing space through virtual re-
by conventional means and can be done ality is a great way for companies to make
in real time a lot of money.
C. One ensures you are in reality,
129. What does AR stand for?
whereas in contrast, the other is the real
world. A. Augmented reality
D. Considered to be the father of video B. Augmented-virtual reality
games because he created the interactive C. Augumented reality
television
D. none of above
125. Multimedia elements that give visual
emphasis to an information presentation 130. What game has Augmented Reality
are? A. Pokemon
A. Tex B. Netflix
NARAYAN CHANGDER
146. Who invented the first VR device?
rections to the computer
A. Mark Zuckerberg
142. Which of the following is an example of B. Morton Heilig
a prototype?
C. Jaron Lanier
A. a Ford automobile just off the assem-
D. Stephen Spielberg
bly line
B. a written idea for a new automobile 147. Virtual reality device
151. When was sensoroma created? 156. What device we can use for apply Virtual
A. 1957 Reality system?
161. Augmented Reality 166. What is the main way we interact with
A. Adds computer-generated content to technology currently?
the user’s view of the world, giving them A. A Keyboard
a composite view. B. Voice
B. A distinct image that the device can C. Eyes
recognise through the camera and track.
D. Thoughts
C. How the device anchors digital content
NARAYAN CHANGDER
to the real world. 167. What is AR?
D. Digital content that is superimposed A. Augmented Reality
over a trigger image. B. Action Reality
162. Which VR headset is most expensive? C. Arjen Robben
A. PlayStation D. Anua R
B. Oculus Rift 168. Can we code in Cospaces Edu, just by
C. Computer dragging the 3D characters to the Environ-
ment?
D. Samsung
A. Yes
163. What are immersive technologies?
B. No, We should enable coding for each
A. Technologies used for gaming characters
B. Technologies that extend reality C. In some conditions, we can.
C. Technologies used for education D. Information is insufficient.
D. Technologies that create reality 169. You need to scan the code with the to
164. How many benefits of AR? load and view the AR experience you’ve
created.
A. 3
A. WakingApp AR Studio mobile applica-
B. 2 tion
C. 4 B. WakingApp AR Studio website
D. 5 C. WakingApp AR Studio email
165. Pokemon Go! D. WakingApp AR Studio image
A. An early example of an augmented re- 170. What are the 4 difficulties in using aug-
ality game that put digital animals into the mented reality (AR) in education?
real world.
A. Lack of content-creation tools, invest-
B. Digital content that is superimposed ment costs, technology learning curves,
over a trigger image. limited research
C. Adds computer-generated content to B. Digital divide, limited funding, limited
the user’s view of the world, giving them research, functionality issues
a composite view. C. Access to resources, lack of flexibility,
D. How the device anchors digital content lack of interpersonal connections, invest-
to the real world. ment costs
180. What kind of movement should your VR 184. Augmented reality (AR) can turn abstract
subjects have? concepts into realistic experiences by mak-
ing abstractions appear as real objects in
A. Complete and total freedom of move-
the user’s world and allowing them to in-
ment.
teract with them naturally. Which type of
B. The viewer should be in a central loca- learner will benefit most from the use of
tion and movement be limited. augmented reality?
C. The viewers movement is not impor- A. Auditory learner
NARAYAN CHANGDER
tant. B. Logical/mathematical learner
D. The viewer should be able to run in real C. Kinesthetic/visual learner
life with a headset on.
D. All of the above
181. AR works by projecting artificial light
185. Why is investment costs an issue when
onto a real surface. In some cases it al-
using AR for education?
lows the user to interact with it. It’s like
the holograms you see in sci-fi genre films A. Schools have to acquire technologies
like Star Wars B. It cost money to train teachers
A. Projection Based Augmented Reality C. Maintenance cost should be consid-
B. Superimposition Based Augmented Re- ered
ality D. All of the above
C. Markerless Augmented Reality 186. When was the VR headset made?
D. none of above A. 1968
B. 2002
182. Image Target
C. 1945
A. The image recognized by the App,
which launches the AR experience D. 1977
B. An image or graphic superimposed 187. What Type of AR/VR is described be-
over an Image Target low:A teacher of a design class has her
C. An AR app such as Layar or Aurasma students use an app to see what different
that is designed to provide Augmented Re- fixtures and paint colors would make the
ality viewing experiences across multiple classroom look like.
brands and content types A. Augmented
D. a technology that superimposes a B. Fully-immersive virtual
computer-generated image, video or 3D C. Non-immersive virtual
model on a user’s view of the real world
D. Semi-Virtual
183. A person using a Snapchat filter. 188. What is a 360 video?
A. Augmented A. Takes video from all directions
B. Fully-immersive virtual B. It allows to watch 360 things
C. Non-immersive virtual C. Is a wider rectangle picture view
D. Filter D. none of above
189. AR technology allows students to inter- D. To criticize the use of both virtual and
act with the physical world by augmented reality.
NARAYAN CHANGDER
NARAYAN CHANGDER
A. PPM D. Thermal Wax
B. DPI
14. there are two type of output hardcopy and
C. PPI
A. soft copy
D. CMYK
B. printer
9. Which voltage is applied to the paper to C. monitor
transfer the toner to the paper in an EP
D. none of above
process laser printer?
A. +600VDC 15. Which device in an inkjet printer contains
the print head?
B. -600VDC
A. Toner cartridge
C. +6000VDC
B. Ink cartridge
D. -6000VDC
C. Daisy wheel
10. Which type of scanner has built-in WiFi?
D. Paper tray
A. ES-60W
16. What technology does the Flatbed Scanner
B. DS-360W
use?
C. DS-570W
A. Change Copled Device
D. All true
B. Charge Coupled Device
11. You are printing from a dot-matrix C. Charge Copy Device
printer and notice that the characters look
D. Computer Connectivity Device
chopped off at the top. What should you
try adjusting? 17. LPM stands for
A. Toner A. Line paper minute
B. driver B. length per minute
C. Print Head C. lines per minute
D. Drum D. length paper minute
12. DPI stands for what? 18. Select three types of Scanner
A. dots per inches A. Flatbed Scanner
B. dual per integrator B. Sheet-Fed Scanner
C. dot per inches C. Handheld Scanner
D. dual per inches D. Portable Scanner
19. How is laser printer resolution mea- 24. What is the correct order of the steps in
sured? the EP print process?
29. PPS MEANS: 34. what is the abbreviation for Visual Display
A. Pages per second Unit
NARAYAN CHANGDER
nently presses the toner into the paper? 35. In the laser printing process, the uses
A. Transfer corona friction to isolate a single sheet any others
that were picked up.
B. Fuser assembly
A. duplexing assembly
C. Printer controller circuitry
B. separation pad
D. Paper transport assembly
C. transfer roller
31. Apakah jenis-jenis printer bagi 2D D. gearbox
printer?
A. Inkjet Printer, Laser Printer, Dot- 36. This element is heated by tiny resistors or
Matrix Printer electroconductive plates at the end of each
tube in an inkjet printer?
B. Dot-Matix Printer, Point Printer, Jet
Printer A. Ink
C. hardware C. Inkjet
D. software D. Laser
E. Thermal
33. The term sublimation means to cause
something to change from a solid into a 38. part of computer that print out information
form and then back into a solid. on the paper
A. vapor A. Monitor
B. plasma B. printer
C. crystalline C. mouse
D. liquid D. none of above
50. What are the missing wordsScanner is a 55. The printing speed of this printer is 5 to
device used to transfer or into a 300 pages per minute (ppm).
A. Laser printers
A. Computer, printer, text B. Thermal printers
B. printer, scanner, computer C. Inkjet printers
C. text, image, computer D. Line printers
D. none of above
NARAYAN CHANGDER
56. What “process” of color printing is typi-
cally used by today’s color printers?
51. Which Epson applications can users use to
print remotely? A. Spot color
A. Epson iPrint B. RGB
54. What is the name of the scan application A. It must be sterilized and decontami-
installed on the PC specifically for the ES- nated
50 and ES-60W scanners? B. It must be grounded and fully dis-
A. Epson Scan 2 charged
C. It must be charged with a uniform pos-
B. Epson DocumentScan
itive charge
C. Epson ScanSmart
D. It must be charged with a uniform neg-
D. Epson iPrint ative charge
60. A fast line printer can print as many as 66. If Roger wants to print multipart forms
lines per minute. (like those on a Point of sale machine) he
should use this type printer
65. The Hewlett-Packard system for control- 70. what is the abbreviation for Cathode Ray
ling printers is Tube
A. PCL A. CRT
B. PostScript B. LCD
C. ASCII C. VDU
D. Unicode D. none of above
71. part of computer that scan picture 77. The acronym CPS stands for
A. scanner A. characters per second
B. printer
B. characters per save
C. mouse
C. Computer process per second
D. none of above
D. character process per second
72. A Laser Printer uses toner (fine powder)
that is made up of plastic particles that are
NARAYAN CHANGDER
78. A laser printer creates an image of dots
bonded to this type of particles. and holds it in memory before printing it.
A. nickel What is this image of dots called?
B. polyester A. Raster image
C. aluminum B. Laser image
D. pigment
C. Vector image
73. Which of the following is an advantage of
D. High-resolution image
impact printers?
A. High Resolution 79. Which of the following are page-
B. Less expensive description languages? (Choose two.)
C. Energy Efficient A. Page Description Language (PDL)
D. Many options to select B. PostScript
74. Which printer part gets the toner from the C. PageScript
photosensitive drum onto the paper?
D. Printer Control Language (PC)L
A. Laser-scanning assembly
B. Fusing assembly 80. What kind of chip is used by a laser printer
C. Corona assembly to translate the raster image sent to the
printer into commands for the laser?
D. Drum
A. RAM
75. What mobile scanning applications can be
used to facilitate the scanning process? B. RIP
A. Epson iPrint C. ROM
B. Epson DocumentScan D. UART
C. Epson Google Print
D. Epson Scan to Cloud 81. It prints one character at a time; it prints
at the speed of around 30 to 600 charac-
76. What causes an unwanted mark (ghosting) ters per second.
to appear on printed pages?
A. Character printer
A. A damaged laser
B. Line printer
B. A damaged ozone filter
C. A damaged transfer corona C. Page printer
D. A damaged drum D. none of above
93. Printers that use a 9-pin dot-matrix are C. converts data into a form that your
generically referred to as . printer can understand
A. Economy quality D. describes how to print the text and
B. Near-letter quality draw the images on the page
NARAYAN CHANGDER
94. Which of the following most accurately de- the paper?
scribes how to obtain a firmware upgrade A. Transfer corona
for your laser printer?
B. Turning gears
A. Download the firmware upgrade for
C. Laser
free from the manufacturer’s website.
D. Toner
B. Pay to download the firmware upgrade
from the manufacturer’s website. 99. What part of a laser printer supplies
C. Have a certified laser printer techni- the voltages for charging and transferring
cian come to your site and install a new corona assemblies?
firmware chip. A. High-voltage power supply (HVPS)
D. Contact the manufacturer of the B. DC power supply (DCPS)
printer, and they will send you the
C. Controller circuitry
firmware upgrade on a CD.
D. Transfer corona
95. This printer creates an image by physi-
cally striking an Ink Ribbon and pressing 100. When a thermal printhead passes over
it against the surface of the Paper the film ribbon, what melts onto the pa-
per?
A. Laser
A. Toner
B. Dot-matrix
B. Wax
C. Thermal
C. Dye
D. Impact
D. Ink
96. What kind of printers tend to have prob-
101. It is an output device that accepts text
lems with ink drying out inside the nozzles
and graphic from a computer and transfers
when the printer is not used for a period?
the information to paper.
A. Color
A. Scanner
B. Laser
B. Xerox Copier
C. Inkjet
C. Printer
D. Dot-matrix
D. Fax Machine
97. What does the print spooler do? 102. Printers can use , which enable the
A. storage files to be printed printer to automatically print on both sides
B. lets you change the order of docu- of the paper.
ments in the queue A. bidirectional assemblies
113. What type of printer works by heating D. It allows the printer to communicate
tiny resistors or electroconductive plates with networks, servers, and workstations
at the end of different tubes filled with
ink? 116. Most of today’s printers, scanner, and
multifunction devices connect to a com-
A. InkJet
puter via a
B. Solid Ink
A. proxy server
C. Dye-Sublimation
B. parallel port
NARAYAN CHANGDER
D. Direct Thermal
C. Ethernet cable
114. What are 9-pin dot-matrix printers D. USB port
generically called?
A. Economy quality 117. What voltage does the corona wire or
corona roller hold?
B. Near-letter quality
A. +600VDC
C. Draft quality
D. Letter quality B. -600VDC
C. 0VDC
115. Which of the following is not an ad-
vantage of a Universal Serial Bus (USB) D. -100VDC
printer interface?
118. A device that can sometimes also work
A. It has a higher transfer rate than a se- as a copying machine.
rial connection.
A. Computer
B. It has a higher transfer rate than a par-
B. Printer
allel connection.
C. It automatically recognizes new de- C. Scanner
vices. D. none of above
B. Errors in charging customers are re- 9. In a film camera, light passes through the
duced lens onto actual
8. On a digital camera, the photograph is cap- 12. To make a comparison between barcode
tured when light passes through the lens and QR code, normal barcodes can hold up
onto a light sensitive cell made up of tiny to 30 digits while QR codes
elements known as A. can hold over 7000 digits
A. Dots B. can hold less digits
NARAYAN CHANGDER
D. Add “RED EYE” to the image file such as
15. Scanned image using 3D scanner can be A. The barcode is first read by a red laser
used/processed in a CAD software like or red LED (LIGHT EMITTING DIODE)
Auto-CAD. CAD stands for B. Light is reflected back off the barcode;
A. Computer Aided Design the dark areas reflect little or no light
which allows the bars to be read
B. Computer Aided Drawing
C. The reflected light is read by sensors
C. Computer Aided Document (photoelectric cells)
D. Computer Aided Digital D. The focused image falls onto a CCD
16. A series of dark and light parallel lines of made of pixels
varying thickness 21. When using a scanner:If the original docu-
A. Barcode ment was a photograph or image, then the
B. QR-code scanned image forms a file such as
C. Tomographic A. File.DOCX
D. OCR B. File.XLSX
C. File.JPG
17. Below are numerous technologies used in
3D scanners, except: D. File.TXT
B. QR-code B. keyboard
C. CT-scan C. SD Card
NARAYAN CHANGDER
8. These allow you to hear audio such as mu-
13. HDMI can transmit what kinds of data, se-
sic, voice, and other sounds
lect ALL that apply
A. CPU
A. Video
B. Hard drive
C. Keyboard B. Sound
D. Speakers C. Programs
C. Computer B. Mouse
D. Tablet C. Digital Camera
10. The computer or device that is used for D. Scanner
sending data is called -
A. Sender 15. A specialized output device for producing
charts, maps, and very high-quality draw-
B. Reciever ings is a?
C. Manager
A. Printer
D. Follower
B. Plotter
11. Which type of printer is best suited for
C. Scanner
higher volumes of printing?
A. Plotter D. OMR
B. Dot matrix
16. is a connection in which the data flows
C. Laser in only one direction, from the transmitter
D. Inkjet to the receiver.
17. USB micro, mini, and Tpye B are commonly 22. consists of electronic components that
used to connect these devices, select ALL store instructions waiting to be executed
that apply and the data needed by those instructions.
NARAYAN CHANGDER
book, an address book, a calculator, a
28. Message can be , & files.
notepad, games, browser, and numerous
A. Text other apps.
B. Audio
33. A is a device designed to connect to a
C. Video laptop to provide additional ports to con-
D. Alphabets nect peripheral devices. The user simply
plugs in the laptop to this device.
29. You are changing the hard drive in a lap-
top. One way to transfer the files, data, A. docking station
and OS is to use a migration app. Anther B. port replicator
way would be to C. USB adapter
A. Create an image of the old hard drive
D. HDMI adapter
and restore to the new hard drive
B. right click on the c drive icon then cut 34. How many pins does a SO DIMM DDR2
and paste the icon on the new hard drive have?
C. go to the command line and type in A. 204
“move hard drive” B. 200
D. go to the command line and type in “ip- C. 288
config”
D. 260
30. What kinds of devices commonly use USB
Type A to connect, select ALL that apply 35. connection is a connection in which
the data flow in both directions simulta-
A. Printer neously.
B. Keyboard A. Simplex Connection
C. Mouse B. Half Duplex Connection
D. Flashdrive
C. Full Duplex Connection
31. The is a worldwide collection of com- D. All above
puter networks that connects millions of
businesses, government agencies, educa- 36. A computer keeps data, instructions, and
tional institutions, and individuals. information on
A. web A. disk
B. network B. CD Rom
C. interent C. hard drive
D. browser D. storage device
37. Where would you find the Wi-Fi antennae 42. A is an output device that visually con-
and inverter in a laptop? veys text, graphics, and video informa-
tion.
C. Mouse A. Stylus
D. Microphone B. Keyboard
48. A type of printer that produces high- C. Game Controller
quality and is inexpensive. D. Mouse
A. Laser
50. A provides services to other computers
B. Inkjet
or devices on a network.
C. Dot matrix
NARAYAN CHANGDER
A. computer
D. Plotter
B. internet
49. This computer device enables users to con-
trol movement on the screen when playing C. web
a video game D. server
8. Which of the following wireless commu- A. A network that covers a small geo-
nication methods has the shortest opera- graphical area.
tional range?
NARAYAN CHANGDER
A. Financial
the form of a single circuit board?
B. Retail
A. blade
C. research laboratory
B. tower
D. library
C. rack
20. Which manufacturer uses the term AirPods D. dedicated
to refer to headphones that fit in your ear
and connect wirelessly to devices? 25. What are the programs on mobile devices
known as?
A. Apple
A. Apps
B. Samsung
B. Baps
C. Sony
C. Caps
D. Nokia
D. Zaps
21. Radio waves form a part of the elec-
26. computing refers to an environment
tromagnetic (EMF) spectrum. What else
that provides resources and services ac-
does?
cessed via the Internet
A. Ordinary light A. Cloud Computing
B. A light bulb B. Vitural
C. Mobile phone towers C. Internet
D. Fibre cables D. Global
22. Sue made a big bowl of popcorn and is 27. Which of the following broadband tech-
planning to stream four hours of Disney nologies is the fastest?
movies to her cell-enabled tablet. Why A. DSL
has she opted to use Wi-Fi for her movie
night? B. Satellite
C. Broadband cable
A. Wi-Fi gives a clearer picture.
D. 3G cellular
B. Using Wi-Fi won’t impact her data
plan. 28. What happes after the CPU fetches an in-
C. Wi-Fi provides for true surround- struction and stores it in the instruction
sound. register?
32. The strength of the signal from the mobile 38. Which of the following are advantages
phone tower is indicated by of e-readers using E Ink over tablets?
(Choose two.)
A. How big the tower is
A. More vivid colors
B. The number of bars on your phone
B. Longer battery life
C. Where the tower is located
C. Easier to read in bright light
D. The size of your phone D. Better screen resolution
33. Which of the following are two main com- 39. is the process of initiating contact be-
ponents on the motherboard? tween two Bluetooth devices.
A. memory and storage A. tethering
B. interpreter and compiler B. initiating
C. processor and memory C. coupling
D. compiler and processor D. pairing
40. Select the 2 main display technology types 46. Which of the following is NOT considered
in smartphones. a mobile device?
A. LCD A. tablet
B. System-on-a-Chip B. phablet
C. LED
C. smartphone
D. Smart screen
D. desktop computer
NARAYAN CHANGDER
41. The type of display that Google Glass
presents to its users is called what? 47. Which of the following is the name of the
protocol used to transmit data in NFC peer-
A. Retinal projection
topeer mode?
B. VR
A. NDEF
C. AR
B. NFCP
D. OCR
C. LLCP
42. Most mobile devices are shipped with
LPDDR3 or 4. What does LP mean? D. SNEP
A. Low Power 48. A Bluetooth device in discoverable mode
B. Limited Power transmits the device class, list of ser-
C. Low Processor vices, and other technical information on
demand.
D. Limited processor
A. device code
43. What function of the CPU describes the re-
ception of an instruction or set of instruc- B. device address
tions? C. device name
A. Fetch D. none of above
B. Decode
49. Which wireless standard simplifies the
C. Execute
process of adding a device to a WLAN?
D. Store
A. WPA
44. What do we use smartphones for?
B. WPA2
A. To throw.
C. WEP
B. To print.
D. WPS
C. To talk on and surf the internet.
D. none of above 50. Which two are connections made using an
Ethernet port on a Laptop?
45. A tablet is a computer
A. Connect to a camera.
A. Laptop
B. Desktop B. Connect to a switch.
C. Mobile C. Connect to another computer.
D. Cellular D. Connect to a printer.
C. They’re small enough to take with you A. When a cellular device uses another
device’s Wi-Fi connection to get on the In-
D. They’re easy to use ternet
52. What is a task that a tablet CANNOT per- B. When a Bluetooth device uses another
form? device’s Wi-Fi connection to get on the In-
A. make phone calls ternet
B. edit a google doc C. When a Wi-Fi device uses another de-
vice’s Bluetooth connection to get on the
C. download a gaming app
Internet
D. connect to the internet
D. When a Wi-Fi device uses another de-
53. The is often referred to as the brain of vice’s cellular connection to get on the In-
the computer ternet
A. Random Access Memory (RAM)
58. Some smartphones support a(n) key-
B. Central Processing Unit (CPU) board app, on which users enter words by
C. Motherboard tracing a path on an on-screen keyboard.
D. Power Supply Unit (PSU) A. Touch
B. Swipe
54. What part of a computer performs calcula-
tions, actions, and runs programs. C. Finger
A. Calculator D. none of above
B. Graphics Processing Unit (GPU)
59. With which iPhone version was the Light-
C. Central Processing Unit (CPU) ning connector introduced?
D. Power Supply Unit (PSU)
A. iPhone 4
55. What hardware component in a server per- B. iPhone 5
manently stores all digital content.
C. iPhone 5s
A. CPU
D. iPhone 6
B. RAM
C. Hard Disk Drive 60. Data that a computer accepts and pro-
D. Mother board cesses is called
A. Input
56. Smartphones use technology to navi-
gate through them. B. Digital Facts
A. Infrared C. Information
B. Touch Pad D. Bytes
61. A master Bluetooth device can communi- 66. A(n) is a handheld vertical lever,
cate with a maximum of devices in a mounted to a base, that you move to con-
piconet. trol the actions in a game.
A. seven A. joystick
B. eight B. gamepad
C. nine C. drive shaft
NARAYAN CHANGDER
67. What type of server runs websites?
62. When was the first Mobile Phone in-
vented? A. Web Server
D. 36
A. mobile
74. Common examples of wireless networks
B. machine
include
C. manufacturer
A. Mobile phone cellular networks
B. WiFi D. media
NARAYAN CHANGDER
by
C. Macintosh
A. using Bluetooth only when required
D. Apple
B. using bluetooth all the time
C. paring multiple devices 90. A frame that houses the system unit on a
desktop is called a(n)
D. none of above
A. briefcase
85. A(n) is a thin, lighter-weight mobile
B. tower
computer that has a touch screen.
C. sleeve
A. Notebook
B. PC D. canister
94. The cornerstone of any wireless network 100. A frame that houses the system unit on
is: a desktop is called a(n) (3-1/3-3)
105. Which of the following is the operating A. A network that covers a small geo-
system used by Apple Watch? graphical area.
A. WatchOS B. A network that covers a large geo-
B. iOS graphical area.
C. OS X C. A network limited to just one room.
D. Apple OS D. none of above
106. Instructions received by the CPU are 108. Which two frequency bands are used by
NARAYAN CHANGDER
stored where? wireless LANs?
A. RAM A. The 88MHz band and the 206MHz
B. Hard Disk Drive band.
C. Registers B. The 800MHz band and the 1.2GHz
D. Storage device band.
107. Which of these best describes a wide C. The 2.4GHz band and the 5GHz band.
area network (WAN)? D. The 54MHz band and the 300GHz band.
NARAYAN CHANGDER
B. False
9. Identify the default view in Impress
C. 24
A. Normal
D. 1212
B. Slide Sorter
C. Handout 15. What is the shortcut key for finding and
replacing text in a document?
D. Notes
A. Ctrl + F
10. The software that is used to format a doc-
B. Ctrl + F5
ument is:
C. Ctrl + F4
A. MS word
B. MS PowerPoint D. Ctrl +F7
19. Find & Replace option is available in which 25. The shortcut key is used to save the docu-
menu? ment is
20. is word processor software. 26. Spelling and grammar checking feature
shows underline for spelling errors.
A. MS Window
A. Red
B. MS Excel
B. Green
C. MS Powerpoint
C. Yellow
D. MS Word D. Blue
21. Which area in an Excel window allows en- 27. Which of the following syntax is correct
tering values and formulas? regarding to SUM function in Excel?
A. Title bar A. =SUM (A1, B1)
B. Menu bar B. =SUM (A1:B9)
C. Formula bar C. =SUM (A1:A9, B1:B9)
D. Standard tool bar D. All of the above
22. A formula in calc may begin with 28. To apply the table of contents automati-
cally, the most important task is to prop-
A. +
erly define
B. =
A. levels of heading
C. -
B. page numbering
D. All the above C. page layout
23. Two options of orientations for page setup D. themes
are and
29. CTRL+N is used to
A. up, down
A. Open document
B. left, right
B. Close document
C. centre, justify C. New document
D. portrait, landscape D. Save document
24. Formatting is performed on 30. What is the short cut key for Undo?
A. Text A. Ctrl +E
B. Table B. . Ctrl + U
C. Menu C. Ctrl + Z
D. Both (a) and (b) D. Ctrl + n
NARAYAN CHANGDER
32. What is the shortcut key to go to the start
C. Hardware
of the document?
D. None
A. Ctrl + Home
B. Ctrl + End 38. Which of the following function will use to
C. Home find the highest number in a series of num-
ber?
D. End
A. HIGH (B1:B3)
33. is electronic spreadsheet software
B. MAXIMUM (B1:B3)
used for automated calculations.
C. MAX(B1:B3)
A. MS Window
B. MS Excel D. None of the above
42. Which key is used to move the cell pointer C. Returns a subtotal in a list or database
in the forward direction within the work-
D. Both (a) & (b)
sheet?
C. F5 A. Excel
D. F9 B. Lotus 1-2-3
NARAYAN CHANGDER
54. If we want to change the overall design of C. &
a word document, we should use:
D. $
A. themes
60. The software that is used for accounting
B. page layout
purpose is:
C. watermark
A. MS word
D. margins
B. MS excel
55. Microsoft word is software. C. MS PowerPoint
A. Application D. MS access
B. Compiler
61. Grid of cells with a programmable calcula-
C. System tor
D. Programming A. Spreadsheet
56. Which is displayed at the top part of the B. Database
window? C. Word processor
A. Menu bar D. Linux
B. Tool bar
62. option in word changes the structure
C. Title bar and layout of pages.
D. Format bar is displayed at the top part A. Format
of the
B. Print and Print preview
57. Excel displays the current cell address in C. Page Setup
the .
D. Proofing
A. Status Bar
B. Name Box 63. Which of the following software used to
show information in the form of slide
C. Formula bar show?
D. None of the above A. word processor
58. The default linespacing is B. spreedsheet
A. 1.5 C. presentation
B. single D. draw
11. Amir is searching on his computer for a file 16. TIFF files are best used for:
that he created and saved in Pixlr’s native
A. Both Web and print publishing.
file format. Which type of file should he
be searching for? B. Print publishing only.
A. EPS C. Web publishing only.
B. PDF D. Neither web publishing nor print pub-
C. PXD lishing.
NARAYAN CHANGDER
D. PSD 17. is one of the oldest forms of human-
expression, with evidence for its exis-
12. A graphic editing software that lets you
tenceeven before written communication.
create a fine vector arts. Create logos,
sketches, typography, icons or even com- A. telegram
plex illustrations. B. mobile communcation
A. Adobe Illustrator C. Arts
B. Adobe Photoshop
D. Drawing
C. Indesign
D. GIMP 18. Which type of image format is constructed
using proportional formulas rather than
13. Which type of image file is constructed by pixels?
a series of pixels to form an image? A. Raster
A. Vector B. JPEG
B. SVG
C. Vector
C. Raster
D. PNG
D. PDF
19. What graphic editing software is known to
14. When using a graphics editing program, be the alternative for Adobe Illustrator?
which option allows you to adjust the
space around an image? A. Inkscape
A. Constrain proportions B. Cyberlink
B. Image size C. Coreldraw
C. Canvas size D. sketch-up
D. Anchor points
20. It is a drawing technique that uses some
15. When a drawing is created using graphics kind of paint applied to some kind of sur-
software. It is the act of using a computer face, usually a flat, two-dimensional can-
to draw. vas.
21. Which of the following is a vector 26. Raster images are best used for:
graphic? A. photos.
32. What is the term used when saving an im- 37. Malachi has to create vector graphics that
age and all layers are merged? can be opened by all of his clients, no mat-
ter which design editors their companies
A. anchored use. Which file format should he use to
B. imported make sure they can all open his files?
NARAYAN CHANGDER
C. exported A. PNG
D. flattened B. TIFF
NARAYAN CHANGDER
51. Which option is used to maintain width and C. not able to be resized without losing
height ratios when resizing an image? quality.
A. Constrain Proportions D. made up of mathematical equations.
B. Anchor 57. It is believed that was used as as-
C. Free Transform pecialized form of communication before
theinvention of the written language.
D. Opacity
A. telegram
52. Which image file format creates a large B. telephaty
raster file best used for print but not rec-
C. drawing
ommended for use on the Web?
D. painting
A. TIFF
B. PNG 58. A graphic software ideal for layout design
usage like online magazines. Whether you
C. GIF want to create layouts for printed books
D. JPG or digital magazine this is the tool you
need. However, it has limited tools for
53. Drawing is considered to be a form of creating graphics.
within the visual arts.
A. Illustrator
A. arts
B. Indesign
B. expression
C. Serif Drawplus
C. emotion D. cyberlink
D. inspiration
59. Which graphics software tool is used for
54. You have been asked to design a logo for editing?
a community organization. What kind of A. Lasso
image would you create?
B. Clone Stamp
A. Raster
C. Blur
B. Vector D. Zoom
C. Transparent
60. What is Mrs. Thompson’s Snail’s name?
D. Opaque
A. Slow Down
55. Which is not a graphic editing software? B. Hippie
A. Photoshop C. Smiley
B. Illustrazo D. Warp Drive
71. Which choice lists common tools from 75. Which tool is used to rotate and resize an
graphics programs that are examples of image or shape in a graphics editing pro-
blending tools? gram?
A. Blur, Dodge, Sharpen A. Free Transform
B. Magic Wand, Lasso, Marquee B. Crop
C. Erase, Gradient, Drawing C. Free Distort
D. Spot Heal, Bloat, Pinch D. Move
NARAYAN CHANGDER
72. Dmitri has several logos he’s designed. He 76. is an interactive computer application
wants to add them to the company’s Web for organization, analysis and storage of
site. He has asked you if he should save data in tabular form.
the images as vector or raster. Which A. spreadsheet
statement is the best response?
B. database
A. The raster file format should never be
C. document form
used for Web publishing.
D. organized files
B. The vector file format is best used with
digital photographs. 77. Anahi is creating a graphic that will be
C. Vector images are best for logos, be- used on her company’s Web site, in print
cause they can be resized without losing materials, in advertising and on uniforms.
resolution. She needs to choose an image file format
that will not lose quality when the image
D. Raster images are best for logos, be-
is resized. Which graphic format should
cause they can be resized without losing
Anahi use?
resolution.
A. Vector
73. Which graphics program tool is used to se- B. TIFF
lect a free-hand area of a layer or the can-
vas? C. Bitmap
A. Lasso D. Raster
What is the most likely reason that this 84. uses a combination of different content
occurred? forms such as text, audio, images, anima-
tions, video and interactive content.
80. A is a computer-made image that is 85. Sharing an image online generally requires
made up of points, lines, and curves that which of the following?
are based upon mathematical equations,
A. Low resolution
rather than pixels.
A. vector grahic B. HIgh resolution
B. pixels and frames C. Blurring
C. graphic images D. Kaleidoscope
D. jpeg file formats
86. Yuki is creating a memory book for her
81. Using this graphic software you can easily friend’s birthday. Which file type should
combine multiple images and even remove she use to print the pictures?
unwanted objects from the image.
A. DRW
A. Adobe illustrator
B. Raster
B. Photoshop
C. GIMP C. SVG
D. Corel draw D. Vector
82. A drawing is started with 87. Which of the following is a raster graphics
A. All simple shapes laid out in composi- format?
tion. A. SVG
B. The colors being mixed and ready for
B. JPG
application.
C. All the important details. C. PPI
D. The separation between lights and D. DPI
darks.
88. When you are creating graphical images,
83. What term describes images that are made which technique can you use to control and
up of pixels and cannot be resized without manipulate elements individually?
losing quality?
A. Layers
A. DPI
B. Opaque B. Shapes
C. Vector C. Transparency
D. Raster D. Opacity
NARAYAN CHANGDER
to choose an image file format that will
90. Which image file type is best for logos? not lose quality when the image is resized.
A. Raster Which graphic format should Gilah use?
B. Vector A. Raster
C. Transparent B. Vector
D. Opaque C. JPEG
91. What drawing technique is use showing D. GIF
variety of tonal values on the paper to rep-
resent the shade of the material as well as 96. Which graphics tool is used to make a se-
the placement of the shadows? lection?
A. shading A. Eraser
B. sketching
B. Lasso
C. painting
C. Zoom
D. tracing
D. Color Picker
92. What graphic editing software is known
to be the perfect alternative for Photoshop 97. Which file format was designed to produce
as it has alike features? high-resolution vector graphics for print
A. Adobe Illustrator that can be opened in any design editor?
B. GIMP A. TIFF
C. Corel Draw B. EPS
D. Inkscape
C. BMP
93. Which program is an example of graphics D. PNG
editing software?
A. Google Docs 98. Which “lossless” image type is best suited
B. Microsoft Outlook for Web pages, but is not suitable for
print?
C. Adobe Photoshop
A. PSD
D. Google Slides
B. TIFF
94. Which raster image format is best used fof
webpages but is not suitable for print? C. PNG
A. TIFF D. SVG
D. tracing A. Vector
B. Bitmap
100. What drawing technique is like creating
C. Pixel
‘carbon copy’ of the original image?
D. none of above
A. tracing
B. sketching 105. Which image format would be most likely
used for a photo directory in web or print
C. painting
publishing?
D. shading
A. AL
101. Which panel is used to reverse changes B. DRW
made in graphics software?
C. PNG
A. clear
D. SVG
B. history
106. Which option is used to specify how the
C. navigator
canvas is modified?
D. deselect all
A. Crop
102. Trent has scanned several digital pho- B. Constrain Proportions
tographs. He wants to add the scanned C. Anchor
photos to his Web site. He has asked you
if he should save the scanned images as D. Cross Process
vector or raster. Which statement is the
107. You want to transform an image with
best response?
artistic effects. Which menu would you
A. The raster file format should not be look under?
used for Web publishing. A. Filter
B. The vector file format is best used with B. Edit
digital photographs.
C. View
C. Scanned images can only be saved as
vector images by using specialized conver- D. File
sion software. 108. You are using a graphics editing program.
D. Scanned images can only be saved as You want to create a softer edge at the
raster images by using specialized conver- border of the image you are selecting.
sion software. Which option should you use?
NARAYAN CHANGDER
113. Technically refers to any application that
D. Vector contains more than one type of media, but
is often used to refer to audio and video
110. Which term describes the arrangement or
content.
placement of image layers in a graphics
program? A. Graphics
A. Opacity B. Multimedia
B. Layer visibility C. Vector
C. Stacking order D. Bitmap
D. Transparency
114. Andrew took a photo of a beach sunset
111. Which of the following statements is true while on vacation. He wants to change the
regarding cropping or resizing an image in color of the sky to a deeper blue. Which
graphics software? tool will allow him to do so?
A. Resizing an image deletes the unused A. Dodge
portion of the image.
B. Clone stamp
B. Cropping an image keeps the unused
C. Burn
portion of the image.
D. Color replace
C. Resizing an image does not reduce its
file size. 115. Which of the following is an example of
D. Cropping an image reduces its file size. an editing tool?
112. A is an identifying image or pattern A. Lasso
in paper that appears as various shades B. Clone Stamp
of lightness/darkness when viewed by
transmitted light (or when viewed by re- C. Blur
flected light, atop a dark background), D. Zoom
12. A Database Management System is a type 17. The following are Characteristics of Data
of Dictionary EXCEPT
A. It is a type of system software A. include information on relationship be-
tween files
B. It is a kind of application software
B. Information about relationship of ta-
C. It is a kind of general software bles in database
D. Both A and B C. Place where all meta data for
database is stored
NARAYAN CHANGDER
13. Which of the following is not an Schema?
D. Provides direct control access to
A. Database Schema database
B. Physical Schema
18. Companies that start processing materials
C. Critical Schema and produce components or products af-
ter receiving orders from consumers. com-
D. Logical Schema
pany called?
14. The following are the benefits of digital A. LINE UP
data analysis, except B. ATO
A. spatial and non-spatial data can be C. WITH
managed together
D. MTS
B. data can be managed in a clear format E. MTO
C. costs incurred are less
19. is an example of hierarchical data
D. faster data retrieval model
E. data becomes more complex A. Doors and windows
B. Windows registry
15. are collections of similar types of enti-
ties C. RDM server
22. Which of the following is not the type of 27. Data Manipulation Language is used to
the data model? the DBMS.
23. Which statement best describes a 28. In a literal sense. Data can be interpreted
database? as a representation of world facts that rep-
resent an object. An example of the object
A. a A collection of tables.
in question is except
B. Tables that are in sequence.
A. man
C. Tables of related information.
B. Goods
D. A collection of related tables. C. incident
24. There are 2 display templates that have D. The situation
been provided by Joomla, namely . E. Symbol
A. Administrator templates and site page
templates 29. The advantages of a client-server network
include:
B. Template customer dan template site
A. security is created, managed and en-
C. Administrator templates and catalog forced
templates
B. backup of data is centralised
D. Site page templates and article tem-
plates C. many computers have access to cen-
tralised resources
25. A collection of programs required to store D. All options
and retrieve data from a database is called
30. The set of all records of the same type is
A. RDBMS called
A. Files
B. DBMS
B. Tuple
C. SQL
C. Entity
D. None
D. Column
26. The following are tools that can be used
E. Attribute
for data visualization, except
A. Put. Feel 31. What is the use of DBMS in the telecom-
munication sector?
B. Plotly
A. For reservations and schedule infor-
C. FineReport
mation
D. Tableau B. Keep call records, monthly bills, main-
E. Windows Video Player taining balances
NARAYAN CHANGDER
C. APACHE
C. Alternate key
D. IIS
D. Candidate key.
38. As data objects and relationships among
33. Which type of application should you use if them are represented logical in an
you need to store a large quantity of data
A. Relational data model
in an organized format that you can easily
query? B. E-R model
A. Database C. Object based model
B. Presentation D. Semi-structured model
C. Spreadsheet 39. The database management system can be
D. Word Processor considered as the collection of that
enables us to create and maintain the
34. A data types which stores data and time database.
values from the year 100 through 9999.
A. Translators
A. Currency
B. Programs
B. Date/Time
C. Keys
C. OLE Objects
D. Language
D. Yes/No
40. The relationship between two or more en-
35. Disadvantages of File systems to store tities is the meaning of
data is:
A. Relation
A. Data redundancy and inconsistency
B. Attribute
B. Difficulty in accessing data
C. Model
C. Data isolation
D. Entity
D. All of the above
E. Key
36. The process related to the relational data
model for organizing data sets with high 41. which one of the following cannot be taken
or close dependencies and interrelation- as a primary key?
ships is the notion of A. ID
A. Normalization B. RegistrationNo
B. ERD C. DepartmentID
C. USB Disk D. Street
42. Relational calculus is a language 47. Choose multiple correct answers:To create
a database, the DBMS allows users to
A. Non-procedural
44. The reports are generally created after 49. A set of fields comprises a
making on the database. A. Database
A. Record B. Table
B. Statements C. Record
C. Tables D. File
D. Queries 50. I can perform an advanced search. I am
very similar to asking a detailed question.
45. At the user level, the database is grouped
into several user levels. Among them is A. report
the user who is the central controller of the B. query
entire database. What we usually call
C. table
A. Database Administrator
D. form
B. Application Programmer
51. It let you access frequently access com-
C. System Analyst mand.
D. Database Designer A. Navigation pane
E. End user B. Quick access toolbar
NARAYAN CHANGDER
A. Online Analyst Process
59. The following is the correct way to write a
B. On Analyst Processing variable is you can answer more than
C. Online Analytical Processing 1
D. Online Analytical Processing A. price
54. The architecture of a database can be B. And Books
viewed as the
C. total price
A. One level
D. 12 talk
B. Two level
E. print
C. Three level
D. Four level 60. Which key ensure that data in a field must
only appear once in the whole table.
55. Which is not a function of a DBMS?
A. Provide database creation environ- A. Candidate key field
ment B. Foreign key
B. Provide an up-to-date and data mining C. Primary key field
environment
D. Alternate key field
C. Provides tools to control and control
access to the database 61. What does PHP files have a default file
D. Provide file management services extension?
63. I give the ability to present information in E. Data managed by the system supports
an easy-to-read format. I summarize and a multiuser environment (many users)
print information from the query search.
73. is a type of database that stores data 78. A set of rules in a programming language
physically. that defines what symbol combinations
A. Object database are considered to make up a properly struc-
tured document
B. Electronic Database
A. Statement
C. Manual Database
B. Syntax
D. Hybrid Database
C. Program
NARAYAN CHANGDER
74. Which of the following defines the term D. Scratch
‘field’ in relation to databases?
E. String
A. A field is all of the information about
one person or one thing 79. A list of containing every object in your
B. A field is the collection of all the database
database records on one topic or subject A. Menu Bar
C. A field is one type or piece of informa- B. Ribbon
tion
C. Navigation Pane
D. none of above
D. Quick access
75. The database management system is
80. Users involved in managing the database
A. Software and using the database which is one of the
B. Data database components are
C. Computer control program works A. Users (users)
D. Information of the organization to be B. Hardware
managed C. Database Management System
76. A person, place, event or item is called D. Application Software (software)
as E. Operating system (operating system).
A. Data
81. How many functions does a DBMS have?
B. Entity
A. 3
C. Attributes
B. 4
D. Relationships
C. 2
77. The basic database operation used to
D. 5
delete an archive sheet that is in an archive
folder is 82. MySQL belongs to which category of
A. create database DBMS?
B. create table A. OBJECT ORIENTED
C. drop table B. HIERARCHICAL
D. insert C. RELATIONAL
E. delete D. NETWORK
NARAYAN CHANGDER
B. 1+2 E. Entity
C. 1.+.2
99. are used for entering, modifying, and
D. ERROR viewing records.
94. Which of the following is a licensed oper- A. Tables
ating system?
B. Forms
A. Microsoft Windows NT Server
C. Database objects
B. Windows Server 2003
C. UNIX D. View
103. What things need to be prepared in build- 107. The first step that must be taken to cre-
ing an ERP system? (more than 1 answer) ate a database application is
NARAYAN CHANGDER
C. SQL server D. none of above
D. Oracle
118. Data type used to store currency value
E. Ms.Office and numeric data used in mathematic cal-
culations involving data with one to four
114. At the user level, the database is grouped
decimal places
into several user levels. Among them
are users who create application programs A. Numeric
to interact with the system or access B. Currency
databases by calling through certain pro- C. Short text
gramming languages. What we usually
D. Long text
call
A. Database Administrator 119. The type of datatype can store valued
used in mathematical calculations
B. Application Programmer
A. Autonumber
C. System Analyst
B. OLE Object
D. Database Designer
C. Numeric
E. End user D. Short Text
115. Which of the following query would dis- 120. A fact about something in the real world
play all the students whose first name (can be in the form of numbers, strings of
starts with the character ‘A’? characters, symbols and images) that can
A. select first name from students be recorded and stored on computer media.
where first name like ‘A%’; is the meaning of
B. select first name from students A. Data
where first name like ‘%A’; B. Information
C. select first name from students C. Database
where first name like ‘%A%’; D. Information Systems
D. select first name from students 121. A Database Management System (DBMS)
where first name like ‘A’; is
116. Occurs when multiple users seeking ac- A. Collection of interrelated data
cess to the same set of records lockout B. Collection of programs to access data
each other.
C. Collection of data describing one par-
A. Data manipulation ticular enterprise
B. Deadlock D. All of the above
122. Data Warehouse berisi data: 127. In which one of the following, the mul-
A. Transaksi tiple lower entities are grouped (or com-
bined) together to form a single higher-
132. Before building the web the first step 137. Types of Database System supports data
that must be done is to create an empty across several sites
folder in the . directory.
A. Data Warehousing database
A. Drive C → www B. Distributed Database
B. Drive C → wamp C. Operational Database
C. Drive C → program files D. none of above
D. Drive C → wamp → www
NARAYAN CHANGDER
138. Planning that is intended to cover the
133. What are the advantages of DBMS? next 5 years is called planning?
A. Low cost of hardware & software A. the strategic plan
B. DBMS are simple to use B. medium term
A. Software system used to create, main- 146. Humans who have full responsibility in
tain, and provide controlled access to a database management include:setting ac-
database cess rights, coordinating and monitoring
142. The language for expressing data mining 147. A description of the data elements in a
and update requirements is database, the relationships among them,
and the logical model used to organize and
A. Data manipulation language describe the data.
B. Data definition language A. Subschema
C. Data update language B. Logical view
D. Database language C. Physical view
143. The software included in the DBMS is D. Schema
A. Visual Basic, Oracle, dan MySQL E. External-level schema
B. Delphi, Microsoft Access, dan MySQL 148. The following are not features of Close
C. Microsoft Access, MySQL, dan Oracle Loop MRP
D. Microsoft Word, MySQL, dan Oracle A. It’s a suite of functions, not just MRP
E. Pascal, Delphi, and Visual Basic B. Provides feedback function from exe-
cution to planning.
144. A collection of relationally similar records
stored on a secondary storage medium is C. Plans can be changed/replaced if
called a needed by keeping priorities valid.
A. File D. Sales and operations planning, which
is used to balance demand and supply.
B. Record
E. Consists of tools for solving priority is-
C. Tuple
sues, capacity planning and execution.
D. Attribute
149. Software (Software) that is used to
E. Entity
manage a collection or collection of data,
145. The data dictionary is a system structure where the data is organized or compiled
that stores into a data model is called
A. Database A. Field
B. Metadata B. DBMS
C. Hardware C. Record
D. Software D. Four
150. Which of the following is Database Lan- C. Support in the development of the com-
guage? plex applications software
A. Data Definition Language D. All of the above
B. Data Manipulation Language 156. The type of datatype which allows al-
C. Query Language phanumeric characters and special symbols
D. All of the above but can store up to 255 characters.
A. Auto number
151. What does DBMS stand for?
NARAYAN CHANGDER
B. Text
A. Database Management System
C. OLE Object
B. Database Manufacture System
D. Memo
C. Database Malfunction System
D. none of above 157. Which of the following is not true about
the ALTER TABLE statement?
152. Logically related data consists of these
A. It can add a new row.
EXCEPT
B. It can add a new column
A. attributes
C. It can modify existing columns
B. relationships
D. It can define a default value for the
C. entities
new column
D. variables
158. The following shows the types of
153. Using different file organization should DBMS
not require change to conceptual or exter-
A. Hierarchical database
nal schemas. This is referring to
B. Object-oriented database
A. Logical Data Independence
C. Relational database
B. Physical Data Independence
D. Rational database
C. Conceptual Data Independence
D. User Data Independence 159. One or more very large databases con-
taining both detailed and summarized data
154. What does the PING command stand for a number of years that is used for anal-
for? ysis rather than transaction processing.
A. Protokol Internet Gopher A. Data warehouse
B. Google Internet Packages B. Data Sharing
C. Paket internet Gopher C. Database
D. Paket International Gopher D. Data Mining
155. The Database Management Query lan- 160. Data warehousing is related to
guage is generally designed for the
A. create data warehouse
A. Specifying the structure of the
database B. update data
B. Support end-users who use English C. scan and load data for analysis
like commands D. write new data
A. type() B. MySQL
C. int x D. WampServer
NARAYAN CHANGDER
D. Optimistic locking
C. form, sort, table, query
172. The system is in the form of a dis- D. form, column, row, report
tributed database that will map/convert
host/machine/domain names to IP (Inter- 177. An instruction or command sentence in a
net Protocol) addresses and vice versa programming language to be executed by
from IP addresses to hostnames, which is a computer is called
called reverse-mapping. It is a function of A. Statement
a Network Service called
B. Syntax
A. Domain Database
C. Program
B. Domain Name Server
D. Scratch
C. Web Server
E. String
D. Samba Server
178. Database management system used to
E. Mail Server
A. create, update and exploit information
173. In the database world, sometimes we are in the database
familiar with the term data redundancy. B. create information in the database
The meaning of redundancy data is
C. Create and store information in a
A. Data Allowance database
B. Data Frame D. information extraction in the database
C. Data Condition
179. a = 10b = 10c = a + bprint(c)
D. Data error
A. 10 10
E. Data Position B. 10 + 10
174. The language in which users express re- C. 20
quirements for creating databases is called D. 10
A. Data definition language E. 20 10
B. Data manipulation language
180. The convenient way to enter or find data
C. Data Description Language in tables.
D. Database language A. Forms
175. Which of the following levels is consid- B. Macros
ered as the level closed to the end-users? C. Modules
A. Internal level D. Report
181. is a unique field by which records are 186. The main challenges of the evolution of
identified in a table. software development are
NARAYAN CHANGDER
B. SQL Server D. Application Programmers
C. XAMPP 197. Where the database does not have any
D. Oracle multivalued columns?
211. Which of the following is generally used 216. What is meant by SQL?
for performing tasks like creating the
A. SQL (System Qualified Language)
structure of the relations, deleting rela-
tion? B. SQL (Structure Qualified Language)
A. DML C. SQL (Structured Query Language)
B. Query D. SQL (System Query Language)
C. Relational schema
E. SQL (Structured Qualified Language)
NARAYAN CHANGDER
D. DDL
217. Types of Database System where sup-
212. This type of server provides services to
ports a small number of users(few than
applications such as mobile applications.
50) or specific department within an orga-
A. Application Server nization
B. Media Server A. Enterprise Database
C. Game Server
B. Centralized Database
D. Web Server
C. Workgroup Database
213. The database object that is used as a
means to store data is the notion of D. none of above
221. A collection of fields and records in a spe- name alphabetically? SELECT * FROM in-
cific category structor ORDER BY salary , name
NARAYAN CHANGDER
B. Office Assistant
A. Domain C. Query
B. Relation D. Report
C. Degree
237. Which of the following is a top-down
D. Metadata approach in which the entity’s higher
232. print (”Hello”) then the output is level can be divided into two lower sub-
entities?
A. Helo
A. Aggregation
B. Two
B. Generalization
C. Hello
C. Specialization
D. hello
D. All of the above
E. Helo
238. Which of the following in not a function
233. The following are not included in the of DBA?
virtuemart feature, namely . A. Network Maintenance
A. Chatting B. Routine Maintenance
B. catalog C. Schema Definition
C. Check out D. Authorization for data access
D. Payment
239. Consider attributes ID, CITY and NAME.
234. In database table, rows are called which one of these can be considered as a
primary key?
A. field
A. NAME
B. column
B. ID
C. record
C. CITY
D. none of above
D. ID, NAME
235. A table is a collection of data arranged
240. What does DBMS stand for
in
A. Database Multiple System
A. row formats (records) and attributes
B. Database Manager System
B. tables and columns (fields or at-
tributes) C. Database Management System
C. columns (fields or attributes) and rela- D. Database Management Supply
tions E. All Answers Salan
241. The following are the data types of the 246. Which one of the following commands is
Python programming language, except used for removing (or deleting) a relation
forms the SQL database?
244. The data type that represents a decimal A. First Normal Form
number is B. Second Normal Form
A. string C. Third Normal Form
B. float D. Fourth Normal Form
C. Database Management System 257. A branching structure that has more than
D. Database Management System 2 (two) conditions can use the command
NARAYAN CHANGDER
B. Database E. elif
C. Record
258. Types of Database System where sup-
D. Query ports data located at single site.
253. Data resulting from questions you asked A. Centralized Database
from one or more tables B. Enterprise Database
A. Form C. Workgroup Database
B. Report D. none of above
C. Queries
259. is responsible for the management of
D. Field the data resource.
272. This server is based on the internet that 277. a computer program that provides
responds to requests from clients such as database management services and
web browsers serves computers or database application
programs that use a client/server model
A. File Server
is the notion of
B. Media Server
A. Phpmyadmin
C. Game Server
B. Database Client
D. Web Server
NARAYAN CHANGDER
C. Database server
273. The abbreviation for CMS is . D. MySQL
A. Communications Management System
278. The following attributes are most appro-
B. Content Management Security priate for the student entity:
C. Content Message System A. name, class, no hp, address, email
D. Content Management System B. nis, name, class, address,
gender gender
274. Data Manipulation Language enables
C. name, class, name book, address,
users to
gender gender
A. Retrieval of information stored in
D. nis, code book, address, nik, e-mail
database
E. name, address, sex gender, class,
B. Insertion of new information into the
code medication
database
C. Deletion of information from the 279. Pay attention to the following steps:(1)
database Identify the data and group them based
on their characteristics. (2) Normalize the
D. All of the above
data (3) Collect the required data (4) Data
275. The key that can be used for data re- analysis The proper sequence of data anal-
trieval is known as ysis procedures is
281. . A in a table represents a relation- 286. The following are purpose of a database,
ship among a set of values which is NOT true?
285. A computer system that provides certain 290. To be able to access localhost in a web
services in a computer network is an ex- browser with XAMPP, you can do this by
planation of
A. Server A. Enabling the Mercury start button in
XAMPP
B. Client
B. Enables the FileZilla start button in
C. Host
XAMPP
D. Computer C. Enable the Tomcat start button in
E. User XAMPP
D. Enabling the Apache start button in E. The amount of raw materials that must
XAMPP be ordered according to the level of pro-
E. Enabling the MySQL start button in duction and when to order?
XAMPP
295. What does the acronym DBMS stands
291. An is an item in the real world that is for?
represented in a database. A. Data Bypass Management System
A. Manual Database B. Database Management System
NARAYAN CHANGDER
B. Field name C. Digital Base Management System
C. Entity D. All of the above
D. Records
296. The software used to manage database
292. Helping users to understand patterns, applications and the use of computer re-
trends, relationships, and outliers hidden sources which is one of the database com-
in big data is the benefit of data ponents is
techniques A. Operating system (operating system).
A. visualization B. Hardware
B. collection C. Users (users)
C. processing
D. Application Software (software)
D. integration
E. Database Management System
E. documentation
297. Which part of the database is included?
293. A peer-to-peer network:
A. Sistem database
A. usually links just two computers
B. User
B. allows computers on the network to ex-
change files with each other C. Operating system
303. Data types where we can store files like C. Sort the list of students by block, in
digital photos each block by class, in class in ascending
order by name
A. OLE Object
D. Detect and disallow student access to
B. Hyperlink
edit grades in the database
C. Attachment
D. Lookup Wizard 308. The fact of an object is called
A. Information
304. Command is used to delete a
database. B. Data
A. DELETE DATABASE DATABASE NAME C. meta data
D. Database
B. DELETE DATABASE NAME
E. DBMS
C. DROP DATABASE DATABASE NAME
D. DROP DATABASE NAME 309. a group of related data organized in
columns and rows in a datasheet.
305. In terms of language, the word data
comes from the Roman language, namely A. Record
A. dates B. Fields
B. datum C. Tables
C. data D. Report
NARAYAN CHANGDER
311. One of the key factors in the success of a C. JAVA
business is
D. API’S
A. depend on quality
B. the ability of a hardware to support the 316. Which of the following is not involved in
business DBMS?
C. the ability of a software to support A. End Users
quality B. Data
D. computer based solution C. Application Request
E. depending on the software product D. HTML
312. Functions return values in the Python lan- 317. Types of Database System designed to
guage when implementing or calling the support companies day-to-day operations
function
A. Data Warehousing database
A. def
B. Distributed Database
B. return
C. Operational Database
C. then
D. none of above
D. if
E. while 318. Each item from this list is classified
as Name, Birthdate, Street, County,
313. Objects that represent something in the PostCode
real world and can be distinguished from
one another (unique) are called A. Table
A. Files B. Record
B. Tuple C. Field
B. DDL C. Report
C. Schema D. Query wizard
D. Source code
335. In which of the following formats data is
330. An arrangement of data in a row and col- stored in the database management sys-
umn tem?
A. Record A. Image
NARAYAN CHANGDER
B. Table B. Text
C. Field C. Table
D. Form
D. Graph
331. Here which of the following displays the
unique values of the column? SELECT 336. In the Pioneer Era A distribution of soft-
dept name FROM instructor; ware that was limited to certain compa-
nies was called
A. All
A. Customer Software
B. From
C. Distinct B. Limited Distribution
332. Records or Rows are data sets that con- D. Customer Orientation
sist of one or more fields. Another name E. Batch Distribution
for Record or Row in the relational model
is 337. In the value chain, the parameters used
A. Field to measure all activities needed to convert
the inputs provided by logistics into the
B. Attribute final product form. This includes machin-
C. Column ing, packaging, assembling, and maintain-
D. Tuple ing equipment
339. The model used to determine how the 344. The format of displaying the information
system should be implemented regard- from a particular table is called
less of the database management system
A. conceptual B. Record
B. logical C. Forms
C. physique D. Database
D. qualitative
E. quantitative 345. Entity-Relationship Diagram (ERD) is
a
340. What an HTTP method is not is
A. a diagram that describes the relation-
A. GET
ship (relationship) between relationships
B. INPUT
B. a diagram that describes the relation-
C. POST
ship (relationship) between attributes
D. DELETE
C. a diagram that describes the relation-
341. All of the following are examples of ship (relationship) between entities (en-
Database Management System software tity)
except?
D. a diagram that describes the relation-
A. Microsoft Access
ship (relationship) between multivalued
B. MySQL attributes
C. Oracle E. a diagram that describes the relation-
D. FaxBass ship (relationship) between derivative at-
tributes
342. decides how the logical DB design is
to be physically realised
346. data warehouse is based on
A. Data Administrator (DA)
A. two dimensional model
B. Database Administrator (DBA)
C. Database Designers (Logical & Physi- B. three dimensional model
cal)
C. multidimensional model
D. Application Programmers
D. unidirectional model
343. A group of objects that are defined have
the same characteristics and can be distin- 347. Course(course id, sec id, semester)Here
guished from one another, can be goods, the course id, sec id and semester are
people, or an event. and course is a
A. Attribute
A. Relation, attribute
B. Entity
B. Attribute, relation
C. Relation
D. Data Value C. Tuples, relation
E. Record D. Tuple, attribute
348. What is Database Management Sys- 353. Which of the following is not a Storage
tem? Manager Component?
A. A software system that enables users A. Transaction Manager
to access to the database.
B. Logical Manager
B. A software system that enables users
C. Buffer Manager
to create access to the database.
C. A software system that enables users D. File Manager
to define, create, maintain and control ac-
NARAYAN CHANGDER
354. The process of processing data with the
cess to the database.
aim of finding useful information that can
D. A software system that enables users be used as a basis for making decisions for
to maintain and control access to the the solution of a problem is called .
database. data.
349. Data mining means A. analysis
A. data fetching B. processing
B. data accessing C. modeling
C. knowledge discovery D. publication
D. none of above E. interpretation
350. Who is the inventor of IOT technology?
355. How many types of data models are
A. Kevin Ashmad there?
B. Kevin April A. 1
C. Kevin Ashton B. 2
D. Kevin Henry
C. 3
351. The basic operations that we can do with D. 4
respect to databases include:Creating a
new database is a process that is identi- 356. An attribute that has only one value is
cal to creating a new filing cabinet. The the meaning of
basic operations used are A. Single value Attribute
A. create database
B. Composite attribute
B. create table
C. Derived Attribute
C. drop table
D. Simple Attribute
D. insert
E. Multi Value attribute
E. delete
352. Which is the MySQL instance responsible 357. Each of these objects interacts with the
for data processing? records stored in your database’s
358. Database objects that function to display, 363. In general, the understanding of the
edit and filter data according to the desired database can be viewed from two sides,
criteria are the notions of the literal understanding and the term un-
368. The following does not include activities 373. The Python programming language is a
in data analysis, namely data type of
A. grouping A. interpreter
B. cleaning B. compiler
C. deletion C. Machine
D. transformation D. Compile
E. Assembly
NARAYAN CHANGDER
E. modeling
369. Data types to store audio, video or other 374. Update the data of the database includ-
BLOBs files ing
A. Import, edit, delete data
A. OLE Object
B. Arrange
B. Hyperlink
C. Search
C. Attachment
D. Report
D. Lookup Wizard
375. Field or Column is the same/similar data
370. Which is not a benefit in dbms is set for each table. Another name for Field
A. Speed and convenience or Column in the relational model is
B. Multi-user A. Attribute key
C. Device cost savings B. Attribute
388. An entity set that does not have enough D. Organized collection of data that can-
attributes to form primary key is known not be updated
as
393. It is the use sophisticated statistical anal-
A. STRONG ENTITY SET ysis, including artificial intelligence tech-
B. WEAK ENTITY SET niques such as neural networks, to “dis-
cover” unhypothesized relationships in
C. IDENTITY SET
the data. For example, credit card com-
D. OWNER SET panies use this to identify usage patterns
NARAYAN CHANGDER
indicative of fraud.
389. Why would you create a primary key?
A. Data integration
A. To make each record in a database
unique B. Data Sharing
B. To make each field in a database C. Data Mining
unique D. Database system
C. To make each query in a database 394. is where information is stored in a
unique database.
D. none of above A. Query
390. How data is stored in relational B. Report
database? C. Tables
A. Stored in the form of objects D. Microsoft Access
B. Stored hierarchically 395. The following are not included in the var-
C. Stored in fixed structures ious CMS, namely .
D. none of above A. CMS Drupal
B. CMS Lycos
391. This type of server provides clients with
network connections and other communica- C. CMS Joomla
tions such as voice. D. CMS Moodle
A. Application Server
396. Rows in a database tables are called
B. Media Server A. Fields
C. Communication Server B. Records
D. Web Server C. Tables
392. What is a database? D. none of above
A. Organized collection of information 397. The important thing in the data collection
that cannot be accessed, updated and process is to ensure that .
managed
A. get a lot of data
B. Collection of data or information with-
B. data comes from well known sites
out organizing
C. data is well known
C. Organized collection of data or infor-
mation that can be accessed, updated and D. data sourced from reliable sources
managed E. get complete data
398. A column in a table that contains particu- 403. ERP information system consists of?
lar information about a record (more than 1 answer)
A. System person in charge
409. In the value chain, the parameters used 411. The elements in the database are except.
to measure the activities carried out to A. Entity
purchase the inputs needed to produce the
company’s products. Purchase inputs in- B. Attribute
clude items that are all used during the C. Data value
product manufacturing process. called? D. RDBMS
A. Firm Infrastructure E. Table
B. operations
NARAYAN CHANGDER
412. A collection of objects or things that can
C. Procurement be distinguished or uniquely identified
D. Technology development A. Entity
E. Human resource development B. Attribute
C. Relationship
410. One of the main components of the
database is the hardware in the computer D. Indicator
system. The main device in the data pro- E. Cardinality
cessing system is
413. Which of the following is not a level of
A. Computer data abstraction?
B. Windows 10 A. Physical Level
C. Keyboard B. Critical Level
D. Accounting information system C. Logical Level
E. Memory D. View Level
3. Olap servers support common analytical 5. The reason why data warehouse has to be
operations such as? separated, except
16. If you have doubts, you can ask your 21. Which evolution of ERP contains materi-
teacher in the next class, and only today als planning, order entry, distribution, gen-
with me, I thank you for the time and I ask eral ledger, accounting, and shop floor con-
you Does anyone have a doubt? trols?
A. And A. ERP
B. No B. Extended ERP
C. We asked the teacher later. C. ERP II
NARAYAN CHANGDER
D. none of above D. None of the above
17. Which application’s primary business bene- 22. Customer specific products are also known
fits include forecasting, planning, purchas- as
ing, material management, warehousing, A. make-to-stock.
inventory, and distribution? B. make-to-order
A. CRM C. goods.
B. SCM D. expected products
C. ERP
23. A collection of interrelated events, activ-
D. All of the above ities, and decision points that involve a
number of actors and objects, and which
18. What are several different types of soft-
collectively lead to an output that is of
ware, which sit in the middle of and pro-
value to at least one customer is the defi-
vide connectivity between two or more
nition of:
software applications?
A. Process
A. Middleware
B. Business Process
B. Enterprise application integration mid-
dleware C. Business Process Management
26. The traditional business system is called as 31. Below are SAP ERP Features except:
A. Software that can provide real-time
A. Business B. consultant’s.
C. management’s.
B. Process
D. technical support team’s.
C. Business Process
D. Business Process Management (BPM) 33. approaches reduces data redundancy
and provide update information.
E. Business Cycle
A. Legacy system.
28. Employee recruitment information (Hiring B. Information system.
information), is the output of C. Integrated data model.
A. Production D. Data base.
B. Marketing Sales
34. The elapsed time between placing an order
C. Human Resources and it receiving it is also known as
D. Supply Chain Management A. elapsed time.
B. waiting time
29. Production and inventory data (Production
and inventory data) is part of the input C. time interval
NARAYAN CHANGDER
A. Small Bang
B. SCM
B. Big bang
C. Phased Approach C. ERP
38. In conditions where the information sys- 43. During the session the re-engineering
tem in a company is separated and not in- must also consider new technologies.
tegrated between (functional) parts, then
A. planning
an effect arises which is called the effect of
indifference / not wanting to know about B. implementing
other parts, called: C. brainstorming
A. Disintegrated Effect
D. training
B. Miscommunication effect
C. Silo Effect 44. Client computers are responsible for pre-
senting data to the user and passing user
D. Uncoordinated Effect input back to the server are the operating
E. Decentralization Effect of Three-Tier Model
NARAYAN CHANGDER
D. Project management
E. Financial management 62. The other name of core application is
A. Online analytical perspective
57. When several groups of resources are
used as input in a process to become out- B. Online transaction processing applica-
put, then all of the input elements will: tions
A. changes and should provide value to C. Online transfer processing applica-
the process tions
B. experience an increase in price D. Online analytical processing
C. experienced a decrease in price 63. An enterprise is a group of people with
D. become more numerous (increase) A. common goal.
E. the amount remains the same or does
B. separate goal for each department
not change
C. multiple goals.
58. is the people who will be using the ERP
D. two or more goals.
system once it is in place.
A. Management 64. The role of Information Systems in relation
B. End-user to the implementation of ERP in a business
organization is:
C. Consultant
A. IS integrates all information in busi-
D. Vendor ness processes
59. should determine the characteristic of B. IS improves communication and work-
the current system before implementation. flow in business processes
A. Decision makers C. IS integrates people, procedures, soft-
B. Project team members ware, computer storage (database), orga-
C. Decision makers and project team nizational analysis and information shar-
members ing (delivery).
60. Which is not the system that IFS have for 65. An information system produces informa-
their ERP? tion using the cycle.
A. Manufacturing A. data analysis
B. Financials B. input-process-output.
C. Tourism C. input-output.
D. Human Capital Management D. process-input-output.
75. Before engaging an outside consultant, 80. Below is the Output section of Account-
management should: ing/Finance:
A. Conduct reference A. Production
B. Set a firm termination date B. Data piutang (Accounts receivable
C. Establish in writing how staff changes data)
will be handled C. Data kredit customer (Customer credit
D. Interview all the staff in the company data)
NARAYAN CHANGDER
76. is the last phase in ERP implementa- D. Data hutang (Accounts payable data)
tion life cycle
81. What concept best defines an ERP?
A. Testing
A. materials planning and management
B. End user training system
C. Post implementation
B. computer software for work order and
D. Going live materials management
77. used to support the old process to be- C. information management system that
come useful in the new process, involves integrates all business processes of a
reducing some requirements while expand- company
ing others. D. management tool that determines how
A. Transitioning the information much and when is going to be produced
B. software management.
82. Is a list of the number of components,
C. front-office software. mixture of ingredients, and raw materials
D. information system. needed to make a product:
84. Material Requirement Planning(MRP) uti- C. Central database for all departments
lizes software applications for scheduling D. All of the above
NARAYAN CHANGDER
into electronic processes, with the goal to fund?
create a paperless office.
A. They damaged a product by accident
A. E-Administrator
B. They decided that they don’t want it
B. E-Democracy
now, but initially did
C. All of the above
C. The product arrived damaged
D. None of the above
D. none of above
5. What is a key negative impact of eCom-
merce 10. The combination of these independent com-
A. Job Losses ponents according to the desired business
B. Cheaper Goods process blueprint is called?
C. More Choice of Goods A. Tailor-made
D. Shopping 24/7 B. Technology Infrastructure
6. are the most used software on the In- C. Component Based Applications
ternet. They are the starting step for
D. Inter-Enterprise Business Process
many Internet-based activities, not only
but, of course, also if somebody is looking 11. Which is below is the components in the
for a business opportunity dimension of e-commerce?
A. Search engines
A. Choose, Process, Delivery
B. Online Shops
B. Order, Process, Delivery
C. Content provider
D. Portal C. Order, Payment, Delivery
E. Electronic mall D. Order, Process, Infrastucture
7. There are 3 things that drive e-commerce, 12. Requests for checks and cards, informa-
one of which is business pressure, espe- tion on ATM locations, and sending data
cially technology pressure. The following via email are mobile banking services that
are included in the criteria for technological fall into the category of
pressure are
A. Investment
A. Reduced government subsidies
B. Increasing technological innovation B. Support
13. allows a business application on the 17. setting up a network so that employees
computer of one organization to communi- can view other employees’ data but can-
cate directly with the business application not view anything outside the company
B. Protocols B. Intranet
C. LAN
C. Standards
D. WAN
D. none of above
18. It is a type of e-commerce in which con-
14. The meaning of the market is sumers trade products, services and infor-
mation with each other online.
A. Place of entertainment between con-
sumers A. Business-to-business
22. Which device has the Largest CPU size? B. One to One Relationship
A. Smartphones C. Communities of Interests
B. Desktop D. Real Time Organizations
C. Tablets
28. has a ring structure, provides a trans-
D. Smart watches mission rate up to 100 MBit/sec and is
defined in the ANSI standards X3T9.5,
23. is a central entry and navigation point
X3.139 and X39.5 (ANSI = American Na-
NARAYAN CHANGDER
to provide access to a virtual area (of ap-
tional Standards Institute),
plications or services) and to deliver addi-
tional information to the user. It works as A. Transmission Control Proto-
an interface between user and system(s). col/Internet Protocol.
A. portal B. Fiber Distributed Data Interface
B. Vertical portal C. Token Ring
C. enterprise portal D. Ethernet
D. none of above
29. Meaning of Cloud computing
24. It is also called E-tailing A. Virtual storage services
A. Consumer to business B. Virtual site focus on “development of
B. Business to Consumer apps”
C. Business to Business C. Cover a vast range of options, from
D. Consumer to Consumer the basics of storage, networking, and
processing power through to natural lan-
25. Smart card is better than other cards using guage processing and artificial intelli-
A. Encryption gence as well as standard office applica-
tions.
B. Firewall
D. none of above
C. Hub
D. All of the above 30. Rules stated in a Returns Policy
26. A connector used to allow a computer to A. Items can be used and returned as
network with other types of hardware long as the customer has the receipt
such as printers, keyboards, and speakers B. Perishable items can be returned
is called a C. Items must be unused and contain a
A. USB Port receipt as a proof of purchase
B. Printer D. Returned within 30 days after pur-
C. USB Cable chase
D. Hardware 31. What is the acronym of ICT?
27. The company’s ability to form a commu- A. Information Communication Transmis-
nity in cyberspace in e-commerce is also sion
called? B. Information Communication Technolo-
A. Brochurware gies
34. Self-serve payment systems (gas stations, 39. is a standard network protocol used to
kiosks, etc.) are common targets for transfer computer files from one host to
another host over a TCP-based network,
A. credit card theft
such as the Internet.
B. spoofing
A. Hypertext Transfer Protocol
C. phishing
B. File Transfer Protocol
D. hacking
C. Simple Mail Transfer Protocol
35. How the transactions occur in e- D. World Wide Web
commerce?
40. Security, authentication, electronic pay-
A. Using e-medias
ment, directories catalogs are e-commerce
B. using Computers only infrastructure of ?
C. Using mobile phones only A. Information superhighway
D. None B. Messaging and information distribu-
tion
36. A small portable hard drive designed to
hold digital files and data; also called a C. Common business
thumb or flash drive is also called a D. Web architecture
A. USB Cable 41. is preparation of information for indi-
B. CD/DVD Drive vidual consumers.
C. USB Port A. Personalization
D. Portable Storage B. Ubiquity
NARAYAN CHANGDER
B. Content Provider code attack, tapping and sniffing
C. Whole of Enterprise B. Server-Dos attack, hacking, theft and
fraud
D. Direct to Consumer
C. Client-Malicious code attack, vandal-
43. According to Tucci in 2003 there are four ism, theft and fraud
business models that are most widely ap-
plied or carried out in e-business where D. none of above
revenue is obtained from membership fees
for a service, namely 47. An online marketplace is a website,
where suppliers and potential customers
A. Advertising can come together like on a real market-
B. Sales revenue place in a small town.
C. Subscription A. Search engines
D. Model B. Online Shops
44. is a website, where you can buy prod- C. Content provider
ucts or services, e.g. books or office sup-
D. Portal
plies. Traditional and similar business mod-
els are direct mail selling (no shop facility, E. Electronic mall
offering of goods via a printed catalogue,
ordering by letters or telephone calls) and 48. To protect network, the solutions we can
factory outlets (producer has own shop fa- use are and
cility, does not sell his products via mer-
A. Firewall, Proxy server
chants).
B. anti virus, patches
A. Search engines
B. Online Shops C. Proxy server, antivirus
C. Content provider D. SSL, antivirus
D. Portal
49. is concerned with the buying and
E. Electronic mall selling information, products and services
over computer communication networks
45. A SWOT analysis is a simple but effec-
tive technique to help organisations anal- A. Commerce
yse their internal resources in terms of B. E-Commerce
strengths and weaknesses to identify op-
portunities and C. E-Business
A. Technological status D. none of above
50. There are significant factors that man- 54. A hand-operated device that allows con-
agers should appreciate in the adoption of trol of the cursor on a computer screen.
any e-commerce service. Which of the fol-
NARAYAN CHANGDER
C. Credit cards
Legacy Applications and Assets
D. Smart cards
C. Strengths, Weaknesses, Opportuni-
ties, Threats, Goals, Requirements, Con- 66. is a platform for communication and
straints exchange of experience. It is similar to a
D. Distributed Object Infrastructure, virtual club or association.
Legacy Applications and Assets A. Search engines
61. What does the term eCommerce mean? B. Online Shops
A. Buying goods and services over the in- C. Content provider
ternet D. Portal
B. Buying Goods over the internet E. virtual community
C. Selling goods and services over the in-
ternet 67. is a framework for integrating informa-
tion, people, and processes across organi-
D. Buying and Selling goods over the in- zational boundaries,
ternet
A. portal
62. The lowest bidder will wins is using B. Vertical portal
A. Normal auction
C. enterprise portal
B. Reverse auction
D. none of above
C. Forward auction
68. Below are tools that can be utilized at the
D. Backward auction
analysis stage of an e-commerce develop-
63. Which of the following is example of Social ment, except?
Network Services (SNS)? A. Making samples
A. facebook B. Conducting interviews
B. instagram C. Create a web
C. twitter D. Make observations
D. youtube
69. Is broker is a person or an organization
64. The most commonly discussed type of com- to execute sales transactions. Sometimes
merce is in which online business at- those brokers are used to hide the real cus-
tempts to reach individual consumers. tomer to the supplier.
A. B2C A. Information Broker
B. C2C B. Transaction Broker
A. All of the above options 78. Its objective is to run a marketplace for
goods and values. Examples are e bay and
B. The set of priority keywords and
yahoo
phrases for Search Engine Optimisation
(SEO) A. Business web agora
79. is a digital mobile phone technology 84. It is features online sales transactions
that allows improved datatransmission made via mobile devices, such as smart-
rates as a backward-compatible extension phones and tablets.
of GSM. A. E-Commerce
A. EDGE B. E-Business
B. HTML C. Mobile E-Commerce
C. Transmission ControlProtocol/Internet D. Commerce
NARAYAN CHANGDER
Protocol.
85. Reasons Business should use Cloud Ser-
D. UMTS (Universal Mobile Telephone vices
System)
A. Makes collaboration easy & cheaper.
80. E-Commerce is bigger than E-Business B. It can support variety of business
A. True needs & offers better insights and visibil-
ity.
B. False
C. Cheaper technology & easy to use.
C. Same in Size
D. Fast connection to internet & easy ac-
D. Hard to say cess to content.
81. The term used for scrambling/translating 86. One of the drivers of m-commerce, , is
data into a secret code that can only be the widespread use of cell phones, which
decoded by authorised users? is a social phenomenon, especially among
the 15-to-25-year-old age group.
A. Anti-virus
A. vendor push
B. Encryption
B. bandwidth improvement
C. Firewall
C. device availability
D. Password Protection
D. handset culture
82. This process describes the general pattern 87. Every business model run by e-commerce
of making business indelivering goods or actors must at least consider several
providing services and getting payments. things. one of which is Buyer Side. What
A. Primary Process is meant by Buyer Side is.
B. Secondary process A. Looking for websites with attractive
buying and selling facilities
C. Initial process
B. Look for items with the highest dis-
D. Last process counts
83. Internet commercialization began in? C. How to attract buyers to buy the prod-
ucts offered
A. 1960-an
D. Choose cheap
B. 1990-an
88. Is broker collects, aggregates and pro-
C. 1980-an
vides information, e.g. information with
D. 1970-an respect to products, prices, availabilities
NARAYAN CHANGDER
C. Community Model C. Internet
D. Affiliation Model D. Intranet
99. *Sales*Subscription fees*Membership 104. Below are five aspects of the benefits
feesThese fall under? offered by e-business (spectrum value e-
A. Cost structure business), except?
NARAYAN CHANGDER
mode?
and closely managing the development
A. Cash on Delivery process
B. Debit card D. identifying the key components of your
C. Credit card business plan and selecting the right soft-
ware, hardware, and infrastructure for
D. e-cheque your site
121. What is a Business Model? 125. Its objective to establish an optimized
A. A paper model of your business. value creation chain. Examples are Cisco
and Dell
B. A story of how your enterprise will cre-
ate, deliver, and capture value. A. Business web agora
C. A model made out of bricks B. business web aggregator
C. Business web integrator
D. None of the above.
D. none of above
122. There are 7 types of portals namely com-
mercial portal, publishing portal, personal 126. Is the automation of an organization’s
portal, affinity portal, mobile portal, cor- procurement processes using Web-based
porate portal and applications.
A. Language portal A. E-Procurement
B. E-Commerce
B. Voice portal
C. M-Commerce
C. Intranet portal
D. M-Procurement
D. Business portal
127. methods of firewall including and
123. That means a form of government in
A. SSL, packet filter
which all adult citizens are presumed to be
eligible to participate equally in the pro- B. application gateway, proxy server
posal, development, and creation of laws. C. proxy server, packet filter
A. E-Administrator D. packet filter, application gateway
B. E-Democracy 128. All of the following might be part of a
C. All of the above Web site’s middle-tier layer except:
D. None of the above A. a database server.
B. an ad server.
124. What are the two most important man-
agement challenges in building a successful C. legacy corporate applications.
e-commerce site? D. a mail server.
131. It is a virtual computer (a piece of soft- 136. What includes Web Authoring Tools are,
ware), which helps to deliverWeb content except
that can be accessed through the Internet.
A. HTML
A. Webserver
B. Microsoft FrontPage
B. WSDL (Web Services Description Lan-
guage) C. Netscape Navigator Gold
C. SOAP (Simple Object Access Protocol) D. Macromedia Backstage Designer
D. None of the Above 137. How does e-Commerce impact the US
economy?
132. It is a benefits of e-commerce avoid the
cost associated with physical stores, such A. Consumers only visit physical loca-
as rent, inventory and cashiers, although tions to purchase goods
they may incur shipping and warehouse
B. Businesses experience decreased
costs.
rent expense
A. Availability
C. Consumers have fewer choices
B. Speed of Access
D. Businesses can sell to a larger market
C. Lower Cost
D. none of above 138. What is the term for a shop that is both
online and on the high street?
133. The following is not a way for company
A. Click & Brick
transactions to offer their products or ser-
vices, namely by: B. Brick & Click
A. Faster C. Brick & Brick
B. Switching cost D. Click & Click
NARAYAN CHANGDER
D. Hard
140. State the 4 types of relationships in the
business world that are usually carried out 145. A universal serial bus that supports data
by a company, except transfer to and from other devices is called
A. Relations with suppliers the
B. Relations with distributors A. USB Cable
C. Relations with consumers B. Printer
D. Relations with companies C. Portable Storage
D. USB Port
141. People order things just fun and never
plan to pay and accept the delivered 146. Traditional business models, which are
goods. somehow similar to the business of an ac-
A. Junk orders cess provider, are operators of a technical
infrastructure, e.g. telephone networks,
B. Waste Order
carhighways, or railways.
C. Order of Digital Goods
A. Access Provider
D. none of above
B. Search Engine
142. has the widest propagation now ac- C. Online Shop
tually is the primary technology and
D. Content Provider
provides transmission rates up to 10
Gigabit/sec (Access is carried out via 147. It is a benefits of e-commerce sites
CSMA/CD = Carrier Sense Multiple Ac- are available 24x7, allowing visitors to
cess/Collision Detection; technology is browse and shop at any time.
based on standard IEEE 802.3).
A. Availability
A. Transmission Control Proto-
B. Speed of Access
col/Internet Protocol.
B. Fiber Distributed Data Interface C. Lower Cost
153. This virus is application specific.Meaning 158. is the process where different parts
that the virus affects only the application of the CPU are used for performing tasks
for which it was written, such as Microsoft
A. Caching
Word, Excel, PDF, or PowerPoint. This re-
fer to B. Pipelining
A. Macro virus C. Core
B. File-infecting virus D. Clock speed
159. There are 4 (four) types of relationships 164. On what platform may an online user ex-
in the business world that are usually es- perience Phishing?
tablished by a company, except A. Gaming sites
A. Relations with suppliers (suppliers) B. Email applications
B. Relations with internet users C. Social media
C. Relations with partners (partners) D. E-commerce sites
D. Relations with consumers (customers)
NARAYAN CHANGDER
165. Which of the following is an example of
B2B e-commerce?
160. If a seller entertains bids from multiple
buyers known as . A. Facebook
NARAYAN CHANGDER
B. Your full name
C. Your phone number 184. What is the meaning of digitization based
D. Your favourite color on the economic concept
179. What is the acronym of WWW? A. Products and services forms are trans-
formed into ones and zeros format
A. Web World Wide
B. Replacement of the mass media into
B. World Wide Web
molecular media
C. Wide Web World
C. Physical things (institution and rela-
D. World War Web tionship) can become virtual
180. eCommerce is short for D. Convergence of computing, communi-
A. Email Commerce cation, and content
NARAYAN CHANGDER
C. IaaS = Infrastructure as a Service. A. Commerce
D. None of the above B. Communication
C. Collaboration
199. It is a disadvantage of e-commerce, there
D. Connection
is a wait time for the product to be shipped
to the customer’s address. 204. What is included in mobile computing?
A. Limited customer service A. Mobile with 2G
B. Not being able to touch or sale B. LAN with bandwidth
C. Wait time C. notebooks with PDAs
D. Security D. PDA with IRDA
205. Which legal legislation/act protects
200. E-Commerce applications began in the
users who’s data has been accessed with-
early
out authorisation?
A. 1960
A. Data Protection act
B. 1970 B. GDPR
C. 1990 C. Computer Misuse Act
D. 1940 D. Copyright, Designs and Patent Act
201. The advantages of E-commerce are (any 206. Online word-of-mouth marketing is re-
3) ferred to as:
A. Global scope A. Permission marketing
B. Anytime shopping B. Search engine marketing.
C. Security C. E-mail marketing
208. Is commonly understood as the usage of 213. By connecting their businesses to the on-
mobile devices for business purposes, es- line infrastructure of the Internet, compa-
pecially mobile phones and PDA’s. nies can generally do all of the following,
217. The digital economy is also sometimes A. Computer Misuse Act 1990
called the Internet Economy, the New Econ- B. Copyright and Patents Act 1988
omy, or Web Economy.
C. Data protection Act 1998
A. M-Commerce
D. none of above
B. E-Commerce
C. Digital Economy 222. Brochureware is
NARAYAN CHANGDER
company management through the cam-
218. Supply chain management refers to the era
coordination of all supply activities of an B. Development of an application that al-
organisation from its suppliers and de- lows business transactions to occur elec-
livery of products to its customers. E- tronically (E-Commerce)
commerce transactions between a com-
pany and its stakeholders, be their con- C. Internet as a means to develop elec-
sumers or businesses are often referred to tronic brochures
as: D. The company’s ability to form a com-
A. B2C, B2B munity in cyberspace.
236. provides services, which can be run 241. Which type of e-commerce focuses on con-
electronically, e.g. application software sumers dealing with each other?
services or ICT infrastructure services like A. B2B
storage or backup services.
B. C2B
A. information broker
C. C2C
B. transaction broker
D. B2C
C. Content provider
242. is a 13-digit number product identifier
NARAYAN CHANGDER
D. Portal
used by publisher, booksellers, libraries,
E. online service provider internet retailers and other supply chain
participants for ordering, listing, sales
237. you have a small business specializing
records and stock control purposes.
in custom designed silver jewelry. How
should you globalize your business? A. ISBN (International Standard Book
Number)
A. Subscribe to an international publica-
tion B. GTIN (Global Trade Item Number)
B. Establish a website on the internet C. Bar code
C. Buy jurisdiction to sell jewelry in Japan D. None of the above
D. Build an infrastructure in France 243. Below are examples of mediators in eco-
nomic activity except
238. A payment option that doesn’t involve
sharing personal financial details with a A. Convergence
business, during payment? B. Broadcasters
A. Credit Card C. Wholesalers
B. Debit Card D. Retailers
C. Third Party Payment option 244. “The process of buying, selling, or ex-
D. none of above changing products, services, or informa-
tion via computer. “The above statement
239. Features of a strong password refer to
A. Contains a mixture of upper and lower A. E-Business
case letters
B. E-Marketplace
B. Is short
C. E-Commerce
C. Has both Letters and Numbers
D. E-Tailing
D. Contains only numbers
245. It refers to the electronic exchange
240. Auction in which the buyer places an item of products, services or information be-
for bid tender ) on a request for quote tween businesses rather than between
(RFQ) system is also known as businesses and consumers.
A. Normal auction A. Business-to-business
B. Reverse auction B. Business-to-consumer
C. Forward auction C. Consumer-to-consumer
D. Backward auction D. Consumer-to-business
246. A method where you can place banners 250. One of the 12 characteristics of the digi-
from people’s companies on your site, tal economy that Don Tapscott discovered
where if someone makes a transaction on is
255. An e-commerce model in which business 260. Only members can use the services pro-
actors directly involve sellers (e-commerce vided
service providers) and individual buyers or A. Bartering Online
buyers, this matter is the understanding
of B. Membership
A. Consumer to Consumer (C2C) C. Value Chain Integrators
B. Consumer to Business (C2B) D. Online Auctions
NARAYAN CHANGDER
C. Business to business (B2B) 261. is typically used to call for pop-up
D. Business to Consumer (B2C) ads to display when the user visits cer-
tain sites. It can be downloaded and some-
256. To save a URL, we use: times included in free programs.
A. Copy A. spyware
B. Bookmark B. adwares
C. Save C. phising
D. Paste D. spoofing
257. which are not important characteristics of 262. Prior to the Internet Resolution, most
the digital economy that must be known businesses produced their product compo-
and understood by management practition- nents in-house. Now they depend on many
ers, namely? vendors to supply their component parts.
Which term describes this?
A. Molecularization
A. Dependability
B. Requirements
B. Integration
C. Knowledge
C. Intermeditation
D. Digitization
D. Out-sourcing
258. What is the purpose of a Denial of Ser-
vice attack? 263. At this stage the seller and buyer carry
out various activities or communication,
A. Exploit a weakness in the TCP/IP stack
such as?
B. To execute a Trojan on a system
A. Do not ask and do not ask for informa-
C. To overload a system so it is no longer tion about the product
operational
B. No complains about product quality
D. To shutdown services by turning them
C. Discussion on how to use the product
off
properly
259. is an Internet standard for electronic D. Not informing about the products of-
mail transmission. fered
A. Hypertext Transfer Protocol 264. E-commerce is also referred to as ex-
B. File Transfer Protocol change of business information using EDI
C. Simple Mail Transfer Protocol A. User friendly
D. World Wide Web B. Paperless
NARAYAN CHANGDER
A. Seller
C. phishing
B. Buyer
D. cybervandalism
C. Intermediaries
275. It is a type of e-commerce in which con-
D. Framework
sumers make their products and services
available online for companies to bid on 280. Unsolicited e-mail is called what?
and purchase.
A. Junk Mail
A. Business-to-business
B. Extra Mail
B. Business-to-consumer
C. Spam
C. Consumer-to-consumer
D. Consumer-to-business D. Mailing
276. Establishes a secure, negotiated client- 281. Type of hacker including all below EXCEPT
server session in which URL of requested A. Black hats
document, along with contents, is en-
B. White hats
crypted. This is type of securing channel
of communication called C. Grey hats
A. Secure Sockets Layer (SSL): D. Red hats
B. S-HTTP
282. Trying to integrate several units within
C. Virtual Private Network (VPN) the company, each of which has imple-
D. Firewall mented a small e-business concept, is the
meaning of?
277. The ability of e-technology in expand-
A. Automated level
ing the range and space of the companies
that use it is one of the advantages of e- B. inform stage
business, namely C. reinvent stage
A. Reach D. observation stage
B. Effectiveness
283. A Website is a collection of
C. Efficiency
A. Home Page
D. Structure
B. First Page
278. is a set of standards developed in the
C. WWW
1960s to exchange business information
and to do electronic transactions D. Web Pages
284. They are the starting step for many A. The Web is the technology upon which
Internet-based activities, not only but, of the Internet is based.
course, also if somebody islooking for a
NARAYAN CHANGDER
295. Pervasive Security Mechanism A. consumer-to-consumer (C2C)
A. Data Integrity B. social e-commerce
B. Digital Signature C. mobile e-commerce
C. Access Control D. business-to-business (B2B)
D. Trusted Functionality
299. “Organizations that conduct their busi-
E. Enchipherment ness activities solely online”Above state-
ment is refer to.
296. is a standard protocol for business trans-
actions that is designed for transfer of A. brick and mortar
business documents. B. virtual (pure play)
A. cXML (commerce eXtensive Markup C. click and mortar
Language)
D. none of above
B. BMEcat
C. GTIN (Global Trade Item Number) 300. Is a website, where you can buy products
or services, e.g. books or office supplies.
D. ISBN (International Standard Book
Number) A. Access Provider
B. Search Engine
297. Three key points of vulnerability can be
identified as below EXCEPT C. Online Shop
A. Internet communications channels D. Content Provider
NARAYAN CHANGDER
shape the whole table had to be changed. B. astrolabe
9. When was the term “computer” first C. clocks
seen?
D. all of these
A. 1989
14. What did the astrolabe help with?
B. 1200
A. It showed the current weather state
C. 1583
B. Sent signals to soldiers during the war
D. 1613
C. Allowed people to receive signals from
10. How would you show the number 2, 345 other countries.
using the abacus that is shown in the
D. Enables ships to calculate their lati-
video?
tude at sea.
A. 2 green, 3 red, 4 white, 5 yellow
15. Who is considered to be the “Father of
B. 2 red, 3 white, 4 yellow, 5 green
Computing”?
C. 2 white, 3 yellow, 4 green, 5 red
A. Charles Babbage
D. 2 yellow, 3 green, 4 red, 5 white
B. Albert Einstein
11. What was the analytical engine capable C. Isaac Newton
of?
D. Galileo Galilei
A. Could be used for more than one com-
putation 16. Why was there a demand for faster and
B. Could be given data and run operations more flexible tools for processing data?
in sequence A. Inventors wanted to make new inven-
C. Had memory and a primitive printer tions
NARAYAN CHANGDER
pose computer that required no manual D. Blaise Pascal
programming? 19. The first device that could be called a ‘per-
A. ENIAC sonal computer’ was the , which de-
B. Colossus Mark I buted in 1975.
24. She was called the first programmer who 30. What made the Harvard Mark I run?
wrote a program for Analytical Engine.
A. Drive Shaft connected to an electric
NARAYAN CHANGDER
B. Jacquard’s Loom
A. 1964-1971 C. Leibnitz Calculator
B. 1971-1980
D. Analytical Engine
C. 1940-1956
D. Present and beyond 42. How many mechanical relays were in the
Harvard Mark I?
37. Who was considered as the “First Com- A. 150
puter Programmer” and worked with
Charles Babbage during the development B. 700
of his two engines? C. 1750
A. Konrad Zuse D. 3500
B. Thomas De Colmar
C. Augusta Ada Byron 43. In which generation did the Integrated Cir-
cuits (ICs) intoduce?
D. Herman Hollerith
A. 1st generation
38. When and who invented the first computer
B. 2nd Generation
mouse?
A. Bill Gates C. 3rd generation
39. What are two ways that innovator Steve A. The US Census Bureau
Roberts incorporated different technolo- B. The UK Census Bureau
gies into BEHEMOTH?
C. The Chinese Census Bureau
A. Wi-Fi
D. The Australian Census Bureau
B. Laptops
C. Mobile Phones 45. Select the era of the first generation of
computers.
D. iPad’s
A. 1959-65
40. In what year was the first mechanical com-
puter invented? B. 1965-71
A. 1822 C. 1940-56
B. 1937 D. None of these
B. shoes A. ENEDIK
C. calculators B. ENIAC
D. curcuits C. ENIEC
D. Microprosseors
48. Does IBM Simon had a touchscreen
A. No 54. What was the first design of a ma-
chine that had memory and could be pro-
B. Yes grammed?
C. Maybe A. Hollerith’s Tabulating Machine
D. Never B. Difference Engine
49. language was used in third generation C. Harvard Mark I
of computers. D. Analytical Engine
A. COBOL
55. WHAT WAS THE TIME PERIOD OF GENER-
B. JAVA ATION 1 COMPUTER ?
C. RDBMS A. 1945-1955
D. none of above B. 1820-1845
50. This man is known for starting the com- C. 1920-1945
pany Microsoft back in the year 1975. D. 1818-1830
Since then, he has become one of the rich-
est people in the world. What is the name 56. Computers used Transistors starting in
of this person? 1956, replacing vacuum tubes
A. Konrad Zuse A. First Generation
B. Steve Jobs B. Second Generation
C. Bill Gates C. Third Generation
D. Elon Musk D. Fourth Generation
51. The vacuum tube was invented in what 57. What is the most common Operating Sys-
year? tem for PCs?
A. 1904 A. Windows
B. 1911 B. Linux
58. A website or web page run by an individ- A. Computing & Tabulating Inc.
ual that is written in conversational style B. Tabulations ‘R’ Us
is called
C. Computing-Recording Company
A. TV
B. Blog D. International Business Machines
NARAYAN CHANGDER
C. YouTube
65. Who is known as the Father of Comput-
D. Facebook ers?
59. Abacus was invented in? A. Herman Hollerith
A. China B. Charles Babbage
B. America
C. Gottfried Leibniz
C. Japan
D. John Fleming
D. India
60. GIGO means 66. are used in homes, schools, shops, of-
A. Go In Go Out fices, banks etc.
B. Garbage In Garbage Out A. MICRO COMPUTERS
C. Get In Get Out B. MINI COMPUTERS
D. none of above C. MAIN FRAME COMPUTERS
61. Which was the first storage device D. none of above
A. DVD
B. Floppy disk 67. First fully electronic digital computer built
in the U.S. It was created at the University
C. Magnetic tape
of Pennsylvania
D. CD
A. UNIVAC
62. Second generation computers used
B. Abacus
A. Vacuum tubes
B. Microprocessors C. Vacuum Tubes
NARAYAN CHANGDER
C. Analytical engine
C. Posh Computer
D. Jacquard Loom
D. Petite Computer
81. Who is the father of the Modern Com-
puter? 87. Also called counting frame, this device per-
forms basic arithmetic operations and was
A. Herman Hollerith
used by human in performing calculations.
B. Charles Babbage what do we call this device?
C. Blaise Pascal A. Pascaline
D. Gottfried von Leibniz B. Slide rule
82. A device that consists of beads divided C. Abacus
into two parts which were removed on the D. Stepped reckoner
rods of the two parts
A. Computer 88. Fourth Generation of computer.
91. IBM Z Series is an example of: 97. The first computer had
A. Mainframe computers A. An input device
92. The first computer language is: 98. Invented in 1622 by William Oughtred,
this calculation tool was based on Napier’s
A. Fortran
ideas about logarithms and was the most
B. C++ commonly used calculation tool before the
C. C invention of the modern calculator. What
is this tool?
D. COBOL
A. Abacus
93. Word processor, spreadsheet, and presen- B. Slide Rule
tation software are examples of:
C. Pascaline
A. Application software
D. Arithmometer
B. System software
C. Hardware 99. The stepped Reckoner was invented in
NARAYAN CHANGDER
103.
eration computers C. Transistor
107. Who was the IBM PC designed for? B. addition and Subtraction
A. IBM themselves C. Multiplication and division
B. Just for business use D. The four operations
113. Which was the first computer to handle 119. In this generation, computers were
both numeric and text data? smaller, more powerful, cheaper, more
energy-efficient and more reliable.
124. The Loom for weaving elaborate designs 130. In this computer generation, microproces-
used . sor became the most prevalent component
A. Punched Cards of computers. This generation also intro-
duces the use of GUI or Graphical User In-
B. Programs terface, the mouse, and other handheld de-
C. Floppy Disks vices. During what computer generation is
this?
D. Ticker Tape
A. Second Generation
NARAYAN CHANGDER
125. FULL FORM OF A.I.?
B. Fifth Generation
A. AUTOMATIC INTELLIGENCE C. Fourth Generation
B. ARTIFICIAL INTERNET D. First Generation
C. ARTIFICIAL INTELLIGENCE
131. When was the Abacus invented?
D. ADVANCE INTELLIGENCE
A. 1200
126. The first mechanical calculator was devel- B. 1100
oped by
C. 1250
A. Leibniz
D. 1150
B. BLAISE PASCAL
132. How long did it take ENIAC to calculate a
C. Charles Babbage ballistic trajectory?
D. none of above A. Less than 5 seconds
127. Which computer was a secret british com- B. Less than 10 seconds
puter? C. Less than 20 seconds
A. Colossus D. Less than 30 seconds
B. Hardvard Mark I
133. The first mechanical calculating machine
C. The Analythical Engine is called
D. none of above A. Tabulating Machine
128. were used in generation 2 comput- B. Leibniz’s Calculator
ers? C. Abacus
A. Microprocessor D. Pascaline
B. Transistors 134. Who is considered as First Programmer?
C. ENIAC A. Lady Ada Smith
D. None of the above B. Lady Augusta Babbage
129. WHO CREATED TIC-TAC-TOE C. Lady Augusta Ada Byron
A. TIM BERNERS-LEE D. Lady Eva Byron
B. RAY TOMILSON 135. Mar1 was invented by:
C. DONALD DAVIES A. John Von Neumann
D. NONE OF THESE B. Howard Aiken
C. John Mauchly 141. How well did the IBM PC sell when it was
D. none of above introduced?
B. Precise metal parts were hard to get 152. George Boole solved mathematical prob-
C. Babbage ran out of money lems and linked positive results to 1 and
negative results to 0.This was called the:
D. All of these
A. Calculating logic
147. In (1912-1954) this person invented
B. Data storage
Colossus, the worlds first electronic com-
puter . He used it to crack German codes C. Boolean Logic
during World War Two and saved thou- D. none of above
NARAYAN CHANGDER
sands of lives. Who was he?
A. Steve Jobs 153. What is a comprehensive network of com-
puters?
B. Alan Turing
C. Charles Babbage A. Internet
151. What are the names of the two people 156. The circuit used in 1st generation of com-
that started Apple? puters in 1940-56
157. Who invented DNS? 163. The first machine to use punch cards in
A. Paul Mockapetris performing its tasks. What do we call this
machine?
161. Mechanical Relays were replaced by 167. The first mechanical calculating device
what technology? was
A. Leibniz Wheel A. Pascal CALCULATOR
B. Vacuum Tubes B. Leibniz calculator
C. Plug Boards C. Charles Babbage
D. Electric Motors D. none of above
162. What gear inside the Stepped Reckoner 168. Computers using are able to take
was an important invention? think and take decisions.
A. The IBM Gear A. Processor Chip
B. The Leibniz Wheel B. Integrated Circuits
C. The Incremental Gear C. Artificila Intelligence
D. The Hollerith Drum D. Vacuum tubes
NARAYAN CHANGDER
170. What is the basic language of all comput-
ers? 176. Analytical Engine is an engine powered
by a huge engine.
A. Binary Code
B. Java Script A. petrol
C. HTML B. diesel
D. They are all different C. steam
171. A calculating machine invented by a D. electrical
French Mathematician to help his father a
tax collector. 177. What year did the first arcade game come
A. Calculating Clock out?
B. Pascaline A. 1942
C. Abacus B. 1952
D. Stepped Reckoner C. 1962
172. Which is the World’s fastest super com- D. 1972
puter?
A. Summit 178. Which is the best definition for a com-
puter?
B. UNIVAC
C. ENIAC A. The human brain
NARAYAN CHANGDER
193. An is a small picture that links to a
C. Stepped Reckoner
file or program
D. None of these
A. Image
B. Icon 199. First electronic computer used stored pro-
C. Wallpaper grams
D. Mouse A. EDSAC
B. EDVAC
194. The device that Charles Babbage and
Lady Augusta invented. C. UNIVAC I
A. Abacus D. Mark I
B. Jacquard’s Loom
200. This person is often called the inventor of
C. Leibnitz Calculator the modern computer. He actually created
D. Analytical Engine the first fully electronic computer.
A. WILLIAM GATES
195. The large program that controls how the
CPU communicates with other hardware B. STEVE JOBS
components. C. KONARD ZUSE
A. Router
D. BYRON LOVELACE
B. Modem
C. Video Card 201. Hollerith’s Tabulating machines were
203. The A* algorithm that was used for 208. Steve Jobs was the Mastermind behind
Shakey the Robot is till used today. Which A. Microsoft Computers
of the following examples of usage are
NARAYAN CHANGDER
215. Identify the first calculator. D. Professor John Vincent Atanasoff
A. Difference engine
221. is an example of a Super Computer
B. Pascaline
A. IBM PC
C. ENIAC
B. CRAY I
D. UNIVAC
C. ENiAC
216. The world’s first computer programmer. D. all Of The Above
A. Grace Hopper 222. The Difference Engine was
B. Charles Babbage A. mechanical
C. Bill Gates B. electronic
D. Lady Ada Lovelace C. electromechanical
217. How many years would it have taken to D. None of these
program the calculations using a desk cal-
culator? 223. Who developed the first punch card?
226. Slide rule was used be NASA for what? 232. Tabulating machine was invented by
A. Apollo Mission 1971 A. Charles Babbage
227. Name the device 233. Who invented the Tabulating machine?
A. ENIAC A. Dr. Herman Hollerith
B. UNIVAC B. John Von Neumann
C. ABC C. Howard Aiken
D. none of above D. none of above
228. Grace Hopper found a moth stuck in a re- 234. Who invented the Pascaline?
lay responsible for a malfunction, and re- A. Blaze Pascal
moved it, calling it B. Blaise Pascal
A. Operating C. Blair Pascal
B. Cleaning D. Belle Pascal
C. Hacking
235. What company did Paul Allen and Bill
D. Debugging Gates start
229. The Difference Engine was invented by A. Microsoft
A. Blaise Pascal B. Windows
B. Leibniz C. Apple
C. Sir John Napier D. Minecraft
D. Charles Babbage 236. The was developed in 3000 BC, and
was basically beads on rods to count and
230. What was the first machine to use all vac- was used to calculate, has upper and lower
uum tubes? deck.
A. Harvard Mark I A. UNIVAC
B. Colossus Mark I B. Abacus
C. ENIAC C. Vacuum Tubes
D. Analytical Engine D. Slide Rule
231. What did the Harvard Mark I use for its 237. What invention made microprocessors
programming? possible?
A. Vacuum Tubes A. Vacuum Tubes
B. Switchboards or Plug Boards B. Integrated Circuits
C. Punch Cards C. Magnetic Tape
D. Punch Tape D. RAM
238. The 4 steps of computing are: 243. considered by many to be the earliest
A. science, technology, engineering, recorded calculating device.
math A. Internet
B. input, process, output, store B. hardware
C. state hypothesis, collect data, test, C. computer
and conclude D. software
D. prophase, metaphase, anaphase,
NARAYAN CHANGDER
244. The was developed in 3000 BC, and
telophase
was basically beads on rods to count and
239. This person lived between (1791-1871) was used to calculate.
and designed the first automatic computer. A. UNIVAC
He designed a steam powered calculat-
B. Abacus
ing device called the Difference Engine but
couldn’t build his design because he didn’t C. Jacquard Loom
have enough money! Who Was he? D. Slide Rule
A. Alan Turing
245. The first camera phone was created in
B. Charles Babbage
A. 2000
C. Steve Jobs B. 1999
D. Bill Gates C. 2004
240. Used Integrated Circuits D. 2005
A. First generation computers 246. Which of the following word pairs best
B. Second generation computers symbolizes the ones and zeroes in binary
code?
C. Third generation computers
A. Sight and sound
D. Fourth generation computers
B. Yes and no
241. The word COMPUTER was derived C. Red and Blue
from the Latin word “computare” which
means? D. Want and need
C. To answer A. UNIVAC
B. ARPANET
D. To execute
C. DEFNET
242. Who designed the CRAY-1 Supercom-
D. USDOD
puter?
A. Anthony Cray 248. Which of the following is TRUE of the Z3
developed by Konrad Zuse from 1935 to
B. Simon Cray
1941?
C. George Cray A. It was the first computer with a screen
D. Seymour Cray monitor and a keyboard
259. Who invented the Pascal’s Calculator or 265. Moore’s Law is named after who?
Pascaline
A. Gordon Moore, co-founder of Intel
A. Thomas de Colmar
B. Gordon Moore, inventor of transistors
B. John Napier
C. Gordon Moore, creator of IBM
C. Charles Babbage
D. Gordon Moore, first computer pro-
D. Blaise Pascal
grammer
260. What year was the first computer game
NARAYAN CHANGDER
introduced? 266. Memory of the Analytical Engine
A. 1822 A. Mill
B. 1937 B. Bank
C. 1962 C. Mile
D. 1975 D. Store
261. What people used to count and calculate
in early days. 267. What does each row on an Abacus repre-
sent?
A. Computer
A. Each row represents a unit ten greater
B. Calculator
than the previous.
C. Pebbles, fingers and sticks
B. Each row represents a unit of ten
D. Microprocessor
C. Each row represents a unit ten greater
262. Dense integrated circuits should be than the next.
placed:
D. none of above
A. As small and far as possible.
B. As large and close as possible. 268. Which type of computers do Indian Rail-
ways use to interact with the customers
C. As small and close as possible.
for the booking and cancellation of ticket?
D. none of above
A. Main frame computers
263. In which generation of computers the con-
B. Micro computers
cept of internet was introduced.
A. Third Generation computers C. Super computers
270. UNIVAC stands for 276. Which of these is a third generation com-
A. Universal Automatic Cash puter?
281. Simple Devices that aid humans in calcu- 286. Who is recognized as the first computer
lation programmer?
A. SIDE RULE A. Charles Babbage
B. NAPIER’S BONES B. Howard Aiken
C. both of these C. Blaise Pascal
NARAYAN CHANGDER
282. What do the letters BEHEMOTH stand
for? A. Abacus
NARAYAN CHANGDER
their order are are
C. Cards
A. output, process and input
D. Tape
B. process, output, and input
C. input, process and output 310. Raman works in the national weather
D. input, output and process forecasting agency. Which type of com-
puter does he use to forecast weather con-
305. What devices do microprocessors con- ditions?
tain? A. Micro computer
A. Calculators
B. Super computer
B. Transistors
C. Main frame computer
C. Gears
D. computer
D. Tubes
311. First calculating device
306. Which university had the first computer
graphics program in the country? A. Abacus
A. University of Utah B. Napier’s bones
B. University of Calafornia C. Pascaline
C. Harvard University D. Difference engine
D. MIT-Massachusetts Institute of Tech-
nology 312. Abacus did
308. What was the job title for persons who A. Difference Engine
carried out calculation and computations.
The first recorded used was in 1613. B. Jacquard Loom
A. Computer C. Z3
B. Calculator D. none of above
314. What famous company in Seattle created 320. When was the Internet made available to
the operating system for the IBM PC? the general public?
315. Which among the following generation 321. Where was the mouse invented?
had expensive operation cost? A. Stanford Research Institute
A. 3rd generation B. MIT-Massachusetts Institute of Tech-
B. 2nd generation nology
C. To teach his children how to add and 331. What invention replaced vacuum tubes in
subtract. computers?
D. none of above A. Silicon
B. Mechanical Relays
326. What is the name of the man who in-
vented the Census Machine? C. Switches
A. Herman Hollerith D. Transistors
NARAYAN CHANGDER
B. Hollerith Herman 332. What was the first digital Computer
C. Dimitrios Kontos called?
337. circuitry was used in the 2nd genera- B. Electric Digital Storage Automatic Cal-
tion of computers. culator
338. What is the modern definition of the 343. What’s the name of the inventor of the
word computer? Difference Engine?
A. A machine that makes calculations A. Albert Einstein
B. An electronic device that stores and
B. Stephen Hawking
processes data
C. Charles Babbage
C. A person that makes calculations
D. A device with sliding beads used for D. Konrad Zuse
making calculations
344. is the capacity of a computer to store
339. Ever since the first tabulating machine, data.
computers have functioned by turning A. Storage
what ON and OFF?
B. Speed
A. Mechanics
C. Accuracy
B. Electric Motors
C. Electricity D. all
D. Computers E. none
340. What was The Antikythera used to pre- 345. It is a software application capable of
dict? organizing, storing and analyzing data in
A. The tides tabular form.
341. The word Computer was used for the D. Presentation Software
first time to describe
346. Software used to create a sequence of
A. the iPad text and graphics, and often audio and
B. A calculator video, to accompany a speech or public pre-
sentation.
C. A person
D. none of above A. Word Processor
B. Spreadsheet Software
342. Full form of EDVAC is
C. Simulation Software
A. Electronic Delay Storage Automatic
Calculator D. Presentation Software
NARAYAN CHANGDER
ers?
354. what does the acronym AI stands for?
A. Slow
A. artificial Intelligence
B. Has many parts
B. attending Intelligence
C. Big
C. art interlligence
D. Portable
D. none of above
349. What was the name of the first computer
game? 355. Which one of the following is an example
A. Donkey Kong of Supercomputer
B. Spacewar A. IBM PC
352. What does an Abacus do? 358. Smaller computer parts allowed us to
have what?
A. It calculates numbers
A. home computers
B. It calculates Chinese letters and num-
bers B. computers in rockets
C. You can learn to spell with it C. both
D. Its a toy that you play with D. none of above
359. the Second Generation of computers 365. An electronic device for storing and pro-
used? cessing data and it comes from the root
word “compute” meaning to calculate.
D. Windows Steve Jobs and Steve Woz- 375. The first transistor was created in
niak built their first computer using a A. 1940
wooden box. Their company has grown
and is still around today. The name of the B. 1943
company is: C. 1947
A. First generation computers 376. If you were one of the first people to op-
NARAYAN CHANGDER
erate ENIAC, what information would you
B. Second generation computers
likely have computed?
C. Third generation computers
A. Planetary movements
D. Fourth generation computers
B. Bombing targets
371. A computer is an machine that gathers, C. Stock prices
processes, and stores D. Census data
A. household.
377. Who in vented Napier bones
B. information.
A. Charles Napier
C. objects.
B. John Napier
D. keyboards.
C. Oliva Napier
372. In which year 3rd generation of modern D. Christano Napier
computer started
378. Why were mechanical devices devel-
A. 1999-2004 oped?
B. 1657-1945 A. To assist tedious
C. 1963-1970 B. For repetitive calculations
D. 1964-1971 C. For generating calenders
373. What is the technology that was used in D. All of these
first generation computers?
379. What part of the computer processes in-
A. Transistors formation?
B. Integrated circuits A. memory
C. Artificial Intelligence B. input
D. Vacuum tubes C. central processing unit (CPU)
D. software
374. The Stepped Reckoner was the first de-
vice that could 380. What is the language of the internet?
A. Read punch cards A. HTML
B. Print calculations B. English
C. Add, Subtract, Multiply, & Divide C. Spanish
D. Add decimals D. Tech
392. How long did it take to complete the 398. Father of the computer.
1880 Census? A. William Oughtred
A. 23 years B. John Napier
B. 14 weeks C. Charles Babbage
C. 7 years D. Tommy Flowers
D. 3 years 399. Moore’s Law states that the number of
transistors on an integrated circuit will
NARAYAN CHANGDER
393. When was the term “microprocessor”
first used? what every 2 years?
A. decrease
A. 1950
B. double
B. 1955
C. stay the same
C. 1968
D. triple
D. 1973
400. One of the benefits to vacuum tubes were
394. A device that can count fast and is similar that they
to an abacus.
A. Were faster than mechanical relays
A. Pascaline
B. Had no moving parts
B. Jacquard’s Loom C. Lasted longer than mechanical relays
C. Tabulating Machine D. All the above
D. Automatic Loom
401. computers used Integrated Circuits
395. Who built the Mark I Computer? (chips)
A. Charles Babbage A. First Generation
NARAYAN CHANGDER
C. Z1 B. Micro computers
D. Atanasoff-Berry Computer (ABC) C. Mini Computer
416. is believed to be the first calculating D. Super Computer
device.
422. BIOS stands for
A. Napier’s Bones
A. Basic Input/Output System
B. Abacus
B. Basic Input/ Output Software
C. Pascaline
C. Basic Indoor/ Outdoor Standards
D. Leibniz Calculator
D. none of above
417. Which was the vacuum tube primarily
made for? 423. Herman Hollerith invented an Electronic
counting device which used
A. Personal use
A. Vacuum tubes
B. Business use
B. Punch-cards
C. family use
C. rods
D. none of above
D. none of above
418. computers are most powerful and are
used for weather forecasting and space re- 424. In 1958, the first integrated circuit was
search. created
A. Mainframe computers A. From material whose properties can
be altered to control the flow of electric-
B. Super computers
ity
C. Mini computers
B. from pieces of computer hardware
D. none of above used to transfer elements between vari-
ous components
419. Who invented the Analytical engine
A. Charles Babbage C. by gluing a magnetic strip onto a stor-
age device
B. Tomas de Colmar
D. by combining components and the cir-
C. Blaise Pascal cuitry connecting them on a single piece
D. John Napier of silicon
420. Abacus was invented by Mesopotamians 425. Integrated circuits were used in which
in generation?
A. 5000 BCE A. Generation I
B. Generation II C. 1940s
C. Generation III D. 1860s
437. What was the first calculator? 443. Who introduced the first microprocessor
A. ENIAC in 1971 for Intel?
NARAYAN CHANGDER
A. 1 means electricity is ON
444. Univac was developed in the year
B. 0 means electricity is OFF
A. 1951
C. electricity turning ON and OFF is rep-
resented by 1s and 0s B. 1941
460. Web browser first used in 2003 466. What was the first graphical web
browser?
A. Netscape
A. Apple
B. Internet Explorer
B. Mosaic
C. Safari
C. Google
D. Google Chrome
D. Yahoo
461. First super computer made in India
NARAYAN CHANGDER
467. Which of the following is not an example
A. CRAY CS300 of 2nd generation computer
B. PARAM 8000 A. IBM 1620
C. IBM 1401 B. CDC 1604
D. RCA 501 C. Vacuum tube
D. UNIVAC 1108 .
462. WHAT WAS USED IN JACQUARD LOOM
A. PUNCHED CARDS 468. was the first commercially available
computer.
B. VACUUM TUBES
A. ENIAC
C. MICROPROCESSORS
B. UNIVAC
D. NONE OF THESE
C. EDAVC
463. In what year was the Pascaline in- D. none of above
vented?
469. The Analytical engine was designed in
A. 1876
A. 1801
B. 1633
B. 1833
C. 1642
C. 1890
D. 1842
D. 500 BC
464. What’s the name of the inventor of the
Analytical Machine? 470. He perfected the light bulb which has a
direct effect on the computer.
A. Albert Einstein
A. Tesla
B. Stephen Hawking
B. Benjamin Franklin
C. Charles Babbage C. Alesandro Volta
D. Konrad Zuse D. Thomas Edison
465. First Android Tablet 471. Examples for search engines are
A. Apple iPad A. Opera
B. Fujitsu Stylistic 2300 B. Google Chrome
C. Samsung Galaxy Tab C. Mozilla Firefox
D. none of above D. Google or Bing
472. What year was the computer mouse in- 477. The first computer to use stored pro-
vented? grams. Invented by John von Neumann.
D. 1812 D. COBOL
478. is a machine invented by Gottfried
473. It is the software that can play, create or
von Leibniz that could calculate square
record images, audio or video files.
roots.
A. Educational Software A. Tabulating Machine
B. Multimedia Software B. ENIAC
C. Graphics Software C. Leibniz’s Calculator
D. Web Browsers D. Pascaline
474. What was the role of women in program- 479. Name one early computing device.
ming ENIAC? A. Calculator
A. They physically hand-wired the ma- B. Abacus
chine
C. Slide Rule
B. They designed the hardware for the D. All of the above
machine and put it together
C. They wrote the software to be used on 480. Who gave the concept of stored pro-
the machine grams?
A. Howard Aiken
D. They designed the switches and cables
used on the machine B. John Von Neumann
C. George Boole
475. The computers in this generation used ma-
chine code as the programming language D. Augusta Ada
NARAYAN CHANGDER
phone 490. This person created a machine called ‘The
A. Microsoft Analytical Engine.’ His ideas were some
of the first that led to the creation of com-
B. Apple
puters. Guess the name of this person.
C. IBM
A. Simon Konrad
D. Samsung
B. Charles Babbage
485. The fourth generation computers used C. John Lovelace
as its basic circuitry.
D. William Howard
A. Vaccum tubes
B. Transistors 491. VLSI were used in generation of com-
puters
C. Microprocessors
A. Generation I
D. Artificial Intelligence
B. Generation II
486. Analytical engine was invented by
C. Generation III
A. Charles Babbage
D. Generation IV
B. Augusta ada lovelace
C. Reynold 492. This is an electromechanical machine
that was designed to assists information
D. none of above stored on a punch cards. This machine
also helps process the U.S. Census of 1890.
487. h Generation computers had , and are
what do we call this machine?
getting smaller and smaller
A. Transistors A. Atanasoff-Berry Computer
488. The most common material found in tran- 493. who made the first mechanical calculator
sistors is what? in 1642?
A. Silicon A. Gottfried Leibniz
B. Mercury B. John Napier
C. Copper C. Blaise Pascal
D. Plastic D. none of above
494. The First Generation of Computers used 500. main component of first generation
what? A. IC
497. The first general purpose electric digital 503. First electronic, general purpose com-
commercial computer that was used by a puter. It was used for military research
television station in predicting the result of and took up a whole room.
the 1952 US Presidential Elections. what A. UNIVAC
do we call this computer?
B. CSIRAC
A. ENIAC
C. ENIAC
B. EDVAC
D. ASCI Red
C. UNIVAC
504. Which computer is the most powerful?
D. ABC
A. Supercomputers
498. Who discovered The Antikythera? B. Minicomputers
A. Captain Dimitrios Kontos C. Worstation
B. People diving for pearls D. Mainframe
C. Captain John Sparrow E. Personal Computer
D. A crew of sponge divers
505. WHO CREATED SPACEWAR AND IN
499. were used in generation-II computers WHICH YEAR IT WAS CREATED
A. Vacuum tubes A. STEVE RUSELL1962
B. Transistors B. LINUS TORVALDS1959
C. Integrated circuits C. WILLIAM HIGINBOTHAM1958
D. Artificial intelligence D. DONALD DAVIES1952
506. What calculating device was created by 511. What do we call a programmable device
Gottfried Leibniz? that accepts data for processing, perform
prescribed operations and display the re-
A. Stepped Reckoner
sult of this operation?
B. Havard Mark I
A. Computer
C. Tabulating Machine
B. Abacus
D. Analytical Engine C. Washing machine
NARAYAN CHANGDER
507. What company did Steve Jobs & Steve D. Thermometer
Wozniack start?
512. Who invented the ‘Difference Engine’?
A. Apple
A. Mr MacGregor
B. Orange
B. Charles Babbage
C. Microsoft C. Steve Jobs
D. Dell D. Charles Totten
508. Who built the Difference engine? 513. What are abacus?
A. Herman Hollerith A. a simple device for calculating, con-
B. Blaise Pascal sisting of a frame with rows of wires or
grooves along which balls slide
C. Charles Babbage
B. slips of ivory or other material divided
D. Howard Aiken into sections marked with digits, devised
by John Napier and formerly used to facil-
509. Many devices were created throughout itate multiplication and division.
the ages and helped to build up to what
we now know as a computer. Which is C. a ruler with a sliding middle strip,
the oldest representative? marked with numerical scales and used
for making quick calculations, especially
A. The Pascaline multiplication and division.
B. The Mouse D. none of above
C. The Abacus
514. Alan Turing was responsible for creating
D. The Ipod the first?
A. Steam Powered Computer
510. Developed by Charles Babbage from
1822 to 1834, an automatic and mechan- B. Electronic Computer
ical calculator that tabulates polynomial C. Desktop Computer
functions that was named after the math-
ematical principle-the method of finite dif- D. Computer Tablet
ferences. What do we call this engine? 515. Napier Bones is a device invented by
A. Differential Engine A. John Napier
B. Difference Engine B. Charles Babbage
C. Analyzation Engine C. James Napier
D. Analytic Engine D. Alan Turing
516. The first mechanical device for calcula- 522. Who were the first computers?
tions developed in china. A. Animals
521. What is first commercial microproces- 527. The first computer game made in 1972
sor? was called
A. Intel 8008 A. Pong
B. Intel 4004 B. Space invaders
C. Intel 8085 C. Pac Man
D. Zilog Z80 D. Chess
528. is a perfect example of a mechanical 533. Why did Martin Newell choose the teapot
calculator. model?
A. Pascaline A. He was having tea with his wife when
the idea came to him
B. Taxi meter
B. He was having dinner when the idea
C. Abacus came to him
D. all C. He was having lunch with his wife
NARAYAN CHANGDER
E. none when the idea came to him
D. He asked his team for ideas and they
529. Who invented a machine to add long came up with it
columns of numbers quickly?
534. During this computer generation, comput-
A. Charles Babbish
ers were mostly built with vacuum tubes
B. Blaise Pascal and as a result, computers were enormous
and usually takes up an entire space of a
C. John Napier
room. what computer generation is this?
D. Bill Gates
A. Second Generation
530. This invention replaced vacuum tubes and B. Fifth Generation
made computers much smaller and faster. C. Third Generation
However, it was eventually replaced by
another invention. D. First Generation
C. J.P. Eckert and John Mauchly 544. Which of the following statements is true
D. Charles Babbage for Fourth Generation Computers?
539. It is considered as the first computing de- 545. Tabulating Machine was invented by Her-
vice. man Hollerith in
A. Laptop A. 1990
B. Desktop B. 1890
C. Abacus C. 1820
D. Altair
D. 1819
540. Who invented the Internet?
546. The circuit used in 1st generation of com-
A. Steve Jobs puters.
B. Vinton Cerf and Bob Kahn
A. Transistors
C. Al Gore
B. Integrated Circuit
D. William Shockley
C. Vacuum tubes
541. WHEN WAS TIC-TAC-TOE CREATED
D. Microprocessors
A. 1932
B. 1945 547. language was used in first generation
of computers
C. 1969
D. 1952 A. COBOL
B. Machine
542. Abacus is used to perform ?
A. Four operation C. RDBMS
B. Only Addition D. none of above
C. Only Subtraction 548. This invention was 1, 000 times faster
D. Both Addition and Subtraction than any machine built before it. It was
so big that it could fill up a house.
543. The Apple II was first produced in
A. 1977 A. APPLE I
B. 1975 B. ENIAC
C. 1973 C. WINDOWS
D. 1976 D. Z3
549. Who invented the first computer program 554. Who invented the mouse?
was used to help the Analytical Engine cal- A. Steve Engelbart
culate number?
B. Douglas Meece
A. Steve Jobs
C. Steve Mouse
B. Ade Lovelace
D. Douglas Engelbart
C. Bill Gates
555. Personal Computers (PCs) became acces-
D. Dr. Douglas Engelbart
NARAYAN CHANGDER
sible in:
550. The second generation of computers was A. 1960s
based on
B. 1970s
A. Transistors
C. 1980s
B. Silicon chips D. 1990s
C. Vacuum chips
556. Which was the first CPU ever made?
D. Bio chips
A. Intel Celeron
551. This important invention began the de- B. Intel 4004
velopment of the second generation com-
puters, which no longer required vacuum C. Intel Pentium
tubes, and were much more efficient and D. Intel Xenon
less expensive.
557. The inventor of difference engine 1 the
A. CPU first mechanical computer made of hand-
B. Transistor made brass parts.
C. Silicon chip A. Joseph Marie Jacquard
D. Integrated circuit B. Charles Babbage
C. Blaise Pascal
552. Why didn’t vacuum tubes get used in
computers until the 1940s? D. Thomas Edison
A. The technology didn’t exist 558. Which is designed to run for a long time
B. No one had thought about it until then without turning off.
A. motherboardf
C. They had been too expensive up to that
point B. Server
D. They were too fragile C. Personal Computers
D. flash drive
553. What was the average size of an ENIAC
computer 559. Identify the odd one out.
A. As small as an ant A. Battery
B. As big as an elephant B. Accuracy
C. As small as a monquito C. Diligence
D. As big as a room D. Versatility
560. Who sent the first email? C. Transistors made computers heavier
A. Herman Hollerith and more substantial
565. The first generation of computers used 570. What was the definition for the word
vacuum tubes. Why were they replaced computer in the 1600s?
by the transistor? A. A machine that makes calculations
A. Transistor technology was fully mature B. An electronic device that makes calcu-
B. Vacuum tubes are too small to work lations
with and were expensive C. A person that makes calculations
D. A device with sliding beads used for B. It was used to store recipes
making calculations C. It was used to program times used for
571. This allowed a CPU to be built on a single cooking products
chip, thus allowing computer engineers to D. It was the first Dish Washer
design the first fourth generation comput-
ers 576. What computer was built over 5000
years ago?
A. silicon chip
A. Apple Watch
NARAYAN CHANGDER
B. integrated circuit
B. Stonehenge
C. microprocessor
C. IBM
D. SRAM
D. ENIAC
572. June 1943 two men built a first gener-
ation computer at the University of Penn- 577. He was the founder of of the Interna-
sylvania which was built to project the tra- tional Business Machines (IBM).
jectory of military missiles during WWII. A. Charles Babbage
Although it was not build until after the
B. Blaise Pascal
war, it was able to calculate a problem
that would take a team of humans 3 days C. Howard Aiken
in 20 seconds. D. Hernan Hollerith
A. Hollerith’s tabulating machine
578. I was known as the father of computing.
B. Mark I I am
C. ABC Computer A. Blaise Pascal
D. ENIAC B. Herman Hollerith
573. Which of the following is known as the C. Marie Jaquard
world’s first general-purpose computer? D. Charles Babbage.
A. Difference Engine
579. When was the Napier’s Bone invented
B. Analytical Engine
A. 1820
C. Pascaline
B. 1975
D. Abacus
C. 1618
574. Who designed what is commonly known D. 1617
as the first version of the internet?
A. Harvard 580. This invention replaced the transistor and
led to the development of third generation
B. Intel computers. Processing speed increased to
C. IBM millions of calculations per second.
D. US Department of Defense A. Vacuum tube
581. First device that stored programs and 587. is the world’s fastest supercomputer
used metal cards A. Tianhe-2
C. CPU B. Mill
D. Transistor C. Store
NARAYAN CHANGDER
D. Mile
594. The second generation computers used
in place of vacuum tubes. 597. Which was the first smartphone
A. Transistors A. Apple 6
B. microprocessors B. Realmi 2 pro
C. punched cards C. IBM Simon
D. all D. Samsung A1
E. none 598. Example of supercomputer
595. Some types of technology we see around A. Cray cs 300
us are: B. RCA501
A. Microwaves C. IBM1401
B. Mobile phones D. none of above
D. Magnetic Drums 11. What computer piece caused the first gen-
eration of computers to overheat?
6. Select the portable types of computers
NARAYAN CHANGDER
18. Pascaline was invented by C. 1970
28. What is the focus of the fifth generation 34. Software which are designed to meet the
of computers? specific needs of users are called soft-
ware.
40. Computer memory is broken down into 45. A system with 10 numeric values, 0
what two types? through 9.
A. Primary and Secondary Memory A. Decimal number system
B. RAM and ROM B. Binary number system
C. Hard Drive and Flash Drive C. Counting number system
D. Operating Systems and Application D. none of above
Software
NARAYAN CHANGDER
46. The era of first generation computers
41. In 1976 created the first personal com-
was
puter, called the Apple 1, with a built-in
keyboard, display screen, and storage unit A. 1920-1936
A. Peter Andrews B. 1940-1956
B. Mark Zuckerberg C. 1950-1958
C. Bill Gates D. none of above
D. Steve Wozniak
47. Which intention led to the age of the per-
42. What is computers sonal computer?
A. A computer is an electronic device for A. The microprocessor
storing and processing data, typically in bi- B. The vacuum tube
nary form, according to instructions given
to it in a variable program. C. The keyboard and monitor
B. code used in digital computers, based D. None of these are right
on a binary number system in which there
48. A is a device or computer connected to
are only two possible states, off and on,
a multi-user computer such as a minicom-
usually symbolized by 0 and 1.
puter or mainframe computer while a A
C. Both A & B single-user computer more powerful than
D. None of These a microcomputer; commonly used by engi-
neers, scientists, and graphic artists.
43. The size and shape of a computer or de-
vice. A. Terminal
A. Computer standard B. workstation
B. Ergonomics C. Server
C. form factor D. Router
D. none of above 49. Primary memory is divided into what two
44. A system with two numeric values of 0 types of memory?
and 1, which are also referred to as off or A. Semiconductors and Flash Drives
on.
B. Integrated Circuit and Random Access
A. Counting System Memory
B. Binary number system C. Random Access Memory and Read-
C. Electronic system Only Memory
D. none of above D. none of above
4. Robot is derived from Czech word 9. Which of the following includes in Immer-
A. Rabota sive experience?
NARAYAN CHANGDER
droid? 10. Which industry can use blockchain technol-
A. A software program used to control a ogy for cybersecurity?
robot A. Critical infrastructure
B. A robot with a human like appearance B. Healthcare
C. A type of operating system C. Logistics
D. A human with a robot like appearance D. All of the above
6. A new user has joined an organisation and 11. Which decade saw the debut of augmented
needs access to IT resources. To give them reality technology?
access, what would an infrastructure tech- A. 1960s
nician need to do?
B. 1970s
A. Give the new user a test account
C. 1980s
B. Give the new user an account with
their name D. 1990s
C. Give the new user the infrastructure 12. “In AI, we study the whole universe by di-
technicians login name and password viding it into two components. “What are
D. Give the new user access to a guest these two components?
account. A. Sky and Land
8. Leonardo da Vinci sketched plans fora hu- B. Combines the Resources of Several
manoid robot in the late Which Year Computers
did Leonardo da Vinci sketch plans for the C. Looks like a Single Computer
robot? D. All of the answers are correct
A. 1200s
14. In this type of cloud, an organization rents
B. 1400s cloud services from cloud providers on-
C. 1100s demand basis.
D. 1300s A. Private
B. Public A. Auto
C. Protected B. Fashion
NARAYAN CHANGDER
Professionalism
NARAYAN CHANGDER
C. Advance Citizen
cess
D. Intelligent Citizen
B. The distribution of internet access is
20. Based on the data presented, how many fair and equal to everyone
active social media users in Indonesia in C. The ISP can not control the speed of
the beginning of 2018? download and uploading things
A. 130 million D. The ISP can charge the users and can
B. 120 million block the content
C. 103 million 25. Which of the following is not threats in so-
D. 132 million cial media?
A. Leakage of personal information
21. A type of malicious software designed to
block access to a computer system until a B. Malicious Apps
sum of money is paid C. Social Scams and Phishing Attacks
A. Malware D. effective way of marketing campaign
B. Ransomware
26. A set of beliefs about right or wrong, is
C. Spyware the meaning of
D. Virus A. Morals
22. The full name of Education Rate Program B. Ethics
is . C. Law
A. The Schools and College Program of D. Legal
the Universal Service Fund
B. The Schools and Libraries Program of 27. Here are some pros of having workplace
the United Source Fund monitoring, except
C. Netflix C. Authentication
D. Neotype D. Cryptopgraphy
39. Who will be the chairperson of NICT pol- 44. Ways that computers and information
icy? shared via computer can be made more se-
A. Hon, Minister, Minister of Information cure.
and Communication Technology A. Encryption
B. Member of National planning Commis- B. Authentication
NARAYAN CHANGDER
sion C. Passwords
C. Secretary, minister of education D. All of the above
D. Secretary, Minister of Health
45. A file or code, typically delivered over
40. A cyberattack carried out by creating a a network, that infects, explores, steals
fake website, or compromising/corrupting or conducts virtually any behavior an at-
a real one, in order to gather information tacker wants .
or data on visitors. A. Hacking
A. Phishing B. Malware
B. Encryption C. Ransomware
C. Watering hole attack D. Spyware
D. Cryptography
46. Terms used to describe the gulf between
41. How many members are there under NICT those who do and those who don’t have
Policy? access to modern information and commu-
nications technology, called as
A. 11 Members
A. Internet of Things
B. 9 members
B. E-Rate Program
C. 12 Members
C. The Digital Divide
D. 10 Members
D. Net Neutrality
42. The person who gain an unauthorized ac-
cess to others information system to steal 47. The interactive computer mediated tech-
other sensitive data for personal benefit is nologies that facilitate the creation sharing
of information, ideas, career interest and
other forms of expression through virtual
A. Hacker
communication and network is
B. Cracker
A. Digital Society
C. Programmer B. Social Media
D. All of the above C. Electronic Media
43. A process that proves the identity of the D. None of the above
user.
48. The transaction of electronic records, data
A. Encryption by using any types of electronic means is
B. Phishing termed as