100% found this document useful (1 vote)
165 views

Computer Fundamentals

This document appears to be the table of contents for a book on computer fundamentals. It includes chapters on topics like introduction to computers, computer architecture, data representation, computer hardware, computer software, computer networks and communications. Each chapter is further divided into sections that delve deeper into the various subtopics within that chapter. The document provides an overview of the book's structure and the types of information that will be discussed in each chapter and section.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
165 views

Computer Fundamentals

This document appears to be the table of contents for a book on computer fundamentals. It includes chapters on topics like introduction to computers, computer architecture, data representation, computer hardware, computer software, computer networks and communications. Each chapter is further divided into sections that delve deeper into the various subtopics within that chapter. The document provides an overview of the book's structure and the types of information that will be discussed in each chapter and section.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1327

MOST POPULAR AROUND THE WORLD

SUCCESS

PRACTICE BOOK» NOT FOR SALE


SERIES

COMPUTER FUNDAMENTALS
BOOST YOUR KNOWLEDGE

DESIGNED FOR SURE SUCCESS


MCQ EDITION
NARAYAN CHANGDER

8 + S
2 1 ON
3 T I RS
1 S E
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2

Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.

JAI SHREE RAM

NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:

PRACTICE BOOK» NOT FOR SALE


my guiding light, my shining star,
forever

It is my deepest gratitude and warmest


affection that I dedicate this Ebook.

To my mother JOYTSNA CHANGDER


who could not see this Ebook.

who has been a constant source of Knowledge and in-


spiration. Mom, Covid did not take you, it took our
many dreams. wherever you are we will meet again.
Disclaimer

The aim of this publication is to sup-


ply information taken from sources be-
lieved to be valid, reliable and authen-
ticate. The author bear no responsibil-
ity for any damage arising from inad-
verent omissions, negligence or inac-
curacies (typographical or factual) that

NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.

nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:

PRACTICE BOOK» NOT FOR SALE


1. If you require practice sets on various sub-
jects, kindly send us a message on Facebook
with the subject name. Our team will be happy
to create them for you. Message us on Face-
book at https://www.facebook.com/
narayanchangder
2. Additionally, you can access all of my books
with answers on Google Play Books at »>
https://play.google.com/store/books/
author?id=Narayan+Changder
3. Answers are given at the end of every page
to help you identify your strengths and weak-
nesses.
4. It shows you how to build your own techni-
cal and pedagogical skills to enable them to
create their own materials and activities for
students.
5. It helps you to see how you can make the
transition from classroom teaching to blended
and online teaching.
6. It’s the cheapest good quality ebook that you
can buy online on google play books.

NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents

1 Introduction to Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Computer Systems and Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Computer Generations and Classification . . . . . . . . . . . . . . . . . . . . . . . . 35
1.3 Computer Performance and Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.4 Computer Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
1.5 Definition and Classification of Computers . . . . . . . . . . . . . . . . . . . . . . . 74
1.6 Characteristics of Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
1.7 Components of a Computer System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
1.8 Computer Architecture and Organization . . . . . . . . . . . . . . . . . . . . . . . . 94

2 Computer Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103


2.1 CPU Architecture and Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
2.2 Memory Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
2.3 Input/Output Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
2.4 Secondary Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

3 Data Representation and Number Systems . . . . . . . . . . . . . 187


3.1 Binary, Octal, Decimal, and Hexadecimal Number Systems . . . . . . 187
3.2 Two’s Complement and Floating Point Representation . . . . . . . . . . . 191
3.3 ASCII and Unicode Character Encoding . . . . . . . . . . . . . . . . . . . . . . . . 193

4 Computer Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196


4.1 Input Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
4.2 Output Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
4.3 Processing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
4.4 Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
4.5 Computer Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
4.6 Motherboards and Expansion Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

5 Computer Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301


5.1 Types of Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
5.2 Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

NARAYAN CHANGDER
5.3 Utility Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
5.4 System Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
5.5 Application Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
5.6 Programming Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

6 Computer Networks and Communications . . . . . . . . . . . . . . . 510


6.1 Network Topologies and Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
6.2 LAN, WAN, and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
6.3 Network Security and Cybersecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
6.4 Wireless Communication Technologies . . . . . . . . . . . . . . . . . . . . . . . . . 639
6.5 Types of Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
6.6 Network Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
6.7 Network Protocols and Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
6.8 Network Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
6.9 Internet and Web Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721

7 Input/Output and Storage Devices . . . . . . . . . . . . . . . . . . . . . . 753


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory . . . . . . . . . . . 753

8 Computer Peripherals and Interfaces . . . . . . . . . . . . . . . . . . . . 785


8.1 Peripheral Devices: Scanner, Camera, and Microphone . . . . . . . . . . 785
8.2 Interface Standards: USB, HDMI, and Thunderbolt . . . . . . . . . . . . . 791
8.3 Expansion Slots and Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795

9 Computer Applications and Uses . . . . . . . . . . . . . . . . . . . . . . . . 796


9.1 Scientific and Engineering Applications . . . . . . . . . . . . . . . . . . . . . . . . . 796

10 Computer Ethics and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 803


10.1 Types of Threats and Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
10.2 Security Measures and Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
10.3 Cryptography and Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
10.4 Firewalls and Antivirus Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
1

10.5 Ethics in Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885


10.6 Intellectual Property Rights and Privacy . . . . . . . . . . . . . . . . . . . . . . . . 955

PRACTICE BOOK» NOT FOR SALE


10.7 Computer Viruses, Malware, and Hacking . . . . . . . . . . . . . . . . . . . . . . 974

11 Emerging Trends in Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 980


11.1 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980
11.2 Internet of Things (IoT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044
11.3 Artificial Intelligence and Machine Learning . . . . . . . . . . . . . . . . . . 1068
11.4 Quantum Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096
11.5 Virtual and Augmented Reality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099

12 Computer Peripherals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121


12.1 Printers and Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121
12.2 Digital Cameras and Camcorders . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1132
12.3 Audio and Video Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1135
12.4 Mobile Devices and Smartphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1140

13 Computer Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151


13.1 Office Automation Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151
13.2 Graphics and Multimedia Software . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157
13.3 Database Management Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168
13.4 Enterprise Resource Planning (ERP) Software . . . . . . . . . . . . . . . . 1210
13.5 E-commerce and E-business Applications . . . . . . . . . . . . . . . . . . . . . 1219

14 Computer History and Evolution . . . . . . . . . . . . . . . . . . . . . . . . 1251


14.1 Early Computing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1251
14.2 Development of Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1252
14.3 Evolution of Computer Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1306
14.4 Future Trends in Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1311

15 Computer Ethics and Professionalism . . . . . . . . . . . . . . . . . . 1314


15.1 Ethical and Social Issues in Computing . . . . . . . . . . . . . . . . . . . . . . . 1314
1. Introduction to Computers

NARAYAN CHANGDER
1.1 Computer Systems and Components
1. is nonvolitile and refers to memory A. recipe
chips storing permanent data and instruc- B. algorithm
tions.
C. program
A. RAM
D. specifications
B. read-only memory (ROM)
C. flash memory 5. Name the software that you use for view-
ing web pages
D. firmware
A. Presentation
2. It is an integrated circuit board that pro- B. Web browser
vides a computer with the ability to pro-
C. Desktop publisher
duce sounds.
D. Communications Software
A. Sound Card
B. Motherboard 6. How many bits in a byte?
C. Read-Only Memory (ROM) A. 8
D. Video Card B. 14
C. 72
3. Users to communicate with the computer
(windows) D. 16
A. Compiler 7. Which of these is not a computer system?
B. Operating System A. PlayStation 5
C. Utilities B. iPhone 12
D. Linkers C. Washing Machine

4. A set of rules to be followed by a com- D. Microwave oven


puter: E. They all are

1. B 2. A 3. B 4. B 5. B 6. A 7. E
1.1 Computer Systems and Components 3

8. The main circuit board in a computer is 13. Which of the following is known as the
called the ‘BRAIN’ of a computer?

PRACTICE BOOK» NOT FOR SALE


A. RAM A. GPU
B. dongle B. Memory
C. motherboard C. CPU

D. power supply unit D. HDD

14. Which of the following four steps is in the


9. Refers to a type of computer where the
machine cycle?
monitor, keyboard, pointing device, and
processor are all together in one single unit A. Arithmetic calculations, comparison,
storing, pipe lining
A. Laptops
B. Decoding, fetching, executing, control-
B. Personal Computer(PC) ling
C. Smartphones C. Storing, executing, registering, cycling
D. Smartwatches D. Executing, fetching, storing, decoding

10. The moment you turn on your computer it 15. What is Hardware
begins to access its memory. BIOS, the A. Neutral components
software that boosts up your computer, is
located in which type of memory? B. hypertext markup language protocol
C. Hydrochloric acids that make up the
A. ROM
computer system
B. Virtual memory
D. Physical Components
C. CACHE
16. Which part of computer hardware is used
D. RAM to type in information into the computer?
11. What type of CPUs are x64 operating A. Monitor
systems and software primarily designed B. Mouse
for?
C. Laptop
A. x43
D. Keyboard
B. x32
17. The memory comes with your computer
C. x86 that is pre-written to hold the instructions
D. x64 for booting-up the computer is ROM
A. True
12. It is type of software that is designed to
perform specific task that includes word B. False
processing and web browser. C. Neither
A. Peopleware D. none of above
B. Malware 18. Which is the best User Interface
C. Application Software A. CLI
D. System Software B. GUI

8. C 9. A 10. A 11. D 12. C 13. C 14. D 15. D 16. D 17. A 18. D


1.1 Computer Systems and Components 4

C. WIMP C. Peopleware
D. It is Subjective D. Malware

19. A worldwide system of computer 24. A device that allows you to type informa-
networks-a network of networks in which tion and instructions into the computer
users at any one computer can, if they
have permission, get information from A. computer
any other computer (and sometimes talk B. keyboard

NARAYAN CHANGDER
directly to users at other computers).
C. mouse
A. Internet
D. headphones
B. Twitter
C. Amazon 25. Cray an IBM z-enterprise are named ex-
amples of which major types of computer
D. Google systems?
20. In order to connect your computer to the In- A. desktop and mainframe
ternet with a modem, your computer will
B. mainframe and supercomputer
have to have a(n) port
A. HDMI C. supercomputer and mainframe

B. USB D. mainframe and desktop

C. Headphone 26. A storage device that uses lasers to read


D. Ethernet data on the optical media.
A. Optical Drive
21. What does GB stand for?
A. Gigabyte B. Flash Drive

B. Giantbyte C. Hard Disk Drive

C. Giagabyte D. Floppy Drive


D. Giggabyte 27. This component only executes instructions
to be displayed on the screen.
22. A(n) is the most important software
that runs on a computer. A. Graphics Card (GPU)
A. Operating System B. CPU
B. Windows C. HDD
C. Anti Virus D. Motherboard
D. iOS
28. It contains circuits that perform various
23. Refers to the people involved in the data functions.
processing operations such as the system A. Hard disk drive
administrator, office workers, students
and others. B. Motherboard
A. Hardware C. Processor
B. Software D. Sound card

19. A 20. D 21. A 22. A 23. C 24. B 25. C 26. A 27. A 28. B 29. D
1.1 Computer Systems and Components 5

29. A sequence of instructions that performs C. Device Drivers


a specific task when executed by a com- D. ROM
puter:

PRACTICE BOOK» NOT FOR SALE


A. game 34. RAM is what kind of memory?
B. research A. Permanant
C. essay B. Forever
D. program C. Slow
D. Temporary
30. Online access to data. Better web brows-
ing capability than a more simple mobile 35. Is an artificial environment created by the
phone. Just one device can accomplish software
many tasks at work or at home. Con-
A. Robotics
tacts’ details and phone numbers can be
integrated. B. Artificial Intelegence(AI)
A. Desktop or Personal computer (PC) C. Virtual Reality
B. Laptop or notebook D. 3D-Holographoc
C. Smartphones 36. Which of the following consists of elec-
D. Personal Digital Assistants (PDAs) tronic components that stores instructions
waiting to be executed by the processor,
31. Computer that is intended to be used on a data needed by those instructions and the
single location. results of process data?
A. Desktop A. Memory
B. Laptop B. Dynanamism
C. Tablet Computer C. Concepting
D. Netbook D. Motherboard
32. Manufacturers state clock speed (the 37. is the process of writing the result to
speed at which a processor executes in- memory.
structions) in , which equate to one mil-
lion and one billion ticks of the system A. Fetching
clock, respectively. B. Storing
A. kilobytes (KB) and megabytes (MB) C. Decoding
B. milliseconds (ms) and nanoseconds D. Executing
(ns)
38. Before USB was common the keyboard and
C. megahertz (MHz) and gigahertz (GHz) mouse were connected with their own ded-
D. kilobytes per second (kbps) and icated circular plugs called.
megabytes A. PS/2
33. What is not a System Software B. SCSI
A. Mac OS C. VGA
B. Linkers D. I/O

30. C 31. D 32. C 33. D 34. D 35. C 36. A 37. B 38. A


1.1 Computer Systems and Components 6

39. An internal computer expansion card that level, allowing the computer to function
facilitates the input and output of audio and the software to run.
signals. B. Electronic component, device in an
A. Video Cards electronic system used to affect electrons,
B. Memory usually industrial products.

C. Network Interface Card C. all of the components in a computer

D. Sound card D. the power button

NARAYAN CHANGDER
40. A printed circuit board found in all comput- 45. This device enables a computer to trans-
ers mit data (such as over cable or telephone
lines)
A. Video Card
A. Processor
B. Rom
B. Monitor
C. Motherboard
C. Modem
D. Ram
D. RAM
41. Notebooks and tablets are examples of
which major type of computer system? 46. Which type of network cable is commonly
used in backbone networks and telephone
A. desktop
companies?
B. embedded device
A. CAT
C. game consoles
B. Fiber Optic
D. mobile devices
C. Coaxial
42. Routers can be used on networks for de- D. RJ11
vices to
47. One megabyte is equal to kilobytes,
A. to be totally dependent without net-
works A. 10
B. to be independent of each other B. 100
C. to join the same network C. 1, 000
D. to function solely on first-come, first D. 1, 000, 000
serve
48. Which of the following are famous com-
43. Which of the following is a type of monitor puter component brands?
port? A. Ford, Porsche, Nissan
A. VGA port B. Kingston, Intel, Samsung
B. DisplayPort C. Pearson, AQA, WJEC
C. HDMI port D. Kings, GESS, DC
D. All of the above
49. It is commonly known as programs or ap-
44. operating system plications, consists of all instructions that
A. communicates with hardware and tell the hardware how to perform a task.
other installed software on the most basic A. Hardware

39. D 40. C 41. D 42. C 43. D 44. A 45. C 46. B 47. C 48. B 49. B
1.1 Computer Systems and Components 7

B. Software 55. Takes input and creates output can be


referred to as the brain of the computer.
C. Peopleware

PRACTICE BOOK» NOT FOR SALE


A. Motherboard
D. Malware
B. Operating System
50. It is the technical descriptions of the com-
C. Processor
puter’s components and capabilities.
A. System Components D. Modem

B. System Integration 56. the fan and heat sink are needed by the
C. System Specification CPU and other hot parts of the computer
so they don’t burn out, what do we call
D. System Settings this system

51. Which of the following statements are A. graphics card or video card
true about RAM? B. sound
A. It comes in smaller sizes compared to C. heat dispersal
Hard Disk Drive.
D. storage device
B. It gives CPU quick access to the data
that CPU needs for processing. E. optical drive

C. It keeps and stored all data. 57. How is the CPU’s speed measured?
D. It can keep data only temporarily. A. MIPS

52. A Personal Computer is considered as a B. MPIS

A. Supercomputer C. MSPI

B. Minicomputer D. none of above

C. Microcomputer 58. It is the first step to run the tests required


D. Server by the procedure and find out what hap-
pens.
53. ROM stands for A. Gathering components
A. Random Only Memory B. Gathering test information
B. Random Only Me C. Checking Specification
C. Read Only Memory D. Gathering Visual Testing
D. Read Only Me
59. how quickly a component works (the
54. What is the meaning of ROM? faster the better)
A. Random Omit Memory A. clock speed
B. Registered Only Memory B. cache memory
C. Read only Memory C. PSU
D. Read only module D. none of above

50. C 51. A 51. B 51. D 52. C 53. C 54. C 55. C 56. C 57. A 58. B 59. A
60. C 61. B
1.1 Computer Systems and Components 8

60. Which of the following is a purpose-built 66. It is a report that is normally accomplished
computer system? as soon as the tests are completed.
A. Laptop A. Components Report
B. Smartphone B. Checking System Report
C. Washing Machine C. Checking report
D. Desktop PC D. Technical report

NARAYAN CHANGDER
61. The 2 types of Software are: 67. Which of the following (there can be more
A. Operating System than one) are true regarding Operating
Systems?
B. System
A. OpS stands for Operating Systems
C. Business
B. The Operating System manages the
D. Application computer’s memory and processes, as
62. The physical part of the computer that you well as all of its software and hardware.
can actually touch, C. The Operating System allows you to
A. hardware communicate with the computer without
having to speak the computer’s language.
B. software
D. Without an Operating System, a com-
C. Input puter is useless.
D. Output
68. what is file management
63. Temporary storage device for data and A. is a computer program that provides
programs that are being accessed by the a user interface to manage files and fold-
CPU. ers.
A. Read-Only Memory B. provides files and help creates plan
B. Memory Card C. it provide user information
C. Random Access Memory D. all of the above
D. Hard Disk Drive
69. It is type of software that manages other
64. Restively new internet-enabled portable software and device inside the computer.
computers. A. Peopleware
A. Tablets B. Malware
B. Smartphones C. Application Software
C. Smartwatches D. System Software
D. Personal Computer(PC)
70. Which of the following is an example of
65. How many Megabytes are in 1 Gigabyte ‘main memory’.
A. 1 A. Hard Drive
B. 132 B. USB Drive
C. 1000 C. RAM
D. 1024 D. ROM

61. D 62. A 63. C 64. A 65. C 66. D 67. B 67. C 67. D 68. A 69. D 70. C 71. A
1.1 Computer Systems and Components 9

71. Which one of these is commonly used to 76. Which of the following are examples of a
measure storage capacity secondary storage device? Tick all the cor-
rect options.

PRACTICE BOOK» NOT FOR SALE


A. bytes
A. Hard Disk Drive (HDD)
B. the number of text documents you can
store on it B. RAM
C. hertz C. SSD
D. Mb/s D. Micro SD Card
E. CPU
72. A computer program that takes one or
more object files produced by a compiler 77. RAM stands for
and combines them into a single program A. Random Access Memory
that can be run on a computer.
B. Read Access Memory
A. Linkers
C. Ram Access Memory
B. Compiler
D. Read Only Memory
C. Operating System
78. Which of the two pieces of hardware play
D. Utilities a crucial role in the quality of online video
games you’d play on your computer?
73. Backing up your files is important
because . A. Hard Disk Drive
A. Computer drives could fail B. The screen (monitor)

B. A virus could corrupt your work C. RAM

C. You could accidentally delete a file D. GPU

D. ALL ARE IMPORTANT! 79. Early drive controller interface that con-
nects hard disk drives and CD/DVD drives.
74. A mobile app is a(n) developed specifi- A. SATA
cally for use on small, wireless computing
devices, such as smartphones and tablets, B. USB
rather than desktop or laptop computers. C. IDE
A. Application Software D. FDD
B. Device Software 80. Which of the following devices is an exam-
C. Hardware ple of an input device?
D. none of above A. Monitor
B. Camera
75. Which of the following is a general pur-
pose computer system? C. Speakers
D. Projector
A. Microwave
B. Traffic Lights 81. Which of the following refers to an envi-
ronment of servers that house and provide
C. Dishwasher
access to resources users access via the in-
D. Apple iPad ternet?

72. A 73. D 74. A 75. D 76. A 76. C 76. D 77. A 78. C 78. D 79. C 80. B 81. A
1.1 Computer Systems and Components 10

A. Cloud computing 87. A computer network is connected to-


B. embedded computing gether.
C. dynamic computing A. One computer
D. peripheral computing B. Two or more
C. Three or more
82. Converts digital signals into analog so
they can be transmitted over telephone or D. Four or more
cable lines-converts analog to their digital
88. PDA stands for:

NARAYAN CHANGDER
equivalents as well.
A. Personal Diagram Assistant
A. Processor
B. Personal Data Account
B. Modem
C. Personal Digital Assistant
C. Motherboard
D. Personal Digital Accountant
D. Optical drive
89. It is a printed circuit board found in all com-
83. Stores the data, operating system, images,
puters.
music, documents, files etc. on the com-
puter. A. Motherboard
A. Modem B. Random Access Memory (RAM)
B. Processor C. Read-Only Memory (ROM)
C. Motherboard D. Video Card
D. Hard drive 90. Which Windows tool is used to determine
84. The CPU is attached to the inside the if a dynamic disk is corrupted?
computer A. Disk Management
A. RAM B. Device Manager
B. Motherboard C. Microsoft System Preparation
C. Hard Drive D. Bootmgr
D. Secondary Storage Device 91. When 8 bits are grouped together as a
85. When repairing an application, which is unit, how many individual characters can
less common? these 8 bits represent?
A. Resetting the program’s defaults A. 4
B. Repairing the software B. 100
C. Uninstalling and reinstalling the soft- C. 256
ware D. 8
D. None of the above
92. The main circuit board and brains of com-
86. The CPU is called the of the computer. puter is called the
A. arm A. RAM
B. mother B. dongle
C. brains C. motherboard
D. leg D. power supply unit

82. B 83. D 84. B 85. C 86. C 87. B 88. C 89. A 90. A 91. D 92. C
1.1 Computer Systems and Components 11

93. This is used to make visual images that can 99. It is also known as CPU or the Central Pro-
be displayed on a monitor cessing unit.

PRACTICE BOOK» NOT FOR SALE


A. heat dispersal A. Hard disk drive
B. storage device B. Motherboard
C. optical drive
C. Processor
D. sound
D. CMOS battery
E. graphics card or video card

94. Which of the following is an example of 100. This application interface is comprised
software? of multiple APIs that support multimedia
tasks in windows.
A. Keyboard
B. Mouse A. OpenGl

C. Google Chrome B. DirectX


D. Laptop C. active partition
95. The Operating System is a D. MBR
A. System Software
101. Which of these computers are designed
B. Utility Software to provide services to client machines ina
C. Sending mail computer network?
D. Spreadsheet A. Microcomputer
96. A collection of instructions that performs B. Minicomputer
a specific task when executed by a com-
C. Supercomputer
puter:
A. game D. Server
B. research
102. Portable and easy to use. Quick to switch
C. essay on. Thousands of downloadable applica-
D. program tions available.

97. This component is a text input device. A. Tablets

A. Mouse B. Laptop or notebook


B. Keyboard C. Mainframe computer
C. Speakers D. Personal Digital Assistants (PDAs)
D. Monitor
103. Keyboard
98. What is an example of network media?
A. Commonly replaced
A. networking CAT5 cable
B. desktop computer B. Commonly upgraded

C. laptop C. Commonly replaced/upgraded


D. network switch D. none of above

93. E 94. C 95. A 96. D 97. B 98. A 99. C 100. B 101. D 102. A 103. B 104. C
1.1 Computer Systems and Components 12

104. Programs that allow the hardware to run C. Control port


properly and allow the user to communi- D. Control unit
cate with the computer
A. Computer Hardware 109. What is Software?

B. Computer Software A. Programs that Control the computer


system
C. System Software
B. android device driver
D. Application Software

NARAYAN CHANGDER
C. programs that control xbox
105. What is a motherboard? Tick the most D. an application
complete answer.
110. Software is used to organize and manipu-
A. It is a circuit board inside the com-
late numerical data (in the form of integer,
puter.
real, date, and so on
B. It is a circuit board that holds others
A. Excel
piece on it.
B. Powerpoint
C. It is the biggest circuit board in a
computer that holds every piece on it C. Word
and makes sure they can communicate to- D. Database
gether.
111. What isn’t computer hardware
D. It is the biggest circuit board in the
computer that works with CPU. A. RAM
B. EPOS
106. Programs that allow the user to do spe-
cific tasks C. HDD
A. Computer Hardware D. SSD

B. Computer Software 112. hardware


C. System Software A. written programs that operate a com-
D. Application Software puter system and that are stored on the
hard drive.
107. Which of the following is NOT an exam- B. screws, nuts and bolts that hold the
ple of an operating system? components
A. Microsoft Windows C. all of the files that you save on a com-
B. Apple OSX puter
C. Adobe Photoshop D. the physical components making up a
computer system
D. Linus
113. What version of Windows 7 is best for
108. Which of the following is a case on the small business?
desktop that contains and protects the
items shown in the accompanying figure A. Ultimate
and other electrical components? B. Professional
A. System unit C. Enhanced
B. Master connector D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 13

114. Which of these have the capacities to 119. Which piece of hardware is responsible
host multiple operating systems and oper- for carrying out all the processing, cal-
ate as a number of virtual machines and culations and comparisons performed on

PRACTICE BOOK» NOT FOR SALE


can substitute for several small servers? data?
A. Microcomputer A. Hard Disk Drive
B. Minicomputer B. CPU
C. Mainframe C. GPU
D. Server D. RAM

115. Lack of portability-heavy and separate 120. Which type of network component is
components are connected by wires. Files used to interconnect computing devices?
have to be copied and stored on portable
A. shared peripheral
disks, especially if you need to take them
with you. B. host
A. Desktop or Personal computer (PC) C. network media
B. Laptop or notebook D. intermediate device
C. Smartphones
121. Biometric sytems are not used for
D. Personal Digital Assistants (PDAs)
A. verification
116. Allows you to save information to be B. identification
used later
C. screening
A. Input device
D. entertainment
B. Processing
C. Output device 122. Which of these is not an application soft-
ware?
D. Storage device
A. Control and Measurement
117. Output devices. Check all that apply B. APPS
A. Monitor C. Spreadsheets
B. Mouse D. Utilities
C. Headphones
123. This is a form of spoofing where a phony
D. Touch Screen webpage is created that looks just like the
E. Speakers real webpage. It LURES you to click on it.
It is usually carried out by email or instant
118. Whats HDD messaging.
A. Hard Device Driver A. Fishing
B. Hard Disk Drive- B. Farming
C. Central Processing Unit C. Phishing
D. However Devices are Deadly D. Phoning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 14

124. What is SSD A. Desktop or Personal Computer (PC)


A. Solid State Drive B. Mainframe computer
B. Some Storage Device C. Personal Digital Assistants (PDAs)
C. Synthetic Sound Drive D. Smartphones
D. Synopsis Sicily Doncaster 130. Keyboards, mice and microphones are all
125. It consists of a quick inspection of the ex- examples of

NARAYAN CHANGDER
terior of the computer, the monitor, the A. All of these choices
keyboard, any peripherals, and cables. B. Peripherals
A. Internal Visual C. Hardware
B. External Cables D. Input Devices
C. External Visual Inspections
131. The following are application software
D. Testing Visual EXCEPT
126. The processor rely on which of the follow- A. Facebook
ing to control the timing of all computer B. Twitter
operations?
C. Microsoft Office
A. Master clock
D. Operating System
B. System clock
C. Control clock 132. Which of the following is a computer sys-
tem?
D. unit clock
A. Laptop
127. A type of computer that can perform B. Monitor
highly calculation-intensive task through
its large transaction processing power. C. Keyboard

A. Microcomputer D. USB Pen Drive

B. Supercomputers 133. The term capacity refers to


C. Server A. the amount of data you can store on
D. Minicomputer the device
B. how shiny the device is
128. At which step of F-D-E cycle, does the
CPU refer to its Instruction Set Table? C. how easily you can damage the device

A. Fetch step D. the speed of the device

B. Decode step 134. is a package that temporarily holds


C. Execute step data and instructions while they are being
processed by the CPU.
D. All through F-D-E cycle
A. Port
129. Small handheld computers with a touch B. Processor
screen. Some have traditional keyboards
behind or underneath the screen. Others C. Expansion card
display a keyboard on the screen. D. memory module

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 15

135. Not all have 3G/4G access. Touch-screen 140. Operating system
typing can be difficult. Cannot make phone A. Windows
calls.

PRACTICE BOOK» NOT FOR SALE


B. Apple
A. Desktop or Personal computer (PC)
C. Android
B. Laptop or notebook
D. All of these are operating systems
C. Tablet
141. Computer memory and computer storage
D. Personal Digital Assistants (PDAs) are available in varying sizes. Which of
136. Memory the following is the largest amount of stor-
age of memory?
A. Commonly replaced
A. gigabytes (GB)
B. Commonly upgraded
B. Terabyte (TB)
C. Commonly replaced/upgraded
C. Kilobyte (KB)
D. none of above
D. Megabyte (MB)
137. Extremely portable-they fit into pockets 142. CPU stands for central unit and is
and bags. Usually have bigger screens responsible for executing a sequence of
than mobile phones. Web and email con- stored instructions called a program.
nectivity. Often have a QWERTY key-
board. Designed for organising informa- A. Protection
tion:diary, calendar, alarm, clock, address B. Packet
book, etc. C. Plasma
A. Desktop or Personal computer (PC) D. Processing
B. Laptop or notebook
143. Which of these are input devices? Click
C. Mainframe computer 2.
D. Personal Digital Assistants (PDAs) A. mouse
138. Examples of Input devices. Select all that B. scanner
apply C. monitor screen
A. keyboard D. printer
B. monitor 144. A scanner is a device.
C. touch screen A. Input
D. camera B. Output
E. microphone C. Storage

139. This is a general purpose computer made D. Input, Output, and Storage
up of separate components:monitor key- 145. Allows a user to manipulate digital pho-
board mouse processor and storage. tographs stored on a computer;
A. Desktop or Personal Computer (PC) A. Photo Editing Software
B. Mainframe computer B. Video Editing Software
C. Personal Digital Assistants (PDAs) C. Graphic Manipulation Software
D. Smartphones D. System Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 16

146. An example of computer hardware is 151. Which of the following is the correct de-
scription for software?
A. Web Browser
A. Software is the apps and programs
B. Keyboard
that you use on your device.
C. App B. Software is the physical parts of a com-
D. Operating System puter that you can touch.
C. Software is a type of computer system.
147. A light-sensitve stylus wired to a video

NARAYAN CHANGDER
terminal used to draw pictures or select D. Software is a type of purpose built
menu options. computer system.

A. Digitizer Tablet 152. This is when someone steals your social


security number, bank account numbers,
B. Touch Screen
and other personal information.
C. Joystick
A. Identity Theft
D. Light Pen B. Hackling
148. GUIs are sometimes called WIMPs. “M” C. Trojan Horse
in WIMP stand for D. Pharming
A. Monitor
153. This is a computer where all the compo-
B. Menu nents are together in a single unit. This
means that they are portable.
C. Mouse
A. Desktop or Personal Computer (PC)
D. Mark
B. Mainframe computer
149. Biometrics overcomes this problem using C. Laptop or notebook
dynamic profiling-the system learns by us-
ing AI about a person’s fingerprints on ev- D. Tablet
ery scan (e.g. Siri, Google Translate) 154. What is a technology used in a cellular
A. Robotics telephone network?
B. Artificial Intelegence (AI) A. Bluetooth

C. 3D Holographic B. fiber-optic

D. Virtual reality C. Global System for Mobile Communica-


tions (GSM)
150. Is overclocking dangerous? D. Wi-Fi
A. Yes! 155. mobile operating system developed by
B. No! Apple
C. Depends on the cooling system. A. AOS

D. Depends on the architecture of the B. EOS


CPU. C. UOS
E. Depends on RAM. D. IOS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 17

156. Which Windows 10 GUI utility is used to C. mobile phone


manage Windows 10 disk partitions, logi- D. all of them
cal drives, and volumes?

PRACTICE BOOK» NOT FOR SALE


A. Disk Management 162. What does a motherboard do?
A. Acts as the “hub” to which other com-
B. DiskPart
puter devices connect.
C. Fsutil
B. Feeds the BabyBoards?
D. Disk Format
C. Makes the touchscreen happen.
157. It dissplays information in visula form us- D. Cools down the computer
ing text and graphics.
163. It allows a person/user to send audio sig-
A. Computer Display Monitor
nals to a computer for recording or carry-
B. Digitizer Tablet ing out commands.
C. Mouse A. Speaker
D. Josytcik B. Headphone
158. The most widely used operating system C. Monitor
for personal computers is D. Keyboard
A. Mac OS X 164. Which of the following devices are an ex-
B. Facebook ample of non-volatile storage? Tick all the
C. Microsoft Windows correct options.

D. Ubuntu Linux A. CPU


B. RAM
159. Temporary storage area that holds data
and instructions C. USB Pen Drive

A. Register D. Blu Ray Disc

B. System clock 165. Which is faster?


C. ALU A. A dual core CPU with clock speed of
1.85 GHz
D. processor
B. A Quadra-core CPU with the clock
160. is a temporary holding area for data, speed of 1.12 GHz
program instructions and results waiting
C. A dual core CPU with the clock speed
to be outputted.
of 2.23 GHz
A. random access memory
D. none of above
B. read only memory
166. What enables different parts of the CPU
C. primary storage
to work on different tasks at the same
D. secondary time
161. Examples devices containing soc (system A. Hyper Threading
on a chip) B. Multiplier
A. microwave C. Cores
B. tablet D. Bus Speed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 18

167. It is a general term for the physical com- 172. What does the CPU do?
ponents that make up a computer system.
A. Provides electricity
A. Computer Hardware
B. Computer Software B. Executes Instructions

C. System Software C. Stores Files


D. Application Software D. Connects everything together
168. Which of the following is an ADVAN-

NARAYAN CHANGDER
TAGE of Hard Disk Drives over Solid State 173. One of the capabilities of operating sys-
Drives? tems:The operating system can support
two or more CPUs.
A. Faster Performance
B. Usually More Storage Space A. multi-user
C. More QuietMore Quiet B. multitasking
D. None of the Above C. multiprocessing
169. These computers can be worn on the body D. multi-threading
and are often used in the study of behavior
modeling and human health.
174. A removable storage device that connect
A. Tablet Computers to a USB port.
B. Personal Digital Assistants
A. Optical Drive
C. Desktop
B. Flash Drive
D. Wearble Computers
C. Hard Disk Drive
170. Usually refers to a general-purpose com-
puter that is made up of a separate moni- D. Floppy Drive
tor, keyboard, mouse and processor unit
A. Laptops 175. it controls the movement of the cursor or
B. Personal Computer (PC) pointer on a display on a display screen.
C. Smartwatches A. Mouse
D. Smartphones B. Touch Screen
171. Which of the following statements are C. Joystick
correct about RAM in a computer system?
A. It acts as the active working space for D. Light Pen
the CPU.
176. is the process of carrying out com-
B. It can store data permanently.
mands.
C. It hold data that the CPU is currently
working on. A. Fetching
D. It provides data to CPU much faster B. Storing
than the HDD.
C. Decoding
E. It is a lot bigger in capacity compared
to Hard Disk. D. ExecutingANS:D

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 19

177. Why may a hard drive need to be parti- 181. It includes the name of the techni-
tioned before installation of a new OS? cian(s)who conducted the diagnosis and
troubleshooting.

PRACTICE BOOK» NOT FOR SALE


A. Partitioning verifies that the file sys-
tem has no errors. Windows will not in- A. Client name
stall properly with file system errors. B. IT Manager
B. You need to create a partition for fu- C. Supplier name
ture backups before Windows will allow D. Technician on Duty
the install.
182. Which piece of hardware is responsible
C. Creating a partition reserves a physi-
for holding up all pieces together inside the
cal portion of the hard drive space that the
CASE?
operating system can address.
A. Power Supply
D. none of above
B. RAM
178. Requires a user to type in instructions C. Motherboard
to choose options from menus, open soft-
D. Hard Disk Drive
ware
A. Solid State Drive 183. is the process of obtaining a program
instruction or data item from memory.
B. Graphical User Interface
A. Fetching
C. Internal Hard Disk B. Storing
D. User Interface C. Decoding
D. Executing
179. This is not an example of operating sys-
tem 184. Cache
A. Microsoft Windows A. is a fast memory that is used as a data
buffer
B. Linux
B. a slow memory
C. Google
C. is clock speed
D. Apple OS X
D. none of above
180. what are the three categories of data 185. name two components of heat dispersal
stored in memory? system
A. operating system and other pro- A. heat sink and fan
grams:Applications:Data being processed
B. fan and projector
B. System software; Data being pro- C. heat sink and projector
cessed; Internet website requires to mon-
itor D. none of above

C. Application:Application hardware; ap- 186. signal is continuous and vary in


plication data strength and quality.

D. system software; application soft- A. digital


ware; command software B. sound waves

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 20

C. analog B. Use the Devices and Printers control


D. none of the above panel to right-click on the monitor, and se-
lect Properties.Select Roll Back Driver.
187. It Is a memory used to store information
C. Select Create a Restore Point from
that needs to be permanent.
System Tools.
A. Motherboard
D. Use regedit to remove the information
B. Random Access Memory (RAM) about the graphics driver from the reg-

NARAYAN CHANGDER
C. Read-Only Memory (ROM) istry.
D. Video Card
192. What is data bus?
188. What is the purpose of a device driver?
A. a circuit that connects one part of the
A. to drive the CPU mother board to another
B. allows the operating system to commu- B. a fast clock speed
nicate with hardware components
C. local memory
C. allows the operating system to open
applications D. none of above
D. allows the operating system to per-
form multiple tasks at once 193. The term durability refers to

189. What happens if you don’t have enough A. how easily you can damage the device
RAM? B. the speed of the device
A. Your computer will slow down because C. the amount of data you can store on
it has to load everything from the Hard the device
Drive
D. how shiny the device is
B. Your computer will speed up
C. You won’t get much wool from your 194. A CPU or processor does these 2
sheep things
D. Your computer will run out of Hard A. Controls what happens in the com-
Drive Space puter
190. what is a system on a chip B. Stores data long term
A. a device that is run on a single chip C. Stores data short term
B. a device that needs many chips to run
D. Makes decisions/ executes commands
C. device that sits on top of a chip
D. none of above 195. What numbering system uses the number
0 and 1?
191. A technician has loaded an incorrect video
driver on a Windows 7 computer. How can A. Binary
the technician revert to a previous driver? B. Octa-system
A. Select the video adapter card Proper-
C. ASCII numbering system
ties in Device Manager, select the Driver
tab, and click Roll Back Driver. D. 8-bit system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 21

196. Which of these indicates a website is se- 200. Which of the following rests below the
cure? laptop and protects the laptop from over
heating and also your lap from excessive

PRACTICE BOOK» NOT FOR SALE


A. You found the website on Google or
heat?
clicked it from a link in an email.
A. Cooling pad
B. A little lock icon next to the website ad-
dress. B. Lap pad
C. The website shows a company name C. heat sink
and logo and looks real.
D. heat blanket
D. none of above
201. ALLOWS A USER TO MANIPULATE
197. Logical operations VIDEOS TO PRODUCE AN EDITED VIDEO.
A. involve matching one data item to an- A. System Software
other to determine if the first item is
B. Graphic Manipulation Software
greater than, equal to, or less than the
other item C. Photo editing Software
B. include addition, subtraction, multipli- D. Video editing software
cation, and division
202. Costs can be high as most providers want
C. sort data items according to standard,
the user to commit to a long-term contract
predefined criteria in ascending order or
with internet access. Some webpages may
descending order
not display or function entirely as the web
D. use conditions with operators such as designer expected.
AND, OR, and NOT
A. Desktop or Personal computer (PC)
198. What is the purpose of a recovery parti- B. Laptop or notebook
tion?
C. Smartphones
A. to provide a copy of the C:partition and
D. Personal Digital Assistants (PDAs)
data from the last backup in case of failure
B. to provide a backup copy of the BIOS 203. A(n) chip is a blank ROM chip on
which items can be placed permanently.
C. to restore the computer to the factory
state without deleting user files A. ROM
D. to restore the computer to its factory B. RAM
state
C. PROM
199. The performance of which three compo- D. PRAM
nents is most important in a Gaming com-
puter? 204. CPU stands for
A. CPU, RAM, Graphics Card A. Computer Processing Unit
B. RAM, Hard Disk Drive, CPU B. Central Processing Unit
C. Hard Disk Drive, BIOS, Monitor C. Core Processing Unit
D. Motherboard, USB Socket, D. Central Power Unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 22

205. An example of utility software 211. What is Mr. Ark’s favorite operating sys-
A. Printer tem?

B. Disk defragmenter A. Android OS and Chrome OS

C. Monitor B. IOS and Mac OS


D. Touch screen C. Windows OS
D. Mr. Ark doesn’t have a preference
206. It is done to ensure that hardware or soft-

NARAYAN CHANGDER
ware is working properly or as expected. 212. The computer instructions
A. Device tested A. Hardware
B. Internal tested B. Software
C. System tested C. RAM
D. Visual tested D. ROM
207. In terms of processing speed, which of 213. Storage is another term used for which
the following devices is MOSTLY LIKELY of the following components?
the fastest?
A. CPU
A. desktop computer
B. RAM
B. mainframe computer
C. HDD/SSD
C. notebook computer
D. GPU.
D. smartphone
E. ROM
208. The software that is designed for
computer-specific tasks such as defrag- 214. CPU stands for central unit.
menting your disks is called: A. Protection
A. utility software B. Packet
B. operating system C. Plasma
C. application software D. Processing
D. system software
215. Which of these are output devices? Click
209. Enters information into the computer 2.
A. Input device A. keyboard
B. Processing B. printer
C. Output device C. speaker
D. Storage device D. memory stick

210. What does RAM stand for? 216. Name the two components of the CPU?
A. Random Access Monitor A. AMD and ALU
B. Random Allowed Memory B. ALU and CU
C. Random Access Memory C. Memory and CU
D. Relocated Advanced Memory D. CMOS and ALU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 23

217. How Many Megabytes Are in 1 Gigabyte 223. Sound card, modem card, video card, and
A. 1 network interface card, are circuit boards
that add devices andcapabilities to the

PRACTICE BOOK» NOT FOR SALE


B. 132 computer.
C. 1000 A. ports
D. 1024
B. processors
218. What is the purpose of the hard drive? C. expansion slots
A. It’s the brain of the computer D. memory modules
B. Stores data (permanent) and software
information 224. Barcode reader is a
C. Allows access to the internet possible A. software
D. Short term storage also known as RAM B. hardware

219. A magnetic storage device that is in- C. battery


stalled inside the System Unit. D. mobile phone
A. Optical Drive
225. This device is combined with the functions
B. Hard Disk Drive of a PDA, with, among other features:web
C. Flash Drive browsers, high-resolution touch screens,
GPS navigation and Wi-Fi access.
D. Floppy Drive
A. Desktop or Personal Computer (PC)
220. Operating system developed by Apple for
mobiles like iPhone B. Mainframe computer

A. DOS C. Personal Digital Assistants (PDAs)


B. EOS D. Smartphones
C. OSX 226. Which of the following is an advantage
D. IOS of the NTFS file system compared with
FAT32?
221. What is an example of an intermediary
network device? A. NTFS is easier to configure.

A. PC B. NTFS supports larger files.


B. printer C. NTFS allows faster access to external
peripherals such as a USB drive.
C. network switch
D. NTFS allows faster formatting of
D. mouse
drives.
222. They are also called as mid-range sys-
tems or workstations. 227. Which file system is the most secure?
A. Microcomputer A. FAT32
B. Minicomputer B. NTFS
C. Supercomputer C. FAT
D. Mainframe D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 24

228. Sends information out of the computer; 233. What is not one of the basic functions of
displays the result of processing an operating system?
A. Input device A. Manage applications
B. Processing B. Tracking the date and time
C. Output device C. Provide a user interface
D. Storage device D. Control hardware access

NARAYAN CHANGDER
234. Which is not true about desktop comput-
229. What is the best way to install device
ers
drivers?
A. Have a larger screen
A. download from manufacturer website
or use media included with the device B. Need constant power supply
B. Just use generic drivers or google and C. Easy to upgrade
download the first driver you find D. Portable
C. plug it in and hope it works 235. A type of memory where data is lost
D. look for a driver that is not digitally when the computer is switched off
signed A. HDD
230. Can track down and fix disk errors, re- B. USB
pair corrupted files, and give devices a C. ROM
performance-enhancing tune-up.
D. RAM
A. System Utilities
236. Which of the following is the most com-
B. Software mon type of volatile memory?
C. Device Driver A. RAM
D. none of above B. ROM
231. What happens to the contents of the C. CMOS
RAM when the computer is turned off? D. Flash Memory
A. It is deleted / lost 237. Primary Memory is another term used for
B. It is sent back to the secondary stor- which of the following component(s)?
age A. CPU
C. It is processed by the CPU B. RAM
D. It is stored until the computer is turned C. Hard Disk Drive
back on.
D. GPU
232. What are the 2 main types of software? E. ROM
A. System and Application 238. Which of the following symbols is NOT
B. Informational and Entertainment A. parallelogram
C. Dynamic and Static B. circle
D. Professional and Home-based C. triangle

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 25

D. rectangle 244. A printed circuit board that contains the


E. diamond main components of a computer

PRACTICE BOOK» NOT FOR SALE


A. BIOS
239. The circuit board to which the inter- B. Hard drive
nal computer components connect:the CPU,
the RAM, the ROM, and the secondary C. Motherboard
storage devices D. Power supply
A. Multi-core 245. Essentially allow users to wear a mini-
B. Software computer on their wrists
C. Multiprocessing A. Smartphone

D. Motherboard B. Smartwatches
C. Personal Computer(PC)
240. Two basic components of a computer sys-
D. Tablets
tem are the and
A. Hardware and softshell 246. Which is not an operating system?
A. Windows
B. Hardware and Hard drive
B. IOS
C. Hardware and software
C. Linux
D. Monitor and computer
D. Microsoft
241. A microphone is a device.
247. Processor speed is measured in
A. Input
A. Ghz
B. Output B. Bus Speed
C. Storage C. Hyperthreads
D. Input, Output, and storage D. Cores

242. It Is an Internal chip where data is tem- 248. Your business is relying on cloud comput-
porarily stored when running applications. ing to make data available to its develop-
ers to incorporate into applications. What
A. Motherboard
is the term for this?
B. Random Access Memory (RAM)
A. Infrastructure as a service
C. Read-Only Memory (ROM) B. Platform as a service
D. Video Card C. Data as a service
243. Which of the following types of computer D. Platform as a service
systems is Most LIKELY to have a single 249. This device converts analog audio signals
processor? into audible sounds.
A. desktop system A. Sound card
B. mainframe B. Speakers
C. mobile system C. Hard drive
D. supercomputer D. Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 26

250. are so large that they take up almost a 255. Why is it that Hard Disk Drive cannot
whole room. Complex to set up. Expen- give CPU data?
sive to operate and maintain and they re- A. They cannot understand each other.
quire specialist staff to operate them.
B. Hard Disk drives work much more
A. Desktop or Personal computer (PC) slowly than CPU and it wastes a lot of time
B. Laptop or notebook of the CPU waiting for the data to arrive.
C. Mainframe computers C. Hard disk Drive has other roles that

NARAYAN CHANGDER
keeps it very busy.
D. Personal Digital Assistants (PDAs)
D. Hard Disk Drive is not in the computer.
251. What is the unit of measurement for the
256. Refers to a small memory on PC mother-
clock speed?
boards that is used to store BIOS settings
A. nano second
A. Hard disk drive
B. hertz
B. Motherboard
C. gigabytes per second C. Processor
D. pica-hertz D. CMOS battery
252. It includes the date of starting the diagno- 257. Known as the heart or “brain” of the
sis until relevant outcomes have been es- computer system, responsible for process-
tablished. ing the information that has been entered
A. Dates of received into the computer; the processor.

B. Dates of inspection A. Central Processing Unit “CPU”


B. Motherboard
C. Dates of internal testing
C. Keyboard
D. Dates of system settings
D. Random Access Memory (RAM)
253. CMOS battery
258. Reads and writes data from disks
A. Commonly replaced through laser technology-retrieve, edit
B. Commonly upgraded and delete content from CD’s, DVD’s and
Blu-ray disks.
C. Commonly replaced/upgraded
A. Optical Drive
D. none of above
B. Hard Drive
254. Which of the following is the correct de- C. Sound Card
scription for an input device?
D. Video Card
A. A device that allows you to enter data
into a computer system. 259. Which of the following does not impact
the performance of a computer?
B. A device that has information sent to
it. A. RAM
C. A device that is used to store data. B. Number of CPU cores

D. A device that is used for communica- C. Having HDD instead of an SSD


tion. D. Clock speed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 27

260. Keyboards, mice and microphones are all 266. Dram looses the information stored on it
examples of (Select all that apply) when the power is off. this is called a

PRACTICE BOOK» NOT FOR SALE


A. Output Devices A. volatile storage
B. Peripherals B. dynamic storage
C. Hardware C. non-volatile storage
D. Input Devices D. Synchronous storage

261. Which cache level is the biggest? 267. Which of the following companies is
known for manufacturing computer proces-
A. Level 1 sors?
B. Level 2 A. CPU
C. Level 3 B. Intel
D. none of above C. Sony
262. Monitor D. Corel
A. Commonly replaced 268. Information Technology merges the study
B. Commonly upgraded of all of the following EXCEPT
C. Commonly replaced/upgraded A. computer science
D. none of above B. computer technology
C. information and communications tech-
263. Which of the following are the two lead- nology
ing manufactures of personal computer
processor chips? D. office automation

A. Intel cuad 269. A CPU is a device.


B. AMD and Xeon A. Input
C. Xeon and Intel B. Output
D. Intel and AMD C. Storage
D. Processing
264. What does the motherboard do?
A. Processes instructions 270. A disk divides a hard disk into two or
more storage units.
B. Keeps the computer safe
A. partition
C. Connects everything together
B. root
D. Generates electricity
C. cluster, block
265. Input devices are pieces of hardware that D. system, systems

271. What is a Peripheral Device?


A. take data out of a computer
A. A digital system
B. put data in to a computer
B. Designates input, output, and storage
C. store data equipment that might be added to a com-
D. none of above puter system to enhance its functionality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 28

C. Something I can physically hold 277. which of the following processors is a sin-
D. The application inside the digital sys- gle chip with two or more processors?
tem A. Multi-core
272. These are extremely large computers B. Single-core
used in organisations (such as banks C. Binary
and government departments) where very D. Compressed
large amounts of data are processed.
278. It allows the computer to send graphical

NARAYAN CHANGDER
A. Desktop or Personal Computer (PC)
information to a video display device such
B. Mainframe computer as a monitor, television or projector.
C. Laptop or notebook A. Sound Card
D. Tablet B. Random Access Memory (RAM)
273. Select all answers below that ARE mini- C. Read-Only Memory (ROM)
mum requirements for a Windows 7 install D. Video Card
(in a 64-bit system)?
279. How do we measure Processor Speed?
A. Processor-1 Ghz or faster
A. Gigahertz
B. Monitor-1400 x 1200 resolution
B. Gigahurts
C. Hard Drive Space-20Gb or more
C. Gigabytes
D. Memory-2Gb or more RAM
D. Giga-burgers
E. RAM Type-DDR3 or better
280. Which of the following interprets and car-
274. Which of the following is the typically the ries out the basic instructions that operate
most expensive component? a computer?
A. Keyboard A. Control unit
B. RAM B. CPU
C. CPU C. Motherboard
D. Mouse D. Binary device
275. You need to connect more than two 281. Programs designed for the end user are
computers in a network. known as:
A. Network Interface Card A. System Software
B. firewall B. Utility Software
C. switch C. Application Software
D. none of above D. none of above
276. What is the physical components of com- 282. It is a detailed description on how the
puter system? tests were conducted.
A. Hardware A. Action taken
B. Software B. Action development
C. Peopleware C. Findings
D. Malware D. Recommendations

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 29

283. The instructions that tell the computer 289. Loss and theft are key disadvantages.
what to do: Battery life is limited. Keyboards and
pointin gdevices are not as flexible as

PRACTICE BOOK» NOT FOR SALE


A. Hardware
those on a desktop. They are more com-
B. Input pact, so overheating can be a problem.
C. Software A. Desktop or Personal computer (PC)
D. Ooutput B. Laptop or notebook
284. .A measure of the frequency equivalent C. Mainframe computer
to one billion cycles per second D. Personal Digital Assistants (PDAs)
A. Multi-core
290. All computer systems have what?
B. Software
A. Input, Process, Output
C. Gigahertz
B. Inners, Progress, Outers
D. Hardware
C. Keyboards
285. Types of operating systems:
D. Screens
A. Unix
B. Robotics 291. Check all the characteristics of comput-
ers.
C. Linux
A. Speed.
D. Windows
B. Accuracy.
E. Business
C. Reliability.
286. It is the final step in testing procedures. D. Versatility.
A. Checking Components E. Store capacity.
B. Checking System Integration
292. Old CD-ROMs drives are commonly re-
C. Checking Specification
placed with DVD-ROM and DVD writers.
D. System Settings
A. Hard disk drive
287. A printer is a device. B. Optical drives
A. Input C. Processor
B. Output D. Modem
C. Storage
293. Hardware used to drive speakers is usu-
D. Input, Output, and Storage ally built into the motherboard-what am I
talking about?
288. This uses laser light to read data from
CDs and DVDs A. graphics card or video card
A. sound B. sound
B. heat dispersal C. heat dispersal
C. storage device D. storage device
D. optical drive E. optical drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 30

294. This is an output device C. primary memory and output devices


A. Microphone D. output devices and processor
B. Webcam 300. What is a storage device?
C. 3D printer A. A device use for calculating data
D. Scanner B. A device used to store data temporar-
295. It is also known as LAN card ily

NARAYAN CHANGDER
C. A device used to supply power to the
A. Video Cards
computer
B. Memory
D. A device used to store data perma-
C. Network Interface Card nently
D. Sound card
301. To display a decision-making instruction
296. Allows the user to interact with a com- in flowchart, which of the following sym-
puter (or MP3 player, gaming device, mo- bols should be used?
bile phone A. A parallelogram
A. Graphical User Interface (GUI) B. A rectangle
B. WIMP(Windows Icon Menu and Point- C. An oval
ing)
D. A diamond
C. Operating System
302. This component, executes the instruc-
D. Desktop/PC
tions from main (primary) memory. The
297. Wireless connections happen by way of speed it does this is measured in hertz (hz)
A. radio waves. A. CPU
B. cables. B. RAM
C. Cat 5. C. HDD
D. tubes. D. SSD

298. The user interface that requires to type 303. What is an example of an end device
instructions to choose options from menus, A. printer
open software and so on.
B. desktop computer
A. Command User Interface
C. network switch
B. Command Line Interface D. network router
C. Graphical User Interface E. network firewall
D. Graphical Line Interface
304. The user interface that allows to inter-
299. During the input-processing-output- act with a computer using pictures or icons
storage(IPOS)cycle, a two-way flow of rather than having to type in a number of
data takes place between. commands.
A. input and output devices A. Command User Interface
B. the processor and primary memory B. Command Line Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 31

C. Graphical User Interface C. Software Failure


D. Graphical Line Interface D. None of these answers are correct

PRACTICE BOOK» NOT FOR SALE


305. Peripherals are basically 310. Like a laptop this is a small portable com-
puter but the biggest difference is that its
A. devices connected to a computer sys-
user interface is all through touch.
tem to add functionality.
A. Desktop or Personal Computer (PC)
B. systems without compute systems
that function alone. B. Mainframe computer
C. are used to transform computer sys- C. Laptop or notebook
tems. D. Tablet
D. will work only without computer sys- 311. what does CMOS stand for?
tems.
A. Complementary metal oxide Semi-
306. What does the operating system do? conductor
A. Manages the computer resources B. Classic measured online semi-
(CPU, Memory, Drives, Printers etc.) conductor
B. User interface C. Cache memory on silicon

C. Execute and provide services for appli- D. circuit method online


cation software 312. It contains the observations of the tech-
D. all of these nician on the test conducted.
A. Diagnosis
307. The term portability refers to
B. Findings
A. how easy it is to carry around/transport
the device C. Recommendations
B. the speed of the device D. Remarks

C. the amount of data you can store on 313. A peripheral


the device A. a screen that is very large, such as an
D. how shiny the device is IMAX screen that is so large you can’t see
the whole thing at once.
308. It is referred to as a graphics accelerator,
B. device such as a keyboard or printer,
whose function is to generate and output
that is not part of the essential computer
images to a display.
and are connected through ports.
A. Video Cards C. any screen used to display graphics
B. Memory such as streaming videos or video games.
C. Network Interface Card D. input devices
D. Sound card 314. Synchronizes all computeroperations
309. A crash or cessation of processing be- A. Register
cause of a logic error in a program is: B. System Clock
A. Boot Process C. ALU
B. Quantum Computing D. Processor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 32

315. A computer is 320. At every clock pulse, the CPU will per-
form:
A. A combination of hardware and soft-
ware A. A Fetch
B. Some hardware (only) B. A Decode
C. Some software (only) C. An Execute
D. The screen you are looking at D. A complete F-D-E cycle

NARAYAN CHANGDER
316. Random Access Memory (RAM) 321. what is a chip?
A. an integrated circuit
A. memory available for the operating
system, programs and processes to use B. a single component
when the computer is running. C. is soldered onto an electronic circuit
B. requires the computer to be turned on board
in order to retain data D. is soldered onto an electronic circuit
C. The data in RAM is not permanently board to connect the chip to the rest of
written (volatile memory) the device
D. All of the above E. all of them

317. What happens to data in Main Mem- 322. Are software that has been designed to
ory/RAM when we switch the power carry out specific tasks on a computer
off? A. Operating System
A. All data is lost B. Linkers
B. All data is saved C. Utilities
C. All data is backed up to the Hard Drive D. Compiler
D. All data is saved to the Processor 323. Which of these is not part of every com-
puter?
318. Advantage of using a laptop
A. Motherboard
A. Tangible
B. Processor
B. Heavy
C. Power Supply
C. Portable
D. Keyboard
D. Low performance E. RAM
319. All of the following pairs of components 324. Which term describes the interference
interrelate with each other EXCEPT when electrical impulses from one cable
A. input devices and output devices cross over to an adjacent cable?
B. output devices and storage devices A. cross over

C. ouput devices and the microprocessor B. cross talk

D. the microprocessor and output de- C. RFI


vices D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 33

325. Your business is looking to rely on cloud 330. Where the operating system, programs
computing services to create applications and data are permanently stored is called
using web-based development platforms. what?

PRACTICE BOOK» NOT FOR SALE


What is the term for this? A. Primary Storage
A. Software as a service B. Secondary Storage
B. platform as a service C. Tertiary Storage
C. data as a service D. Backup
D. infrastructure as a service
331. Which component of the computer, stores
326. Capable of processing very big jobs, the data and programs which the computer
which make use of their large memories is CURRENTLY using?
and fast processor speeds. A. Primary Storage (RAM)
A. Desktop or Personal computer (PC) B. Secondary Storage (HDD/SSD)
B. Laptop or notebook C. CPU
C. Mainframe computer D. Motherboard
D. Personal Digital Assistants (PDAs) 332. Spare parts are often cheap because they
are standardised. They often have faster
327. The CPU contains
processors than laptop computers for the
A. input devices and output devices same price. There are fewer problems
B. the control unit and the arith- with overheating than laptops because of
metic/logic unit their larger size.
C. main memory and storage devices A. Desktop or Personal computer (PC)
D. none of above B. Laptop or notebook
C. Mainframe computer
328. What kind of processing and calculations
is the GPU in charge of? D. Personal Digital Assistants (PDAs)

A. All the programs that are open in RAM. 333. What happens to data on our Hard Disk
B. All the graphic calculations to do with Drive when we turn the power off?
video, image and colours. A. All data is saved
C. All the calculations going on on the B. All data is lost
computer. C. All data is backed up to the Graphics
D. GPU doesn’t do any calculations or pro- Card
cessing. D. All data is encrypted
329. Which of the following is an example of 334. It enables your computer to connect to
hardware? the internet.
A. Monitor A. Hard disk drive
B. Microsoft Word B. Optical drives
C. Malware C. Processor
D. Facebook D. Modem

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 Computer Systems and Components 34

335. Why is CLI better than GUI head of a pin would one day exceed 10 mil-
A. More Options if the user can code prop- lion
erly D. Gordon Moore stated that the num-
B. It is Lined ber of transistors per square inch on in-
tegrated circuits would double every year
C. you can command
D. It doesnt have wimp 341. The two types of file systems used for
Windows are:
336. It is a fixed computer storage medium.

NARAYAN CHANGDER
A. FAT32
A. Hard disk drive
B. NTFS
B. Motherboard
C. Linux
C. Processor
D. iOS
D. Sound card
342. North bridge and south bridge are con-
337. A monitor is a device. nected via:
A. Input A. CPU
B. Output B. Buses
C. Storage C. Motherboard
D. Input, Output, and Storage D. They don’t need to be connected!
338. The type of software that the users run 343. Which if the following is not a function of
to do various tasks on a computer is an operating system?
A. System Software A. interface between the user and the ma-
B. Application Software chine
C. Utility Software B. Editing text.
D. Operative Software C. coordinate hardware components
339. A device that must always be connected D. monitor system performance
to an external power source to work
344. It is a general term for the programs that
A. Laptop control the computer system.
B. Desktop A. Computer Hardware
C. Smartphone B. Computer Software
D. Tab C. System Software
340. Moore’s Law D. Application Software
A. Gordon Moore said that everyone 345. It is commonly called RAM (Random Ac-
should have free access to digital technol- cess Memory).
ogy
A. Video Cards
B. Gordon Moore stated that it was uneth-
ical to use DNA to store code B. Memory

C. Gordon Moore stated that the number C. Network Interface Card


of transistors that you could fit on the D. Sound card

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Generations and Classification 35

346. Similar to their desktop counterparts, C. Central Processing Unit


notebook computers and handheld comput- D. Center Processing Unit
ers have a system unit that

PRACTICE BOOK» NOT FOR SALE


A. cannot run using a standard power 348. S oftware is used to organize, manipu-
supply late and analyze data.
A. Excel
B. usually is less expensive than desktop
computers with the same capabilities B. Powerpoint
C. contains electronic components that C. Word
processes data D. Database
D. houses devices such as the keyboard, 349. Motherboard
pointing devices, speakers, and display
A. Commonly replaced
347. What does CPU stands for? B. Commonly upgraded
A. Command Processing Unit C. Commonly replaced/upgraded
B. Communication Processing Unit D. none of above

1.2 Computer Generations and Classification


1. Who is known as the father of computer? 4. ENIAC stands for
A. Herman Hollerith A. Electronic Numerical Integrator And
B. Louis Pascal Calculator

C. ENIAC B. Electrical Numerical Integrator And


Calculator
D. Charles Babbage
C. Electronic Numerical Integrator And
2. What is a stored program? Computer
A. A set of instructions stored in com- D. None of these
puter for quick calculations
5. Fifth generation computer used
B. A set of instructions stored in usb
A. Vacuum tubes
C. A set of instructions stored on
punched cards. B. microprocessor

D. None of these C. Artificial Intelligence


D. None of these
3. Which generation of computers started us-
ing Keyboard as input devices and Monitor 6. Which generation of computers are more
as output device? user-friendly.
A. Fifth generation computers A. Fourth Generation computers
B. Third Generation computers B. First Generation computers
C. Second Generation computers C. Fifth Generation computers
D. Fourth Generation computers D. Third Generation computers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Generations and Classification 36

7. An Expert System is a computer system 13. First electronic computer that used stored
that programs.
A. has no ability to work on its own. A. ENIAC
B. has ability to walk like humans. B. MARK I
C. has decision-making ability like hu- C. EDSAC
mans. D. None of these
D. None of these
14. What was the third generation of comput-

NARAYAN CHANGDER
8. Choose Three advantage of fourth genera- ers built with
tion of computer? A. Integrated Circuits
A. small in size B. Processors
B. used punch card as input device C. Vacuums
C. fast processing with less power con- D. Transistors
sumption
15. EDSAC stands for
D. support high level language in differ-
A. Electronic Delay Storage Automatic
ent type of computer
Calculator
9. Which component was used in Second gen- B. Electrical Delay Storage Arithmetic
eration computers Calculator
A. Transistors C. Electrical Delay Storage Automatic
B. Integrated Circuits Computer
C. Vacuum Tubes D. None of these
D. VLSI technology 16. Which generation of computers uses artifi-
cial intelligence?
10. d Generation computer used
A. Fourth Generation computers
A. Vacuum Tubes
B. First Generation computers
B. Transistors
C. Fifth Generation computers
C. Integrated Circuits
D. Third Generation computers
D. None of these
17. What was the main electronic component
11. How small is a chip used in the first generation of computers?
A. younger than a fingertip A. Tape
B. tinier than a fingertip B. Wire
C. as small as an ant C. Gum
D. something else D. Vacuum tube or valve
12. the first generation computers was 18. d Generation computer used
A. Big and cheap A. Vacuum Tubes
B. slow and expensive B. Transistors
C. slow and small C. Integrated Circuits
D. none of above D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Generations and Classification 37

19. The first generation of computers used 25. Which among the following generation
as a major piece of technology computers had expensive operation cost?
A. First

PRACTICE BOOK» NOT FOR SALE


A. very Large Scale Integrated (VLSI) cir-
cuits. B. Second
B. integrated Circuits C. Third
C. transistors D. Fourth
D. vacuum tubes
26. The generation is the fastest, reliable
20. What is a programming languages? and more efficient
A. Language understood by humans A. First
B. Language understood only by com- B. Second
puter C. Third
C. Language we use to communicate D. Fourth
D. None of these E. Fifth
21. ENIAC was the first 27. Fifth Gen will have:
A. fully electronic device A. AI
B. fully electronic digital computer B. Things
C. fully electronic digitial calculator C. Something bad
D. None of these D. umm iieeh.ahh

22. Abacus is used to perform 28. Which one is not true for Integrated Cir-
cuits (Chips)
A. Addition
A. Increased storage capacity
B. Subtraction
B. Different programs can run together
C. Multiplication
C. Large size, slow speed
D. Division
D. None of these
E. All of the above
29. Versatility means
23. Transistors are used in which generations
A. the ability to perform only one task at
of computers.
a time.
A. 1st generation
B. the ability to perform work in less time.
B. 2nd generation
C. the ability to perform different types of
C. 3rd generation jobs efficiently.
D. None of these D. None of these
24. Who is known as the father of modern 30. How many generations of computers are
computers. there?
A. Charles Babbage A. 4
B. Alan Turing B. 5
C. John Napier C. 3
D. Blaise Pascal D. 6

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer Performance and Reliability 38

31. Pascaline is the first C. Much More reliable


A. Electronic Machine D. Smaller
B. Manual Machine E. Very Large
C. Mechanical Calculator
37. What type of technology was used in
D. None of above fourth generation of computers?
32. Computers are classified into different gen- A. Integrated circuit
erations based on

NARAYAN CHANGDER
B. Transistors
A. Shape C. Vacuum tubes
B. Size D. Microprocessors
C. Weight
38. Which one is not true for Microprocessor.
D. Technology
A. Greater computing power
33. First generation computers was very B. Greater Storage capacity
A. Big C. Use cost less storage device
B. Small
D. Huge in size
C. Medium
39. What is technology that used in First Gen-
D. none of above
eration?
34. What period of time was the fifth genera- A. Artificial intelligence
tion of computers used?
B. Transistor
A. 1971 to present
C. Vaccum Tubes
B. 1956 to 1963
D. Integrated circuit
C. Present to future
D. 1945 to 1956 40. At what period of time were second gen-
eration of computers used?
35. The microprocessor was introduced in A. 1940 to 1970
which generation
B. 1956 to 1963
A. Third
C. present to future
B. First
D. 1945 to 1956
C. Fourth
D. Second 41. Microprocessors were used in
A. 1st generation computer
36. Select all that apply to the first generation
of computers. B. 4th generation computer
A. Cheaper C. 5th generation computer
B. Generated a lot of heat D. None of these

1.3 Computer Performance and Reliability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer Performance and Reliability 39

1. limitations of hybrid computer 5. description of quantum computer


A. bulky, keyboards are smaller, switch- A. computers that make direct use of

PRACTICE BOOK» NOT FOR SALE


ing operating system takes time quantum-mechanical phenomena, such as
superposition and entanglement, to per-
B. a number expressed as base 10 form operations on data
C. decimal prefix meaning “a million” or B. dont require installed programs, very
106 light, fast with good connection
D. computers that make direct use of C. to connect domestic users to the inter-
quantum-mechanical phenomena, such as net and other cable services
superposition and entanglement, to per- D. Popuplar in education of for casual
form operations on data browsing and gameplay
2. Select all places that one is likely to find 6. limitations of desktop
mainframes still in use. A. more portable, smaller, less cords
A. Banks than a desktop
B. Technology start-ups B. theis technology is widely used for mo-
bile devices at home or in shops and of-
C. Schools fices
D. Government institutions C. permanently part of a computer, can
E. Healthcare be used to store OS
D. a printed circuit board that controls
3. description of mainframe the output to a display screen
A. computers used primarily by large or- 7. description of desktop
ganizations for critical applications
A. a personal computer that is designed
B. fragile, more expensive, smaller to fit conveniently on top of a typical office
screen, battery goes flat quickly desk
C. automatic input device that recognises B. software diagnostic disk, multimeter,
marks entered onto paper cable tester, POST card
D. save space and portability where pos- C. adds reliability, faster network expan-
sible with small form factor devices sion, allows centralised backup
D. easy to use, intuitive, requires little
4. purpose of of desktop training
A. To allow user to work or game easily 8. characteristics of server
with large screen and keyboard
A. rarely turned off, lot of RAM, possibly
B. a storage media that does not involve RAID
magnetic disks or any moving parts B. covers large geographical area, af-
C. bandwidth of 400-800 Mbps. It can fordable
handle up to 63 units on the same bus, and C. lightweight and portable, good for be-
is hot swappable. ginners and light users
D. binary prefix meaning 2 to the power D. decimal prefix meaning “a thousand
of 10 million” or 109

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer Performance and Reliability 40

9. uses of hybrid computer C. short wavelength radio signals used


A. save space and portability where pos- for communication
sible with small form factor devices D. very popular with 450m subscibers,
B. prints on paper by spraying ink out of supports roaming, stable network
tiny nozzles-shaped by crystals or electric 13. benefits of quantum computer
current
A. computers are very fast an powerful,
C. allows a computer to generate sound- can create and break conventional encryp-

NARAYAN CHANGDER
either basic sounds like beeps, or more so- tion
phisticated sounds using a sound card
B. to provide DC power for internal com-
D. used to print in warehouses where du- ponents of a computer
plicate forms (such as delivery notes) are
required C. a device that connects to a computer
and is used to project the video output
10. benefits of desktop from the computer onto a wall or screen
A. more powerful, more features, D. connectivity affected by resistance of
cheaper than laptop buildings and interference, limited range,
B. one computer cannot be used by user, slow
easier spread of viruses 14. limitations of server
C. the technology that allows the text on A. one computer cannot be used by user,
paper documents to be converted into text easier spread of viruses
which is editable after scanning
B. adds reliability, faster network expan-
D. a plug-in interface card that displays sion, allows centralised backup
progress and error codes generated dur-
ing power-on self-test (POST) of a com- C. black and white are a bit more expen-
puter sive, colour are a lot more expensive than
ink jet.
11. limitations of smartphone D. turn on heating when on way home,
A. not durable, water can damage easily, turn on music using speech
.need internet connection when browsing,
small storage capacity 15. Which of these characteristics can best
differentiate between laptops and desk-
B. have video RAM, a GPU chip and usully tops?
HDMI and DVI connections
A. cost, style, portability
C. captures audio input, feeds Text to
speech, accessibility B. cost, performance, portability

D. a device to convert images or text on C. performance, portability, compatibility


paper into a digital format that can be D. portability, functionality, cost
used by the computer.
16. limitations of quantumcomputing
12. benefits of mainframe A. Their development is at very early
A. reliability, easy to expand network, se- stages, concerns about security of per-
curity sonal data
B. high cartridge cost, slower than laser, B. save space and portability where pos-
documents can smudge before drying sible with small form factor devices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer Performance and Reliability 41

C. playing music from computer, on the A. The device that allow users to do a spe-
move cific task

PRACTICE BOOK» NOT FOR SALE


D. a device to convert images or text on B. The device that allow memory to store
paper into a digital format that can be data
used by the computer. C. The device that convey information to
17. uses of embedded system/internet of people
things D. The device that help printer to print the
A. turn on heating when on way home, output
turn on music using speech 21. Two types of user interfaces are
B. A pen and base that allows user to cre- A. Graphics and Video interface
ate drawings on the computer screen
B. Graphical user interface and command
C. used to store the start-up instruc- line interface
tions for a computer, also known as the
firmware C. Command line interface and Video in-
terface
D. provide higher bandwidth and can
transmit data over longer distances D. Command line interface and hypertext

18. description of tablet computer 22. description of embedded system/internet


of things
A. a portable computer that uses a touch-
screen as its primary input device A. internet-enabled computing devices
embedded in everyday objects, enabling
B. allows user to connect without wires, them to send and receive data
standards are agreed, eas to set up
B. prints high quality images on far big-
C. Input device used for games playing ger paper than most printers can
and flight simulators.
C. Stored audio files can take up a lot of
D. creates large files, difficult to use with memory.Voice commands can be difficult
background noise, banned in some quiet to recognise.
areas
D. provides 2D, 3D and sometimes even
19. limitations of embedded system/internet general purpose graphics processing
of things (GPGPU) calculations for a computer
A. expensive aonnection kits, possibility 23. benefits of server
of hacked devices
A. adds reliability, faster network expan-
B. connectivity needs line of sight, signal sion, allows centralised backup
absorbed by atmosphere, towers expen-
sive to build B. storage size, appearance, reliability
C. home use-low volume, high quality C. cables made from glass that becomes
sometimes required for photos very flexible when thin
D. video conferencing, video showing D. A 2-in-1 PC consists of a screen and
seaside weather to potential tourists a detachable keyboard and has the func-
tionality of both a laptop computer and a
20. What is the function of output device? tablet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer Performance and Reliability 42

24. System software consists of the program D. show status of electronic equipment vi-
that controls the operations of the com- sually, signs
puter and its devices. Two types of sys-
tem software are ; 28. The physical, tangible parts of a computer
system is the
A. Microsoft Word and Windows 10
A. Tower Casing
B. Utility programs and Windows
B. Monitor
C. Operating systems and utility pro-
C. Keyboard

NARAYAN CHANGDER
grams
D. Operating system and application soft- D. Hardware
ware 29. description of server
25. purpose of of server A. A computer running software to man-
A. to provide services to client computers age network resources

B. save space and portability where pos- B. storage size, appearance, reliability
sible with small form factor devices C. communication requires line of sight,
C. reliability, easy to expand network, se- short distance only
curity D. easy to use, intuitive, requires little
D. a disk containing a program written for training
the express purpose of locating problems 30. benefits of tablet computer
with the software, hardware, or any com-
bination there of in a system, or a network A. lightweight and portable, good for be-
of systems. ginners and light users
B. prints on paper by spraying ink out of
26. description of hybrid computer tiny nozzles-shaped by crystals or electric
A. A 2-in-1 PC consists of a screen and current
a detachable keyboard and has the func- C. usually used with PC-moves cursor
tionality of both a laptop computer and a around screen in two dimensions
tablet
D. save space and portability where pos-
B. allows user to connect without wires, sible with small form factor devices
standards are agreed, eas to set up
C. have video RAM, a GPU chip and usully 31. benefits of hybrid computer
HDMI and DVI connections A. Battery life, travel with less stuff, Tak-
D. playing music from computer, on the ing notes and reading ebooks are easier.
move B. Reads 300 cheques per minute with
100% accuracy
27. uses of tablet computer
C. expensive aonnection kits, possibility
A. Popuplar in education of for casual of hacked devices
browsing and gameplay
D. print quality low, noisy
B. Imags produced can take up a lot of
memory space, some quality lost in the 32. limitations of mainframe
process A. expensive, very large and require
C. Very expensive-only used by banks greater skills to use

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 43

B. phone calls, text to speech, recording real time for two-way network communi-
music cation.

PRACTICE BOOK» NOT FOR SALE


C. reliability, easy to expand network, se- 36. uses of smartphone
curity
A. making/answering calls, access the
D. rarely turned off, lot of RAM, possibly
internet/multimedia applications/ make
RAID
payments
33. limitations of tablet computer B. non-volatile, Data stored in these chips
A. touchscreen typing difficult, poor bat- is unchangeable
tery life, dirty screen C. one computer cannot be used by user,
B. storage space, form factor, data ac- easier spread of viruses
cess performance D. More accurate than a mouse, and eas-
C. a hardware device or software pro- ier and more accurate to draw designs
gram used to manage storage with
D. Digital video camera that allows you to 37. benefits of smartphone
capture video input for your computer
A. Apps, Maps and Navigation., Search
34. benefits of embedded system/internet of information on net, Entertainment video,
things books, music, games, etc.
A. allows control of household objects B. a circuit board or card wih an ethernet
from smartphone or controller like Alexa connection (RJ45)
B. allows user to connect without wires, C. a technology that uses radio waves to
standards are agreed, eas to set up provide network connectivity
C. home use-low volume, high quality D. might break or need replacing, can
sometimes required for photos only indicate 2 states such as on /off
D. Input device used for games playing
38. description of smartphone
and flight simulators.
A. Smartphones can browse the Inter-
35. uses of mainframe computer net and run basic software programs like
A. bulk data processing, such as census, a computer. Smartphones use a touch
industry and consumer statistics, enter- screen to allow users to interact with
prise resource planning, and transaction them
processing. B. Can be connected to a computer, lights
B. a printed circuit board that controls up in response to electrical signals.
the output to a display screen C. A computer running software to man-
C. decimal prefix meaning “a million mil- age network resources
lion” or 1012 D. converts mains AC to low-voltage reg-
D. a type of hardware device that con- ulated DC power for the internal compo-
verts between analog and digital data in nents of a computer

1.4 Computer Networks and the Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 44

1. Every internet user needs an address. 6. You have a computer at home. The com-
A. MAC puter is connected to the Internet through
a dial-up connection. Every time you con-
B. DNS nect to the Internet, you send a request to
C. VPN the Internet service provider (ISP).Which
D. IP device establishes this connection?
A. sound card
2. Web browser is an application software
that read HTML documents and display B. Modem

NARAYAN CHANGDER
them as C. Microphone
A. Web Site D. Speak
B. Web Browser 7. Cyber security deals with:
C. Web Page A. common thievery
D. Web Server B. Viruses, DDoS attacks and Phishing ac-
3. are used in the place of IP address be- tivities
cause they are easier to remember. C. business security
A. Domain names D. spam
B. Protocols 8. A LAN can be connected to the Internet by
C. Routers a router, provided that the LAN uses:
D. Hosts A. TCP/IP
4. Why might a Webpage appear differently B. ISP
in different web browsers? C. Wireless Connection
A. Each browser utilizes network band- D. T or E Lines
width differently
9. In the client/server environment, what is
B. Each browser interprets HTML some- the main function of client software?
what differently
A. It manages network resources & pro-
C. Each browser may interpret the Web- vides information to the client
page differently based on the pages W3C-
compliance B. It enables users to communicate with
& request information from the client
D. Each browser uses different protcols
to access the webpage C. It defines the protocols that enable the
client to communicate with the server
5. You own a small bookstore. Because of D. It enables users to communicate with
the popularity of the Internet, you decide & request information from the server
to provide online services for your cus-
tomers. Where will you go to get an In- 10. Chunks of data sent over the internet are
ternet connection for your computer? known as
A. Software development company A. packets
B. Hardware Company B. protocol
C. Internet cafe C. port
D. Internet Service Provider (ISP) D. message

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 45

11. Internet is a space D. A very powerful computer that pro-


A. Public vides services

PRACTICE BOOK» NOT FOR SALE


B. Private 17. Which of the following top-level domains
C. Local would generally refer to an Internet ser-
vice provider (ISP)?
D. none of the above
A. .org
12. When you use the Internet, you send and B. .com
receive from a large computer, called
a C. .edu

A. files D. .net

B. information 18. What is the main purpose of routers?


C. server A. Routers connect computers to nearby
wireless devices, such as headphones
D. laptop
and speakers.
13. What do networks allow you to share? B. Routers connect computers and
A. information choose the path that information takes
from one computer to another.
B. dinner
C. Routers increase the speed of a net-
C. cars
work’s internet connection by decreasing
D. desks the latency.
14. Which of the following is a common advan- D. Routers translate a website’s name
tage of cloud computing? into an IP address.
A. Unlimited Access 19. What is Mr. Kroger’s favorite team?
B. Speed A. Dallas Cowboys
C. Connectivity B. Tekamah-Herman Tigers
D. Cost Reduction C. Kansas City Royals
15. Permanent digital connection to the inter- D. St. Louis Cardinals
net using a normal telephone line
20. “The world’s largest computer network
A. Fibre which connects millions of computer all
B. Telkom over the world.” This is the definition for
.
C. ADSL
A. Communication
D. Mweb
B. Network
16. Which of the following describes the World C. Internet
Wide Web?
D. World Wide Web
A. Two or more computers connected to-
gether 21. Networks provide
B. A worldwide network of computers A. goods
C. Websites, web pages, and links B. information

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 46

C. services from one or more servers that reside on


D. all of these the Internet
C. A computing paradigm that prevents
22. You open the home page for users from accessing most Internet re-
www.alpineskihouse.com. On the home sources unless those resources are
page, you see a link for the weather re- stored locally
port. You want to view the weather re-
port in a separate window, but you do not D. Hosted applications & services offered
want the home page to close. by a third party & run on that organiza-

NARAYAN CHANGDER
tion’s local computer
A. Type the keyword weather in the ad-
dress bar and then click New Page . 26. All statements below shows the responsi-
B. Click the link for the weather report. bilities of ISP EXCEPT
C. Right-click the link for the weather re- A. Providing and maintaining a connec-
port and then click Open in New Window tion to the Internet
D. Type the keyword weather in the B. Support the hardware and software
Search box. needed for the connection service.
23. Your brother wants to create an online C. To protect their site and network from
journal to document a special event so that external threats
all of your friends can view the pictures D. To provide 12-hours customer service
and illustrations. Which of the following and technical support.
online communities will help him create
this online journal? 27. A proxy server is used as the computer?
A. Blog A. with internal access
B. Chat group B. with no access
C. Newsgroup C. with external access
D. Bulletin board D. All of these
24. You need to send email over the Internet
28. A is a transmission which uses dig-
to your friend Paula. What information do
ital code (a 0 or 1) to write code on the
you need to send a message to Paula?
signal.
A. Telephone
A. Digital Signal
B. E-mail address
B. Web Address
C. Home address
C. Broadcast Communication
D. Company address
D. Transmission Medium
25. Which of the following describes cloud
computing? 29. What is the full form Of E-Commerce
A. A computing paradigm in which web A. Electronic Commerce
browsers & numerous other applications
B. Electrical Commerce
are required on local computers
B. Hosted applications & services offered C. Element Commerce
by a third party and run almost entirely D. Elegant Commerce

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 47

30. What is the meaning of Router? 35. You want to send your photographs to a
A. a networking device that forwards friend. What should you do to make sure
that your friend’s e-mail inbox does not

PRACTICE BOOK» NOT FOR SALE


data packets between computer networks.
Routers perform the traffic directing func- get filled?
tions on the Internet. A. Compress Attachment
B. Global computer network providing a B. Format Message
variety of information and communication
C. Use Rich Format
facilities, consisting of interconnected net-
work using standardized communication D. Use Default Formatting
protocols.
36. In an IP address such as 192.241.187.8,
C. A computer network that links devices the last number in the address (on the far
within a building or group of adjacent right) identifies:
buildings.
A. the gateway to which a computer is
D. A network of computers across a city connected
31. We use these devices for wired communi- B. the router to which a computer is con-
cation: nected
A. Mobile phone C. the largest network to which a com-
B. Tablet puter is connected

C. Telephone D. a specific computer


D. Desktop PC 37. It covers relatively large region such as
cities, towns.
32. Which one of the following is a valid email
address? A. LAN
A. [email protected] B. WAN
B. gmail.com C. MAN
C. java@mail D. none of above
D. [email protected] 38. What is another way to say you are not
33. People access and view web pages on the connected to the internet?
computer or mobile devices through . A. Online
A. internet software B. Booted
B. presentation software C. Offline
C. graphic software D. 404
D. web browser
39. A system for searching the info available
34. Home computers connect to a server on the Web such as google.com, bing.com,
through a etc. is a
A. router A. search engine
B. mobile B. webpage
C. laptop C. browser
D. monitor D. dictionary.com

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 48

40. Which network type is best used for a 44. What moves around the Telephone cable
school supplies company which provides network?
schools with equipment? A. Train
A. Intranet B. Bus
B. Extranet C. Information (Voice calls)
C. Internet D. none of above
D. LAN

NARAYAN CHANGDER
45. What is a top-level domain in the Domain
41. How many bits does the Internet Protocol Name System (DNS)?
version 6 (IPv6) address format use? A. The left-side component of a domain
A. 128 name, which categorizes domains into
groups by server name
B. 256
B. The right-side component of a domain
C. 64 name, which categorizes domains into
D. 32 groups by common type or geography
C. The left-side component of a domain
42. What is Dial up conection?
name, which categorizes domains into
A. This is one of the earliest merhods groups by common type or geography
used to connect to the internet.
D. The right-side component of a domain
B. company that provides Internet con- name, which categorizes domains into
nections and services to individuals and groups by server name
organizations.
46. A firewall is:
C. is the transmission of wide bandwidth
data over a high speed internet connec- A. a barrier to prevent the spread of fire
tion. B. a software to restricts communication
D. an electronic communications network an improve security
that connects computer networks and or- C. a warning set for a computer overheat
ganizational computer facilities around
D. limited state of PC operation
the world-used with the except when be-
ing used attributivelydoing research on 47. are small text files that identify a
the Internetan Internet search. user’s personal preference and settings
and allows web site servers to retrieve
43. Your neighbor has moved to another coun- the information.
try. He informs you about his new job.
You want to congratulate him by sending A. Cookies
an e-mail message.Which of the following B. Micro Chips
devices must you use to connect your com-
C. Channel
puter to the Internet?
D. Files
A. Printer
B. Scanner 48. Which term is described as a “worldwide
network of computers made up of cables,
C. Modem routers, and other pieces of hardware
D. Sound card used to connect devices together”?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 49

A. World Wide Web B. Bus Stations


B. Internet C. Telephone Exchanges

PRACTICE BOOK» NOT FOR SALE


C. Local network D. Water pipes
D. 4G
54. What is the term for a device that deter-
49. The World Wide Web only works by us- mines the best path for data to take across
ing an internet browser. Which is not a a network?
browser? A. Gateway
A. Chrome B. Packet
B. Internet Explorer C. Router
C. Safari D. Backbone
D. Microsoft
55. Each electronic document on the Web,
50. Protocols are which can contain text, graphics, anima-
tion, audio, and video.
A. different sets of rules for transferring
data A. World Wide Web
B. sets of instructions for walking along B. Web Browser
a path C. Web Page
C. different sets of rules for getting the D. Web Site
bus
D. sets of information for information 56. In computer terminology, what is a net-
work?
51. Google Chrome and Internet Explorer are A. A computer that manages system re-
examples of a sources and provides information to other
A. website computers
B. webpage B. A device that interacts with another de-
vice through a central server to which they
C. search engine
are both connected
D. browser
C. A group of two or more computers con-
52. What is the main purpose of a file trans- nected so they can communicate, share
fer? resources & exchange information with
one another
A. To manage the flow of data between it
& client nodes D. A system that requests a service from
another computer that is used to access
B. To store shared data
files or documents
C. To manage electronic mail
57. A server is:
D. To manage access to the world wide
web A. a computer workstation

53. Following insfrastructure is reqired for B. the main computer on a network


Buses Network: C. dedicated network PC
A. Roads D. network switch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 50

58. Which of the through is share the data of 63. Salman is curious about e-mail. He asks
two computer? you about the medium that is used to send
an e-mail message. Which of the following
A. Telnet
options will you use to answer his ques-
B. Arpanet tion?
C. Internet A. Fax machine
D. Network B. Postal service

NARAYAN CHANGDER
59. Which of the following best describes an C. Courier service
IP address? D. Internet
A. 4 numbers ranging between 0 and 255,
64. ISP
separated by dots
A. internet service protocol
B. 8 numbers ranging between 0 and 10,
separated by ‘@’ signs B. internet service provider
C. 3 numbers ranging between 0 and 10, C. international service provider
separated by dots
D. internet success protocol
D. 4 numbers ranging between 0 and 100,
separated by dashes 65. What network covers a LARGE geographi-
cal area?
60. Which term describes a set of rules that
A. LAN
computers on a network use to communi-
cate with one another? B. WAN
A. Method C. BAN
B. Protocol D. KAN
C. Instruction 66. What is a local area network (LAN)?
D. Conduct A. A group of computers connected
within a confined geographic area
61. What do we call a set of rules known as
“protocols” developed for the internet? B. Two or more nodes that span a wide
geographic area
A. XYZ
C. A set of protocols that enables clients
B. (TCP) Transmission Control Protocol
& servers to communicate
C. HTTP
D. A node on a network that serves as a
D. WWW portal to other networks

62. Which one of these is a type of social me- 67. Which of these is NOT part of “The First
dia? and Last Mile” of the Internet
A. BBC News A. A school network
B. Minecraft B. Cell Phone Towers
C. Instagram C. Undersea Cables
D. Amazon D. Your home WiFi network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 51

68. Which of the following stores websites on B. easy to communicate


the internet?
C. network down

PRACTICE BOOK» NOT FOR SALE


A. Web server
D. none of above
B. Web browser
C. Web page 74. Which of the following is used solely to re-
D. URL solve human-readable domain names into
their computer-readable IP addresses?
69. is a system of connected computers
that allows the sharing of files and equip- A. Reverse domain name servers
ment. B. Domain name servers
A. Network C. Virtual domain name servers
B. Router
D. Shared domain name servers
C. Transmitter
D. Modulation 75. What is a Distributed Denial of Service
(DDoS) attack?
70. To change the domain name to an IP ad-
dress the ISP uses a A. An attempt by a government to deny In-
ternet access to its citizens
A. DNS server
B. An attempt to deny access to a website
B. Switch
by flooding the website’s servers with mil-
C. Web server lions of requests from different comput-
D. Protocol ers

71. What is the name of the problem-solving C. An attempt by one user to deny service
model in which a task that cannot be per- to another user by posting malicious ma-
formed by one person is outsourced to a terial on a social network
large group or community in order to ob- D. An attempt by an Internet user to ac-
tain & analyze large amounts of data? cess private information stored in a pri-
A. Cloud Computing vate database
B. Crowdsourcing
76. Which of the following is a benefit that on-
C. On-demand Computing line shopping websites provide over brick
D. SaaS and mortar stores?

72. Full form of ISP A. Users can try out an item before they
buy it
A. Internet Service provider
B. Ice Cream Service provider B. Users can easily pay with cash in per-
son
C. Inter Software PC
C. Users can easily see product reviews
D. None
and determine if an item has been satis-
73. The basic advantages of the computer net- factory for a large number of people
work is D. There is no wait time between purchas-
A. Hacking ing an item and having access to it

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 52

77. Which type of networking is British Royal A. network


Family Tree? B. web page
A. Bus Netwiorking C. Internet
B. Tree Networking D. IP address
C. Cable networking
82. The Internet is a
D. none of above
A. vast network of LANs and WANs

NARAYAN CHANGDER
78. Which field is computer networks origi- B. small network of LANs and WANs
nated from?
C. line of LANs and WANs
A. Government
D. none of above
B. Military
C. Media 83. What do the letters HTTP stand for?

D. Police A. Hyper Text Transfer Protocol


B. Hip Text Translator Person
79. Telecommunication is the
C. Hyper Text Protocol
A. Transmission of words or symbols, im-
ages, and data. D. Hip Texting Peeps

B. Transmission of words or symbols, im- 84. Sabina creates a Web site for the first
ages, and data over a distance through time. She wants to know which proto-
technology. col her Web browser uses to display Web
C. Process of conveying information from pages. Which of the following protocols
a sender to a receiver. does her Web browser use?

D. none of above A. File Transfer Protocol (FTP)


B. Hypertext Transfer Protocol (HTTP)
80. What is a wide area network?
C. Simple Mail Transfer Protocol (SMTP)
A. A computer network that links devices
within a building or group of adjacent D. Internet Protocol (IP)
buildings. 85. Which of the following best describes the
B. a networking device that forwards basic purpose of the internet?
data packets between computer networks. A. The internet protects the privacy of
Routers perform the traffic directing func- sensitive information.
tions on the Internet.
B. The internet sends information from
C. Global computer network providing a one computer to another.
variety of information and communication
facilities, consisting of interconnected net- C. The internet stores data.
work using standardized communication D. The internet connects input and output
protocols. devices to a computer.
D. A network of computers across a city 86. What is the term for a server at the high-
81. A (n) is a collection of computers and est level of the Domain Name System
devices connected together via communica- (DNS)?
tions devices and transmission media. A. Root-Level Server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 53

B. Fully qualified domain name server 92. Which of the following are ways to con-
C. Top-Level Server nect to the Internet?
A. Electricity

PRACTICE BOOK» NOT FOR SALE


D. TCP/IP Server
B. Light
87. Piece of info sent by a server to a browser
C. Radio
that the browser software saves and
sends back to the server. D. Air
A. candy 93. Data packets are
B. cookie A. packets of sweets
C. cake B. single packets
D. pie C. single package that travels along a net-
work path
88. Select all the services the Internet offers
D. things that travel along a network path
A. Email
94. The time it takes for a bit to get from
B. Web-page hosting sender to receiver.
C. Printing A. Network
D. Fax to email B. Latency
89. This hardware device connects a number C. Bandwidth
of computers together on a local network. D. Bitrate
This hardware device has ports that al-
low cables to be plugged in from each con- 95. WAP stands for?
nected computer. What is the device? A. Wireless Accessible Points
A. Hub B. Wireless Access Point
B. Computer network C. Wired Able Place
C. Network cable D. Wired Able Point
D. Router 96. data is transmitted along thin glass fibre
tubes
90. Which of the following servers allows LAN
users to share data? A. Tubes
A. Data server B. Fibre
B. Client server C. ADSL

C. File server D. Telkom

D. All of these 97. What does a network enable computers to


do?
91. What is an Intranet?
A. Communicate with other computers
A. A local or restricted network only ac-
B. Take commands from users
cessible to users within an organization
C. Solve complicated mathematical prob-
B. The same as the Internet lems
C. The same as the World Wide Web D. Run games and word processing pro-
D. The same as an Extranet grams

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 54

98. One example of telecommunication? C. A more complex device that usually in-
A. Transmission cludes the capability of hubs, bridges and
switches.
B. Emailing
D. A network of computers within the
C. Transferring same building, such as a school, home or
D. Online Travelling business.
99. What is networking? 104. A common function of this hardware de-

NARAYAN CHANGDER
A. the linking of computers to allow them vice is to join a home network to the in-
to operate interactively ternet via your internet service provider
(ISP). What is the device?
B. the linking of objects that doesn’t allow
them to interact A. Router
C. a group of non linked digital devices B. Server
D. none of above C. Network cable

100. What moves around Electricity cables net- D. Hub


work? 105. David wants to publish a Web site. He
A. Gas has an Internet connection from an In-
B. Water ternet service provider (ISP). Which one
of the following features provided by an
C. Electrons ISP will enable David to publish the Web
D. none of above pages?

101. A protocol used for the transfer of files A. Hyptertext Transfer Protocol (HTTP)
between remote computers with an inter- B. File Transfer Protocol (FTP)
net connection
C. Simple Mail Transfer Protocol (SMTP)
A. FPT
D. Simple Network Management Proto-
B. PTF col.
C. TPF
106. We use these devices for wireless com-
D. FTP munication:
102. What infrastructure would you find in A. Mobile Phone
Telephone network? B. Tablets
A. People C. Laptops
B. Gas pipelines D. Telephones
C. Water pipes
E. Buses
D. Telephone cables and wires
107. private, part shared access
103. So, what is the backbone?
A. internet
A. Central network traffic infrastructure,
that connects different network. B. intranet

B. A global network of computers each C. extranet


computer connected D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 55

108. Bonus:What year was the first ever B. Sort messages by name.
email sent? C. Set a flag.

PRACTICE BOOK» NOT FOR SALE


A. 1962
D. Move the e-mail messages to a new
B. 2000 folder
C. 1971
113. You want to use the Internet to view a
D. 2020 list of the latest movies. Which of the fol-
lowing must you use to access the Inter-
109. Examples of are Google Talk,
net?
Whataspp, Yahoo! Messanger and
WeChat. A. Microsoft Notepad
A. www B. Microsoft Paint
B. E-mail C. Web browser
C. Instant Messaging D. Address book
D. FTP
114. You use your computer to chat with
110. Which of the following is a benefit of the a friend who lives in another coun-
fault-tolerant nature of Internet routing? try.Which network lets you transfer the
A. The ability to use a hierarchical naming messages between your computer and
system to avoid naming conflicts your friend’scomputer?

B. The ability to provide data transmis- A. Intranet


sion even when some connections be- B. Internet
tween routers have failed
C. Local area Network
C. The ability to resolve errors in domain
D. Ethernet
name system (DNS) lookups,
D. The ability to use multiple proto- 115. “This type of network connects a collec-
cols such as hypertext transfer protocol tion of network together. It covers every-
(HTTP), Internet protocol (IP), and simple where you can find a network.” The above
mail transfer protocol (SMTP) to transfer statement refers to?
data.
A. WIde Area Network
111. WAN focuses B. The World Wide Web
A. on a small geographical area C. The Internet
B. on a large geographical area D. The telefone networks
C. a network of internet connection
116. Company that has a permanent, fast con-
D. none of above nection to the internet and that sells inter-
112. As you read your e-mail messages in Win- net access and services for a monthly fee
dows Mail, you notice that some messages A. IPS
require a follow-up activity. What will
B. ISP
you do to ensure that you remember to do
the follow-up activity for the messages? C. SPI
A. Create a To Do list. D. SIP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 56

117. What forwards data packets to the right C. Users can share resources like print-
computer? ers and files
A. Router D. Viruses can spread easily
B. Internet 123. A is software such as Internet Ex-
C. Ethernet Cable plorer, Chrome, Safari, Firefox, etc.that al-
lows user to access and view web pages.
D. Clock
A. search engine
118. The need of networking arises due to the

NARAYAN CHANGDER
B. browser
following reasons, EXCEPT
C. URL
A. Limited Resources
D. firewall
B. Need of Money
124. If we connect three rooms in building,
C. Desire to share information
which network type do we get?
D. Cost reduction
A. WAN
119. What company’s operating system runs B. LAN
on the Chromebook? C. MAN
A. Microsoft D. SZAN
B. Google
125. Why are fiber optic cables used for long
C. Apple distances on the Internet Backbone, such
D. Windows as across country and under the ocean.
A. Because they are heavyweight cables
120. What type of server are you accessing
when you download software programs B. Because they are extremely durable
and documents from websites? C. Because they carry data the fastest
A. A HTTP Server D. Because they are the least expensive
B. SMTP Server 126. Allows two or more people to hold online
C. POP Server conferences at different locations using a
computer network to transmit audio and
D. FTP Server
video as if they were all in the same room
121. Which of the following enabled private A. Video Conferencing
(commercial) business to be conducted
B. Video Calls
over networks connected to NSFnet?
C. Video Locations
A. Private telecommunications
D. Video Line
B. The World Wide Web
127. What happens when you click a hyper
C. The National Science Foundation (NSF)
text link?
D. ARPA
A. Another web browser opens
122. An advantages of network is B. Another location in the same webpage
A. Users can see each others areas or another webpage appears
B. Servers may crash, so no work can be C. Current web browser closes
done D. All other open pages close

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 57

128. In the client/server model: D. Consists of a worldwide collection of


A. Servers interact with one another electronic documents.

PRACTICE BOOK» NOT FOR SALE


through a central client to which they are
133. Internal network which only available in-
all connected
side an organization or a company
B. the server is responsible for storing &
providing information A. Network

C. nodes interact with one another B. Web Browser


through a central client to which they are C. https
all connected
D. Intranet
D. the client is responsible for storing &
providing information 134. What is the term for a collection of re-
lated HTML documents located on a host
129. The full form of W.W.W is
computer on the Internet?
A. wide web worry
A. Web browser
B. work wide web
B. Web page
C. World Wide Web
C. Web link
D. online work web
D. Website
130. The enables wireless communication
using mobile devices 135. A network of computer networks linked
A. Mobile phone network to billions of devices worldwide.
B. Cable Network A. Network
C. Wired phone network B. World wide web
D. none of above C. Internet
131. Your friend wants to create and publish a D. none of above
Web page. He tells you that he wants to
learn the language that is used to create a 136. The cloud:
Web page. A. Is controlled by Bill Gates
A. Wireless Markup Language B. responsible for the bad weather con-
B. Hypertext Transfer Language nections
C. Hypertext Markup Language C. are multiple hard drives connected on
D. Standard General Language a Data Center
D. is the internet
132. What is World Wide Web (www)?
A. Software that find website and web- 137. The following activity is made possible by
pages. networking:
B. Collection of computers and devices A. Cloud storage.
connected together via communication de-
B. Internet browsing and email.
vices and transmission media.
C. social media
C. A portal that offers a variety of Inter-
net services. D. all of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 58

138. Which protocol splits messages across D. A power backup source


the internet into smaller pieces of data?
143. Alan wants an Internet connection for his
A. IP new laptop. He does not want to connect
B. HTTP to the Internet through cables. Which of
C. HTTPS the following components will Alan use to
connect his computer to the Internet?
D. TCP
A. Universal Serial Bus (USB)
139. A unique address for a web page is:

NARAYAN CHANGDER
B. Modem
A. a URL
C. WiFi card
B. your home page
D. Display card
C. an IP address
D. A web browser 144. What is the meaning of Local Area Net-
work?
140. What does the Internet prefix WWW A. A network of computers across a city .
stand for?
B. the global network of computers called
A. Wisconsin Wind Weather
the Internet, which connects millions
B. Western Washington World of networks and computers around the
C. Word Wide Web world.
D. Wide Width Wickets C. A computer network that links devices
within a building or group of adjacent
141. What function does the Domain Name buildings.
System (DNS) perform?
D. a networking device that forwards
A. It makes up the IP address of an Inter- data packets between computer networks.
net Protocol version 4 (IPv4) address Routers perform the traffic directing func-
B. It allows a computer to connect to the tions on the Internet.
Internet over a phone line
145. A network that functions like the In-
C. It provides text output that users can ternet but is only accessible to the employ-
access at their convenience and allows ees of an organization.
multiperson input
A. Extranet
D. It resolves IP addresses into easily
recognizable text-based names B. Intranet
C. Internet
142. At home, your grandfather watches you
working on your computer. He recently D. Router
heard about the Internet and wants to
146. What is the term for a software applica-
know what it is. How will you define the
tion that enables users to access & view
Internet to him?
web pages on the Internet?
A. A program installed on a computer
A. Website
B. An Electronic device for printing docu-
ments B. Web Browser

C. A worldwide colelction of computer C. Web Link


networks D. Web Form

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 59

147. You want to write an e-mail and convey C. Search Engine


your emotions to a friend. Which of the D. Search Address
following will you use in your e-mail?

PRACTICE BOOK» NOT FOR SALE


A. Upper case characters 152. What device connects a wireless local
area network to a wireless phone network
B. Inflammatory langauge at broadband speeds?
C. Smilies A. T carriers
D. Exclamation points B. Wireless access point
148. What enables dissimilar systems con- C. 4G mobile hot spot
nected to the Internet to communicate with
D. E carrier
one another?
A. TCP/IP 153. Fiber optic cables transfer data at the
speed of light, so they have the la-
B. WWW
tency. This results in the connection.
C. ISP
A. lowest, slowest
D. FTP
B. lowest, fastest
149. What is a cookie? C. highest, slowest
A. Data sent to a Web server that records D. highest, fastest
your actions on a website.
154. You are explaining the concept of e-mail
B. Chocolate chip.
to your friend.Which of the following op-
C. Something you eat. tions will you use as an analogy?
D. What grandma bakes. A. Postal mail
150. what is the meaning of Internet? B. Telephone directory
A. Global computer network providing a C. Fax machine
variety of information and communication D. Note Taking
facilities, consisting of interconnected net-
work using standardized communication 155. Which of the following best explains
protocols. what happens when a new device is con-
nected to the Internet?
B. A network of computers across a city
C. A computer network that links devices A. A device driver is assigned to the de-
within a building or group of adjacent vice.
buildings. B. An Internet Protocol (IP) address is as-
D. a networking device that forwards signed to the device.
data packets between computer networks. C. A packet number is assigned to the de-
Routers perform the traffic directing func- vice.
tions on the Internet. D. A Web site is assigned to the device.
151. Google, Yahoo!, Bing and MSN are the 156. Which of the following is a piece of soft-
examples of ware used to view information on the
A. Search Tools World Wide Web?
B. Search Topic A. Web server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 60

B. Web browser 161. What is the form of an IP address?


C. Web page A. ###.###.###.###
D. URL B. ##.###.####.####
C. .com
157. What are fractional T & E lines?
D. .net
A. Digital phone lines consisting of one or
more individual T or E carrier channels,
162. TCP means:

NARAYAN CHANGDER
rather than the individual T or E carrier
line A. transmission control protocol
B. Digital phone lines consisting of B. tolerance capacity protocol
shorter lengths of T or E carrier line than C. time control protocol
the standard lengths available for pur-
chase D. tender connection point
C. T or E carriers that support more band- 163. is the first part of an e-mail ad-
width than standard T or E lines dress.
D. T or E carriers that are interchange- A. User Name
able anywhere in the world
B. Web Address
158. High network traffic can lead to C. Transmission
A. data packet collisions D. Broadcast Communication
B. more users on a network
164. You want to chat with your friends over
C. faster transmissions of data the Internet. Which program must you in-
D. packets only being sent once stall to do this?
A. Microsoft Windows Messenger
159. Your internet connection can be slow be-
cause B. Microsoft Paint
A. there is a problem with the internet C. Microsoft Office Word 2013
service provider D. Microsoft Office Excel 2013
B. there is a problem with the domain
name server 165. Anna has used e-mail for more than a
year. She now has difficulty keeping track
C. there is a problem with your wireless of the contact details of all the people
router with whom she communicates. Identify
D. all of the above the method by which Anna can easily ac-
cess all of the contact details in alphabeti-
160. The full form of Internet is cal order.
A. Immediate network A. Create signature
B. International Network B. Use Address Book
C. Intermidate Network C. Sort by name
D. Internal Network D. Set a Flag

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 61

166. Which kind of data and information trans- 171. The location of a resource on the internet
mitted via the network? is given by its?

PRACTICE BOOK» NOT FOR SALE


A. Voice A. URL
B. Text B. Email
C. Video C. Proxy server
D. Image D. SMTP

E. All the above 172. You visit your friend’s house and find her
searching for books on the Internet. Which
167. The sharing and use of resources and ap- of the following describes the status of
plications offered as services over the in- your friend’s computer?
ternet
A. Online
A. Cloud Computers
B. Offline
B. Computer Clouding C. Sleep Mode
C. Cloud Computing D. Logged off
D. Computer Clouds
173. Connecting through a modem connected
168. What is a dotted quad? to a phone line
A. A default password to acces a router A. dial up
or wireless access point B. sattelite
B. A series of numbers divided into 4 seg- C. DSL
ments that identifies a unique resources D. mobile
on the Internet
174. What does Network mean?
C. A manufacturer’s serial number for a
computer A. A network of computers across a city
D. A protocol for how data is exchanged B. network is the global network of com-
between computers puters called the Internet, which con-
nects millions of networks and computers
169. Data is around the world.
A. individual pieces C. A computer network that links devices
within a building or group of adjacent
B. individual pieces of information
buildings.
C. info
D. a networking device that forwards
D. pieces of paper data packets between computer networks.
Routers perform the traffic directing func-
170. At what speed does tele-computed re- tions on the Internet.
fer?
175. Which of the following connection types
A. Internet protocol
provides the fastest direct connection
B. Kbps speed?
C. Mbps A. Fiber-Optic Cable
D. Baud rate B. T1 Line

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 62

C. T3 Line shared access to files such as text, images,


D. Cable Modem sound, or video. What is the device?
A. Router
176. The following is needed to get on the In-
ternet: B. Hub

A. Networking of computers. C. Network

B. Administrative accounts. D. Server

NARAYAN CHANGDER
C. Large storage capacity. 182. Nowadays which connectivity India
D. Wireless connection has?
A. Broadband
177. Everything on the internet has an?
B. Dial up
A. IP address
C. Internet
B. sever
D. ISP
C. packets
D. information 183. An ISP provides access to the infras-
tructure for the users.
178. Which software prevents the external ac-
cess to a system? A. Internet

A. firewall B. Protocols

B. access control C. Router

C. virus tracker D. Layers


D. antivirus 184. Is a collection of related Web pages and
associated items, such as documents and
179. What is a reference to someone who is
pictures, stored on a Web server.
an internet novice?
A. Intranet
A. Surfing
B. Web Page
B. Snailmail
C. Web Site
C. 404
D. Web Server
D. Newbie

180. The Internet is a network of comput- 185. Which of the below describes the term
ers that are together. ‘buffering’?

A. worldwide A. Your device is making a connection to


the internet
B. linked
B. Data is arriving at your device at a
C. home slower rate than it is being processed
D. not C. Data is sent from your device to an-
other device across the internet
181. This device is often described as a power-
ful computer that provides services. One D. Data is arriving at your device at a
example of a service that it can provide is faster rate than it is being processed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 63

186. Which of the following wireless mode 191. Short form of Digital Subscriber line
types uses a centralized access point
A. DSL
known as a wireless access point (AP)?

PRACTICE BOOK» NOT FOR SALE


A. Infrastructure B. ISP

B. Cable Modem C. FB
C. Ad-Hoc D. RAM
D. LAN
192. What is Domain Name?
187. When the mail server sends mail to other A. A text version of web page name.
mail servers it becomes ?
B. The text version of an IP address of a
A. SMTP host
server.
B. SMTP server
C. A search tools used to locate the infor-
C. SMTP client mation.
D. Client server
D. A worldwide collection of network.
188. Satellite orbiting the earth provide wire-
less broadband connection 193. Wifi repeaters are devices to:
A. Wireless broadband via satellite A. Improve a weak wifi signal at home or
work.
B. Wireless broadband
C. Fibre optics B. change digital signal into analog signal

D. Mobile broadband C. distribute the wifi signal

189. You go to your friend’s house to play an D. reconnect an optic fiber cable
online game. You hear modem tones when
194. A/An can either be a telecommuni-
your friend’s computer sends a request to
cation company or any other organisation
the Internet service provider (ISP) to es-
specialising in providing access to Internet
tablish the Internet connection. What type
services.
of Internet connection does your friend
use? A. Network Provider
A. Dial-up B. Internet Service Provider
B. Broadband C. Service Provider
C. Wifi
D. Internet Connector
D. Dedicated
195. The modem helps the internet signal to:
190. What are T carriers?
A. Go IN the computer from analog to dig-
A. Dedicated digital telephone lines used
ital
in Europe
B. The signaling channels in an ISDN line B. Get IN and OUT from analog to digital
and from digital to analog.
C. Dedicated digital telephone lines used
in North America C. Get distributed into many devices
D. The data channels in an ISDN line D. Get into wifi

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 64

196. What is Internet Protocol (IP)? B. software


A. The protocol by which data is sent from C. Packets
one computer to another on the Internet D. none of above
B. The protocol by which data is turned
into blocks of data known as packets 201. People prefer data communication that
is
C. The protocol by which digital data is
turned into analog data A. Always on and everywhere

NARAYAN CHANGDER
D. The protocol by which analog data is B. Fast and Reliable
turned into digital data C. Hassle free
197. According to the domain name system D. Linked to the ISP
(DNS), which of the following is a subdo-
202. What does ISP stand for?
main of the domain example.com?
A. Internet Service Provider
A. about.example.com
B. example.com/about.html B. Icee Secret Professional

C. xample.com.about C. Intranet Service Person

D. example.org D. Interpersonal Secret Professional

198. What is the Internet? 203. A distributed database that links com-
puter names and their IP addresses
A. A way for people to share information
between computers A. DNS (Domain Name Service)

B. Invented by Dr. Tim Berners-Lee from B. ISP (Internet Service Provider)


England C. MAC address
C. A browser D. modem numbers
D. None of the above
204. Your brother sends you an e-mail mes-
199. Which of the following activities poses sage that includes various URLs. Which
the greatest personal cybersecurity risk? one of the following is a valid URL?
A. Making a purchase on an online store A. http://www.margiestravel.com
that uses public key encryption to transmit B. www
information margiestravel.com
B. Paying a bill using a secure online elec- C. http://com.margiestravel.www
tronic payment system
D. http
C. Purchasing a couch by emailing a :www.margiestravel.com
credit card number to the couch owner
205. How do wired networks connect to other
D. Checking a bank account on a bank’s
devices?
website that uses HTTPS for secure com-
munication A. Radio frequencies

200. The data on Internet is broken up into a B. Microwave signals


whole lot of same-sized pieces called C. Ethernet cables
A. hardware D. Barbed wire

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 65

206. Which of the following is not a main 211. Who will win the World Series this
method for sending information from one year?
computer to another?

PRACTICE BOOK» NOT FOR SALE


A. St. Louis Cardinals
A. Electricity
B. Atlanta Braves
B. Light
C. Chicago Cubs
C. Molecules
D. Kansas City Royals
D. Radio
212. Worldwide computer network, consisting
207. Your friend creates and publishes a Web
of computers, devices and networks linked
site. You want to open it on your com-
using some form of communication media.
puter.Which of the following options will
you need to easily identify and access the A. Webpage
Web site? B. Internet
A. Domain name C. Website
B. Alphanumeric code D. Intranet
C. American standard code for informa-
tion interchange (ASCII) 213. public, open access
D. Your friend’s mothers name A. internet

208. What is ICANN stand for? B. intranet

A. Internet Corporation for Assigned Net- C. extranet


work and Numbers D. none of above
B. Internet Corporation for Association
214. What is the primary function of a net-
Names and Numbers
work server?
C. International Corporation for As-
signed Names and Numbers A. to connect network nodes together to
form clients
D. Internet Corporation for Assigned
Names and Numbers B. to request a service from another com-
puter
209. The Router allows your internet signal to:
C. to act as a central repository of pro-
A. Get modulated from digital to analog grams & data to which all users connected
B. get into wifi to the network have access
C. Be distributed through all your devices D. to connect LANs together
including wifi
215. Which of the activities below requires
D. Get demodulated from analog to digi- downloading information to your com-
tal puter?
210. Which of the following is an IP address? A. Putting a video on YouTube
A. 1.2325.434.1 B. Adding an image to a post on your so-
B. www.aeries.com cial media feed
C. a.239.bxc.1234.2 C. Browsing a web page
D. 2.4358.2.34.com D. Posting a comment on Snapchat

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 66

216. are the rules for communication used B. Net


by computers.
C. Pod
A. Protocols
D. tablet
B. Layers
C. DNS 222. Which of the following is considered an
D. Virtual networks unethical use of computer resources?
A. Downloading file sharing software on

NARAYAN CHANGDER
217. A network spread over a wide geograph-
ical area, such as a city, country or even your home computer
continents B. Searching online for the answers to
A. LAN CodeHS exercises and quizzes
B. PAN C. Purchasing an app from an app store
C. GAN and downloading it directly to a mobile de-
vice
D. WAN
D. Searching online for an electronic ver-
218. A small amount of computer data sent sion of a textbook
over a network.
A. Packet 223. What network covers a SMALL geograph-
B. TCP/IP ical area?
C. Protocol A. WAN
D. none of above B. JAN
219. If we connect three schools in a city, C. LAN
which network type do we get?
D. GAN
A. LAN
B. MAN 224. Large amounts of data sent across the in-
C. WAN ternet are split into smaller units. What is
the name of these smaller units of data?
D. HSW
A. Letters
220. If you were to use a caeser cipher with a
key of 3 shifts to the left, how would you B. Parcels
encrypt the word:Cipher?
C. Packages
A. ZAMEBO
D. Packets
B. ZOMEBO
C. ZFMEBO 225. Who owns the Internet?
D. ZFMEBA A. No one
221. What do we call a networking device that B. Bill Gates
forwards data packets between computer
networks? C. the government
A. Router D. Vint Cerf

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 67

226. What is the purpose of the Digital Millen- 230. Your device is connected to your teacher’s
nium Copyright Act? device for this quiz, which type of net-
working is this?

PRACTICE BOOK» NOT FOR SALE


A. To criminalize the act of circumventing,
or getting around, access controls that A. Star Network
block access to copyrighted works.
B. Bus Network
B. To make all content on the Internet
C. Cable Network
free for everyone to use.
D. Mesh Network
C. To criminalize plagiarism on the Inter-
net. 231. A device that converts digital data to ana-
D. To allow for open source software on log signal & vice versa?
the Internet. A. TCP/IP
227. On a network, what is used to store pro- B. Modem
grams so that hard drive space is not taken C. Node
from the computers?
D. Router
A. Server
B. Internet 232. ICANN manages
C. Memory A. Router package, IP address manage-
ment
D. Floppy Disk
B. IP address assignment, Domain Name
228. Connecting through antennas registration
A. dial up C. Content of the website, Domain Name
B. sattelite registration

C. DSL D. Router package, content of the web-


site
D. mobile
233. Which of the following internet services
229. Which of the following is LEAST likely to allows voice data to be sent over the in-
indicate a phishing attack? ternet?
A. An email from a website asks that you
A. VoIP
click on a link to reset your password.
B. Email
B. An email from your bank asks you to
call the number on your card to verify a C. WWW
transaction. D. Instant messaging
C. An email from your water utility com-
pany asks you to enter your date of birth 234. The computers that make use of the ser-
and social security number for verification vices or servers are called
purposes. A. Client Server
D. An email indicates you have won B. Client
money, and asks you to enter your bank
C. Server
account number so the money can be
transferred D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 68

235. What is the second name of the proxy B. Speakers


server?
C. Scanners
A. Proxy tools
D. Universal Serial Bus (USB)
B. Proxy gateway
C. Proxy server 241. A network of computer networks which
operates world-wide using a common set
D. Application level gateway
of communications protocols.

NARAYAN CHANGDER
236. Which of the following transmission di- A. Network
rections listed is not a legitimate channel?
B. Intranet
A. Simplex
C. Internet
B. Half duplex
D. Application
C. Full duplex
D. Double duplex 242. Which of the following can you do on the
Internet?
237. is the name given to a computer di-
rectly connected to the internet. A. All of them
A. Host B. Online shopping
B. Router C. Video calling
C. Receiver D. Streaming music
D. Channel
243. What does ISP mean?
238. www.worldbookonline.com is an exam-
ple of A. Inter Service Provider

A. an address bar B. Internet Service Protocol


B. a URL C. Internet Service Provider
C. a browser D. Internet Search Provider
D. the internet
244. Private, closed access
239. The capacity of data transfer in a system. A. internet
A. Bandwidth B. intranet
B. Bitrate
C. extranet
C. Latency
D. none of above
D. Network
245. How can a user be authenticated to ac-
240. You purchase a computer so that you
cess an intranet?
can work from home. You request an
Internet connection from an Internet ser- A. With a username and password
vice provider (ISP). Which of the following
B. No need to authenticate
physical devices will the ISP use to connect
your computer to the Internet? C. Physical signing in book
A. Cables D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 69

246. A network that connects a group of com- 251. Wide World Importers has clients in vari-
puters in a small geographical area. ous countries. It requires its employees to
work in shifts and communicate with each

PRACTICE BOOK» NOT FOR SALE


A. LAN
other through the Internet. Therefore, it
B. WAN needs an Internet connection that is fast
C. MAN and always available.What type of Inter-
net connection does Wide World Importers
D. none of above use?

247. HD, 1080p image: A. Dial-up

A. Can only be used with more than 2GHz B. Dedicated


frequency C. Digital
B. Can only be use with less than 2Ghz D. Modem
frequency
252. What is a wide area network (WAN)?
C. Cannot be seen on a PC
A. A node on a network that serves as a
D. Can be seen on a low end cell portal to other networks
248. What are electronic books? B. Two or more local area networks
(LANs) that spoan a wide geographic area
A. They are credit cards.
C. A set of protocols that enable clients
B. They are digital versions of books. and servers to communicate
C. They are free books. D. A group of computers connected
D. They cannot be read offline. within a confined geographic area

249. Which of the following best describes the 253. Direct Internet connections:
purpose of websites that use a “.edu” top- A. require digital terminal adapters to
level domain? transfer data over digital phone lines
A. Sites used to inform and provide public B. provide continuous access to the Inter-
services net through permanent network connec-
B. Sites used by non-profit companies tions
such as charities C. use temporary network connections to
provide Internet access
C. Sites ranging from nursery schools’ to
universities’ D. require activation for each usage pe-
riod
D. Sites likely to promote something
254. A city government is attempting to re-
250. An is a computer file which is sent duce the digital divide between groups
along with an e-mail message. with differing access to computing and the
A. Attachment Internet.Which of the following actions is
LEAST likely to be effective in this pur-
B. Network
pose?
C. Receiver
A. Holding basic computer classes at
D. Domain community centers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 70

B. Providing free wireless Internet con- 258. What does the extension .org mean?
nections at locations in low-income neigh- A. organization
borhoods
B. education
C. Putting helpful tips for operating com-
puters on the city government website C. commerce

D. Requiring that every school and library D. none of above


have assistive devices that allow people 259. We watched video from Google. How
with disabilities to access computer re-

NARAYAN CHANGDER
does the Internet work?
sources
A. The video that we watch travel from
255. What is “Net Neutrality? ” Google data center, transmit to satellite
and sent to your mobile.
A. the principle that Internet service
providers should enable access to all con- B. Google sent the video to your mobile,
tent and applications regardless of the and we watch through the satellite
source, and without favoring or blocking C. Satellite sent the video that we watch
particular products or websites to Google data center
B. the practice of registering names, es- D. Your mobile sent the video from the
pecially well-known company or brand satellite to Google data center
names, as Internet domains, in the hope
of reselling them at a profit. 260. How are wide area networks (WANs)
created?
C. the principle that Internet service
providers should NOT enable access to all A. By connecting LANs to one another via
content and applications regardless of the public carriers
source, and without favoring or blocking B. By consolidating network equipment
particular products or websites into one physical location
D. none of above C. By connecting LANs to one another via
network clients
256. A program that allows you to view web
pages is a: D. By distributing network equipment
among two or more buildings
A. search engine
B. plug in 261. What does WAN stand for?
A. Wide Area Network
C. web browser
B. Wide Arena Network
D. none of above
C. World Area Network
257. You want to write an e-mail to your se-
D. World Arena Network
nior applying for leave. Which of the fol-
lowing will you use in your e-mail mes- 262. Which of the following is an example of
sage? a domain name
A. Fancy Quotations A. 198.146.30
B. Signature B. .com
C. Emoticons C. www.
D. Ellipses D. Google

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 71

263. Which among the following is the C. Dial up and broadband


browser for Apple devices? D. Analog and digital system

PRACTICE BOOK» NOT FOR SALE


A. Microsoft Edge
269. What is the name of the rules that use
B. Google chrome
the Internet for communications?
C. Safari
A. Internet Rules
D. none of above
B. Rules are not necesary
264. Which piece of hardware sends data C. Protocols
across a network?
D. Browser
A. Router
B. Terminator 270. Which of these is a standard interface for
serial data transmission?
C. Hub
A. ASCII-7
D. none of above
B. ASCII-8
265. Which piece of information below
C. RS232C
WOULD NOT be included in a data packet
D. Gray code
A. Number of Packets
B. Address 271. Which is the largest network in the
C. Data world?

D. Paper A. Peer-to-peer
B. Intranet
266. Individuals use to connect to friends,
upload videos and photos. C. Extranet
A. forums D. Internet
B. social media 272. A worldwide collection of networks that
C. websites connects millions of businesses, govern-
ment agencies, educational institutions,
D. URL
and individuals.
267. Customers in Martin’s company can ac- A. World Wide Web
cess certain parts of the company network
from their own company computer outside B. ARPANet
of Martin’s company. This is an example C. Internet
of a/an: D. ICANN
A. extranet
273. Which of the following website activities
B. internet.
should make use of HTTPS?
C. intranet.
A. Checking the latest sporting news
D. throughput.
B. Registering your details on a new so-
268. Two function of Modem cial media site
A. Modulation and demodalation C. Researching a holiday abroad
B. Phone and pc D. Watching a video

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 72

274. What do you need to connect networks C. World Wide Web


together?
D. none of above
A. keyboard
B. client 280. What does “URL” stand for?

C. printer A. Uncommon Recent Listing

D. router B. Uniform Resource Locator


C. Under Reform License

NARAYAN CHANGDER
275. What is a computer network?
D. Uniform Reform Listing
A. Two or more computers connected to-
gether
281. It spans large locality and connects coun-
B. A single computer tries together.
C. A powerful computer that provides a A. LAN
service
B. WAN
D. A set of rules
C. MAN
276. What is a network? D. none of above
A. a blue net you take to work
282. Which of the following is an advantage
B. a job where you make fishing nets
of a wired network?
C. 1 computer not connected to anything
A. No trailing wires
D. 2 or more computers connected to-
gether B. It allows portability
C. It is quick and cheap to connect new
277. You want to send an e-mail to apply for devices
a job in a company.
D. Better security
A. Attractive colors
B. Smilies 283. Which of the following would pose the
C. Fancy quotations greatest threat to a user’s personal pri-
vacy if it were to be leaked to the public?
D. Formal Salutation
A. The IP address of the user’s computer
278. Which term describes the amount of data B. The user’s browser cookies
that can be moved from one point on a net-
work to another point in a given time? C. The user’s email address
A. Bandwidth D. The user’s public key used for encryp-
tion
B. Speed
C. Flow 284. Internet is example of which network?
D. Bits per second A. LAN
279. What is www short for? B. WAN
A. World Weighed Website C. MAN
B. World Wide Wed D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Computer Networks and the Internet 73

285. Which of the below is a valid protocol for 290. Which of the following is the address
email addresses? used to uniquely identify every device on
the internet?

PRACTICE BOOK» NOT FOR SALE


A. An ‘ & ’ character must be used
A. Machine address
B. An ‘@’ character must be used
B. Postal address
C. A ‘/’ character must be used
C. IP address
D. An ‘*’ character must be used
D. MAC address
286. Which of the following is used to de-
291. Which of these networks are Private?
scribe taking everyday items and connect-
ing them to the internet? A. Intranet
A. Web of Items B. Internet

B. Online Devices C. Extranet


D. MAN
C. Internet of Things
D. Smart Devices 292. A group of 2 more computer systems
linked together.
287. Which one of the below is an example of A. Network
a wired communication technology?
B. Bandwidth
A. 4G
C. Bitrate
B. Network cable
D. Latency
C. WiFi
293. What is not function of protocol?
D. Bluetooth
A. Set the rules of data packet convertion
288. What is the name of a piece of hardware B. Rules for routers
that is used to connect different devices
C. Set the rules attachment of the source
together? This hardware is often made up
and destination of each packet
of a number of wires.
D. Manage IP address assignment
A. Protocol
B. Server 294. Encryption is a way of

C. Network cable A. Securing Information on a network


B. Securing Viruses
D. Hub
C. Deleting applications
289. Which server type provides text output D. Hacking Passwords
that users can access at their convenience
& also allows multi-person input? 295. What is Packet switching?
A. Database Server A. Switching numbers and letters to the
correct order
B. Web Server
B. Breaking up a file into small pieces and
C. Email Server
putting those pieces back together at their
D. News Server destination

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 74

C. Breaking a box and throwing the C. Point-to-Point Protocol over Ethernet


pieces along a pathway (PPPoE)
D. throwing pieces of data along a path D. Hyper Text Transfer Protocol (HTTP)

296. What are E carriers? 298. Modem and router:


A. Dedicated digital telephone lines used A. are always separated
in North America B. are always present on a network

NARAYAN CHANGDER
B. The data channels in an ISDN line C. can be integrated into one device
C. Dedicated digital telephone lines used D. can not work one without the other
in Europe
299. Your ISP (Internet Service Provider) al-
D. The signaling channels in an ISDN line lows you to:
297. Which of the following protocols can con- A. Run your own website
nect an entire network to the internet? B. Route information to the right place
A. Internet Protocol version 6 (IPv6) C. Access the Internet
B. Point-to-Point Protocol (PPP) D. Turn your computer on

1.5 Definition and Classification of Computers


1. What is one disadvantage of keeping A. You may be roaming
your backups on a local desktop computer B. You are outside of browsing hours
only?
C. Your plan doesn’t include data
A. Should the computer crash, the back-
ups must be retried from storage devices D. You may have a weak signal
B. It is normally slower than using cloud- E. Your browser has expired
based storage
4. While using a laptop, what two meth-
C. The backups cannot be encrypted ods can be used to extend battery life?
D. The storage capacity is limited by the (Choose two)
desktop A. Close all background programs
2. What is a limitation of a tablet compared B. Increase the CPU usage
to a laptop computer? C. Dim the device’s screen
A. Cannot install some applications on a
D. Attach the laptop to an external hard
tablet
drive
B. Cannot make video calls
5. In binary a 1 represents
C. Cannot edit documents
A. on
D. Cannot access email
B. off
3. Which are three reasons you may not be
able to browse the Internet using your C. input
phone? (Choose three) D. output

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 75

6. Which of the following files requires the B. A Cellular-enabled tablet is unable to


most storage space? connect to Wi-Fi

PRACTICE BOOK» NOT FOR SALE


A. Videos C. A cellular-enabled tablet has monthly
B. Photos data plan subscription fees

C. Spreadsheets D. A cellular-enabled tablet costs more


money to purchase
D. Text documents
11. Which of the following options can affect
7. Which two requirements must be met for a your Internet speed? (Choose three)
device to connect to a specific secure wire-
less (Wi-Fi) network? (Choose two) A. Hardware on your computer
A. The device must be plugged in B. Brand of operating system
B. The wireless network card on the de- C. Width of your cable
vice must be enabled D. The subscription purchase from your
C. There must be no other device on the Internet provider
network E. Router connections
D. The device must be within 50 feet of
the wireless router 12. Which of the following regarding the Quick
Access toolbar is NOT correct?
E. You must have the correct network
password A. You can increase or decrease the size
of the command buttons
8. Which backup strategy provides a slower B. You can group commands in the tool-
creation of backups but faster recovery? bar
A. Full C. You can change the order of the com-
B. System State mands on the toolbar
C. Differential D. You can add and remove commands
D. Incremental from the toolbar

9. Microwaves, washing machine, medical 13. What does GUI stand for?
equipment, cameras, toys and airplanes A. Graphical User Instruction
are some of the appliances/ machines
B. Ground User Interface
which uses the list above.
C. General User Instruction
A. Personal Digital Assistants
D. Graphical User Interface
B. Embedded Computers
C. Micro Computers 14. Which backup strategy provides the
fastest creating of backups but the slow-
D. Wearable Computers
est recovery?
10. What are two primary disadvantages of a A. Differential
cellular-enabled tablet compared to a Wi-
B. Incremental
Fi-Only tablet? (Choose two)
A. A cellular-enabled tablet has less mem- C. Full
ory and a lower processing speed D. System State

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 76

15. Which hardware component will have C. Backups are not accessible if traveling
more memory space if you close an appli- without the computer
cation?
D. Files are accessible from anywhere.
A. Read Only Memory (ROM)
B. Hard Drive 20. A user makes the complaint that the com-
puter will not turn on. What is your first
C. DVD Drive
troubleshooting step?
D. Random Access Memory (RAM)

NARAYAN CHANGDER
A. Shake the computer
16. Which two popular operating systems are
B. Check to make sure the RAM is in-
Open Source operating systems? (Choose
stalled correctly
two)
A. Windows C. Try another mouse and keyboard on
the machine
B. Android
D. Check to make sure it is plugged in and
C. Linux
that the computer is getting power
D. iOS
21. What is the major advantage of MMS com-
17. In what way can identity theft may occur
pared to SMS?
through social media?
A. By accepting invitations from follow- A. MMS allows you to do video editing
ers you do not know B. MMS has better paragraph and charac-
B. By watching a video in your newsfeed ter formatting
C. By spying on accounts from followers C. In MMS, text messages are limited to
you do no know 160 characters
D. By reading an email requesting you to D. In MMS, text messages can contain
update your account information photos and links
18. What is a browser cookie?
22. How often should you log out of a social
A. A program that feeds your computer media account, life Facebook?
B. Text file a website puts on your com-
A. Anytime you’re not using it
puter
C. Type of virus B. Never, if not required

D. Spyware C. Each night

19. As you store personal data, it is important D. Weekly


to keep backups available for recovery.
What are two disadvantages of storing 23. Which online cloud storage option is pro-
backups only on a local computer? (Choose vided by Apple?
two) A. Dropbox
A. If the computer is lost, stolen, or dam- B. OneDrive
aged, the files may be inaccessible
C. iCloud
B. Restoring files from a local computer
is slower D. Google Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 77

24. Which two items would be best for cre- C. The same local area network for both
ating backups of your computer data? devices
(Choose two)

PRACTICE BOOK» NOT FOR SALE


D. VPN server
A. Printer E. Wi-Fi connection
B. External hard drive
29. Which three elements should you include
C. OneDrive
when leaving a business voice message?
D. Smartphone (Choose three)
E. Notebook and pens A. Your call-back telephone number
25. Which three options are considered types B. A brief explanation of why you called
of malware? (Choose three) C. Your name
A. Worm D. The date and time you called
B. Patch E. Your return email address
C. Virus
30. Which statement is false about the use of
D. Rootkit
a web application compared to a desktop
E. Social Engineering application?
26. Which cable will allow you to connect a A. Web applications do not need to be in-
new LED television to your laptop com- stalled
puter? B. Web applications require more net-
A. HDMI work connectivity
B. X.25 C. Web applications are confined to a
physical location
C. Ethernet
D. Web applications typically perform
D. Parallel
worse than desktop applications
27. Which three elements should be recorded E. Web applications are accessible out-
in an out-of-office voicemail message? side the office
(Choose three)
A. Detailed description of where you’ve 31. Microsoft Word, Google Chrome, iTunes,
gone and Adobe Photoshop are examples of
B. Instructions to the caller A. Applications
C. When the caller can expect a callback B. Mobile devices
D. Your name C. Operating systems
E. Your home address D. Internet service providers

28. What three items are required to establish 32. What are three limitations of a smart-
a VPN connection? (Choose three) phone compared to a laptop computer?
A. Public network connection, like the In- (Choose three)
ternet A. Cannot directly connect most smart-
B. VPN client installed on the remote de- phones to a USB drive
vice B. Cannot host a website

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 78

C. Cannot edit documents C. Users


D. Cannot use Skype for smartphones D. Testers
E. Cannot install full applications on a 37. In Windows 10, which three settings are
smartphone configured when creating a Custom Power
33. Which options are two activities you Plan? (Choose three)
should avoid when using a public Wi-Fi net- A. When to turn off the wireless adapter
work? (Choose two) B. When to put the computer to sleep

NARAYAN CHANGDER
A. Checking your bank account C. When to turn off the display
B. Watching a YouTube video D. When to turn off the hard drive
C. Making an online purchase E. Brightness level
D. Posting to your Facebook timeline
38. You have a Windows 10 computer and are
E. Browsing the news creating files in Microsoft Office. How can
34. What are three common characteristics of you put them in your OneDrive online stor-
a phishing website? (Choose three) age?

A. Has links connecting to legitimate web- A. Drag each file into your Google Drive
sites B. Open a web browser and log in to Drop-
B. Uses genuine-looking images box

C. Attempt to collect personal or financial C. Save the files in your local OneDrive
information folder

D. Uses authentic logos from a well- D. Place each file in your OneNote note-
known company book

E. Presents fake news 39. You want to install a new program, but
you aren’t sure if you PC has enough RAM.
35. You notice that your computer is full of Where on your computer is this informa-
old files and programs that you no longer tion displayed?
need, and you want to clear up memory on
your laptop. Which hardware component A. User Accounts
will have more storage after you delete a B. Date and Time
file? C. Administrative Tools
A. Random Access Memory (RAM) D. System Information
B. Hard Drive
40. Which component is responsible for hold-
C. DVD Drive ing data, instructions and information in
D. Read Only Memory (ROM) the computer when processing is taking
place?
36. They normally interact with the system via
user interface provided by the application A. RAM
software. B. ROM
A. Programmers C. CPU
B. Developers D. Secondary Storage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 79

41. Which three of the following can be per- B. Unlimited storage space
formed when using Gmail’s chat service?
C. Accessibility
(Choose three)

PRACTICE BOOK» NOT FOR SALE


A. Send photos D. Does not require a network connection

B. Format text and paragraphs 46. Which three ways allow you to connect a
C. Insert tables keyboard to a computing device? (Choose
three)
D. Watch a video inside the chat window
E. Insert hyperlinks A. USB
B. Keyboard port
42. Which three options are common ways
to receive notifications on a smartphone? C. VGA Port
(Choose three) D. HDMI port
A. Fax
E. Bluetooth
B. Vibration
C. Sound 47. What two statements are true about us-
ing external hard drives to store backups?
D. Flashing screen or light (Choose two)
43. What are two advantages of a wired net- A. Transferring data to an external hard
work over a Wi-Fi network? (Choose drive is generally faster than transferring
two) to a cloud service
A. More mobility B. External hard drives must be con-
B. Costs less money to transfer data nected to the computer for each sched-
C. More security uled backup

D. Speed is faster C. Transferring data to an external hard


drive is generally slower than transferring
44. You’re using a hardwired telephone at to a cloud service
your office. You receive a telephone call
D. External hard drives are only useful for
and want to transfer it to another em-
small amounts of data
ployee. How do you transfer a call?
A. You put the caller on hold, dial the ex- 48. When using Office (2016), which of the
tension where you want to transfer the following is the purpose for changing the
call, and hang up. default font in the Options menu?
B. You press the speed dial of the number A. If you send your document to a differ-
where you want to transfer the call ent computer, you won’t need to install
C. You hang up and dial the destination that font
number. B. All future pages will use that font by
D. You can’t transfer a call on a hard- default
wired phone
C. It allows any block of text using that
45. What are two major advantages of using font to load more quickly than other fonts
cloud storage? (Choose two) D. It allows any block of text using that
A. Easier to share files font to be read by a screen reader

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 80

49. Windows, OS X, and Linux are examples A. Send/receive text messages


of B. Browse the Internet similarly to a com-
A. Operating systems puter
B. Internet service providers C. Access voicemail
C. Applications D. Edit a document
D. Mobile devices 54. You are thinking about upgrading to a new
cell phone and selling your old one. What

NARAYAN CHANGDER
50. You want to browse the Internet, but first
you have to connect to a network. A smart are two things you should consider before
phone can connect to the Internet using selling your cell phone? (Choose two)
which three methods? (Choose three) A. Remove the SIM card if applicable
A. Wi-Fi B. Leave all of your personal information
B. Mobile app on the device

C. Data plan from a cellular carrier C. Perform a factory reset of the device

D. Mobile hotspot D. Don’t delete anything on the memory


card if there is one
51. Which two of the following tasks would
you not be able to accomplish on a smart- 55. Which two components require drivers
phone? (Choose two) that occasionally need updating? (Choose
two)
A. Edit a photo
A. Read Only Memory (ROM)
B. Create a spreadsheet
B. Power Supply
C. Store a large database of customers
and their purchase records C. Display

D. Host a website D. Pointing Device

56. Which three situations would be best for


52. Which of the following are advantages of
using Skype with video? (Choose three)
using a zip file? (Choose two)
A. Coordinating with a group of people
A. Zip files can be transferred to other
where to meet for lunch
computers more quickly
B. Interviewing for a job
B. Zipping a file prevents the file from be-
ing unintentionally corrupted C. Demonstrating how to change the set-
tings on a smartwatch
C. Zip files are smaller, so they take up
less hard drive space D. Meeting team members who live in an-
other country
D. Zip files prevent anyone without the
password from accessing them 57. What device would you plug in to a VGA
connector on a laptop?
53. You are buying a new cell phone but the
comparing some models to see what will A. Display
work best for you. What are two things B. OneDrive
you can do with a smartphone that you
cannot do with a basic cellular phone? C. Camera
(Choose two) D. External Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 81

58. What should you always back up? D. Users


A. Apps or programs E. Pictures

PRACTICE BOOK» NOT FOR SALE


B. Operating system
63. Which statement is true about Mac appli-
C. Personal data files cations?
D. Device drivers A. They will work on any device running
59. Which two apps can restore an iPhone, on an iOS operating system
iPad, or iPod Touch from a backup? B. They will not work on computers run-
(Choose two) ning on a Windows operating system
A. iTunes C. They will not work on computers run-
B. Dropbox ning on an OS X operating system
C. OneDrive D. They are called apps not applications
D. iCloud
64. Which two situations may require you to
E. Backup/Restore update a device driver? (Choose two)
60. Which three statements are true about cel- A. A hardware device stops working after
lular phones? (Choose three) you update the operating system.
A. The phone cannot send or receive calls B. An application that previously worked
without a carrier suddenly crashes
B. Generally, cellular phones have C. You reconnect a laptop to your home
clearer reception than hardwire phones Wi-Fi
C. Carrier plans do not guarantee you will D. You upgrade from a 32-bit to a 64-bit
have reception from any location version of Windows
D. Browsing the Internet requires a data
plan 65. Which option best defines SaaS?
E. All carrier plans include text messag- A. A hybrid of web and local apps where
ing applications are provide by a vendor
B. An application provided by Microsoft
61. Which two operating systems are propri-
etary? (Choose two) C. An application that is installed on the
A. iOS physical computer

B. Linux D. An application that runs via the Inter-


net
C. Android
D. Windows 66. Which type of cellular network requires a
device to have a SIM card?
62. What is the default folder for files down-
loaded from the Internet? A. POTS

A. Documents B. CDMA
B. Downloads C. Wi-Fi
C. Temporary D. GSM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 82

67. Software written to meet the need specific 72. To be effective, how often should antivirus
need of a company is software be updated?
A. special purpose software A. As often as available
B. integrated software B. Monthly
C. general purpose software C. Weekly

D. custom written software D. Annually

73. What can affect your Internet connection’s

NARAYAN CHANGDER
68. Which service is required to use text mes-
bandwidth? (Choose two)
saging on a mobile device?
A. Amount of memory
A. A Twitter or Instagram account
B. Processor
B. A mobile text messaging plan
C. Cable modem
C. A connection to the Internet
D. Wireless router
D. A cellular account
74. Which statement is true about firewalls?
69. What is spyware? A. With a firewall in place, users will
A. Malicious software that appears to be never need to worry about viruses and
harmless or good malware
B. Replicates itself to spread to other B. A firewall is a device that protect the
computers hard drive from fire damage
C. Malicious software that collects per- C. Firewalls use a set of rules to protect
sonal information computers from harmful network traffic

D. Adware D. Firewalls are outdated and have


largely been replaced by antivirus soft-
70. What is a function of an Internet Protocol ware
(IP address)?
75. What are the components of a strong pass-
A. Allows access on a Wi-Fi network word?
B. Routes Internet traffic A. A mix of uppercase and lowercase let-
ters with at least one number and one
C. Determines priority of incoming and
symbol, totaling 8 or more characters
outgoing Internet traffic
B. Combining two or three words to-
D. Identifies a specific device connected
gether
to a network
C. Any password you don’t tell to anyone
71. is a package of instructions that tell D. At least 8 letters
the computer what to do also known as
an application or short for app. 76. What two methods are best for sharing
a 90MB computer file with a group of
A. Hardware
friends? (Choose two)
B. Software
A. Post the file to a group chat session
C. Apps
B. Save the file to a shared network
D. Input folder

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 83

C. Upload the file to a cloud service and A. Carpet-cleaning business


share access to that file with the group
B. Flower-delivery service

PRACTICE BOOK» NOT FOR SALE


D. Attach the file to an email and send it
C. Clothing store
to all the members in the group
D. Small restaurant
77. What is the primary reasons you should
secure your home wireless (Wi-Fi) net- E. Real estate agent
work?
81. All computers do processing by following
A. Extend the range of the network a series of instructions in a software pro-
B. Protect your bandwidth from use by gram. The computer chip that receives and
your neighbors carries out these instructions is called:the
C. Prevent family members from shop-
ping online A. harddrive
D. Encrypt your files B. monitor

78. Today, it is often recommended to use a C. processor


new and unique password when signing D. motherboard
up for a new application. What is the best
way to manage multiple passwords? 82. Choose two reasons to back up your files.
A. Use a single password for all logins for (Choose two)
easy memorization A. App update
B. Create passwords that are easy to re- B. Virus infection
member (e.g., mother’s name) and don’t
share them C. Restoring to a new device
C. Use a password manager to encrypt D. Hard drive failure
and store passwords online
83. You are playing a game on your computer.
D. Wire them inside an unused notebook Suddenly, the screen freezes. The image
and secretly store them stops displaying correctly. Which hard-
79. What component is most cellular-enabled ware component is malfunctioning?
tablets and smartphones contains the de- A. Sound card
vice’s telephone number and identifies the
B. Keyboard
device to its carrier?
A. Data plan C. Hard drive

B. SIM card D. Graphics card


C. Hard drive 84. What are at least two types of cell phone
D. Flash drive networks available today? (Choose two)

80. Which two of the following businesses A. USB


would benefit most from using Wi-Fi- B. 3G
only tablets rather than spending the ex-
C. LTE/ 4G LTE
tra money for cellular-enabled tablets?
(Choose two) D. Ethernet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 84

85. Which of the following pieces of informa- 90. A program can be defined as a series of
tion are displayed in the properties win- detailed step-by-step that tell the com-
dow of a file? (Choose three) puter precisely what actions to perform.
A. Size A. Software
B. Location B. Inputs
C. Date Created C. Applications

D. Author D. Instructions

NARAYAN CHANGDER
E. User credentials 91. Which of the following is NOT a classifica-
tion of computers?
86. Which two ways connect a printer directly A. Micro Computer
to a computer? (Choose two)
B. Mini Computer
A. USB port
C. Desktop Computer
B. Ethernet port
D. Super Computer
C. Wi-Fi
92. You want to make a purchase online.
D. VGA port What identifier indicates that the connec-
E. HDMI tion is secure for transmitting credit card
information to the website?
87. What are two advantages of using a Wi-
A. The website’s URL begins with “https”
Fi network instead of a cellular network?
(Choose two) B. The website uses PayPal
A. Cost less money to transfer data C. The website domain is “.biz”
D. The website domain is “.com”
B. Has greater mobility
C. Accessible from more places 93. Which of the following networks will al-
low you to connect your cellular-enabled
D. Speed is faster table without incurring additional data
88. Which two methods are most commonly costs?
used to connect a pair of speakers to a lap- A. Public wireless network
top computer? (Choose two) B. Local carrier network
A. Bluetooth C. Roaming network
B. Wi-Fi D. none of above
C. Ethernet 94. Which three of the following businesses
D. Audio cable would benefit most from using cellular-
enabled tablets rather than Wi-Fi-only
89. Which two connections are made using an tablets? (Choose three)
Ethernet port on a laptop? (Choose two) A. Small restaurant
A. Connect to another computer B. Clothing store
B. Connect to a camera C. Flower-delivery service
C. Connect to a printer D. Carpet-cleaning business
D. Connect to a switch E. Real estate agent

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 85

95. Which online cloud storage options is pro- C. Wi-Fi network


vided by Microsoft? D. Cellular network

PRACTICE BOOK» NOT FOR SALE


A. OneDrive
100. In computing, which option best describes
B. Dropbox a Trojan?
C. Google Drive A. Adware
D. iCloud B. Collects personal information
96. Your computing device supports several C. Replicates itself to spread to other
Wi-Fi encryption standards. Which of computers
these Wi-Fi standards is the most secure? D. Malicious software that appears to be
A. TKIP harmless or good

B. WPA2 101. What is the best solution to use if you


need to share files between coworkers?
C. WEP
A. Outlook
D. WPA
B. Slack
97. In regards to Windows application instal- C. Flash drive
lation, which of the following statements
is true? D. Dropbox

A. Using the uninstaller will remove an 102. What type of public service will allow
application and all files associated with it you to connect your Wi-Fi device to the In-
ternet at no cost?
B. Once an application is installed, it can’t
be removed without completely erasing A. Microsoft
the hard drive B. Hotspot
C. Deleting an application’s desktop icon C. Apple
will remove the app along with all associ- D. Cellular carrier
ated files
103. What type of organization would most
D. Once a program is outdated, it must be
benefit from an LMS?
uninstalled and reinstalled to get the lat-
est version A. Legal office
B. Florist
98. What are the FOUR main functions of the
computer? C. School
A. Input, Process, Output, Recording D. Restaurant

B. Input, Output, Displaying, Remember- 104. What is one reason to zip files?
ing A. To perform routine backups of data
C. Input, Process, Output, Store and files
D. None of the above B. To maintain the organization of a set
of files or directories when sharing it with
99. Which form of network provides the great- others
est reliability and speed? C. To increase disk space
A. Wireless network D. To expand the size of files to be sent to
B. Wired network others online

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Definition and Classification of Computers 86

105. Which of the following does NOT happen A. Presentation


when you boot (or start) your computer? B. VPN
A. The computer runs tests to see if ev- C. Spreadsheet
erything works
D. CRM
B. The computer checks for new hard-
ware 110. What is a device driver?
C. The computer opens your email A. It is software that controls hardware

NARAYAN CHANGDER
D. The computer starts your operating B. It monitors hardware upgrades
system C. In automatically drives or controls sys-
tem updates
106. A friend accidentally deletes all of your
favorite photos from you computer hard D. It is the software that allows comput-
drive. What should you do? ers to connect to a network
A. Reformat your hard drive 111. Which of the following is NOT a system
B. Backup your computer utility?
C. Create new photos A. antivirus program
D. Restore from backup B. disk checking program
C. word processing program
107. You want to share a 100 GB file with
a group of 50 people located in different D. disk defragmenting program
cities. Which is the quickest way to share 112. What are three things you cannot do with
a large file with remote users? a hardwired phone that you can do with a
A. Share a link to a cloud storage location basic cellular phone? (Choose three)
B. Email the file as an attachment A. Cannot send/receive text messages
with hardwired phones
C. Download the file to a flash drive
B. Cannot take hardwired phones with
D. Save it to a shared folder on your com-
you to use while traveling internationally
puter
C. Cannot access voice mail through hard-
108. Which of the following is a way to close wired phones
a program that is not responding without
D. Cannot use hardwired phones while
using CTRL+ALT+DELETE?
riding as a passenger in a car
A. Pressing and holding ESC on your key-
E. Cannot use hardwired phones to make
board for 10 seconds
conference calls
B. Using the End Task feature in the Task
Manager 113. What two statements are true about
using a cloud service to store backups?
C. Pressing CTRL+F5 on your keyboard
(Choose two)
D. Choosing End Task from the Security A. The computer containing the data to be
tab in the right-click menu backed up must be connected to the Inter-
109. Salesforce, Microsoft Dynamics, SAP, net.
and Pipedrive are all examples of what B. Cloud services can only be used to
type of software? backup smartphones

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Characteristics of Computers 87

C. A cloud service is only useful for stor- D. When making calls from a cellular
ing large amounts of data phone

PRACTICE BOOK» NOT FOR SALE


D. Transferring large files, like video, to 118. What is the benefit of using antivirus
a cloud service is generally slower than software?
transferring large files to an external hard
drive A. Blocks hackers from entering your
computer
114. Which of the following would be the
B. Blocks and removes most malware
strongest password?
from your computer
A. Plea$ed2Be
C. Does not allow any malware onto your
B. pa$$w0rd computer
C. Love-U D. Provides a firewall
D. 1234ABCD
119. Which three activities could you avoid on
115. Which of the following is not an advan- a cellular-enabled tablet in order to pre-
tage of local storage over cloud storage vent using too much data? (Choose three)
A. You do not have full control of your A. Stay logged in to Facebook even when
data not using it
B. Less susceptible to hacking B. Edit a PowerPoint slide presentation
C. Its cheap to store your data C. Listen to a local copy of an audio book
D. No need for Internet connection D. Watch streaming movies

116. What is the name given to software that E. Upload several lengthy HD videos
can be used by many people for a wide 120. Computers are made up of and ?
range of tasks?
A. Hardware and Software
A. Custom-written
B. Bits and Pieces
B. Integrated
C. Inputs and Outputs
C. General-purpose
D. Plastic and Metal
D. Special-purpose
121. Which technology provides a “tunnel”
117. In what situation do you need an ISP?
through the Internet so you can securely
A. When you need a data plan for your connect from home to your office?
smartphone?
A. Wi-Fi
B. When connecting your home Wi-Fi to
the Internet B. Local Area Network (LAN)

C. When connecting your cellular- C. Virtual Private Network (VPN)


enabled tablet to the Internet D. Cellular

1.6 Characteristics of Computers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Characteristics of Computers 88

1. What are the benefits of using IoT? C. ROM


A. The data is nominal D. Magnetic
B. The data obtained is real time
7. In Fifth Generation computer used
C. The data obtained is difficult to ob- technology
serve
A. Ultra Large Scale Integration (ULSI)
D. Limited data obtained
B. Very Large Scale Integration (VLSI)

NARAYAN CHANGDER
2. Which of the mode surveillance camera
adapts to during night? C. Transistor

A. Normal D. Vacuum Tubes


B. Infra-red 8. Which are the big challenges of IoT?
C. Attentive
A. Security and Privacy
D. Ultra-Violet
B. It is very easy to create and implement
3. Computers are because they can store C. Connectivity
and process results as desired.
D. All the above
A. serious
B. accurate 9. IoT device interfaces allow users to control
C. reliable the devices

D. versatile A. in a static mode


B. locally
4. The main characteristics of computer is
Speed, Accuracy, Storage, Diligence and C. in a stationary mode
D. remotely
A. Program
B. Versatility 10. Which of these is NOT related to IoT scal-
ability?
C. Hardware
A. Flexibility within Internet.
D. none of above
B. Large scale deployment.
5. Ubiquitous service provision depends on
C. Real-time connectivity of billions of de-
vices.
A. QoS
D. Range of each sensor node
B. Management
C. Interoperability 11. What media of storage can break when
moving a lot?
D. Routing
A. Optical
6. Where do programs get moved when the
RAM is full? B. Magnetic
A. Solid State C. Solid State
B. Virtual Memory D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Characteristics of Computers 89

12. What are the cons about Magnetic Stor- C. USB


age? D. Magnetic Tape

PRACTICE BOOK» NOT FOR SALE


A. It’s slow compared to Solid State
E. DVD
B. mechanical Parts can be broken
18. The ability of the computer to be used in
C. It has a high capacity
almost every occupation is called
D. It’s portable
A. Storage
E. High reliability
B. Accuracy
13. Which characteristics involve the facility C. Speed
the thing to respond in an intelligent way
to a particular situation? D. Versatility

A. Intelligence 19. Computers can do any of the following ex-


B. Connectivity cept
C. Dynamic Nature A. accuracy
D. Enormous Scale B. freedom
C. speed
14. What does the ‘L’ stand for in ‘LAN’?
A. Large D. storage

B. Loop 20. The ability of the computer to give correct


C. Local results is called

D. Lollypop A. Storage
B. Accuracy
15. Two or more computers connected close to-
gether in a local area e.g. building or office C. Speed
is called? D. Versatility
A. WAN
21. A computer is a very device as it can
B. LAN process millions of instructions.
C. The Internet A. Slow
D. Virtual Network B. proper
16. Mistakes on a computer occur only when a C. fast
has been entered.
D. none of above
A. input
22. Each IoT device has a unique identity and
B. wrong data
a unique identifier (such as an IP address
C. program or a ).
D. none of above A. URN
17. What are examples of Magnetic Media B. URF
A. Hard disk C. URI
B. Floppy disk D. URV

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Characteristics of Computers 90

23. Self-configuring devices have the ability to 29. What does the ‘W’ stand for in ‘WAN’
A. fetch latest software upgrades A. Wireless
B. Scatter a network B. World
C. to install a malware C. Web
D. form a container D. Wide

24. One use of IoT is: 30. To Prepare a glass of Juice, the output will
be

NARAYAN CHANGDER
A. Computer
A. Fruits
B. Laptop
B. Juicer
C. Smart Home C. Juice
D. None of these D. none of above
25. Computers are because they can per- 31. What specifications are important for
form many operations on their own with sending 2 GB of data through the mail?
few commands given to them.
A. Capacity
A. serious B. Cost Per GB
B. accurate C. Speed
C. reliable D. Durability
D. automatic E. Portability
26. The ability of the computer to process data 32. The set of rules followed to exchange data
as fast as possible is called between two devices is called?
A. Storage A. Connections
B. Accuracy B. Wires
C. Speed C. Protocols
D. Versatility D. All the above

27. The ability of the computer to store data, 33. Which of these is a characteristic of com-
information and programs is called puters?

A. Storage A. Independence
B. Freedom
B. Accuracy
C. Speed
C. Speed
D. Majestic
D. Versatility
34. IoT Devices may have the capability to
28. It is the process of entering data into the dynamically adapt with changing contexts
computer system. and take actions based on the
A. Output A. device
B. System B. things
C. Input C. sensing environment
D. none of above D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Characteristics of Computers 91

35. Select the advantage of the IoT: 40. Which of the following hardware devices
A. The ability to access information from is most likely to be shared on a network?

PRACTICE BOOK» NOT FOR SALE


anywhere at anytime A. Mouse
B. Slows down communication between B. Keyboard
devices
C. Monitor
C. Wastes time and money
D. Printer
D. None of these
41. IoT devices may support a number of
36. What is an advantage of a LAN? communication protocols
A. You can share peripherals like print- A. exchange
ers.
B. interoperable
B. It is more secure than a standalone
computer C. static

C. Data and information cannot be easily D. variable


shared 42. Which storage is best for capacity?
D. Expensive to setup. A. Solid State
37. Two or more computers connected to- B. Optical
gether over a wide geographical area (e.g.
C. Magnetic
county, country, globe). What type of net-
work is this? D. none of above
A. LAN 43. IoT devices are integrated into network
B. School Network A. Instruction
C. WAN B. Implementation
D. The Internet C. Information
38. What is a standalone computer? D. None of these
A. A computer that is not connected to a 44. A computer can work for long without
network getting tired.
B. A computer that is being used as a A. Hours
server
B. different
C. A computer that does not have any pe-
ripherals attached to it C. medium
D. A computer that is used by only one D. none of above
person
45. To make toys with clay, the input will be
39. A computer cannot take its own
A. nature A. output
B. plants B. clay
C. decision C. toys
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Components of a Computer System 92

1.7 Components of a Computer System


1. A unit that supplies electricity to the moth- B. Air cooling
erboard and other computer components. C. Active-liquid heat sink
A. Power Supply D. x86 processors
B. Motherboard
6. The main memory of a computer that can
C. Heat Sink be quickly accessed by the CPU.

NARAYAN CHANGDER
D. Water Cooling A. Random Access Memory(RAM)
2. A cooling system composed of a liquid heat B. Bus
sink, internal liquid pump, a fan, and a ra- C. Cooling System
diator that all actively pump liquid in and
out with no help from an outside pumping D. Expansion Card
system.
7. A circuit board that connects to a com-
A. Active-liquid heat sink puter’s motherboard, giving it additional
B. Air cooling power or functionality.

C. Advanced RISC Machines (ARM) pro- A. Expansion card


cessors B. Heat sink
D. The fetch-execute cycle C. Electrostatic discharge

3. All components in a system unit are con- D. Immersion cooling


nected to the 8. An event in which two objects with differ-
A. CPU ent charge levels come together resulting
B. RAM in an electrostatic shock.

C. Hard disk drive A. Electrostatic discharge

D. Motherboard B. The fetch-execute cycle


C. Motherboard
4. A family of processors most often used in
smartphones due to its lower power re- D. x86 processors
quirements. 9. A component, sometimes built into and
A. Advanced RISC Machines (ARM) pro- sometimes plugged into the motherboard,
cessors that provides network connectivity.
B. x86 processors A. Network interface card (NIC)
C. Water cooling B. Graphics processing unit (GPU)
D. Immersion cooling C. Advanced RISC Machines (ARM) pro-
cessors
5. A liquid-cooled system that places a water-
cooled heat exchanger near a heat source. D. Active-liquid heat sink
The exchanger removes the heat, reducing 10. The most important part of any modern
the air temperature. computer system; it controls the other
A. Water cooling parts of the computer.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Components of a Computer System 93

A. Central Processing Unit (CPU) A. Bus


B. Random Access Memory(RAM) B. CPU

PRACTICE BOOK» NOT FOR SALE


C. Graphics Processing Unit(GPU) C. Power Supply
D. Network Interface Card(NIC) D. Motherboard The communication sys-
tem that allows data to be transferred be-
11. An advanced system of cooling in which tween the components inside a computer.
liquid coolant is in direct contact with the
CPU. 16. A computer component that attaches to a
A. Immersion cooling chip (such as a CPU) that disperses heat
and prevents overheating.
B. Water cooling
A. Heat sink
C. Air cooling
B. Air cooling
D. Cooling system
C. x86 processors
12. An additional computer processor that pro- D. Electrostatic discharge
vides graphics processing. It improves per-
formance by relieving the CPU of this duty. 17. A family of processors manufactured by In-
tel and AMD that use a common instruction
A. Graphics Processing Unit(GPU)
set.
B. The Fetch-Execute Cycle
A. x86 processors
C. Cooling System
B. Advanced RISC Machines (ARM) pro-
D. Heat Sink cessors
13. Components, including heat sinks and fans, C. Electrostatic discharge
that keep computer components from over- D. Network interface card (NIC)
heating.
18. A three-step cycle that processors use to
A. Cooling system
execute instructions.
B. Electrostatic discharge
A. The fetch-execute cycle
C. Air cooling
B. x86 processors
D. Network interface card (NIC)
C. Power supply
14. A common method of cooling that uses D. Active-liquid heat sink
fans to move hot air out of a system.
19. A large, flat computer component that con-
A. Air cooling nects the important components of the
B. Water cooling computer, such as the CPU, RAM, and the
C. The fetch-execute cycle BIOS chip.

D. Immersion cooling A. Motherboard


B. Power Supply
15. The communication system that allows
data to be transferred between the com- C. x86 Processors
ponents inside a computer. D. Air Cooling

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 94

1.8 Computer Architecture and Organization


1. -15 in a sign magnitude representation is 6. A bus scores over a multistage switching
network in which one of the following as-
A. 10111
pects
B. 01111
A. Reliability
C. 11111 B. Speed

NARAYAN CHANGDER
D. 10101 C. Scalability
2. Convert decimal 104 to hexadecimal num- D. Cost of Performing
ber
7. To get the physical address from the logi-
A. x84 cal address generated by the CPU, is
B. x32 used.
A. MAR
C. x68
B. MMU
D. x45
C. TLB
3. -scan program file-find all labels and cal- D. Overlays
culate the corresponding addressesThese
statement is referring to: 8. In solving problem using programming, the
A. First pass of assembly process following is the basic construct except

B. Second pass of assembly process A. Iterative


B. Conditional
C. Symbol table
C. Sequential
D. Translation
D. Operational
4. To increase the speed of memory access in
pipelining, we make use of 9. The address of the address of the operand
is specified in addressing mode.
A. Special memory locations
A. immediate
B. Special purpose registers
B. direct
C. Cache
C. indirect
D. Buffers
D. relative
5. CPU keeps checking status register until 10. The Input devices can send information to
new data arrives OR device ready for next the processor.
dataThis statement is referring to
A. When the SIN status flag is set
A. Interrupt
B. When the data arrives regardless of
B. Polling the SIN flag
C. Assembly C. Either of the cases
D. Coding D. Neither of the cases

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 95

11. Convert x304E to octal number 17. What does the hardwired control genera-
A. 31116 tor consist of?

PRACTICE BOOK» NOT FOR SALE


B. 30116 A. Decoder/encoder
C. 3116 B. Condition codes
D. 316 C. Control step counter
12. Which of the register/s of the processor D. All of the mentioned
is/are connected to Memory Bus?
18. The type of control signal is generated
A. PC
based on
B. MAR
A. contents of the step counter
C. IR
B. Contents of IR
D. BOTH PC & MAR
C. Contents of condition flags
13. The small extremely fast, RAM’s are
called as D. All of the mentioned
A. CACHE 19. Correct correct statement(s) about LC-3I.
B. HEAPS Consists of 8 registersII. The size of mem-
C. ACCUMULATORS ory location is a word or two byteIII. Mem-
ory consists of 65536 locationsIV. Consist
D. STACKS of 16 instructions
14. A system having only two states is said to A. I
be
B. I and II
A. Boolean values
C. I, II and III
B. Binary
C. None D. I, II, III and IV

D. Both 20. is frequently used to indicate digital


signals
15. The ALU works on the instructions and
data held in the A. Light emiting diode
A. Notebook B. Tunnel diode
B. Registers C. Pin diode
C. Copy Pad
D. None
D. I/O devices
21. The first complement of-32 is (assume 8
16. What is the part of the CPU called that per-
bit number)
forms calculations?
A. 11011111
A. ALU
B. Control Unit B. 10100000
C. Program Counter C. 11100000
D. Memory D. 11011011

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 96

22. When there is more positive voltage (high C. copy-both


(H)) then, it’s said to be D. write-back
A. H = 1 = True
28. What is the name of the register that
B. L = 0 = False stores the instruction that the CPU is exe-
C. Both cuting at the moment?
D. None A. Current Instruction Register
23. The small extremely fast RAM is called as B. Program Counter

NARAYAN CHANGDER
C. Memory Data Register
A. Heap D. Accumulator
B. Stack
29. For an 8 bit signed integer number, the
C. Cache range of integers is
D. Accumulator A. -32 to +31
24. .ORIG is equivalent to B. -128 to +127
A. 001100000000001 C. 0 to 256
B. 0011000000000011 D. -64 to +63
C. 0011110000000000 30. The informs the CPU about the location
D. 001100000011000 of the data residing in the memory.
A. Data bus
25. The CPU has two modes privileged and
non-privileged. In order to change the B. Address bus
mode from privileged to non-privileged, C. Cache
is needed.
D. Control line
A. a hardware interrupt
31. A user-generated interrupt (e.g. moving
B. a software interrupt
a mouse) would be given a higher one
C. either hardware or software interrupt of these to ensure that the user interface
D. a non-privileged instruction does not lag in being updated:
A. priority
26. -32 can be represented as a sign magni-
tude number as B. service
A. 00100000 C. frequency
B. 10100000 D. none of above
C. 11100000 32. Convert the following 2’s complement in-
D. 10101000 teger number to a decimal number:111
1111 1111 1111 1111 1011
27. In cache memory, the word is written
into cache and main memory at the same A. -123
time. B. 123
A. copy-back C. -5
B. write-through D. -3206

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 97

33. Convert the following integer as a 2’s 38. Consider a non-pipelined processor with a
complement:-330 clock rate of 2.5 gigahertz and average cy-
cles per instruction of 4. The same proces-

PRACTICE BOOK» NOT FOR SALE


A. 1010111110
sor is upgraded to a pipelined processor
B. 1010110110 with five stages but due to the internal
C. 1110110111 pipeline delay, the clock speed is reduced
D. 1111110111 to 2 gigahertz. Assume there are no stalls
in the pipeline. The speed up achieved in
34. The format is usually used to store this pipelined processor is-
data. A. 3.0
A. BCD
B. 2.2
B. DECIMAL
C. 3.2
C. HEXADECIMAL
D. 2.0
D. OCTAL
39. Convert the following the following 2’s
35. The fetch and execution cycles are inter-
complement signed integer into deci-
leaved with the help of
mal:100001110
A. Modification in processor architecture
A. -242
B. Clock
B. -252
C. Special unit
C. -262
D. Control unit
D. -272
36. A four stage pipeline has the stage de-
lays as 150, 120, 160 and 140 ns re- 40. If you would like to display a character ‘z’
spectively. Registers are used between to your monitor, the value for DSR and
the stages and have a delay of 5 ns each. DDR will be
Assuming constant clocking rate, the total
A. DSR [15] = 1, DDR [7:0] = 0111
time taken to process 1000 data items on
1010
the pipeline will be-
A. 130.4 microseconds B. DSR [15] = 1, DDR [7:0] = 0111
1010
B. 165.5 microseconds
C. DSR [15] = 1, DDR [7:0] = 0011
C. 145 microseconds 0011
D. 158.4 microseconds
D. DSR [15] = 0, DDR [7:0] = 1111
37. Select an incorrect statements about in- 0011
struction priority in LC-3
41. The instruction for the following operation
A. Consists of 8 priority levels is:R2 < R3 + R5
B. Level 8 is the highest priority A. 0001010011000101
C. Level 8 can interrupt Level 3 instruc-
B. 0010010011000101
tion
C. 0001010011000111
D. Level 3 can interrupt Level 8 instruc-
tion D. 0101010011000101

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 98

42. An interrupt breaks the execution of in- B. AU


structions and diverts its execution to C. ALU
A. Interrupt service routine D. CU
B. Counter word register
48. The fastest memory in the computer sys-
C. Execution unit
tem is
D. control unit
A. ROM

NARAYAN CHANGDER
43. What is Digital Electronics B. RAM
A. Field of electronics involving the study C. Cache
of digital signal
D. None of these
B. Engineering of devices that digital sig-
nal 49. Which of the following assembly code has
error? I. ADD R2, R2, #-24II. BRnzp
C. Engineering of devices that produce
#27III. LD R2, NUMBERIV. HALT x23
digital signal
A. I and II
D. All Of the mentioned
B. II and III
44. Which memory device is generally made of
semiconductors? C. I, II and IV

A. RAM D. I, II, III and IV

B. HARD DISK 50. The possible instruction represent the fol-


C. FLOPPY DISK lowing comment is:M[PC + PCoffset] <
R2
D. CD DISK
A. LD
45. Represent 100.625 (decimal) as a fixed B. ST
point fraction (binary)
C. LEA
A. 1100100.111
D. TRAP
B. 1100100.101
C. 1111100.101 51. The set of wires, which carry information
in a controlled manner, is called
D. 1100111.101
A. System bus
46. A sequence of control words corresponding
B. Public bus
to a control sequence is called
C. Private bus
A. Micro routine
D. None of these
B. Micro function
C. Micro procedure 52. During the execution of a program which
gets initialized first?
D. None of the mentioned
A. MDR
47. The controls the I/O devices and trans-
fer of data to and from the primary stor- B. IR
age. C. PC
A. LU D. MAR

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 99

53. Convert octal number 456 (base 8) to bi- 59. A register that keeps track of the next in-
nary (base 2) struction to be executed is called a

PRACTICE BOOK» NOT FOR SALE


A. 100101110 A. Program Counter
B. 111101110 B. Instruction Register
C. 100101111 C. Accumulator
D. 100111111
D. Data Register
54. What will be the output from a D flip-flop
if D = 1 and the clock is low? 60. enables the processor to access data
quickly whenever they are needed.
A. 1
A. CU
B. No change
B. Cache
C. 0
D. 3 C. Memory
D. Register
55. Interrupts form an important part of
systems. 61. is generally used to increase the appar-
A. Batch Processing ent size of physical memory.
B. Multitasking A. Secondary memory
C. Real-time processing B. Virtual memory
D. Multi-user C. Hard Disks
56. The binary equivalent for the decimal no D. Disks
15 is
A. 0111 62. -Device sends a special signal to CPU when
new data arrives OR device ready for next
B. 1101 data-CPU can be performing other tasks
C. 1110 instead of polling deviceThese statements
D. 1111 are referring to
A. Interrupt
57. Which of the following is not one of the
control instructions? B. Polling
A. JMP C. Assembly
B. TRAP D. Coding
C. BR
63. Highly encoded schemes that use compact
D. SDI codes to specify a small number of func-
tions in each micro instruction is
58. Division by zero causes an interrupt.
A. implicit A. Horizontal organisation

B. internal B. Vertical organisation


C. infinity C. Diagonal organisation
D. external D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 100

64. GETC is equivalent to C. 11 1111 1011


A. TRAP 20 D. 10 1110 1111
B. TRAP 21
70. The following instruction belongs to
C. TRAP 23 type of instruction:0 0 0 1 0 1 0 0 0 1
D. TRAP 25 101110
A. control
65. “MTN” can be written as in ASCII code

NARAYAN CHANGDER
A. x4D544E B. operate

B. x4D644E C. add
C. x4D554E D. data movement
D. x4D5E4E 71. To read the control words sequentially
66. is a large multilayered printed circuit is used.
board inside a computer that contains CPU, A. PC
BIOS, ROM chip and the CMOS setup infor-
B. IR
mation.
C. UPC (MPC)
A. Motherboard
B. RAM D. None of the mentioned

C. ROM 72. The 8-bit encoding format used to store


D. Cache data in a computer is
A. ASCII
67. NUMBER .BLKW 7SIX .FILL x3018If the
address of NUMBER is x3100, the address B. EBCDIC
of SIX will be C. ANCI
A. x3101
D. USCII
B. x3102
C. x3106 73. The registers, ALU and the interconnection
between them are collectively called as
D. x3108
A. PROCESS ROUTE
68. Which of the following is not one of the B. INFORMATION TRAIL
data movement instructions?
C. INFORMATION PATH
A. SDI
D. DATA PATH
B. LEA
C. BR 74. MICR stands for
D. LD A. Magnetic Interface Character Resolu-
tion
69. What is the 2’s complement of 01 0001
0101? B. Magnetic Ink Card Reader
A. 10 1111 1111 C. Magnetic Ink Character Reading
B. 10 1110 1011 D. Magnetic Ink Code Register

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 101

75. What does PC stand for in Computer Archi- C. Decide


tecture?
D. Decode

PRACTICE BOOK» NOT FOR SALE


A. Program Counter
B. Personal Computer 81. The situation wherein the data of
operands are not available is called
C. Placement Counter
A. Data hazard
D. Probably Correct
B. Stock
76. What is the weight of the most significant
C. Deadlock
bit of an 8 bit signed integer?
D. Structural hazard
A. 128
B. -128 82. In addressing mode, the operand value
C. 256 is directly specified.

D. -256 A. Relative
B. Direct
77. How many bits will be required to
represent-88 as a 2’s complement signed C. Indexed
integer number? D. Immediate
A. 6 bit
83. What are the basic gates in MOS logic fam-
B. 10 bit
ily?
C. 12 bit
A. NAND and NOR
D. 9 bit
B. AND and OR
78. The register used to store the flags is C. NAND and OR
called as
D. AND and NOR What are the basic gates
A. Flag register
in MOS logic family? NAND and NOR
B. Status register
C. Test register 84. The control unit controls other units by gen-
erating
D. Log register
A. CONTROL SIGNALS
79. The ALU makes use of to store the in- B. TIMING SIGNALS
termediate results.
C. TRANSFER SIGNALS
A. Register
D. COMMAND SIGNALS
B. Accumulator
C. Stack 85. Which of the following operation will re-
D. Heap sult in overflow?
A. 01001 + 01000
80. Which of these is NOT a stage of the FDE
cycle? B. 01000 + 00100
A. Fetch C. 01001 + 00100
B. Execute D. 01000 + 10100

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Computer Architecture and Organization 102

86. Which of these busses is unidirectional? 91. The stage delays in a 4 stage pipeline are
A. Address bus 800, 500, 400 and 300 picoseconds. The
first stage is replaced with a functionally
B. Control bus equivalent design involving two stages
C. Data bus with respective delays 600 and 350 pi-
D. none of above coseconds.The throughput increase of the
pipeline is %.
87. In zero address instruction method, the
A. 31.33%
operands are stored in

NARAYAN CHANGDER
B. 32.33%
A. registers
B. accumulators C. 33.33%

C. push down stack D. 34.33%


D. cache 92. C, C++, Java languages are
88. If you type “MTN3013” from your key- A. High Level Language
board, the value for KBSR and KBDR will B. Assembly Language
be
C. Machine Language
A. KBSR [15] = 1, KBDR [7:0] = 0011
1111 D. none of above
B. KBSR [15] = 0, KBDR [7:0] = 0011 93. In Register Transfer Language, is used
0011 to denote “Add the numbers in A and B
C. KBSR [15] = 1, KBDR [7:0] = 0011 and place the sum in A”.
0011 A. B ← A + B
D. KBSR [15] = 0, KBDR [7:0] = 1111 B. A + B ← A
0011
C. A ← A + B
89. Which registers can interact with the sec-
D. A + B → B
ondary storage?
A. MAR 94. How must the output of a gate in a TTL
B. PC digital circuit act when it is HIGH?

C. IR A. Acts as a voltage source


D. RO B. Acts as a current source
C. 2
90. NUMBER .BLKW 7SIX .FILL x3018TEXT
.STRING “def”If the address of NUMBER D. 1
is x3100, the address of character ‘f’ will
be 95. Convert x33EF to binary
A. x3109 A. 0111001111111111
B. x310A B. 0011111111101111
C. x310B C. 0111011111101111
D. x310C D. 0011001111101111

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
2. Computer Architecture

2.1 CPU Architecture and Organization


1. Identify the 2 types of Personal computers B. Memory
from the list below:
C. Storage Devices
A. laptop and smartphones
D. Processor (CPU)
B. desktop and embedded
C. smartphones and tablets 5. is an electronic device that manipulates in-
formation or data.
D. desktop and mobile computer
A. Computer
2. What happens in the ‘fetch’ part of the
B. Sensor
Fetch Decode Execute Cycle
C. Sound System
A. The RAM delivers the instruction.
B. The processor fetches the instruction D. Microphone Device
from primary memory.
6. Smallest measurement unit of computer
C. The program counter goes down by memory is?
one.
A. Byte
D. none of above
B. Bit
3. A computer is an device.
C. Megabyte
A. Electronic
D. Killo Byte
B. Electrical
C. Mechanical 7. What is the purpose of the CPU?

D. None of the above A. To store data


B. To create data
4. “Used to expand the computer’s input,
output and storage capabilities.” C. To process data
A. Peripheral Devices D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 CPU Architecture and Organization 104

8. Which of the following is part of CPU? B. mouse


A. Arithmetic Logic Unit C. keyboard
B. Keyboard D. printer
C. Mouse
14. Which of the following memory is the
D. Printer fastest memory to access data?
9. The fastest and most powerful computer A. RAM

NARAYAN CHANGDER
system B. ROM
A. Mainframe C. Register
B. Desktop
D. Harddisk
C. Super
15. it can store, retrieve, and process data.
D. Laptop
A. Computer
10. Which type of computer is built to what is
the abbreviation of CPU? support an orga- B. Microphone device
nization’s information? C. DATA Switch
A. Central Processing Unit D. Router
B. Central Protocol Unit
16. The portion of a computer that fetches and
C. Counter Processing Unit executes instructions is called?
D. Central Proces A. Memory
11. What does the control unit do? B. Central processing unit
A. It controls and monitors communica- C. Register
tions between the computer and any hard- D. Cache
ware attached
B. It holds the data and programs that 17. is a hardware design aspect that defines
the CPU currently needs and prescribes the size, shape, and other
physical specifications of components, par-
C. It holds the data and programs that
ticularly in electronics.
the CPU currently needs
A. Open-Source
D. All of the above
B. CPU
12. it is any part of your computer that has a
physical structure. C. Form Factor

A. software D. Google Forms


B. hardware 18. computer architecture (Choose 2 answers
C. programmer )
D. manufacturer A. Harvard
B. Instruction Set Architecture
13. Which of the following is considered out-
put devices? C. Microarchitecture
A. Touch Pad D. Von Neumann

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 CPU Architecture and Organization 105

19. The Central Processing Unit or CPU con- C. Monitor


tains two sub-Components which are
D. Speaker

PRACTICE BOOK» NOT FOR SALE


A. Main memory & Bus
B. Input & Output Devices 24. it is any set of instructions that tells the
hardware what to do.
C. he Arithmetic/Logic Unit (ALU) and the
control unit (CU) A. hardware
D. none of above B. software

20. How many cycles per second would a 3 C. drivers


GHz processor do? D. updates
A. 3 million
25. Which of the following is considered both
B. 3000 input and output devices?
C. 3 thousand million (3 billion) A. Modem
D. none of above
B. Monitor
21. What is supercomputer? C. Keyboard
A. Powerful desktop computer designed D. Printer
for specialized tasks.
B. Large expensive computer capable of 26. What is clock speed measured in?
simultaneously processing data for hun- A. Cycles per minute
dreds or thousands of users
B. Cycles per second
C. High capacity machines with thou-
sands of processors that can perform C. Cycles per hour
more than several trillion calculations per D. none of above
second.
D. Tiny, specialized microprocessors in- 27. Which of the following is a type of archi-
stalled in smart appliances and automo- tecture used in the computers nowadays?
biles.
A. Microarchitecture
22. A may represent a broad class of B. Harvard Architecture
similarly sized components, or it may pre-
scribe a specific standard. C. Von-Neumann Architecture

A. ATX D. System Design


B. BIOS 28. Desktop, laptop and handheld is catego-
C. Factory defect rized as the same family which called
D. Form Factor ?
A. Microcomputer
23. Which of the following is not an example
of output device? B. Micro-controller
A. Printer C. Personal Computer (PC)
B. Keyboard D. Individual PC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 106

29. What is the abbreviation of DC? C. Cache’s


A. Digital Care D. Higher capacity RAM’s
B. Digital Core
31. this computers are designed for use at a
C. Direct Current
desk or table.
D. Direct Core
A. SMART Phone
30. To reduce the memory access time we gen-
erally make use of B. SMART CCTV

NARAYAN CHANGDER
A. SDRAM’s C. Desktop Computer
B. Heaps D. SMART WiFi

2.2 Memory Systems


1. It is used to speed up the way applications C. Sequential consistency
work. D. None of the mentioned
A. RAM
5. one of the disks in a hard drive
B. ROM
A. spindle
C. Cache memory
B. actuator
D. Flash memory
C. track
2. The standard SRAM chips are costly as D. platter
A. They use highly advanced micro-
6. A shared-memory system is said to sup-
electronic devices
port the model if the value returned
B. They house 6 transistor per chip by a read operation on a memory address
C. They require specially designed PCB’s is always the same as the value written
by the most recent write operation to that
D. None of the mentioned address.
3. Consider a direct mapped cache with block A. Sequential Consistency
size 4 KB. The size of main memory is 16 B. Strict Consistency
GB and there are 10 bits in the tag. Find
the number of bits in block offset. C. Causal Consistency
D. None of the mentioned
A. 8 bits
B. 12 bits 7. a type of storage media that consists of
a flat, round, portable metal disc made of
C. 16 bits
metal, plastic, and lacquer that is written
D. 32 bits and read by a laser.
4. The straight-forward model used for the A. Optical Discs
memory consistency is called B. Hard Disks
A. Random consistency C. Hard Drive
B. Remote node D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 107

8. Virtual memory is used 13. Which of the following is used to hold


ROM, RAM, CPU and expansion cards?
A. when RAM is too small to contain the

PRACTICE BOOK» NOT FOR SALE


programs and data currently being used A. Computer Bus
B. every other time a program is used B. Mother Board
C. as a secondary storage medium for C. Cache
long term storage of documents D. None
D. when the CPU is getting overheated
14. On which memory device is data pre-
9. Consider a direct mapped cache with block recorded?
size 4 KB. The size of main memory is 16 A. Hard Disk
GB and there are 10 bits in the tag. Find
the number of bits in physical address. B. RAM

A. 34 bits C. ROM

B. 32 bits D. none of above

C. 16 bits 15. a storage device that contains one or more


D. 8 bits inflexible, circular platters that use mag-
netic particles to store data, instructions,
10. individual blocks or records have a unique and information.
address based on physical location with A. Flashdrive
B. DVD
A. associative
C. Hard Disks
B. physical access
D. none of above
C. direct access
16. Main memory works in conjunction with
D. sequential access

11. For permanent memory in computer ob- A. CPU


jects used are-
B. RAM
A. Floppy Disc
C. Graphics
B. magnetic Tape
D. None of these
C. Hard Disc
17. which of these statements are correct for
D. Optical Disc DRAM?
E. All of these A. DRAM is a memory chip that depends
upon an applied voltage to keep the stored
12. Which one is secondary storage?
data
A. RAM
B. DRAM stands for Dynamic RAM
B. Hard Disk
C. DRAM is as fast as a CPU
C. ROM
D. DRAM is the most expensive form of
D. BIOS RAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 108

18. optical disks are read with a 24. A is the main storage device in your
A. glass computer.
B. heater A. CPU
C. fuser B. Hard drive
D. laser C. Motherboard
19. What component in a computer allows you D. CD-Rom
to keep multiple windows open and allows

NARAYAN CHANGDER
you to switch between them 25. Computer memory are of two types:
A. RAM A. Hard disk and Flash drive
B. ROM B. Hard Disk and Memory Card
C. CPU C. RAM and ROM
D. SSD D. Internal memory and External memory
20. NORMA means
26. What is the smallest measurement used to
A. no remote mapping access measure a computer memory?
B. network operation of remote memory A. Megabyte
access
B. Terabyte
C. no remote memory access
D. network remote memory access C. Yottabyte
D. Bits
21. Amount of time it takes storage devices to
begin reading data 27. Where is the location of system cache?
A. process time A. on the die of the CPU
B. access time
B. on the processor chip
C. print time
C. on the motherboard
D. idel time
D. none of above
22. Boot-up program
A. Cache 28. What is RAM?
B. RAM A. Read Only Memory
C. ROM B. Random Access Memory
D. Hard Disk C. Read Any Memory
23. Which of these components are included in D. none of above
a Hard Disk Drive?
29. Operating System is loaded into?
A. Motor
B. Platter A. ROM

C. Read-write head B. Hard Disk


D. ALU C. RAM
E. Laser D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 109

30. Which storage device is not flash mem- C. RAM


ory? D. ROM

PRACTICE BOOK» NOT FOR SALE


A. SD Card
36. In method, the shared-memory space
B. RAM
is structured as a collection of objects.
C. Micro SD
A. structuring as a database
D. BIOS
B. no structuring
31. When using the technique all write op- C. structuring by data type
erations made to main memory are made
to the cache as well. D. None of the mentioned

A. write back 37. which of theses are advantages of Solid


B. LRU State Memory storage over Magnetic or
Optical storage?
C. write through
A. No moving parts, less can go wrong.
D. unified cache
B. Faster to read and write to.
32. How many bytes in a kilobyte?
C. Cheaper than Magnetic or Optical de-
A. 2024 vices, byte for byte.
B. 1024 D. Data stored on SS memory will last for-
C. 1000 ever
D. 8 38. What is the location of the internal regis-
ters of CPU?
33. is the memory in a computer that is
used to store computer programs while A. Internal
they are running any information the pro- B. On-chip
grams need to do their job.
C. External
A. RAM
D. Motherboard
B. ROM
C. Cache memory 39. The full form of MROM is
D. Flash memory A. Memorized Read Only Memory

34. Binary data on Hard Disk Drives is repre- B. Metal Read Only Memory
sented using C. Mask Read Only Memory
A. Magnetic charges D. Mobility Read Only Memory
B. Physical pits and lands
40. Virtual memory is
C. Electrical current
A. a memory management technique
D. Lasers
B. a virus checking utility
35. What is the fastest form of memory? C. a piece of hardware
A. Level 1 cache D. an series of pixels used to represent
B. Level 2 cache an image

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 110

41. Which level of cache is share among the C. cache memory


processor core?
D. Main Memory
A. L1 cache
B. L2 cache 47. Which Pocket friendly device is used to
transfer files from one computer to an-
C. L3 cache other?
D. L4 cache
A. Pen Drive
42. Where would virtual memory normally

NARAYAN CHANGDER
B. Blu Ray Disc
be?
C. Hard Disk
A. RAM
D. none of above
B. Hard drive
C. Cache 48. A type of volatile memory
D. The cloud A. RAM
43. A line includes a that identifies which B. ROM
particular block is currently being stored C. Cache memory
A. cache D. Flash memory
B. hit
C. tag 49. Can be programmed a limited amount of
times, and one bit at a time can be erased
D. locality with electricity
44. How many bytes are there in a kilobyte? A. EEPROM
A. 2024 B. EPROM
B. 1024 C. flash ROM
C. 1000 D. PROM
D. 8
50. The memory implemented using the semi-
45. *Consider a direct mapped cache with block conductor chips is
size 4 KB. The size of main memory is 16
GB and there are 10 bits in the tag. Find A. Cache
the number of bits in line number. B. Main
A. 16 bits C. Secondary
B. 8 bits D. Registers
C. 12 bits
51. Which Of these devices can be single or
D. 32 bits
double sided?
46. Which of the following medium is used be- A. CD
tween CPU & RAM TO speed up the pro-
cessing power of a CPU? B. DVD
A. Virtual Memory C. Pen Drive
B. Flash Memory D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 111

52. What Are The Three Types Of Secondary C. Munin


Storage? D. None of the mentioned

PRACTICE BOOK» NOT FOR SALE


A. Optical
58. In the distributed system, data is dupli-
B. ROM cated mainly for
C. Magnetic A. security
D. Solid State B. reliability and performance
53. The main storage medium for computers C. consistency

A. RAM D. None of the mentioned

B. Flash Drive 59. This is a method of making a computer ap-


pear to have more primary memory than
C. Hard disk
it has really has physically. For instance
D. Memory Card a PC might have 2Gb of RAM as primary
memory, but of 4Gb.
54. Which of the following memories allow si-
multaneous read and write operations? A. Virtual Memory
A. ROM B. Random Access Memory

B. RAM C. Read Only Memory


D. Cache Memory
C. EPROM
D. Floppy Disk 60. A computer’s external hard drive is often
considered a storage device
55. Can only be programmed once.
A. primary
A. EEPROM B. secondary
B. EPROM C. tertiary
C. flash ROM D. tertiary
D. PROM
61. Virtual memory is .
56. Breaking logical memory into blocks of the A. Memory on the hard disk that the CPU
same size is called as: uses an extended RAM
A. Frames B. in RAM
B. Pages C. only necessary if you do not have any
C. Segments RAM in your computer

D. Blocks D. a backup device for floppy disk


62. is the simplest mapping technique and
57. is a DSM system that is fundamentally
maps each block of main memory into only
based on software objects, but which can
one possible
place each object on a separate page so the
hardware MMU can be used for detecting A. Direct mapping
accesses to shard objects. B. Associative mapping
A. RPC C. Set associative mapping
B. IPC D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 112

63. Why is there a short delay before a pro- 68. Which one is used to store data that con-
gram opens? trols the most basic computer functional-
ity?
A. Because the RAM is slow
A. RAM
B. Because the RAM is not working
B. ROM
C. Because the RAM has a virus
C. HDD
D. Because the RAM is loading the mod-
ule D. none of above

NARAYAN CHANGDER
69. RAM-What happens when the electricity
64. What is the correct order of storage capac-
Is turned off?
ity in ascending order?
A. The data from the memory is saved
A. Byte, Bit, Megabyte, Kilobyte, Gigabyte
onto flash memory
B. Bit, Byte, Kilobyte, Megabyte, Gigabyte
B. The data from the memory is saved
C. Megabyte, Byte, Gigabyte, Bit, Kilo- onto the hard disk
byte C. The data from the memory is not saved
D. Bit, Megabyte, Byte, Gigabyte, Kilobyte D. The data from the memory is saved
onto ROM
65. In approach, Shared-memory space is
ordered as an associative memory called a 70. Which storage device stores data using
tuple space. magnetic technology?
A. structuring as a database A. Solid state
B. no structuring B. Internal Hard disk
C. structuring by data type C. USB
D. None of the mentioned D. External hard disk

66. A computer keeps data, instructions, and 71. consists of electronic components that
information on this. store instructions waiting to be executed
and the data needed by those instructions.
A. Solid-State Drives
A. Memory
B. External Hard Drive
B. Storage Device
C. Storage Media
C. Memory Cards
D. none of above
D. none of above
67. What does the RAM store? 72. In distributed system, read the data
A. Operating system, programs and data item referenced by address, and write
which are currently being used the contents referenced by address to the
value of data.
B. A program used to start the computer
called the boot program or BIOS A. sets, returns
C. All programs and documents stored on B. returns, sets
the computer C. returns, returns
D. none of above D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 113

73. If the RAM is upgraded from 512MB to B. The cache is too slow
4GB, what will be the biggest benefit? C. The virtual memory is too small

PRACTICE BOOK» NOT FOR SALE


A. More programs and data can be D. The hard disk is too slow
opened at the same time
79. What causes a computer to slow down?
B. The operating system will be faster
A. Too many programs running meaning
C. There will be more hard drive space
the RAM must be used multiple times
D. The computer will be quicker if you
B. Too many programs running at once
open a document
meaning Virtual Memory must be used
74. Can be erased and rewritten faster than C. The computer’s laziness and lethargy
other ROM at the end of long day
A. EEPROM D. none of above
B. EPROM 80. Memory Card is?
C. PROM A. External Memory
D. flash ROM B. Internal Memory
75. What is an example for a secondary mem- C. Primary Memory
ory? D. none of above
A. RAM 81. The problem of may occur when data
B. ROM items in the same data block are being up-
C. Pen Drive dated by multiple nodes at the same time.

D. Charger A. thrashing
B. granularity
76. What are the examples of primary mem-
C. consistency
ory?
D. None of the mentioned
A. RAM
B. ROM 82. a portable flash memory storage device
that you plug in a USB port, which is a
C. HDD
special, easily accessible opening on a com-
D. SSD puter or mobile device.
77. The model is the strongest form of A. Mouse
memory coherence, having the most strin- B. USB Flash Drives
gent consistency requirement. C. IPhone
A. Sequential Consistency D. none of above
B. Strict Consistency
83. Portable, inexpensive storage medium
C. Causal Consistency (also called diskette)
D. None of the mentioned A. CD-ROM
78. A computer is continuously paging to the B. DVD-ROM
swap file. Why might this be C. Floppy disk
A. There is not enough RAM D. Hard disk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 114

84. An advantage of the use of approach 89. A computer has 1024 megabytes of RAM.
in shared-memory space is that it is conve- That is the same as
nient to choose any suitable page size as A. 1 Gb
the unit of sharing and a fixed grain size
may be used for all applications. B. 1000 Gb
A. structuring as a database C. 1 Kb

B. no structuring D. 1 Tb

NARAYAN CHANGDER
C. structuring by data type 90. Why do computers need RAM?
D. None of the mentioned A. To store the boot up sequence for the
computer quickly
85. Which Memory Device is used in Portable
devices such as Mobile Phone? B. To allow the CPU to access Data and
Instructions securely
A. SIM Card
C. To allow the CPU to access Data and
B. Memory Card Instructions quickly
C. CD D. To store the boot up sequence for the
D. none of above computer securely

86. Why is RAM volatile? 91. A storage medium for portable devices like
digital cameras, mobiles.
A. It isn’t, it keeps its memory, even
when the computer is turned off A. Memory card
B. It temporarily stores data, when the B. USB
power is turned off, it loses what was was C. CD
stored in it.
D. Hard Disk
C. Its contents fly around inside it all the
time 92. Which of these components are included in
a Optical Disk Drive?
D. none of above
A. Motor
87. Where is ROM usually found inside a com-
B. Platter
puter?
C. Read-write head
A. Inside the CPU
D. ALU
B. As part of the hard drive
E. Laser
C. On the motherboard
D. With the CD drive 93. The main problem is to solve the memory
coherence problem that deals with the
88. Not intended to be a portable storage de- of a piece of shared data lying in the main
vice. memories of two or more nodes.
A. CD A. thrashing
B. Flash memory B. Granularity
C. DVD C. consistency
D. Internal hard disk D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 115

94. Built in memory of computer is 100. “Memory is organized into records and
access must be made in a specific linear se-
A. EROM
quence” is a description of

PRACTICE BOOK» NOT FOR SALE


B. ROM A. direct access
C. RAM B. random access
D. PROM C. sequential access
D. associative
95. recording of a “0” on a disk
A. pit 101. THE STORAGE CAPACITY OF A DVD
VARIES FROM TO
B. land
A. 4.2 GB TO 16 GB
C. zero B. 4.1 GB TO 17 GB
D. one C. 4.7 GB TO 17.1 GB

96. The only two digits used in the binary num- D. none of above
ber system are 102. What is Blu-Ray used for?
A. one and two A. Save data for later use
B. zero and one B. Backing up whole computer systems
C. zero and two C. Storing Films, Games

D. two and three D. To store data and programs in current


use by the computer
97. Which is the smallest form of data? 103. Where does one find virtual memory?
A. Bit A. RAM
B. Byte B. Cache
C. Nibble C. Hard Disk
D. 8 Binary Digits D. ROM
104. Typically has the largest storage capacity
98. Which one of these devices is optical?
and is the cheapest per Gigabyte.
A. CD A. Magnetic storage
B. SSD B. Solid state storage
C. USB flash drive C. Optical storage
D. Magnetic stripe D. none of above

99. What is BIOS? 105. Which Device uses Blue Violet Laser to
read write data?
A. Beginners Input/output System
A. RAM
B. Basic Input/Output System B. Blu Ray Disc
C. Based Inside Of System C. Hard Disk
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 116

106. refers to the block size of the DSM 111. This memory stores the data of the op-
system, i.e. to the units of sharing and the erating system and programs that are cur-
unit of data transfer across the network rently running, for access by the CPU.
when a network block fault occurs.
A. RAM
A. Granularity
B. ROM
B. Coherence
C. Cache memory
C. Abstraction
D. Flash memory

NARAYAN CHANGDER
D. Synchronization
112. For set-associative mapping, the cache
107. The faster, costlier and relatively small control logic interprets a memory address
from of storage managed by computer sys- as
tem hardware is:
A. 3 fields
A. Main Memory
B. 2 fields
B. Flash Memory
C. 1 field
C. Cache memory
D. 4 fields
D. Virtual Memory
113. A CD CAN STORE UP TO OF DATA
108. Which one is an example of flash mem- AND IS IN DIAMETER.
ory?
A. 500 MB, 56 INCHES
A. SD Card
B. 700 MB, 47 INCHES
B. RAM
C. 300 MB, 54 INCHES
C. ROM
D. none of above
D. Cache
114. Data is stored in the computer memory in
109. Data and instructions stored in this In- the form of:
ternal memory is lost when computer is
A. Numbers
turned off
B. Text
A. ROM
C. Bits/Bytes
B. RAM
D. none of above
C. USB
D. Hard disk 115. What do the instructions in the ROM do
when the computer starts up?
110. The most effective Replacement Algo-
A. Transfers the Operating System from
rithms for direct mapping
Secondary Storage to the RAM
A. LRU
B. Checks the system for viruses
B. LFU
C. Checks the system for errors
C. FIFO
D. Transfers the Operating System from
D. No choice ROM to the RAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 117

116. What is Firmware? 122. A secondary memory can also be called


A. Data in the RAM as

PRACTICE BOOK» NOT FOR SALE


B. A program in ROM A. Backup Memory

C. Any item of Hardware B. Main memory

D. Any program in Cache C. Internal memory


D. none of above
117. Give examples of storage devices and
media 123. Found in the computer’s BIOS, what actu-
A. CD, DVD, Blu-ray ally is the ‘bootstrap’?
B. USB A. The program which takes the com-
puter through steps that lead up to the
C. Memory cards
loading of the operating system (OS)
D. All of the above
B. The program responsible for loading
118. Which Memory is Volatile? the drives for peripheral devices like the
keyboard and mouse
A. RAM
C. T he computer’s initial start-up pro-
B. ROM
cess
C. Both above
D. The device used to attach the ROM to
D. none of above the computer’s motherboard
119. An optical storage device that is used to 124. What is the high speed memory between
record high quality video and sound.It can the main memory and the CPU called?
store data 6 times more than a CD
A. Register Memory
A. Blu Ray Disk
B. Cache Memory
B. CD
C. Storage Memory
C. DVD
D. Virtual Memory
D. Flash Drive
125. Whenever the data is found in the cache
120. A type of non-volatile solid state memory
memory it is called as
technology.
A. RAM A. HIT

B. ROM B. MISS

C. Cache memory C. FOUND

D. Flash memory D. ERROR

121. How Many GBs does a Terabyte have? 126. Which is the Main Secondary Memory?
A. 1024 A. Blu Ray Disc
B. 8 B. DVD
C. 100 C. Hard Disk
D. 1 D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 118

127. Choose the correct option about computer 133. In a distributed computing environment,
memory. distributed shared memory is used which
A. RAM-Non Volatile-Permanent is
B. ROM-Volatile-Temporary A. Logical combination of virtual memo-
ries on the nodes
C. RAM-Volatile-Temporary
D. ROM-Volatile-Permanent B. Logical combination of physical memo-
ries on the nodes
128. Which type of storage is directly accessi-

NARAYAN CHANGDER
C. Logical combination of the secondary
ble to the CPU?
memories on all the nodes
A. Primary
D. All of the above
B. Secondary
C. Offline 134. What is storage?
D. none of above A. Computer equipment on which infor-
129. How many bits are in a single byte? mation can be stored

A. 4 B. Microsoft word
B. 8 C. It is a network
C. 12 D. All of the above
D. 16
135. ROM stands for
130. An example of what is stored on RAM is:
A. Read Optical Memory
A. Instructions
B. Random Only Memory
B. The Operating System
C. Calculations C. Read Only Memory
D. none of above D. Random Optical Memory

131. For internal memory, the is equal to 136. is the most effective replacement al-
the number of electrical lines into and out gorithm
of the memory module.
A. Random
A. access time
B. unit of transfer B. LFU

C. capacity C. LRU
D. memory ratio D. FIFO

132. Can be programmed a limited amount of 137. Binary data on Optical discs is repre-
times and be erased with an ultraviolet sented using
light.
A. Magnetic charges
A. EEPROM
B. EPROM B. Physical pits and lands

C. flash ROM C. Electrical current


D. PROM D. Lasers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 119

138. refers to whether memory is internal C. A device that uses tape to store data
or external to the computer. D. Where the computer start up instruc-

PRACTICE BOOK» NOT FOR SALE


A. Hierarchy tions are stored
B. Tag
144. The memory which is used to store the
C. Location copy of data or instructions stored in
D. Access larger memories, inside the CPU is called

139. Size of the memory mainly depends


A. Level 1 cache
on the size of the address bus.
B. Level 2 cache
A. Main
B. Virtual C. Registers

C. Secondary D. TLB

D. Cache 145. records (writes) and/or retrieves (reads)


items to and from storage media.
140. number of bits per second at which data
is moved from a storage device to RAM A. Cloud Storage
A. rom B. USB
B. data transfer rate C. Storage Device
C. read D. none of above
D. BIOS 146. Where, data will remain intact even
141. The ROM chips are mainly used to store when the computer is turned of
A. Secondary Storage device
A. System files B. Primary Storage device
B. Root directories C. Motherboard
C. Boot files D. RAM
D. Driver files
147. What are the types of Computer Mem-
142. The internal memory that can be con- ory?
stantly overwritten like a blackboard.It A. Primary memory and Secondary mem-
holds currently running programs. ory
A. ROM B. Non of these
B. RAM C. Primary memory
C. CD D. Secondary memory
D. Blu Ray Disk
148. Same as 1024 Gigabytes
143. What Is The Cache?
A. 1 Terabyte
A. Extremely fast but small amount of
B. 1 Gigabyte
memory
B. Slow memory but stores large C. 1Megabyte
amounts D. 1 Kilobyte

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 120

149. CD means? 154. The data held on can be read but not
changed. This is done during manufactur-
A. Circular Disc
ing.
B. Complete Disc
A. RAM
C. Compact Disc
B. ROM
D. none of above
C. Cache memory
150. This is a method of making a computer ap- D. Flash memory

NARAYAN CHANGDER
pear to have more primary memory than
it has really has physically. For instance 155. needle-like part of the HD that writes
a PC might have 2Gb of RAM as primary and reads data from the platter
memory, but of 4Gb. If a computer
A. actuator
relies on this memory it will be slow.
B. spindle
A. Virtual Memory
C. read/write head
B. Random Access Memory
D. cable
C. Read Only Memory
D. Cache Memory 156. What is stored in Read Only Memory
(ROM)?
151. If your programs are loading REALLY
A. Recently opened programs
slow-what could a reason be?
B. Operating system and currently run-
A. The RAM isn’t working
ning programs
B. The RAM is full
C. BIOS and boot sequence (the com-
C. The RAM is frozen puter’s initial start-up process)
D. none of above D. The CPU’s registers

152. When we work on any document on PC, 157. Most popular backup device.Small,
it is stored temporarily on- lightweight plug and play device used to
copy data from one computer to another
A. RAM
A. DVD
B. ROM
B. Hard disk
C. CPU
C. CD
D. Flash Memory
D. Flash drive
153. Having data belonging to two inde-
pendent processes in the same page is 158. Virtual memory typically uses two stor-
called age devices, RAM and
A. Buffering A. the hard drive
B. Blocking B. ROM
C. Message-passing C. a secondary piece of RAM
D. False sharing D. a CD-ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 Memory Systems 121

159. Very portable and robust as it is designed 165. Which transfer is faster
to be fitted into small electronic devices. A. data between the cache and the CPU

PRACTICE BOOK» NOT FOR SALE


A. Flash memory B. data between the RAM and cache
B. Hard disk drive C. data between the RAM and CPU
C. Magnetic tape D. data between the hard drive and CPU
D. CD
166. The type of memory that can be erased
160. Cache memory acts as a buffer between by simply exposing the device to a strong
the processor and source of ultraviolet light for a certain
A. the user amount of time.
B. the harddrive A. PROM
C. the motherboard B. EPROM
D. the RAM C. Flash
D. EEPROM
161. Optical device, fairly fragile, easy to
snap or scratch. 167. Which memory increases the speed of
A. Flash memory your computer?
B. Magnetic Tape A. ROM
C. CD B. Hard Disk
D. Hard disk C. RAM
D. none of above
162. RAM stands for
A. Read Access Memory 168. Internal memory capacity is typically ex-
pressed in terms of
B. Random Application Memory
A. hertz
C. Read Application Memory
B. nanos
D. Random Access Memory
C. bytes
163. Where is data stored when it is Virtual D. LOR
Memory?
A. It is stored on a area of a secondary 169. DVD stands for
storage device e.g. hard disk drive. A. Digital Versatile Disc
B. It is stored in the RAM. B. Digital Video Disc
C. It is stored in the ROM. C. Digitised Video Disc
D. It is stored in an optical drive e.g. CD. D. Digital Virtual Drive
164. The PROM is more effective than ROM 170. The transfer between CPU and Cache is
chips in regard to
A. Cost A. Block transfer
B. Memory management B. Word transfer
C. Speed of operation C. Set transfer
D. Both Cost and Speed of operation D. Associative transfer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 122

171. What Is Secondary Storage? 175. is the time from the instant that an
A. Secondary storage refers to any de- address is presented to the memory to
vice that can store data, in addition to the instant that data have been stored or
main memory. made available for use.
B. Secondary storage refers to any mem- A. memory cycle time
ory that is used after RAM is full. B. direct access
C. Secondary storage refers to storage C. transfer rate
that isnt as good as normal storage.

NARAYAN CHANGDER
D. access time
D. none of above
176. This internal memory holds start up in-
172. CPU Cache is located on
structions that prepare the computer for
A. The CPU use and check proper working of computer
B. The RAM parts.
C. The hard drive A. RAM
D. The motherboard B. Flash Drive
173. Why do a lot of devices use flash memory C. ROM
A. It is the fastest sort of mem- D. Memory Card
ory/storage you can get
177. Auxiliary Memory is
B. It is the cheapest form of mem-
ory/storage A. Primary Memory
C. It’s almost unbreakable due to no mov- B. RAM and ROM
ing parts C. Secondary Memory
D. It needs zero power to write to/read
D. none of above
from
174. What is the average latency of DRAM for 178. Which of these items are NOT stored in
current Computer systems? RAM

A. 10 nanoseconds A. Instructions to load up the computer


B. 100 nanoseconds B. Data
C. 1000 nanoseconds C. Programs
D. 10, 000 nanoseconds D. Applications

2.3 Input/Output Devices


1. What do we call devices that are used D. Output Devices
to enter data, information and instruction
into the computer system? 2. What One Is Volatile?
A. Hardware A. USB Stick
B. Storage Devices B. RAM
C. Input Devices C. ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 123

D. All Of Them C. Laser printer

3. Which output device of a computer is used D. None of the above

PRACTICE BOOK» NOT FOR SALE


for training presentations?
8. Which device on the back of the Microbit
A. Plotters lets you detect movement?
B. Projectors
A. Compass
C. Computer monitor
B. Bluetooth
D. Inject or laser printer
C. RAM
4. Which one of these are input devices? D. Accelerometer
A. Mouse
9. A machine that examines the body through
B. Photocopier
the use of radiation and ultrasound as a di-
C. Keyboard agnostic aid, called?
D. Monitor A. Touch screen
E. Printer
B. Printer
5. What would be the reading of a photocell C. Scanner
if it was in complete darkness?
D. Digital camera
A. 0
B. 255 10. What are 2 examples of output devices?
C. 360 A. Printer
D. 1023 B. Keyboard

6. A company wants to invest in an ad- C. Cell phone


vertising strategy that will increase the D. Scanner
prospects of sales by those people coming
in contact with their advert. What would 11. The most popular input device for com-
you recommend they use? puter games is called?
A. QR codes so people can access web- A. Trackball
sites more conveniently rather than typing
url B. Touch Screen
B. Sending personal emails to interested C. Joystick
people D. Pointing stick
C. Handing out fliers and promising dis-
counts to people who wish to buy 12. You can use this to input printed docu-
ments to a computer?
D. none of above
A. Trackerball
7. Which of these printers would an architect
be most likely to use to print large plans? B. Scanner
A. Inkjet printer C. Keyboard
B. Plotter D. Mouse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 124

13. If you want to draw house plans, you could 19. What does computer memory do? Select
use this device 2.
A. Light pen A. Keep track of software and stores
B. graphic Tablet open files
C. PDA B. Remembers your shopping list
D. none of above C. How the computer types on the screen
D. can make the computer go faster

NARAYAN CHANGDER
14. Which printer is very slow and noisy?
A. Dot Matrix printer
20. Which input device captures handwriting,
B. Laser printer hand drawn images and graphics?
C. Printer A. Graphics tablet
D. none of above
B. Mouse
15. What is used to prevent viruses from en- C. Interactive whiteboard
tering your computer?
D. none of above
A. Anti-malware
B. Anti-spyware 21. Pick out two sensors that can be used in a
C. Firewall vehicle
D. Anti-virus A. proximity sensor

16. Design, Develop, Test, and improve in re- B. parking sensor


peated cycles. C. magnetic break sensor
A. Iteratively Improve D. seatbelt sensor
B. Processing
22. They are the passageway in which data
C. Voice Recognition
and instructions are received by the com-
D. Flash Drive puter.
17. What is the highest number or value you A. Output
can return for a Digital Switch/Input
B. RAM Memory
A. 1
C. Input
B. 255
D. Storage
C. 1024
D. 500 23. memory contains the programs needed
to start a PC, which is essential for boot-
18. Which output device gives you a hardcopy
up;
of a document?
A. RAM
A. A printer
B. Speakers B. ROM
C. A monitor C. CU
D. A projector D. ALU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 125

24. Software that protects against infections 29. keyboard have arrow keys
caused by many types of malware, includ- A. 6
ing viruses, worms, Trojan horses, spy-

PRACTICE BOOK» NOT FOR SALE


ware, keyloggers, and adware. B. 2
C. 4
A. Defragmentation
D. none
B. Back up
30. Which output device of a computer used
C. Anti-malware
for producing highly accurate, very large
D. Anti-virus drawings and poster?
A. Inkjet printer
25. What input device would you recommend
for converting a hard copy document into B. Laser printer
an electronic form to be stored in a com- C. Plotter
puter?
D. Dot Matrix printer
A. A flatbed scanner
31. What is the name of the video display built
B. A photocopying machine into a cell phone?
C. A handheld scanner A. Screen
D. none of above B. Monitor
C. Speaker
26. Which of these is bigger than a gigabyte?
D. Keyboard
A. Kilobyte
32. Small pictures used to represent programs
B. Terabyte and files are called?
C. Megabyte A. Icons
D. Trilobyte B. Software
C. Hardware
27. Which ones are output devices? Select all
that applies D. Printer

A. Keyboard 33. An input device that downloads informa-


tion from the internet.
B. Mouse
A. mouse
C. Monitor
B. PDA
D. Projector
C. scanner
28. Jose’s touchpad broke on his Chromebook. D. none of above
What other device can be used to help him
34. Which of the following is not an example
move his cursor around on his device?
of an OS for Smart phone?
A. Mouse
A. UNIX
B. Keyboard B. IOS
C. Microphone C. Windows Phone 7
D. Joystick D. Android

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 126

35. Select the items below which are not stor- B. program
age devices. C. application
A. Web Camera D. server
B. Microphone
41. Printer, Monitor, Speakers and Head-
C. Scanner
phones are which type of devices?
D. Flash Drive
A. Input
E. SD Card

NARAYAN CHANGDER
B. Output
36. What combination of devices would you C. Software
select in order to provide customers of a
D. Hardware
supermarket with a customised bill?
A. Barcode reader and a printer 42. Which of the following are examples of In-
put Deices?
B. Keyboard, mouse and a printer
A. Barcode Scanner
C. Scanner and a printer
D. none of above B. Monitor
C. Joystick
37. Input device that only works with CRT
monitors called? D. Speaker

A. Graphics tablet E. Microphone

B. Stylus 43. Which memory in the Computer is used to


C. Light pens store programs and data being used by the
CPU in real time
D. Touch screen
A. RAM
38. Which type of device is a mouse: B. ROM
A. Output Device C. CU
B. Computer System D. ALU
C. Processing Device
44. Which device below lies between the sen-
D. Input Device
sor and the CPU
39. Which of the following are examples of in- A. DAC
put devices. two answers
B. DCA
A. CD
C. ACD
B. Microphone
D. ADC
C. Flash disk
45. Which type of device is a Scanner?
D. Touchscreen
A. Input Device
40. Function of system software is to serve as
the between the user, the application B. Output Device
software, and the computer’s hardware C. Storage Device
A. interface D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 127

46. Glare view might give headache to user 52. What performs automatic stock control,
due to the sharpness of the images. enables faster changes to product infor-
mation and allows easier studying of sale

PRACTICE BOOK» NOT FOR SALE


A. CRT
trends
B. TFT
A. A barcode reader
C. LCD
D. LED B. A flatbed scanner

47. Default pointing device of a laptop is C. A database system


A. Mouse D. none of above
B. Touchpad
53. User can move the ball with their thumb
C. Trackball or fingers to move the cursor. What is the
D. Remote control name of this device?
48. A computer-based video game, like A. Touchpad
Minecraft, is considered a/ an:
B. Mouse
A. Application
C. Trackball
B. Operating System
D. Keyboard
C. Web Browser
D. Hardware 54. Which of these is not an input device?
49. The type of printer that works like the A. Scanner
typewriter, printing on paper by striking
on paper. B. Monitor
A. Inkjet printer. C. Microphone
B. Dot matrix printer. D. Keyboard
C. Laser Printer.
55. a set of instructions which control the com-
D. none of above
puter is .
50. Which of the following primary input de-
A. Hardware
vices are commonly used?
A. keyboard and mouse B. Software

B. mouse and webcam C. Firmware


C. webcam and speakers D. Loungewear
D. keyboard and webcam
56. What is the name of a website on the in-
51. They are the medium in which the com- ternet called?
puter shows information to the user
A. domain name
A. Input
B. homepage
B. Output
C. Storage C. browser
D. Byte D. internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 128

57. A point-and-draw device is nothing but D. is used when a computer is not avail-
a able
A. CD-ROM
63. A device that inputs data to a computer.
B. Mouse The data is a measurement of some physi-
C. Printer cal quantity that is continuously changing.
D. Keyboard A. Microphones
58. A device that can read text or illustrations B. Digital Camera

NARAYAN CHANGDER
printed on paper and translates the infor- C. Sensors
mation into a form the computer can use.
D. Graphic tablet
A. Scanning Devices
B. Voice-Input Devices 64. This printer normally print out large and
C. Pointing Devices high resolution printouts.
D. Direct Entry A. Inkjet printer

59. If Jek need to listen to an Audio File from B. Laser printer


his Computer, what output device should C. Inkjet plotter
he use?
D. 3D printer
A. Monitor
B. Speakers 65. Additional components besides the main
parts of the computer such as printers and
C. Printer
scanners are called:
D. Scanner
A. Peripherals
60. Keyboard, mouse, scanner and webcam
B. Output Devices
are examples of which devices?
A. Input C. Input Devices

B. output D. Programs
C. Software 66. Which type of device is a Hard Drive?
D. USB
A. Input Device
61. What does GPS stand for? B. Output Device
A. Global Positioning System C. Storage Device
B. Global Positioning Satellites
D. none of above
C. Global Position Same
D. General Positioning System 67. What software is used to prevent hack-
ers?
62. A peripheral device is a device that
A. Firewall
A. is used on the outside of a computer
B. Anti-spyware
B. is used on the inside of a computer
C. Data Protection ActAnti-virus
C. is used both on the outside and inside
of a computer D. Anti-virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 129

68. PC stands for 74. what does CPU stand for?


A. Personal Caterpillar A. Central Processing Unit

PRACTICE BOOK» NOT FOR SALE


B. Panda Canvas B. Centrel Processing Unit
C. Paper Cutter C. Central Prossing Unit
D. Personal Computer D. Centerl Prossing unet
75. A command that performs different actions
69. is a processing unit in computer
depending on whether a condition is true
A. ups or false.
B. cpu A. Unconditional statements
C. power supply B. True statements
D. printer C. Conditional statements
D. Condition your hair
70. An input device that can transfer informa-
tion into your TV. 76. A precise sequence of instructions for pro-
A. mouse cesses that can be completed by a com-
puter.
B. flash drive
A. computer
C. Wii remote
B. google drive
D. none of above
C. flash drive
71. Which type of device is a Monitor? D. algorithm
A. Input Device 77. What is an example of a input device
B. Output Device A. keyboard
C. Storage Device B. monitor
D. none of above C. computer
D. headphones
72. Which one of these are output devices?
A. Mouse 78. Which device use infrared signal to oper-
ate or control other device remotely?
B. Photocopier
A. Sensor
C. Keyboard
B. Mouse
D. Monitor
C. Remote control
E. Printer
D. Touchpad
73. This device converts text, drawings and 79. A Camera attached to a computer that put
photos to digital format: short videos on your computer
A. digitizing tablet A. Digital Camera
B. softcopy B. Security Camera
C. optical mark reader C. Webcam
D. scanner D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 130

80. A does the same thing as a mouse on 86. What is the common type of wide format
the computer. printer?
A. Track Pad A. electrostatic plotter
B. Floppy Disk B. inkjet printer
C. Hard Disk C. laser printer
D. CPU D. 3D printer

81. Which is a processing device? 87. An advantage of biometric scanning for

NARAYAN CHANGDER
registration is
A. RAM
A. It is not reliant on technology
B. Hard Disk Drive
B. It is cheap
C. CPU
C. It is unique to each person, so the stu-
D. ROM
dent can’t forget it or ask someone else
82. Another term for permanent output is: to scan them in.
A. hardcopy D. none of above
B. softcopy 88. Hardware devices that allow data to be
C. hardware transmitted to a computer is called?
D. printer A. Output Devices
B. Input Devices
83. An eye typer can be used to
C. Direct Data Entry
A. track a users eye movements and
record the movements as input D. Storage Devices

B. lets the user log onto a website using 89. I’m an output device you use to hear
their eye as biometric identification sounds on the computer
C. print something out in braille A. Speaker
D. enlarge information on a screen B. Monitor
C. Mouse
84. Which of the following is NOT an Operat-
ing System D. Printer
A. Android 90. Name the device used to play games on
B. Word the computer.
C. iOS A. Input device

D. Windows B. Joystick
C. Mouse
85. a device the “reads” pencil marks compat-
D. none of above
ible scan forms-used for registering stu-
dents (and tests etc.)-this is describing 91. Choose the input devices.
A. Optical Character Recognition (OCR) A. Scanner and printer
B. Optical Mark Recognition (OMR) B. Speaker and projector
C. Optical Computer Recognition (OCR) C. Mouse and keyboard
D. Optical Mark Response (OMR) D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 131

92. Jasmine needs to hand in her report to a 97. For video conferencing over the internet
teacher, but she only has a digital copy. what do you use?
Which device would most help her with

PRACTICE BOOK» NOT FOR SALE


A. Graphic tablet
this situation?
B. Touch screen
A. Printer
C. Joystick
B. 3-D printer D. Web cam
C. Scanner
98. Input device, in typewriter format, which
D. MIDI includes all the letters of the alphabet.

93. A software program that lets you speak A. Keyboard


words or phrases into a computer, but it B. Braille Display
will not format. C. Printer
A. light pen D. Mouse
B. voice recognition 99. Which one is input devices?
C. scanner A. Speaker
D. none of above B. Touchpad
C. Monitor
94. This output device can be totally portable,
but has a disadvantage of relying on a D. Printer
powerful and expensive bulb to provide
100. In which app can you change the sensitiv-
the pictures on a big screen
ity of the mouse cursor?
A. Laser Printer A. Control Panel
B. Multimedia projector B. Settings
C. 3D printers C. Mouse Adjustment
D. Plotter D. Computer Options

95. The instructions that tell the computer 101. Select the shortcut key of refresh on the
what to do and how to do it: keyboard.
A. Software A. F2

B. Hardware B. F4
C. F5
C. Mouse
D. F8
D. Monitor
E. Non of these
96. Which of the following is the output de-
102. This component allows users to enter
vice?
text, numbers, and other information
A. Photocopier A. Mouse
B. Game controller B. Keyboard
C. Microphone C. Monitor
D. All of the above D. CPU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 132

103. This device works in the same way as a B. Speakers


mouse
C. Microphone
A. Keyboard
D. MIDI
B. Trackerball
C. Graphics Tablet 109. CD

D. Microphone A. Input
B. Output

NARAYAN CHANGDER
104. Which of the following is NOT a category
of Hardware? C. Storage
A. Input Devices D. none of above
B. Software
110. Which of the following devices is in-
C. Central Processing Unit stalled in e-Channels?
D. Storage Devices A. Mice
105. What are the most used input devices B. Keyboards
A. mouse and keyboard C. Fingerprint scanners
B. scanner and space bar D. Speakers
C. power cord and printer
111. Can you identify an input device from the
D. computer and camera following?
106. Device that projects images, gives sound, A. Keyboard
and basically gives out the info from
B. Headphones
the computer so the user can obtain it
(ex:monitor, printer, projector, speakers). C. CRT
A. Byte D. USB
B. GUI
112. How is an output device for a computer
C. Output defined?
D. Input A. Component on the inside of a computer
107. is a device that moves or controls B. Device which connects to the Internet
some mechanism
C. Device which puts data into a com-
A. Sensor puter
B. Actuator D. Device which puts data out from a com-
C. Dynamo puter
D. Buzzer 113. Most commonly used input device.
108. Mark kept getting in trouble at the li- A. graphic tablet
brary because he kept watching YouTube
B. keyboard
videos over the speakers. Which device
would better help keep his audio private? C. SD card
A. Headphones D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 133

114. What does OS stand for 120. Which device can project an image on
A. Organisation Startup the screen, and allow it to be annotated,
changed and eventually saved?

PRACTICE BOOK» NOT FOR SALE


B. Operating Startup
A. An interactive whiteboard
C. Operating System
B. A touchscreen
D. Organisation System C. A projector
115. Which type of device is a Printer? D. none of above
A. Input Device 121. Which of the following are the most com-
B. Output Device mon input devices?
C. Storage Device A. Digital camera and speakers

D. none of above B. Scanner and monitor


C. Keyboard and mouse
116. These are devices that allow you to send
D. Microphone and printer
information to the computer.
A. Input Devices 122. The is used for marking multiple
choice papers.
B. Output Devices
A. OMR
C. Processing Devices
B. OCR
D. None of the above
C. MICR
117. It is used to play games on computer. D. All of the above
A. Digital camera 123. This is a global communication network
B. Webcam that allows computers worldwide to com-
municate.
C. Joystick
A. Internet
D. Microphone
B. Wi-Fi
118. This memory is for short term storage C. Modem
and is lost when the computer is turned
off. D. Cloud Storage

A. ROM 124. which of the following are examples of


monitoring systems
B. CPU
A. buglar alarm system
C. RAM
B. alarm clock
D. none of above
C. street lighting system
119. Headphone D. checking of a patients heart beat
A. Input
125. Which input device is more suitable for
B. Output obtaining a copy of a printed document?
C. Storage A. A scanner
D. none of above B. A webcam

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 134

C. A keyboard 131. Which one of these is the most suitable


for a blind user, using a rail ticket machine,
D. A mouse
to receive their ticket
126. Which input device gives a better gaming A. A braille Printer
experience for racing or flying games?
B. A laser printer
A. A joystick C. A plotter
B. A keyboard D. A light

NARAYAN CHANGDER
C. A scanner
132. Which of these would you use to digitise
D. A webcam a paper photograph?

127. It is an input device that moves an arrow A. Scanner


on the screen as a pointer. B. Joystick
A. Monitor C. Touch screen
B. Mouse D. None of the above
C. Keyboard 133. What are the places on the microbit
D. none of above where the inputs and outputs are con-
nected called?
128. This device scans physical parts of the A. holes
body for security purposes.
B. connectors
A. OCR
C. pins
B. Biometric device
D. places
C. Voice response unit
134. Which of the following is not a sensor
D. All of the above
A. Touch Sensor
129. Which of the following devices is usually B. Heat Sensor
a standard feature on a laptop?
C. Moisture Sensor
A. Mouse
D. Light Sensor
B. Joystick
135. Where do you go to access your apps?
C. Touchpad
A. Start Menu
D. none of above
B. File Explorer
130. What is the main idea behind a barcode? C. App Launcher
A. To automate supermarket checkout D. Home screen
systems
136. What is the job of the last digit in a stan-
B. To provide remote assistance at check-
dard barcode?
outs
A. It tells the color and size. information.
C. To enable self-service checkouts
It can tell the names and locations where
D. none of above the jeans are sold. It can give links to the

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 135

store’s web site. All this inside a simple 142. Which type of device is a Hard Disk
square. Drive?

PRACTICE BOOK» NOT FOR SALE


B. It tells the store’s web site. A. Input Device
C. It detects if the barcode was scanned B. Output Device
correctly. C. Storage Device
D. The locations of where the item is sold.
D. none of above
137. Which of the following is an example of
143. What information can a QR code con-
an input device?
tain?
A. Printer
A. color and size
B. Monitor
B. links to the store’s web site
C. Speakers
C. names and locations where sold.
D. Keyboard
D. All of the above
138. What is output device?
144. Large organisations use this type of stor-
A. It allow to store data age device to back up their systems daily.
B. It allow to print data A. CD
C. It allow processing of internal data B. DVD
D. none of above C. Blu-ray
139. How to get the printed diagram into the D. Magnetic tape
computer?
145. Three types of INPUT devices are:
A. Touchpad
A. Projector, Monitor and Printer
B. Mouse
B. Remote Control, Touch Screen and
C. Printer
Keyboard
D. Scanner
C. Microphone, Video Cameras, Projec-
140. Select the items below which are output tor
devices. D. Speakers, Headphones, scanner
A. Scanner
146. Which key is used to indent a paragraph
B. Printer in MS word?
C. RAM A. Shift
D. Monitor B. tab
E. Projector C. Ctrl
141. CPU stands for D. Esc
A. Central Program Unit E. None of these
B. Control Processing Unit 147. This device converts scanned documents
C. Central Processing Unit into digital form.
D. Control Program Unit A. OMR

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 136

B. OCR 153. What does wi-fi stand for?


C. MICR A. Free Internet
D. None of the above B. Wireless Fidelity
C. Wireless Free Internet
148. Which of the following devices can fall un-
der Input and output devices? D. Without Wires Internet

A. Webcam 154. Which of these devices would not be nec-


essary for a cinema screen?

NARAYAN CHANGDER
B. Touch Screen
A. Monitor
C. Digital Camera
B. Speaker
D. All of the Above
C. Projector
149. What type of keyboard is used in tele- D. Scanner
phone and ATMs?
155. Which type of device is a QWERTY Key-
A. Numeric keyboard board?
B. Numeric keypad A. Input Device
C. Portable keyboard B. Output Device
D. QWERTY keyboard C. Storage Device
D. none of above
150. Documents you create using Google Docs
are stored: 156. is used instead of a mouse in a lap-
A. On your computer top.

B. In your Google Drive. A. Touchpad


B. Scanner
C. In a file cabinet.
C. Webcam
D. On your iPad.
D. none of above
151. Which printer can print in Colour and
Black also? 157. This DDE device has a disadvantage of
special designed forms in order for the
A. Dot matrix printer reader to read it accurately
B. Inkjet printer A. OMR
C. Laser printer B. OCR
D. none of above C. MICR
D. none of above
152. A storage device which is also called as
thumb drive. 158. An aquarium needs the temperatures of
A. SD Card the water and the saltness to be controlled.
Which of the following sensors are best
B. Flash Disk Drive used in this system. two answers
C. Removable Drive A. salt sensor
D. RAM B. Heat Sensor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 137

C. hotness and coldness sensor 164. Which input device is used to select ob-
jects on a screen with the touch of a fin-
D. pH sensor
ger?

PRACTICE BOOK» NOT FOR SALE


159. What is MICR stands for? A. Mouse
A. Magnetic Ink Character Recognition B. Touchscreen
B. Mark Ink Character Recognition C. Keyboard
C. Magnetic Infuser Character Recogni- D. none of above
tion 165. What is the most common output device
D. Magnetic Ink Compiler Recognition A. computer
160. Which of these printers would be the B. printer
most suitable for printing a large number C. monitor
of high quality black and white printouts?
D. mouse
A. Laser printer
166. Another name for Hardware is
B. Dot matrix printer
A. Software
C. Plotter
B. Components
D. None of the above
C. Peripherals
161. The is the computer’s main circuit D. Hardcopy
board.
167. A Processor:
A. hardware
A. prints a document
B. CPU B. Speaks directions to you
C. motherboard C. interprets the instructions from the
D. motherbox software
D. none of above
162. These are devices of computer which are
used to enter data into computer. 168. Output device, used to listen to audio,
which is worn on the ears.
A. Output Device
A. Headphones
B. Input Device
B. Speakers
C. Storage Device
C. Joystick
D. Processing Device
D. Keyboard
163. An input device that uses a USB port to 169. Output device used to print documents
transfer information into a computer and photos
A. mouse A. Printer
B. flash drive B. Scanner
C. Wii remote C. Monitor
D. none of above D. OCR Scanner

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 138

170. The heart (and brains) of the computer is 176. Programs that give instruction to the
the: computer.
A. ROM A. keyboard
B. RAM B. mother board
C. Motherboard C. hardware
D. CPU D. software

171. What is a TV like screen used to show 177. Which monitor is not good for your health

NARAYAN CHANGDER
pictures and words called? (eyestrain, headache, etc)
A. Keyboard A. CRT
B. Printer B. TFT
C. Monitor C. LCD
D. Scanner D. LED

172. Which of the following is not included in 178. Which of the following input devices is
pointing device? most suitable for an information kiosk?

A. Pen input A. Digitizing tablet

B. Mouse B. touch scree


C. scanner
C. Keyboard
D. optical mark reader
D. Trackball
179. Which one of these output devices is
173. This device allows the user to navigate
more suitable for a blind person to use
through a series of pre-recorded messages
A. Speakers
A. MICR
B. A projector
B. Voice response unit
C. Lights
C. Document scanner
D. A monitor
D. OCR
180. An algorithm is a set of followed to
174. input device that inputs biological data complete a task.
about a person which can identify a per-
A. values
son
B. points
A. Biocentric Device
C. scores
B. Biometric Device
D. instructions
C. Key Fob
D. all of the above 181. Which control applications that takes sig-
nal and commands from the computer and
175. what does ROM stand for turns it into motion?
A. random only memory A. Sensor
B. read only memory B. Actuator
C. really oversize memory C. Dynamo
D. none of above D. Buzzer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 139

182. An input device using a CAD program that C. Storage Device


allows the computer to change the shape, D. none of above
size, position, and color of sections of a

PRACTICE BOOK» NOT FOR SALE


screen image. 188. Out of these input devices, which one has
A. light pen the disadvantages of the display may get
dirty, then become less-visible and cause
B. voice recognition malfunction.
C. scanner A. Joystick
D. none of above B. Touch screen
183. Which type of device is a MicroSD Card? C. Keyboard
A. Input Device D. Pointing device
B. Output Device 189. Which of the following are NOT used for
C. Storage Device input?
D. none of above A. Mouse

184. Which type of device is a USB Memory B. Scanner


Stick? C. Printer
A. Input Device D. Keyboard
B. Output Device E. Projector
C. Storage Device 190. An input device used to operate another
D. none of above device from a distance, usually wirelessly,
called?
185. Give an example of a device which is used
for both input and output A. Joystick

A. Touchscreen B. Touch screen

B. Keyboard C. Remote control

C. Barcode reader D. Pointing device

D. Webcam 191. A web-based program that allows you to


E. Monitor store pictures and documents on the inter-
net which can be accessed from any com-
186. The front layer is made of liquid crystal puter.
diodes. A. flash drive
A. CRT B. Drop Box
B. TFT C. voice recognition
C. LCD D. none of above
D. LED
192. It is an output device that known as Vi-
187. Which type of device is a USB Stick? sual Display Unit.
A. Input Device A. Printer
B. Output Device B. Webcam

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 140

C. Monitor 198. What do you call a network for accessing


D. none of above applications from any device?
A. network
193. Input device which has keys with letters
B. Cloud
of the alphabet printed on them.
C. Virtual environment
A. Keyboard
D. Word Processing
B. Mouse

NARAYAN CHANGDER
C. Monitor 199. A system is set to turn on the lights in
a street light. Which of the following will
D. Printer change the data into a format that the CPU
will understand
194. Which of the following would be an ideal
situation for using a tracker ball? A. DAC

A. When there isn’t enough space on a B. ADC


desk C. ACD
B. When a barcode needs to be scanned D. DCA
C. When answers to a test need to be in- 200. Which type of device is a Touchscreen?
put
A. Input Device
D. none of above
B. Output Device
195. The type of printer that uses dry ink to C. Storage Device
print and are mostly used in publishing D. none of above
houses and it prints fast with high quality.
A. Inkjet printer. 201. A device which records facial recognition
or fingerprints is what type of system
B. Laser printer
A. Biometric
C. Dot Matric printer.
B. Future technology
D. none of above
C. AI
196. The is used for cheque processing. D. Skynet
A. MICR 202. The most common ‘pointing device’ used
B. OMR in PCs.
C. OCR A. Touch screen
D. Scanner B. Mouse
C. Keyboard
197. What is the primary function of an input
device? D. Scanner

A. To output data from a computer 203. Input device which communicates com-
mands to the CPU; allows users to select,
B. To store data on a computer
highlight, and control options on the moni-
C. To input data into a computer tor
D. To process data on a computer A. Mouse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 141

B. Keyboard 209. Which input device gives a better gaming


C. Monitor experience for racing games?
A. A joystick

PRACTICE BOOK» NOT FOR SALE


D. Software
B. A keyboard
204. The method of registering students using C. A scanner
a scan of the eye or finger print is known
as D. A webcam

A. Optical Mark Reader Registration 210. programs that control or maintain the
operations of the computer and its devices.
B. Biometric Registration
A. Software
C. Smart Card Scan
B. System Software
D. Electronic Scan Registration
C. Application software
205. In which of the following situations D. Utility program
would you use a keyboard?
211. The unit of CPU that stores information
A. In a hospital to input a number of pa- temporarily or permanently.
tients’ records in a database
A. Control Unit
B. At an architect’s office to draw plans
B. Memory Unit
C. In an examination centre to input a
C. ALU
number of multiple choice questions
D. none of above
D. none of above
212. This component visually displays informa-
206. If you want to download pictures from a tion generated by the computer
digital camera, you would use a
A. Monitor
A. flash drive
B. Motherboard
B. SD card C. CPU
C. Scanner D. Operating System
D. none of above
213. What type of devices are mouse, track-
207. Which device converts a hard copy docu- ball and light pen?
ment into a digital copy? A. Processing devices
A. A 2D scanner B. Pointing devices
B. A printer C. Display devices
C. An interactive whiteboard D. none of above
D. none of above 214. is a type of system software allows
that allow a user to perform maintenance-
208. The most popular input device: type tasks
A. mouse A. Operating system
B. keyboard B. System Software
C. pen drive C. Application software
D. microphone D. Utility program

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 142

215. How would you define an output device? C. Joystick


A. A device which sends data which has D. none
been processed by the computer to an-
other device or a user 221. What storage device comes with the com-
puter?
B. A device which translates sound
waves into digital format A. Internal Hard Drive
C. A device which sends data to the com- B. USB Flash Drive

NARAYAN CHANGDER
puter to be processed C. Memory Card
D. none of above D. External Hard drive
216. is responsible for all the calculations
222. The device which is designed to minimize
sent to the computer.
the background sound is
A. RAM
A. Joy stick
B. ROM
B. Microphone
C. CU
C. Monitor
D. ALU
D. Data glove
217. Which of the following is NOT an actua-
tor? 223. The determines the sequence in which
instructions are executed within the com-
A. Pump puter.
B. Piston
A. RAM
C. Motor
B. ROM
D. Speaker
C. CU
218. IPO stands for D. ALU
A. Internet Programs Output
224. Which of the following Output Device
B. Input Program Output gives a ‘Hardcopy’?
C. Intelligent Processing Output A. Speaker
D. Input Processing Output B. Printer
219. What are the roles of pair programmers C. Monitor
called?
D. Projector
A. Programmers and Writers
225. which of the following is true about the
B. Navigators and Drivers
barcode reader
C. Algorithms and Flowcharts
A. it is used solely by the supermarket
D. Coders and Gamers
B. it is used to scan the type of good
220. is an Output device. C. it uses an led and photosensitive cells
A. Mouse to detect the bar lines
B. Monitor D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 143

226. Which of these is not a type of computer A. Touch screen


monitor? B. Game controller

PRACTICE BOOK» NOT FOR SALE


A. CAM C. Stylus
B. CRT D. Mouse
C. LCD
232. Which is an example of primary mem-
D. None of the above ory?
227. The device used to input the data from a A. 4 GB RAM
contactless credit card B. Blank CD or DVD
A. Bar code reader C. 32 GB SD Card
B. Magnetic stripe reader D. 1 TB Hard Disk Drive
C. RFID reader
233. This monitor is better in terms of the dis-
D. Pin Pad play which has more vivid colour.
228. What are 2 examples of input devices? A. CRT
A. Printer B. TFT
B. Mouse C. LCD
C. Cellphone D. LED
D. Speakers 234. Select the items below which are input
devices.
229. One benefit of a tablet is
A. CPU
A. Requires a power source
B. Mouse
B. May not have as many functions as a
laptop or desktop C. Keyboard
C. Extremely portable D. RAM
D. none of above E. Scanner

230. Any external device that provides input 235. A motion sensing game controller (like
and output for the computer. Examples used with the Wii) is classified as
are a keyboard, mouse, monitor, and a A. input
printer. B. output
A. CPU C. both
B. Peripheral D. none of above
C. Folder
236. These are devices where the computer
D. USB sends information to you.
231. Pointing device provides an intuitive in- A. Input Devices
terface by accepting pointing gestures and B. Output Devices
converting them into machine-readable in-
put. Select all pining devices that you C. Processing Devices
know: D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 144

237. Input device which has is used to move a 243. Use this key to type in all capital letters.
cursor around a computer. A. shift
A. Keyboard B. space bar
B. Mouse C. caps lock
C. Monitor D. tab
D. Printer
244. A screen magnifier can be used to

NARAYAN CHANGDER
238. A free service that provides a virtual A. make information on a screen larger
drive in the Cloud into which you can cre-
B. read out information on the screen
ate folders and store files.
C. print something out in braille
A. flash drive
D. move a pointer on a screen
B. Google Drive
C. voice recognition 245. Which type of device is a MicroSD Mem-
ory Card?
D. none of above
A. Input Device
239. Which one is very fast printer. B. Output Device
A. Inkjet printer C. Storage Device
B. Laser printer D. none of above
C. Dot matrix printer
246. Which of these is not an example of an
D. none of above input device?
240. A device used mainly for playing games: A. Printer
A. remote control B. Keyboard
B. mouse C. Mouse
C. joystick D. Web-Cam
D. trackball 247. The input device that rolls on a desktop
and controls the position of the cursor on
241. controls all the connected input and then on the screen is called a ?
output devices.
A. Touch Screen
A. CPU
B. Light Pen
B. Mouse
C. Digitizer
C. Keyboard
D. Mouse
D. Monitor
248. Which of the following are not known
242. You can input text using this device? computer “infections”.
A. Scanner A. Virus
B. Microphone B. Trojan Horse
C. Webcam C. Adware
D. Keyboard D. Firewall

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 145

249. Input device that is used to input their 255. I’m the main storage device in the com-
PIN numbers when they pay for something puter
by card, called?

PRACTICE BOOK» NOT FOR SALE


A. Web camera
A. Mouse
B. Hard disk
B. Keyboard
C. CD
C. Numeric keypads
D. Printer
D. Touch screen
256. The screen that you see when your com-
250. Type of processing that if something is puter has finished starting up is called the
true, do something else.
A. If/Then
A. Task Bar
B. Comparing
B. Start up screen
C. Matching
C. Home
D. Counting
D. Home Screen/Desktop
251. The type of Monitor that is flat, light in
weight and consumes least power. 257. How would you describe a joystick?
A. CRT Monitors A. An input device-a stick that pivots on a
base-relays angle or direction to the com-
B. LCD Monitors
puter
C. LED Monitors
B. An output device-a stick that pivots on
D. none of above a base-only used for gaming
252. Type of processing that searches a list or C. An input device-a stick that pivots on a
group of things for a match. base-uses sensors to relay information to
A. If/Then computer
B. Comparing D. none of above
C. Matching 258. A storage device that contains the oper-
D. Counting ating system, application softwares and
files save in computer.
253. Output that disappears is called:
A. Memory
A. software
B. Hard Disk Drive
B. hardcopy
C. CPU
C. softcopy
D. hardware D. Flash Drive

254. What is the common connection medium 259. What is the use of the CPU in the auto-
for stylus with the tablet? mated systems
A. WIFI A. Control the sensor
B. Infrared B. Compare value received from sensor
C. Bluetooth C. Control the flow of data in the system
D. Microwave D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 146

260. A device used to input drawings or dia- 266. A is a type of input device that can
grams into the computer. record videos and take pictures.
A. graphic tablet A. printer
B. SD Card B. webcam
C. Keyboard C. scanner
D. none of above D. cellphone
267. Which ones are input devices? select all

NARAYAN CHANGDER
261. Does a mobile device need an Operating
System? that applies

A. Yes A. Keyboard
B. Mouse
B. No
C. Monitor
C. Sometimes
D. Projector
D. none of above
268. Information or signals put into a com-
262. Which type of device is a Keyboard? puter system.
A. Input Device A. Input
B. Output Device B. Output
C. Storage Device C. Variables
D. none of above D. Algorithms
263. Devices used to convert information from 269. Software is a series of that tells a
the computer into useful form like printout, computer what tasks to perform and how
text etc. to perform them.
A. Input device A. data
B. Output device B. information
C. Keyboard C. instruction
D. none of above D. utility

264. Select the output devices. 270. An Operating System is


A. Used for creating graphs and docut-
A. Microphone
ments
B. Speakers
B. The most common type of system soft-
C. Printers ware
D. Webcam C. Only found in desktop computers
265. It is a video camera that takes pictures D. All of these
which can be broadcast on the internet. 271. devices is used to listen music
A. Webcam A. Printer
B. Projector B. Speaker
C. Camera C. Monitor
D. none of above D. CPU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 147

272. Input device that is used to record voice, C. MacAfee


music and sound into the computer is: D. macUX

PRACTICE BOOK» NOT FOR SALE


A. Keyboard
278. What are the four basic components of a
B. Mouse
computer?
C. Microphone
A. Input devices, output devices, printing,
D. none of above and typing
273. Why is it important to know the informa- B. Input devices, processing unit, stor-
tion age, and output devices
A. to talk to the computer C. Input devices, cpu, output devices,
B. to learn about monitors and RAM
C. to know what pieces of hardware do D. none of above
what
279. What is the most suitable input device for
D. all of the above highlighting or selecting an object on the
274. is the result of raw input data that screen?
has been processed by the CPU into a A. Mouse
meaningful information.
B. Joystick
A. Input
C. Keyboard
B. Output
D. None of the above
C. Process
D. Storage 280. What is the meaning of ADC in full
A. Automatic Dispensing Control
275. What is software?
A. any set of instructions that tells the B. Analogue to digital Control
hardware what to do C. Analogue to Digital Convertor
B. the video card on the monitor D. Analogue to Desktop Convertor
C. the operating system
281. Name the device used to take a printout.
D. the monitor and computer case
A. Keyboard
276. All of these are examples of an Input, EX- B. Printer
CEPT
C. Scanner
A. Speakers
D. none of above
B. Microphone
C. Scanner 282. Which one of the following is NOT a piece
D. Mouse of hardware?
A. Mouse
277. Which is an example of an Operating Sys-
tem? B. Keyboard
A. Linux C. MS Word
B. Microsoft D. Printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 148

283. Which of these is NOT an input device? 289. Can you identify the output device from
A. Screen the list?

B. Scanner A. Laser printer

C. Microphone B. Magnetic Ink Character Recognition


C. Joystick
D. Keyboard
D. Hard disk
284. What does ROM stands for?
290. Screen that shows you what you are do-

NARAYAN CHANGDER
A. Ready Only Memory
ing on the computer?
B. Random Only Memory
A. MONITOR
C. Read Only Memory
B. COMPUTER
D. None of the Above C. SPEAKER
285. Which of these devices would not be nec- D. SCANNER
essary for a self-checkout machine?
291. Which device is both and input and an out-
A. Monitor put device
B. Speaker A. A touchscreen
C. Printer B. A scanner
D. Mouse C. A keyboard
286. Input devices which do not require typing D. A light
to input data in to the computer are called:
292. What is the purpose of a microphone
A. Output devices
A. to record/transmit audio data
B. Pointing devices B. to record/transmit text data
C. Software devices C. to record/transmit infrared data
D. none of above D. to play audio data
287. Which of the following shows the correct 293. What are the 2 types of memory?
order of storage size, starting with the
smallest? A. RAM-Random Access Memory
B. Hard drive Storage
A. Floppy disk, CD-ROM, DVD
C. Brain
B. CD-ROM, DVD, floppy disk
D. Processor
C. DVD, CD-ROM, floppy disk
D. none of above 294. What do you absolutely need to run prop-
erly in order for your computer to work?
288. Which of the following is the input de- It’s like a master programmer for your
vice? computer, telling everything what to do.
A. Photocopier A. Mouse
B. Printer B. CD Drive
C. Microphone C. Operating System
D. All of the above D. Transitor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 149

295. DDE device that function as security de- B. Processor


vice to allow entry to buildings, hotel C. Brain
rooms. called?

PRACTICE BOOK» NOT FOR SALE


D. All of the Above
A. Contactless card reader
B. Chip & PIN reader 301. What is input device?
C. Magnetic stripe reader A. Starting up a computer from a halted
or powered down condition.
D. OMR
B. Hardware components that allow the
296. are programs that designed to help user to enter data, commands, and re-
users to be more productive with their per- sponses into a computer.
sonal tasks.
C. Something anyone can operate
A. Software
D. none of these
B. System Software
302. Scans a label then saves the information
C. Application software
into the computer.
D. Utility program
A. Barcode scanner
297. Which of the following is an Operating B. scanner
System?
C. flash drive
A. Word
D. none of above
B. Apple
C. Windows 303. Allow analogue output devices to act
upon receiving digital control signals
D. Memory
A. Actuator
298. What is a sensor? B. Analogue to digital converter (ADC)
A. A device that outputs information from C. Digital conversion (DC)
a physical source
D. Digital motor compression (DMC)
B. A device that inputs information from
a physical source 304. Which Memory contains contents that
C. A device that turns on actuators can be changed or edited?
D. A device that turns on LEDs A. RAM
B. ROM
299. Software that controls all of the comput-
ers hardware is C. CU
A. Program Software D. ALU
B. Application Software 305. A processing device which is the brain of
C. Instructional Software the computer.
D. System Software A. Memory

300. The CPU is known as the of the com- B. Hard Disk Drive
puter. C. CPU
A. Heart D. Monitor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 150

306. Which of the following is true about C. Data


inkjet printers. two answers D. Computer
A. uses a toner to print
312. Pen like pointing device that is used to
B. uses a laser to print select objects on screen or draw directly.
C. used piezoelectric to print A. Touch screen
D. there is a motor to move the cartridge B. Light pen
from side to side

NARAYAN CHANGDER
C. Mouse
307. What is the most suitable input device for D. none of above
inputting a short report?
A. Mouse 313. Which of the following is the result of in-
creasing the resolution of a monitor?
B. Scanner
A. Images will be sharper with more lev-
C. Keyboard
els of colours
D. None of the above
B. images displayed on the monitor be-
308. What does CPU stand for: come bigger
A. Control Processing Unit C. Images displayed on the monitor be-
come smaller
B. Central Personal Unit
D. more details of images can be dis-
C. Compact Processing Unit
played.
D. Central Processing Unit
314. Which of the following is the most recent
309. What is the difference between a mouse version of Windows?
and a tracker ball?
A. Windows 8
A. One moves across a surface and the
B. Windows 7
other is stationary
C. Windows 10
B. One is input and the other is output
D. none of above
C. One has two and the other has three
buttons 315. Output device used to display images
D. none of above from a computer
A. Monitor
310. An input interface that allows a user to
input spatial data to a computer, called? B. Webcam
A. Pointing device C. Braille Display
B. Joystick D. Speakers
C. Keyboard 316. Which of the following TV screens uses
D. Touch screen more power

311. The physical component of a computer A. LCD + LED


system is called? B. LCD + CCFL
A. Software C. LED + CCFL
B. Hardware D. OLED

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 151

317. What are the 4 basic steps to how a com- 322. A display screen that is sensitive to the
puter works? touch of a finger or stylus. Used in myr-
iad applications, including ATM machines,

PRACTICE BOOK» NOT FOR SALE


A. Typing, Process, Output, Input
retail point-of-sale terminals, car naviga-
B. Input, Output, Hard Drive, Storage tion and industrial controls.
C. Input, Storage, Process, Output A. Touch Screen
D. Input, Storage, Output, Hard Drive
B. Mouse
318. Predictive text is where C. Light Pen
A. a user can tap letters on a keyboard
D. Digitizer Tablet
and a word is suggested, so instead of typ-
ing out the whole word the computer sug-
323. Which input device produces soft copy?
gests the word you are trying to type
B. a computer can write word documents A. printer
on its own B. monitor
C. text is read out via a speaker C. scanner
D. text is enlarged on a screen
D. speaker
319. Translates audio information from the
computer into sounds that people can un- 324. When you save a file, it is permanently
derstand. saved on the:

A. speakers A. CPU
B. headphones B. Monitor
C. microphones C. ROM
D. radios D. Hard Drive
320. Which of the following input device is
325. It is the primary storage device of com-
used at Belize Social Security Board and
puter.
Banks to sign and enter in your signature
digitally? A. Hard Disk Drive
A. Barcode Reader B. External Hard Disk Drive
B. Graphic Tablet C. CPU
C. Flatbed Scanner
D. RAM
D. Printer
326. Which input device is used on a laptop, a
321. can input graphical images and pic-
tablet and a smartphone?
tures for a computer.
A. A touchscreen
A. Plotter
B. Printer B. A keyboard

C. Mouse C. A pen
D. Scanner D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 152

327. What is the relationship between a bar- 332. Devices used to provide data and instruc-
code and a barcode reader? tion to the computer.
A. The thick and thin lines making up a A. Input device
barcode are read by the barcode reader, B. Output device
which then forwards to the computer the
information stored in that barcode C. Monitor
B. The pattern of lines are set by the bar- D. none of above
code reader to store information into the

NARAYAN CHANGDER
333. It is an output device that shows the im-
barcode
age onto a large surface, such as wall or
C. The barcode is read by the barcode white screen.
reader and printed onto labels to attach
A. Monitor
to products
B. Projector
D. none of above
C. Scanner
328. Which of the following applies to projec-
D. none of above
tors
A. LCD screens 334. Type of input device that can automati-
B. DLP Chip cally take readings and measurements

C. ADC chip A. Analogue


D. DLC chip B. Actuator
C. Sensor
329. A type of display screen that has a touch
sensitive transparent panel covering the D. none of above
screen, which is similar to a touch screen
335. What is the primary function of an output
A. projector screen device?
B. smart board A. To output data from a computer
C. led monitor B. To store data on a computer
D. crt monitor C. To input data into a computer
330. what type of storage is Blu-Ray? D. To process data on a computer
A. Magnetic 336. The main storage of your computer
B. Optical A. RAM
C. USB
B. ROM
D. Solid State
C. Motherboard
331. An input device you take out of your dig- D. Hard Drive
ital camera and put directly into your com-
puter to download pictures. 337. Choose the output devices.
A. graphic tablet A. Speaker and headphone
B. keyboard B. Mouse and keyboard
C. SD Card C. Scanner and printer
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 153

338. How best is the size of a hard disk mea- B. Remote Control, Touch Screen and joy-
sured? stick

PRACTICE BOOK» NOT FOR SALE


A. Kilobytes C. Microphone, Video Cameras, Projec-
tor
B. Megabytes Megabytes
D. Graphic Tablet, LCD monitor, scanner
C. Gigabytes
D. Terabyte 344. What do a scanner scans?
A. Both picture and text
339. Types of sensor that is used in wash-
B. Neither picture nor text
ing machine, central heating systems, and
ovens C. Text
A. Moisture D. Picture
B. Pressure 345. What is hardware?
C. Light A. all the ports and buttons of a computer
D. Temperature B. is any part of your computer that has a
physical structure.
340. What is an actuator? C. is any part of your desktop
A. A device that outputs information from D. software
a physical source
346. Which of the following describe the func-
B. A device that inputs information from
tion of Output Devices?
a physical source
A. Devices used to enter information into
C. A device that turns on a motor
the computer.
D. A device that turns on LEDs
B. Devices used to show and display in-
341. When starting a new sentence, you formation from the computer.
should the first letter of the first word. C. Devices used to save information into
A. Capitalize the computer.
D. None of the above
B. Use a different font
C. Indent 347. Is a Computer:
D. BOLD A. A programmable machine
B. An electronic device which takes in
342. Information that comes from an external data, processes it and then outputs the re-
source and is fed into computer software sult.
is called
C. Both of these
A. Input
D. none of above
B. Output
348. One drawback of a desktop is
C. Throughput
A. More expensive
D. Reports
B. Less portable
343. Three types of input devices are: C. Less storage than laptops
A. Projector, Monitor and Printer D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 154

349. If you want to put some old paper pic- 355. Which is used with stylus to produce free-
tures into your computer, you could use a hand drawings?
A. SD Card A. Drawing pen
B. flash drive B. Light pen
C. scanner C. Buzz light year
D. none of above D. Graphic tablet

350. Which keys are the home row keys? 356. An input device used to enter characters

NARAYAN CHANGDER
and functions into the computer system
A. qwertyuiop
pressing buttons, called?
B. asdfghjkl;
A. Remote control
C. zxcvbnm
B. Keyboard
D. 12345678
C. Mouse
351. This input device is used in a zoom class D. Touch screen
session.
357. What do the letters RSI stand for?
A. monitor
A. Repeated Stress Intake
B. printer
B. Repetitive Strain Injury
C. speaker
C. Regression Strain Injury
D. webcam
D. Resilient Symptoms Intake
352. A device that recognizes your own hand-
358. What is the heart and brains of the com-
writing or smart phones that can synch
puter?
with your computer.
A. RAM
A. mouse
B. Motherboard
B. PDA
C. Sound card
C. scanner
D. CPU
D. none of above
359. Numeric keypad is used to
353. Which of the following is considered soft-
A. produce output numbers
ware?
B. input numeric data into any transac-
A. CPU-Central Processing Unit
tion
B. OS-Operation System
C. input numeric data into application
C. RAM-Random Access Memory
D. produce a numeric data
D. Graphics Chip
360. If you want to put documents, pictures,
354. Which device scans a hard copy into digi- music, etc. into your computer you could
tal image for editing in the computer? use a
A. Printer A. Flash Drive
B. Scanner B. CD
C. Joystick C. Flash Drive or CD
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 155

361. Which of the following is an output de- C. the toner is a black cream
vice? D. the toner is a black powder

PRACTICE BOOK» NOT FOR SALE


A. Buzzer
367. A device or component that gives infor-
B. Photocell
mation to a computer.
C. Pressure sensor
A. Input
D. Push button
B. Output
362. What is the short-term storage in com- C. Algorithm
puter?
D. none of above
A. RAM
B. ROM 368. Why are output devices needed?
C. HDD A. The computer needs to inform the user
what work needs printing out.
D. SDD
B. You need speakers so you can listen to
363. Use this to save information and take it music and concentrate better.
from one computer to another.
C. You need to have information printed
A. USB drive out for your homework.
B. floppy disk D. They inform the user what actions
C. CD Rom have been performed by the computer.
D. flash drive 369. Using this device you can move the cursor
364. Devices which put data into a computer on the screen.
or device. A. Scanner
A. Input Device B. Lamp
B. Output Device C. Mouse
C. Computer D. Microphone
D. Internet
370. QR code is made up of a matrix of filled in
365. Which type of device is an Infra-Red Sen- dark squares on a light background. What
sor? is QR stands for?
A. Input Device A. Quick Role
B. Output Device B. Quick Response
C. Storage Device C. Quick Runtime
D. none of above D. Quick Registry
366. Which of the following is not true about 371. Which type of device is a Video Camera?
laserjet
A. Input Device
A. the printed paper needs to be left to
B. Output Device
dry out the ink
B. the printed paper needs to be heated C. Storage Device
to fuse the toner D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 156

372. The CPU is also known as 378. A device that inputs data to a computer,
A. Control Unit the data is a measurement of some physi-
cal quantity that is continuously changing,
B. System Unit called?
C. Memory Unit A. Microphones
D. none of above B. Digital Camera
373. Which of the following materials does a C. Sensors

NARAYAN CHANGDER
laser printer use to produce the text on a D. Graphic tablet
printout?
A. magnetic powder 379. This device moves a pointed arrow on the
screen:
B. carbon powder
A. pointer
C. ink drops
B. mouse
D. laser beam
C. keyboard
374. Which one of these can project images D. Visual Display Unit
onto a wall
A. A projector 380. If you are shopping at Walmart and you
need to know the price of an item, you
B. A monitor could use a
C. A printer A. Barcode Scanner
D. Speakers B. Scanner
375. Scanner is a? C. Web Cam
A. Hardware-OUTPUT D. none of above
B. Hardware-STORAGE
381. How would you describe an input de-
C. Hardware-SYSTEM UNIT vice?
D. Hardware-INPUT A. One that supplies the computer with in-
formation about the outside world
376. is like a rectangular box
B. One that changes information for the
A. Hard disk user to understand
B. CD C. One that receives information from the
C. Pen drive computer
D. none of above D. none of above

377. OCR stands for 382. What input device do traffic lights use?
A. Optical Character Recognition A. Sensors
B. Optical Character Reader B. OCR
C. Optimised Character Reader C. Touch screens
D. One Clear Reader D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 157

383. Which statement about RAM is true? 389. What is the name of this class?
A. It holds less data than storage A. Keyboarding

PRACTICE BOOK» NOT FOR SALE


B. It is a processor B. Google Basics
C. It stores data permanently C. Digital Literacy
D. It interprets audio data
D. The Crabby Abby’s
384. What is the first thing you should do
when you create a new Google doc? 390. Hardware is different from software
because .
A. Start typing your report
A. you can see hardware
B. Decide which font to use
B. it costs more
C. Name it
D. Set margins C. hardware needs a person to make it
work
385. Carries out the instructions of a computer D. a computer doesn’t need software to
program, performs basic input/output op- work
erations of the system
A. Software 391. What DDE device that has key feature
B. Central Processing Unit that able to track livestocks?

C. Operating System A. Barcode reader


D. Motherboard B. RFID

386. Which of the following is an example of C. MICR


an input device. three answers D. OCR
A. sensor
392. What is the bar called where the search
B. Mouse bar and other frequently used apps are lo-
C. graphics tablet cated?
D. speaker A. Start Menu
387. is an output devices B. App Bar
A. mouse C. App Shelf
B. keyboard D. Taskbar
C. joystick
393. Braille keyboards and printers use a sys-
D. monitor tem where
388. What is another name for Primary mem- A. characters are represented by pat-
ory? terns of raised dots that are felt with the
A. First memory persons fingertips

B. RAM B. information is enlarged on a screen


C. Main Memory C. information is read out via a speaker
D. Secondary Memory D. a pointer is moved about on a screen

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 158

394. This device is mainly used for assessing A. mouse


the answers given to questions in Multiple B. PDA
Choice examinations:
C. scanner
A. MICR
D. none of above
B. OMR
C. OCR 400. Luis needs to record his guitar practice for
future reference. Which input device can
D. Magnetic Stripe Reader easily do this?

NARAYAN CHANGDER
395. This part stores data, programs, settings, A. Microphone
and the operating system while the com- B. MIDI
puter is off. while it is on, it spins inside
the computer reading and writing data. C. Speaker

A. CPU D. Printer

B. Hard disk 401. This device looks like a pencil eraser that
replaces the mouse on a portable com-
C. ROM
puter.
D. none of above
A. trackpoint
396. which of the following is an example of B. trackpad
an output device
C. trackball
A. Touch Screen
D. pointing stick
B. Speaker
402. Why are input devices needed?
C. microphone
A. So we can put information into a com-
D. Projector
puter for it to process and carry out the
397. Which of these printers would you use to tasks we want it to do.
print a wage slip using carbonised paper? B. So we can print out our homework.
A. Inkjet printer C. So that information is input into the
B. None of the above computer to search the internet.
C. Dot matrix printer D. So we can store the information per-
manently.
D. Laser printer
403. Every task in a computer follows an
398. Which of the following touchscreens cant cycle.
be used while having gloves on
A. IPO
A. Capacitive
B. CPU
B. Resistive
C. Memory
C. infra red
D. CU
D. none of above
404. Keyboard is an device.
399. An input device that is used to input
pictures, documents, pages of magazines, A. Input
and other images into the computer. B. Output

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 159

C. Input and Output 410. What input does the grid on the Micro:bit
D. Machine detect?

PRACTICE BOOK» NOT FOR SALE


A. Pressure
405. Which of the following devices is used
B. Bending
to check the PSE Examination or to check
Questionnaire and survey? C. Shaking
A. Light Pen D. Light Levels
B. Flatbed Scanner 411. Which device is used between the CPU
C. Optical Mark Reader and the actuator
A. DCA
D. Joystick
B. DAC
406. Which input device detects the force ap-
C. CDA
plied to it?
D. ADC
A. Photocell
B. Flex Sensor 412. Devices which displays or sends data out
from a computer or device.
C. Pressure Sensor
A. Input Device
D. Standard Servo
B. Output Device
407. Which input device is most suitable for C. Computer
recording someone singing? D. Internet
A. A microphone
413. Most people have this Operating System
B. A touchpad on their Computer System.
C. A mouse A. UNIX
D. A barcode reader B. LINUX
408. Choose two advantages of video camera C. IOS
compared to digital camera D. Microsoft Windows
A. Record audio as well as images 414. If you want to draw cartoon character
B. Easier and faster to upload images and have it save into your computer, you
would use this device.
C. Easier to manipulate footage using
specialist software A. Light Pen
D. Memory card can store thousand of B. Graphic Tablet
pictures C. PDA

409. Output device, which looks like a TV, D. none of above


which displays images from a computer. 415. What do the letter QR stand for?
A. Monitor A. Quality Product
B. Keyboard B. Quick Response
C. Speaker C. Quality Response
D. 3-D Printer D. Quick Product

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Input/Output Devices 160

416. A processing device takes information C. LCD


from input devices, performs a task, and D. LED
sends the information to a storage or out-
put device. Which of the following is an 422. Sensor used in a classroom to set off the
example of a processing device? burglar alarm if intruders are sensed
A. Keyboard A. Motion sensor
B. Printer B. Temperature / heat sensor

NARAYAN CHANGDER
C. CPU C. Moisture sensor
D. None of the above D. Humidity sensor
417. Objects you can use to put information 423. Which of these is a output device
into a computer
A. mouse
A. Printer
B. joystick
B. Speakers
C. headphones
C. Input Devices
D. bar code reader
D. none of above

418. Which one of these is an output device 424. How is an input device for a computer de-
fined?
A. A monitor
A. Component on the inside of a computer
B. A keyboard
B. Device which connects to the Internet
C. A mouse
C. Device which puts data into a com-
D. A microphone
puter
419. Select the different types of scanners. D. Device which puts out data from a com-
A. Flat bed scanner puter
B. Sheet fed scanner 425. Which of the following is NOT a storage
C. Global scanner device?
D. Hand held scanner A. DVD

420. Images captured by a digital camera are B. Scanner


usually stored in a C. Hard Drive
A. printer D. Compact disc
B. USB flash drive
426. This software program allows you to
C. CD-R type sentences, paragraphs, stories and
D. memory card more.
A. Microsoft Excel
421. Consist of thousand tiny pixels made up
of transistor. B. Microsoft PowerPoint
A. CRT C. Microsoft Word
B. TFT D. Microsoft Publisher

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 161

2.4 Secondary Storage Devices

PRACTICE BOOK» NOT FOR SALE


1. A memory does not lose stored data 6. A computer’s hard drive is often consid-
when the device is powered down. ered a storage device
A. A. volatile A. A. primary
B. B .non-volatile B. B. secondary
C. C. tertiary C. optical
D. D. small
D. D. volatile
2. What is the meaning DVD ROM?
7. Which type of secondary storage would
A. DVD read only memory (media) where
be suitable for a student doing geography
data is written once and read many times
coursework outdoors?
B. It is a type of worm virus
A. Magnetic-its cheap and has a large ca-
C. Is a type RAM holding current pro- pacity
grams and data
B. Solid state-if the device was dropped it
D. It is a storage device using magnnetic
is less likely to break, due to there being
materials.
no moving parts.
3. Which of the following would NOT be a C. Optical-most people have a device ca-
suitable means for a wedding photogra- pable of reading optical disks at home.
pher to store pictures (choose as many as
appropriate)? D. none of above
A. DVD 8. What is durability?
B. USB Drive
A. The amount of data a device can store
C. Magnetic Tape
B. How fast the data can be accessed
D. SD card
C. How easy it is to move from one place
4. It is an advantage of using cloud storage: to another
A. If you have no internet connection, you D. How well it lasts (ie:if dropped)
have no access to your data.
B. Can be expensive to set up. 9. Why do computers need secondary stor-
age?
C. Security concerns.
A. To store data (files) permanently for fu-
D. You can access your documents any-
ture use
where
B. To store the programs that are in-
5. Random Access Memory (RAM) is a stalled on the computers permanently for
device. future use
A. primary
C. To store data and programs temporar-
B. secondary ily which will be cleared off when power
C. tertiary is turned off
D. voltile D. All of the options here

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 162

10. Apu has a handheld e-book reader that C. Cylinders


allows him to store and read electronic D. Density
books.Types of secondary storage devices
are magnetic, optical or solid state.State 15. A databased record has 4 fields. Full
which type of storage is most suitable for name (text up to 20 characters), Class
storing the electronic books inside the e- (text up to 2 characters), DateStarted-
book reader. School, FreeSchoolMeals. There are are 30
A. Optical records. Text = 1 byte per character, In-
gterger = 4 bytes, Real = 4 bytes, Date

NARAYAN CHANGDER
B. Magnetic = 8 bytes, Boolean = 1 byte. How much
C. Solid State storage in bytes would this take up? (In-
D. none of above cluding overheads)
A. 1023
11. Hardware that reads data and programs
B. 102
from storage media.
C. 10230
A. storage devices
D. 102300
B. RAID
C. SAN 16. Which is generally the most portable?
D. NAS A. Magnetic
B. Solid State
12. What does the tem ‘read/write time’ re-
fer to C. Optical
A. How long it takes for data to be read D. none of above
of written to the device 17. Which generally has the highest capacity?
B. How long it takes a person to A. Magnetic
read/write a word document
B. Solid State
C. The amount of data to be stored on the
device C. Optical

D. How long the storage media can rea- D. none of above


sonably be expected to last 18. Which of the following is non-volatile?
13. What is the capacity of Optical Discs for A. RAM
CD format? B. ROM
A. 500MB C. Cache
B. 300MB D. Hard disk
C. 700MB
19. Importance is the importance of secondary
D. none of above storage
14. Measures how tightly the magnetic A. to delete the data from computer
charges can be packed next to one another B. to restore a backup of your files
on the disk C. to transfer the memory to another
A. Sectors computer
B. Tracks D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 163

20. Where does all of the computer’s process- 25. Vicky has been on holiday and has taken
ing happen? lots of photos. The memory in her cam-
era is now full and she needs to trans-

PRACTICE BOOK» NOT FOR SALE


A. RAM
fer her photos to an external secondary
B. ROM storage device.State four characteristics
C. CPU of secondary storage devices that Vicky
D. Hard Drive should consider when choosing a device.
A. Capacity, Speed, Portability, Durability,
21. Most portable? Reliability, Cost
A. CD-ROM B. Capacity, Colour, Portability, Durabil-
B. HDD ity, Reliability, Cost
C. SSD C. Capacity, Speed, Portability, Durabil-
D. SD card ity, Recyclability, Cost
D. none of above
22. The next generation of optical discs.
A. SSDs 26. Which is generally the fastest to access the
data?
B. DVDs
A. Magnetic
C. Hi-Def
B. Solid State
D. HDDs
C. Optical
23. Some secondary storage devices are mag- D. none of above
netic and others are solid state.Describe
the characteristics of magnetic and solid 27. Which of the following should be consid-
state secondary storage.The quality ered when choosing a method of data stor-
of written communication will be as- age? (Choose as many as appropriate)
sessed in your answer to this ques-
A. Capacity
tion.Focus:CostAnswers:2
B. Speed
A. Solid State drives tend to be large ca-
pacity, relatively cheap C. Portability
B. Magnetic drives tend to be large capac- D. Durability
ity, relatively cheap E. Reliability
C. Solid State drives are relatively expen-
28. Primary storage is also often called as
sive so tend to be of smaller capacity
A. Data
D. Magnetic drives are relatively expen-
sive so tend to be of smaller capacity B. Save

24. Which formuale can be used to estimate C. Main Memory


the file size of a English text file? D. Memory Holder
A. number of characters * 1.1 byte 29. Which is generally the most reliable (ac-
B. number of characters * 0.5 bytes cording to OCR).
C. number of characters * 10 bytes A. Solid State
D. number of characters * 11 B. Magnetic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 164

C. Optical 35. Which of the following is volatile?


D. none of above A. RAM
B. ROM
30. Which of these is NOT secondary stor- C. CPU
age?
D. CD-ROM
A. USB
36. Which of these acts as primary storage?
B. Google Drive
A. ROM

NARAYAN CHANGDER
C. RAM B. RAM
D. DVD C. HDD or SSD
D. CPU
31. What is Unicode?
37. Secondary storage is (tick 2)
A. it is the same as ASCII code
A. Non-volatile storage
B. It is an encoding system for symbols
of all languages in the world, using 1, 2 B. Back up storage
or even more bytes per character. It con- C. An external hard drive
tains all the languages of the world. D. The hard drive in your computer sys-
C. The language spoken by unicorns tem
E. Permanent storage of data
D. an encrypted message
38. What is reliability?
32. What type of storage is a USB memory
A. The amount of data a device can store
stick? (4/5)
B. How consistently it performs
A. Optical
C. How easy it is to move from one place
B. Magnetic to another
C. Solid state D. How well it lasts (ie:if dropped)
D. It is not a storage device 39. Why does a laptop need secondary stor-
age? (1/2)
33. First steps to make for free cloud storage. A. To backup files to move to another
A. Upload file computer
B. To storage programs that are currently
B. Start free acount
running
C. Sharing to other cloud users C. To store data, files and software for fu-
D. none of above ture use
D. To store data that the processor needs
34. A bit is
40. ROM and RAM are both
A. a single binary digit
A. Types of Memory
B. 10 binary digits B. Types of Computer
C. 8 binary digits C. Types of Food
D. 4 binary digits D. Types of Work

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 165

41. Mass storage device widely used for home 46. Question 3:What type of storage is a USB
and small business storage. memory stick?

PRACTICE BOOK» NOT FOR SALE


A. tracks A. Optical
B. file compression B. Magnetic
C. storage area network C. Solid State
D. network attached storage D. It is not a storage device

42. Normally used in digital cameras. can 47. Which of these is NOT a characteristics of
hold thousands of jpg photographs. storage devices?
A. SD memory cards A. Capacity
B. USB memory stick B. Speed
C. Magnetic tape C. Colour
D. CD D. Portability
E. Durability
43. This device can be easily damaged if the
correct shut down procedure is not carried 48. Primary storage is the area in a computer
out (this can lead to a head crash which in which data is stored for quick access by
would result in a loss of data) the
A. CD discs A. RAM
B. Fixed/internal hard disk drive (internal B. ROM
HDD)
C. CPU
C. Flash drive
D. CD-ROM
D. Solid state drive (SSD)
49. Which of the following best describes a
44. Select a common use case for magnetic megabyte?
tape A. Paragraph of text
A. Stores files, programs and the operat- B. A video file
ing system
C. A text document
B. Backing up large amounts of data
D. A mp3 file
C. Storage of multimedia files
D. Used to store files on phones and cam- 50. Vicky has been on holiday and has taken
eras lots of photos. The memory in her cam-
era is now full and she needs to transfer
45. How is data stored in solid state storage? her photos to an external secondary stor-
A. In the CPU age device.Define what is meant by ‘sec-
ondary storage’.Answers:2
B. In ‘marks’ arranged in patterns
A. Long term non-volatile storage of
C. In different patterns of magnetisation data/files
in a magnetisable material to store data
(tape/hard disk). B. Short term volatile storage of
data/files
D. Using a large electric current to force
electrons through a barrier and trapping C. External storage of data
them in position. D. Internal storage of data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 166

51. Which of the following is NOT a primary C. Synchronous Static Disk


storage device? D. Not a real produce
A. RAM
57. What type of storage is HDD?
B. Cache
A. Optical drive
C. Hard drive
B. Magnetic drive
D. ROM
C. Solid state drive

NARAYAN CHANGDER
52. Is it correct to call your USB memory stick D. It is not a storage device
simply “my USB”?
58. Large computers used for backup storage
A. Yes
are called
B. No because USB is just a method of
A. Supercomputers
connection.
B. Servers
C. You could have USB camera
C. Clients
D. You could have USB printer
D. Giants
53. Which is generally the most portable? e.g.
Will last if it is dropped. 59. Which of the following statements about
cloud storage are true (choose as many
A. Solid State as are appropriate)
B. Magnetic A. Data will be secure if there is a fire or
C. Optical other problem at the site
D. none of above B. Data protection rules do not apply if
you opt to use cloud storage
54. The actual physical material that holds the
C. It prevents your data being
data and programs.
hacked/targeted by hackers
A. primary storage D. It prevents the need to buy expensive
B. media hardware for data storage
C. capacity 60. Why should you be careful when using file
D. access sharing sites?
A. You might be downloading malware.
55. Latency is;
B. The person sharing the file can see
A. Time taken to read and write data
your name and address.
B. Time taken for user to select where is
C. The person sharing the file will send
save the data
you a bill.
C. Time taken to retrieve data
D. none of above
D. Time taken to write this quiz
61. The types of storage are listed below from
56. What does SSD stand for in the context of least expensive per GB to the most expen-
computer storage? sive per GB. Which order is correct?
A. Solid state drive (disk) A. Solid State, Optical, Magnetic
B. Samsung Super Drive B. Optical, Magnetic, Solid State

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 167

C. Magnetic, Optical, Solid State 67. The types of storage are listed below from
least expensive to most epensive per GB.
D. Solid State, Magnetic, Optical
Which order is correct? (9)

PRACTICE BOOK» NOT FOR SALE


62. Identify an example of optical storage: A. Solid state, Optical, Magnetic
A. Magnetic tape B. Solid state, Magnetic, Optical

B. USB memory stick C. Magnetic, Optical, Solid state


D. Optical, Magnetic, Solid state
C. Blu-ray disks
D. HDD 68. What is virtual memory?
A. It is a RAM style memory sitting inside
63. Select a common use case for CDs and the secondary storage drive (HDDs and
DVDs SSDs)
A. Stores files, programs and the operat- B. It is used when RAM is running out or
ing system already full so that more programs and
data could be stored in RAM
B. Backing up large amounts of data
C. It is the extension of RAM, so the pro-
C. Storage of multimedia files
cessor can run multiple programs or mul-
D. Used to store files on phones and cam- tiple files
eras D. ALL of the ones listed
64. What is an advantage of a CD? 69. Which is the smallest of the storage capac-
ities?
A. Easily scratched, leading to the loss of
data A. 2 KB
B. Large storage capacity B. 2049 bytes

C. Expensive to buy C. 0.5 MB


D. 3GB
D. Portable, easy to carry around
70. An organizational strategy to promote ef-
65. Primary Storage is; ficient and safe use of data across the net-
A. Non-volatile memory works.

B. Volatile memory A. cloud dynamic


B. data mission statement
C. Backup memory
C. enterprise storage system
D. Largest memory
D. RAID
66. Which of the following is not a type of
71. Which storage medium is popular for dis-
storage? (1/2)
tributing video?
A. Optical drive A. CD
B. Magnetic hard drive B. HDD
C. Solid state drive C. DVD
D. GPU (Graphic Processing Unit) D. USB Flash Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 168

72. Harddisk is a device. C. Jesus


A. primary D. Mother mary
B. secondary
78. dWhen the hard drive is used as extra
C. tertiary RAM, this is known as
D. voltile
A. Virtual Reality
73. Which of the following is an example of an B. Virtual Memory

NARAYAN CHANGDER
optical secondary storage device?
C. Extra Memory
A. USB Pen Drive
D. RAM
B. Magnetic Hard Drive
C. Floppy Disk 79. Which one of these devices is solid state?
D. DVD A. CD
74. A NAND flash memory cell uses a; B. DVD
A. Electron Gate C. Magnetic stripe
B. Solid Gate D. USB flash memory
C. Drowning Gate
80. what is secondary storage?
D. Floating Gate
A. USB ONLY
75. Which formulae can be used to estimate
B. FILES, DATA, MEMORY
the file size of a sound file?
A. bytes per sample * channels * height C. USB, DVD, CD, HARD DRIVES and etc.
+ number of minutes D. none of above
B. samples per second * number of sec-
onds * 1.1 81. In the song ‘The Twelve Days Of
Christmas’, how many swans were a-
C. samples per second * bytes per sam- swimming?
pel * duration
A. One
D. sampels pers second * bytes per sam-
ple * channels * duration in seconds B. Five

76. What name would you give to an email at- C. Six


tachment that may harm your computer? D. Seven
A. Phishing
82. How many bytes per character in Unicode
B. Spam system?
C. Malware A. 0.5
D. none of above
B. 2, or more
77. who was born on christmas C. English text uses 1 byte per character,
A. Albert Einstein other lanugages may use more
B. Pope Frances D. 10

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 169

83. Similar to internal hard-disk drives except 89. Which storage medium is most appropriate
they use solid-state memory. for an action camera?

PRACTICE BOOK» NOT FOR SALE


A. solid-state drives A. HDD
B. file compression B. CD
C. storage area network C. DVD
D. network attached storage D. Flash / Solid State

84. A Blu-Ray disc can hold; 90. Storage that loses its memory every time
the computer is turned off
A. 1000 Nibbles
A. RAM
B. 50 GB
B. ROM
C. 0.9 TB
C. CPU
D. 300 MB
D. Hard Drive
85. Fastest?
91. A memory loses stored data when the
A. SSD device is powered down.
B. HDD A. A. volatile
C. Magnetic tape B. B .non-volatile
D. CD-ROM C. C. tertiary
86. When is christmas? D. D. small
A. December 28 92. Which of the following is an example of
B. December 19 Optical StorageAnswers:3
C. December 25 A. CD
D. November 26 B. DVD
C. Blu-Ray
87. which has moving points .
D. Floppy Disk
A. HDD
E. SD Card
B. SSD
C. flash memory 93. USB drives are also known as:

D. Ram A. flash drives


B. optical drives
88. The process of accessing information
stored on secondary storage devices is re- C. ports
ferred to as D. universal state bus
A. writing
94. Why is secondary storage needed in a com-
B. reading puter system?
C. backing up A. To back up your files
D. restoring B. To store your programs.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 170

C. To store all files needed for the com- C. solid state drive
puter system to run. D. none of above
D. To store all of the files just in case your
100. External hard drive is a device.
computer crashes.
A. primary
95. Which of the following storage devices is
B. secondary
most suitable for use in mobile devices?
C. offline secondary
A. Hard disk

NARAYAN CHANGDER
D. volatile
B. Memory card
C. Optical disk 101. Which is generally the cheapest per GB?
A. Magnetic
D. Solid state drive
B. Solid State
96. A databased record has 4 fields. First-
C. Optical
Name (text up to 10 characters), Surname
(text up to 10 characters), DateOfBirth, D. none of above
NumberOfChildren. There are are 100 102. Which type of storage uses lasers to
records. Text = 1 byte per character, In- write the data?
gterger = 4 bytes, Real = 4 bytes, Date
= 8 bytes, Boolean = 1 byte. How much A. Optical
storage in bytes would this take up? (In- B. Magnetic
cluding overheads) C. Solid State
A. 3520 D. All types
B. 352 103. It is an example of optical storage:
C. 35200 A. Magnetic tape
D. 352000 B. USB memory stick
97. Why is secondary storage needed? C. Blu-ray disks
A. It is non-volatile D. HDD
B. It is volatile 104. This hard-disk performance enhancement
C. It is quicker anticipates data needs.
D. It is online A. disk caching
B. file compression
98. Which is an example of Flash / Solid State
memory? C. file decompression

A. RAM D. RAID

B. ROM 105. The R/W speed of storage are listed be-


low from fastest to slowest. Which order
C. SD Card
is correct? (9)
D. Cache
A. Solid State, Optical, Magnetic
99. what is SSD? B. Optical, Magnetic, Solid State
A. soft sick drive C. Magnetic, Optical, Solid State
B. solid stick drive D. Solid State, Magnetic, Optical

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 171

106. Which formuale can be used to estimate 111. The disadvantage of this type of storage
the file size of an image? is that it is easily scratched.

PRACTICE BOOK» NOT FOR SALE


A. number of pixels * number of byyes A. Magnetic storage
per pixel B. Optical storage
B. number of pixels * 1.1 C. Solid state storage
C. number of pixels wide * number of pix- D. none of above
els high * number of bytes per pixel * 1.1
112. Why does having moving part make
D. None of these is correct
HDDs not very portable compared SSDs?
107. These are some advantage from cloud A. With moving parts, you cannot make
storage EXCEPT the disks very small, while SSDs can be
as small as a SIM card
A. Maintenance
B. That is not true. HDDs are as portable
B. File security as SSDs.
C. File sharing and collaborations C. The HDDs movnig parts are not
D. none of above needed to read and write the disk media
D. The SSDs are not as portable as HDDs.
108. What term describes the act of winding
someone up online? 113. Why does having moving part make
HDDs not very portable compared with
A. Trolling
CDs or DVDs?
B. Posting
A. HDDs must have the drive and the me-
C. Phishing dia disk together, while CDs and DVDs are
D. none of above separated from the drives
B. CDs and DVDs are not easy to break
109. What should you do if you want to meet while magnetic disks are
someone you only know online?
C. HDDs are as easy to break as the CDs
A. Meet somewhere quiet, so you can get and DVDs
to know each other. D. CDs and DVDs are less portable thasn
B. Take an adult with you and meet in a HDDs
public space.
114. What are the factors to consider for a
C. Don’t tell anyone because that would storage device?
be embarrassing.
A. Capacity and Cost
D. none of above
B. Durability and Reliability
110. In a CD what is registered as a 1? C. Speed and Portability
A. Pit D. ALL of the ones listed
B. Land 115. Which of the following are volatile?
C. Pit End A. RAM
D. Land End B. Secondary Storage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 172

C. ROM 120. Which of the following is NOT an exam-


D. Hard Disk ple of offline secondary storage?
A. USB Flash Drive
116. Below are the reasons why it is impor-
B. CD
tant to back up your data, except
C. Internal SSD
A. to safeguard against hackers
D. External HDD
B. to use the files elsewhere

NARAYAN CHANGDER
C. to safeguard against loss of 121. How can CD-ROM and DVD’s be the same
data/failure physical size, but differ in data storage?

D. to safeguard against loss of hardware A. Smaller pits are more densely packed
component B. Larger pits can hold more data
C. Concentric circles instead of a spiral
117. Vicky has been on holiday and has taken
lots of photos. The memory in her cam- D. Larger read/write head
era is now full and she needs to trans-
122. Which of the following typically have the
fer her photos to an external secondary
highest storage space?
storage device.Identify the three common
storage technologies Vicky can choose A. Hard-drive
from.Answers:3 B. Flash Drive (USB)
A. Optical C. SD Card
B. Magnetic D. CD
C. Solid State
123. How is data stored in magnetic storage?
D. Blu-Ray
A. In the CPU
E. Hard Drive B. In ‘marks’ arranged in patterns
118. Why is a Hard Disk Drive (HDD) not usu- C. In different patterns of magnetisation
ally recommended for portable devices? in a magnetisable material to store data
(tape/hard disk).
A. It has moving parts
D. Using a large electric current to force
B. It will break if you touch it
electrons through a barrier and trapping
C. It is too small them in position.
D. It is too large 124. Head crash occurs when makes con-
tact with the hard disk’s surface
119. A(n) card is a credit card or other sim-
ilar card, with a stripe that contains infor- A. Read-write surface
mation identifying you and the card. (Also B. Read-write tail
called swipe card)
C. Read-write head
A. Secure Digital High Capacity (SDHC)
D. none of above
B. magnetic stripe
125. When a read-write head makes contact
C. Secure Digital with the hard disk’s surface, it causes a
D. microSDHC head:

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 173

A. land 131. Hard disk drives are a from of what type


of storage?
B. pit
A. Optical

PRACTICE BOOK» NOT FOR SALE


C. crash
B. Magnetic
D. scratch
C. Solid state
126. Cheapest? D. Sequential
A. SSD 132. Which device would you use:To backup
B. HDD very large amounts of data
C. CD-RW A. Optical Disk
B. Hard Drive
D. Micro SD card
C. Flash Memory
127. Which of the following devices can usu- D. Magnetic Tape
ally be removed or unplugged?
133. What type of storage is a DVD ROM?
A. A. primary
A. Optical storage
B. B. secondary
B. Magnetic storage
C. optical
C. Solid state drive
D. D. volatile D. It is not a storage device
128. What type of storage is a HDD? (4/5) 134. A(n) card is a credit card, entertain-
A. Optical ment card, bank card or other similar card,
with a stripe that contains information
B. Magnetic identifying you and the card.
C. Solid State A. Secure Digital High Capacity (SDHC)
D. Hard Drive B. magnetic stripe
C. Secure Digital
129. In a CD a 0 is registered when;
D. microSDHC
A. The laser hits the just the disk
135. What is portability?
B. The laser hits the disk and the light
sensor A. The amount of data a device can store

C. The laser hits the mirror and the light B. How fast the data can be accessed
sensor C. How easy it is to move from one place
to another
D. The laser hits the disk, mirror and light
sensor D. How well it lasts (ie:if dropped)
136. How many bytes per character in ASCII
130. What type of storage is an SSD?
system?
A. Magnetic A. 0.5
B. Optical B. 1
C. Solid State / Flash C. 1.5
D. none of above D. 10

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 174

137. Select all the advantages of using solid B. Used in MP3 players to store music
state storage. files
A. Robustness C. Used to transport files between com-
puters
B. Reliability
D. Used as mobile phone memory cards
C. Durability
D. Cost 143. The types of storage are lited below
from the most reliable to the least reliable.
E. Portability

NARAYAN CHANGDER
Which order is correct? (9)
138. What category of storage device is a SD A. Solid state, Optical, Magnetic
memory card? B. Solid state, Magnetic, Optical
A. Magnetic C. Magnetic, Optical, Solid state
B. Optical D. Optical, Magnetic, Solid state
C. Solid State 144. Provides permanent or nonvolatile stor-
D. Primary Memory age.
A. primary storage
139. Which of the following typically have the
lowest storage space? B. secondary storage
A. Hard-drive C. volatile memory
B. Flash Drive D. short term memory
C. SD Card 145. Primary storage is
D. CD A. Volatile storage
B. Non-volatile
140. Which is generally the most expensive
per GB? C. Permanent
A. Magnetic D. none of above
B. Solid State 146. Which of these is classed as personal in-
C. Optical formation?
A. Date of birth
D. none of above
B. Online nickname
141. Assume that all storage devices below
C. Gender
have the same capacity. Which one has
the lowest price? D. none of above
A. Solid state drives 147. Select a common use case for a Flash SD
B. Hard disks card
A. Stores files, programs and the operat-
C. Memory cards
ing system
D. USB flash drives
B. Backing up large amounts of data
142. Below are the uses of Flash Memory C. Storage of multimedia files
Cards, except D. Used to store files on phones and cam-
A. Storing photos on digital cameras eras

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 175

148. Users subscribe to a cloud storage service 154. Virtual memory occupies space on a
to computers

PRACTICE BOOK» NOT FOR SALE


A. access files from any computer that A. ROM
has Internet access B. RAM
B. allow others to access their files C. Secondary Storage
C. store offsite backups off data D. CPU Cache
D. all of the above
155. What is capacity?
149. dIf the RAM is low, the computer can use A. The amount of data a device can store
extra memory from the
B. How fast the data can be accesed
A. ROM
C. How easy it is to move from one place
B. CPU to another
C. CACHE D. How well it lasts (ie:if dropped)
D. HARD DRIVE
156. Question 4:What type of storage is a SSD
150. How many bits are in a byte? card?
A. 7 A. Optical
B. 8 B. Magnetic
C. 9 C. Solid State
D. 10 D. It is not a storage device

151. which of the storage media you think not 157. What type of storage is a USB memory
using direct access stick?
A. Magnetic tape A. Optical
B. Flash memory stick B. Magnetic
C. DVD disc C. Solid State
D. Magnetic hard disk D. It is not a storage device

152. Storage device are? 158. The smallest measurement of capacity?


A. a memory in computer A. Terabyte
B. a hardware B. Gigabyte
C. a files C. Megabyte
D. none of above D. Petabyte

153. Each track is divided into invisible wedge- 159. How many bytes are there per character
shaped sections called in a text file?
A. platter A. 0.5
B. cluster B. 1
C. sector C. 1.5
D. cylinder D. 10

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 176

160. Which of these define what secondary 165. Benefits of secondary storage
storage is?
A. lower cost, higher capacity, backup
A. Non-volatile storage / devices that are disk
not directly accessible by the CPU
B. higher cost, low capacity
B. Any non-volatile storage
C. save data, backup
C. All memory technologies that use mag- D. low cost, save data
netism.

NARAYAN CHANGDER
D. Any memory technology using laser 166. What is stored on your secondary stor-
light age in your computer system?
E. A USB device A. Programs
B. Data and files
161. The largest measurement of capacity?
C. Operating system
A. Bit
D. All data (Programs, operating system
B. Megabyte and files).
C. Byte
167. These are some types of solid state stor-
D. Kilobyte age EXCEPT.

162. Which of these devices below doesn’t be- A. cloud storage


long to the types of storage media B. flash memory card
A. magnetic C. solid-state drives
B. optical D. none of above
C. induction
168. How is data stored in optical storage?
D. solid state
A. In the CPU
163. Concentric rings on a hard-disk platter. B. In ‘marks’ arranged in patterns
A. cluster C. In different patterns of magnetisation
B. tracks in a magnetisable material to store data
(tape/hard disk).
C. sector
D. Using a large electric current to force
D. cylinder electrons through a barrier and trapping
them in position.
164. What is binary?
A. A number system that uses 10 digits 169. Why is a Hard Disk Drive (HDD) not very
(0-9) portable? (9)
A. It has moving parts
B. A number system that uses 16 digits
B. It is too large
C. A number system that uses 2 digits (0
and 1) C. It will break if you touch it
D. Special characters used by computers D. It is too small

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 177

170. What does the acronym ROM repre- 175. Which of the following statements are IN-
sent? CORRECT? (choose as many as appropri-
ate)

PRACTICE BOOK» NOT FOR SALE


A. Read Only Many
A. SSD’s run cooler than magnetic drives
B. Read One Memory
so are suited to use in laptops
C. Read Only Memory
B. Magnetic tape is obsolete and is no
D. Read Once Memory longer used

171. Solid state drive C. Any storage device with moving parts
is likely to be more reliable
A. Storage that works by storing the data
D. Optical storage is suited to backing
in electronic circuits
up/archiving files
B. Storage that can be disconnected from
the main computer unit, for example to 176. Which of the following is not a type of
transfer files between computers. storage.
C. Storage that uses a surface which can A. Optical
be magnetised to store data. B. Magnetic
D. none of above C. Solid Sate
D. Hard Drive
172. Optical disc most common on today’s per-
sonal computers. 177. Magnetic tapes still play important role
A. solid-state drives in different applications. Below are the
examples of the application of magnetic
B. digital versatile discs tapes, except
C. storage area network A. Clearing bank cheques
D. network attached storage B. as long term backup media
173. What is the most durable? C. utility billing
A. Magnetic Tape D. storing music and videos

B. Solid State Drive 178. The process of accessing information


from secondary storage devices is referred
C. Hard Drive
as
D. CD
A. writing
174. What is meant by being durable when B. reading
talking about a storage device? C. backing up
A. The stored data lasting longer periond D. restoring
of time
179. Question 11:Which type of storage uses
B. not easy to rub off the logo and pack-
lasers to write the data?
aging prints
A. Optical
C. Very quickly locate the data stored in
it B. Magnetic
D. Large amount of data could be stored C. Solid state
in it D. All types

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 178

180. Another term for storage is 185. Secondary storage memory is basically?
A. backup A. volatile memory
B. compressionB. compression B. non volatile memory
C. memory C. backup memory
D. zoom D. impact memory

181. A secondary storage device is 186. This type of storage uses pits and lands
to represent 1s and 0s.

NARAYAN CHANGDER
A. A built in device that holds information
A. cloud
B. The main storage or area in a com-
puter B. hard disk
C. A hardware device used by the com- C. optical
puter to access data D. solid state
D. Data storage that is not currently in a
187. The types of storage are listed below
computer’s primary storage or memory A
from fastet to lslowest. Which order is
secondary storage device is
correct? (9)
182. Magnetic storage A. Solid state, Optical, Magnetic
A. Storage that uses a surface which can B. Solid state, Magnetic, Optical
be magnetised to store data
C. Magnetic, Optical, Solid state
B. Storage that can be disconnected from
D. Optical, Magnetic, Solid state
the main computer unit, for example to
transfer files between computers. 188. Choose two advantages of SSDs.
C. Moving a data, program or file from A. They don’t require as much power to
memory onto secondary storage for later operate as hard drives do.
use.
B. The memory chips in an SSD have a un-
D. none of above limited number of write cycles,
183. What is CD-ROM? C. They are much faster than hard disks.
A. Compact Disc-Recordable Only Mode D. SSDs are cheaper than hard drives.
B. Compact Disc-Rewritable Only Mode 189. A nibble is how many bits?
C. Compact Disc-Read Only Mode A. 1
D. none of above B. 4
184. Select a common use case for Hard disk C. 8
drives D. none of above
A. Stores files, programs and the operat- 190. An image is 20 by 50 pixels. The image
ing system uses 4 bit(s)/0.5 byte(s) per pixel. How
B. Backing up large amounts of data much storage in bytes would this take up?
C. Storage of multimedia files (Including overheads)

D. Used to store files on phones and cam- A. 550


eras B. 55

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 179

C. 5500 C. CD-ROM
D. 55000 D. DVD-RW

PRACTICE BOOK» NOT FOR SALE


191. Which of the following types of storage 196. The smallest section of a hard disk is
would it be possible to access data the called;
quickest on? A. A track
A. Solid State / Flash B. A cluster
B. Magnetic C. A platter
C. Optical D. A sector
D. none of above
197. A sound has 2 bytes per sample, it takes
192. “Highly durable, no moving parts, very 10 samples per second, over 2 channels
fast read/write speeds, no noisy fan or and is 30 seconds long. How much storage
drive arm, faster start up times” describes in kilobytes would this take up? (Including
the advantages of which secondary stor- overheads)
age? A. 1.320
A. Optical B. 0.132
B. Magnetic C. 13.200
C. Solid State Device (SSD) D. 132.000
D. Flash 198. Which device would you use? If you
193. Why does a laptop need secondary stor- needed to store music and/or films
age? A. Optical Disk
A. to backup files to move to another com- B. Hard Drive
puter C. Flash Memory
B. to store data, files and storage for fu- D. Magnetic Tape
ture use
C. to storage programs that are currently 199. Which type of storage has moving
running parts?
A. Hard Disk Drive
D. to store data that the process needs
B. Flash Drive
194. Which storage or memory solution below
C. DVD
is used to store the BIOS?
D. Solid State Drive
A. ROM
B. Secondary Storage 200. Optical storage is?
C. Hard Disk A. Nothing
D. RAM B. Recorded by making patterns with a
magnet
195. Most durable? C. Recorded by making marks in a pattern
A. HDD that can be read back with the aid of light
B. SSD D. Storing optical stuff about glasses

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 180

201. Which of the following types of storage C. Portability


is the most expensive per MB or per GB D. none of above
now(2018)?
207. What is an advantage of a Hard drive?
A. Optical drive
A. Easily scratched, leading to the loss of
B. Magnetic drive
data
C. Solid state drive
B. Large storage capacity
D. They are all the same! C. Expensive to buy

NARAYAN CHANGDER
202. What type of storage is a SSD card? D. Portable, easy to carry around
A. Optical 208. Which ISN’T an example of secondary
B. Magnetic storage?
C. Solid State A. RAM
D. It is not a storage device B. SSD
C. USB memory
203. Disks containing concentric circles called
tracks are found in which secondary stor- D. CD-RW
age? 209. Which of the following statements is NOT
A. Optical true:
B. Magnetic A. Solid State Drives are more durable
than Magnetic Drives since they have no
C. Solid State Drive (SSD)
moving parts
D. Flash B. Optical drives are faster than a mag-
204. Secondary storage characteristics include netic hard drive
C. Magnetic tape is ideal for backing up
A. Capacity large quantities of data (such as a net-
work)
B. Programme
D. Cloud storage can allow many users to
C. Main data share and access the same data/files
D. none of above
210. Someone has told you three reasons why
205. Which of the following is an example of you shouldn’t let your mobile phone post
a secondary storage device? your location on social networking sites.
Which one is true?
A. RAM
A. Your parents will be able to track
B. ROM where you’ve been and guess what you’ve
C. Hard Disk Drive been up to.
D. CPU B. The local shopping centre will notice
you’re there so often that they will offer
206. Which word means:How likely the device you a job.
is to break
C. Someone might go to your house while
A. Durability you’re out and burgle it.
B. Capacity D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 181

211. What is cost? C. A type of computer.


A. The amount of data a device can store D. A type of programming language.

PRACTICE BOOK» NOT FOR SALE


B. How consistently it performs
217. What storage technology is a hard
C. How much does it cost per KB, MB or drive?
GB?
A. Solid State Storage
D. How well it lasts (ie:if dropped)
B. Hard Storage
212. Architecture to link remote storage de-
vices to computers such that the devices C. Magnetic Storage
are as available as locally attached drives. D. none of above
A. tracks
218. measures the amount of time it takes
B. file compression to locate an item on a storage device.
C. storage area network A. Capacity
D. network attached storage
B. Access time
213. What the acronym RAM represents? C. A storage medium
A. Read Any Memory D. Reading
B. Random Access Memory
C. Read Anything Memory 219. The following are some of devices used
in Enterprise Storage System except:
D. Read All Memory
A. File servers
214. What is a secondary storage device?
B. RAID
A. The main memory where computer
fetches data from. C. Networked Attached Storage (NAS)

B. A type of storage device that stores in- D. RFID tag


formation permanently.
220. Mass storage devices are specialized
C. A type of network high-capacity secondary storage devices
D. It is the CPU of a computer. and very suitable for.

215. Which of the following typs of storage A. Large organization


would likely access its data the fastest? B. School
(4/6)
C. Government
A. Optical drive
D. none of above
B. Magnetic drive
C. Solid state drive 221. How many bytes are needed to store
32769 different colours?
D. They are all the same!
A. 1
216. What is Boolean logic?
B. 2
A. Something that can be either true or
false. C. 3
B. A type of maths problem. D. 4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 182

222. Rank the units of data storage in order B. flash drives


from smallest to largest. C. mass storage devices
A. MB > KB > Byte > TB >GB
D. platters
B. KB > Byte > MB > TB > GB
228. Why is a hard disk drive (HDD) not very
C. Byte > KB > MB > GB > TB
portable?
D. TB > GB > MB > KB > Byte
A. It has moving parts

NARAYAN CHANGDER
223. What are the three main types of sec- B. It is too large
ondary storage devices?
C. It will break if you touch it
A. Magnetic, optical and solid state
D. It is too small
B. CPU, RAM and graphics card
C. RAM, ROM and virtual memory 229. What of the following is an advantage of
a Hard Drive?
D. Hard drive, CD ROM and floppy disk
A. Highest capacity
224. What type of storage is a DVD ROM?
(1/2) B. Low cost

A. Optical C. Low maintenance

B. Magnetic D. Quick Access Speed


C. Solid State 230. RAM is sometimes referred to
D. Hard Drive A. primary storage
225. A text file stores 100 characters. 1 byte B. ratio active memory
per character is used. How much storage C. read-only memory
in bytes would this take up? (Including
overheads) D. secondary storage
A. 110 231. Which one is true about storage device?
B. 11 A. Storage device is used for calculating
C. 1100 data.
D. 11000 B. Storage device is used to supply power
to the computer.
226. Which of the following is NOT a sec-
ondary storage device? C. Storage device is used to preserve all
kinds of information.
A. RAM
D. Storage device is used to store data
B. CD temporarily.
C. Floppy magnetic discs
232. A flash drive is an example of what
D. USB Flash Drive
A. Magnetic Storage
227. Specialized high-capacity secondary stor-
B. Solid-state storage
age devices designed to meet organiza-
tional demands. C. Optical Storage
A. CD devices D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 183

233. Which statement is true? B. 2049 bytes


A. ROM contains the operating system C. 0.5 MB

PRACTICE BOOK» NOT FOR SALE


B. RAM is part of the hard disk D. 3gb
C. RAM stores programs / data used by 239. Which of the following is an example of
the CPU Magnetic StorageAnswers:3
D. ROM is volatile A. USB Memory Stick
234. Which of the following shows the capac- B. Hard Drive
ity of OPTICAL STORAGE MEDIA in the cor- C. Tape Drive
rect order (smallest to largest)? D. Floppy Disk
A. DVD > BLU RAY > CD E. SD Card
B. CD > DVD > BLU RAY 240. What BEST describes secondary stor-
C. BLU RAY > DVD > CD age?
D. DVD > CD > BLU RAY A. Stores data permanently without the
need for electricity
235. Very portable as it is designed to be fit-
B. Stores data temporarily whilst the
ted into small electronic devices.
computer is turned on
A. Flash memory devices
C. Fetches data from RAM and processes
B. Internal hard disk it
C. Magnetic tape D. Stores the boot up instructions for the
D. Server computer

236. A is a memory storage device that 241. A text file stores 100 chracters. 1 byte
plugs in a USB port on a computer or mo- per character is used. How much storage
bile devices. in bytes would this take up? (Including
overheads)
A. smart card
A. 110
B. USB flash drive
B. 11
C. UMD
C. 1100
D. memory stick D. 11000
237. The disadvantage of this type of storage 242. Which one is true about storage capac-
is that it is easily scratched, leading to the ity?
loss of data.
A. Storage capacity refers to the size of
A. Magnetic storage the storage device.
B. Optical storage B. Storage capacity refers to how expen-
C. Solid state storage sive the storage device costs.
D. none of above C. Storage capacity refers to the storage
device that is the user’s favorite.
238. Which is the smallest of these data capac- D. Storage capacity refers to how much
ities? disk space one or more storage devices
A. 2 KB provides.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 184

243. What type of storage is a SSD card? 248. Increases storage capacity by reducing
(4/5) the amount of space required to store data
and programs.
A. Optical
A. file compression
B. Magnetic
B. digital versatile discs
C. Solid State
C. storage area network
D. Hard Drive
D. network attached storage

NARAYAN CHANGDER
244. Why is perpendicular recording in mag- 249. What type of storage is a DVD?
netic storage devices better that longitu-
A. Magnetic
dinal?
B. Solid State / Flash
A. Less densely packed
C. Optical
B. Easier to identify magnetic signals
D. none of above
C. Changed the direction of the
read/write head 250. What is speed?

D. Changed when a 1 is recorded A. The amount of data a device can store


B. How fast the data can be accesed
245. What is an advantage of Cloud Comput- C. How easy it is to move from one place
ing? to another
A. Can access your files anywhere D. How well it lasts (ie:if dropped)
B. It is safer 251. Select ALL three storage technologies.
C. Can access files anywhere you have in- A. Flash Storage
ternet
B. Solid State Storage
D. Expensive C. Hard Memory
246. Below is the advantage of internal hard D. Magnetic Storage
disk drive E. Optical Storage
A. it is generally not expensive 252. Which of the following types of storage
B. not easily damaged is the most durable?
C. fast data transfer rate A. Optical drive

D. has many moving parts B. Magnetic drive


C. Solid state drive
247. Which of the following is an example of D. be careful with this one?
Solid StateAnswers:3
253. A group of two or more integrated hard
A. USB Memory Stick
disks is called a
B. Hard Drive A. backup
C. DVD B. platter
D. Solid State Drive C. RAID
E. SD Card D. portable hard disk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 185

254. Serial access starts from the beginning of A. Magnetic disks are less robust then
the data and then access each record of SSD’s as they contain moving parts
the data until the required record is found.

PRACTICE BOOK» NOT FOR SALE


B. Portability is an advantage of flash
Which one of these devices below uses se-
storage devices
rial access?
A. Hard disk drive C. SSD’s consume more power than mag-
netic hard drives
B. Flash drive
D. Internal hard disks are usually used in-
C. Cassette tape side the computer as backing storage
D. CD discs
260. What is DVD R, DVD R-, or DVD R+?
255. Random Access Memory (RAM) is a
device. (select two) A. They are drives and disks that make
DVD disks rewriteable.
A. primary
B. They are the drives and disks that
B. secondary
make DVDs read only.
C. non-volatile
C. They are the drives and disks that
D. volatile make CDs of music.
256. Which type of storage uses lasers to D. They are the drives and disks that
write the data? (4/5) make Blu-ray movies.
A. Optical
261. Which definition of optical discs are
B. Magnetic FALSE?
C. Solid State A. CD-ROM can be read from but not writ-
D. All Types ten to

257. Which of the following is an example of B. CD-R is an optical disc on which users
a backing storage devices? can write once, but not erase.

A. Data C. CD-RW is an erasable multi-session


disc
B. Hard disk
D. DVD-ROM is a re-writable high capac-
C. RAM
ity optical disc on which users can read
D. ROM but not write or erase

258. Which of the following types of storage 262. Which best describes magnetic storage?
is the most expensive per MB/GB?
A. Uses magnetic fields to read/write
A. Optical
data onto a metal disc.
B. Magnetic
B. Uses electronic pulses to read/write
C. Solid State data onto a metal disc
D. They are all the same C. Uses a magnetic chip to store data
259. Which of the following statements are D. Uses a laser to read/write data onto a
True (choose as many as are appropriate) metal disc

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Secondary Storage Devices 186

263. Which of these storage devices make use 268. What type of storage is SSD?
of optics (laser light) to store data? (Tick A. Optical drive
All)
B. Magnetic drive
A. CD
B. Fibre Optic Cable C. It is not a storage device

C. DVD D. Solid state


D. Blue-Ray 269. What is a disadvantage of solid state

NARAYAN CHANGDER
E. LED storage?

264. Which of the following devices cannot be A. Easily scratched, leading to the loss of
removed or unplugged? data
A. A. primary B. Large storage capacity
B. B. secondary C. Expensive to buy
C. magnetic D. Portable, easy to carry around
D. D. non-volatile
270. What is ASCII code?
265. Which is the largest of the storage capac- A. ASCII stands for American Standard
ities? code for information interchange which
A. 2048 MB specifies the ID code for each symbol in
B. 2 GB English/Latin language, using 1 byte
C. 2050 MB B. It is ascending order ranking of letters
D. 100000 KB C. It is the same as Unicode

266. Which is the largest of these data capac- D. It is a way of digitising sound
ities?
271. Virtual memory is used to
A. 2048 MB
A. Allow a computer to continue to run
B. 2 GB if the computer runs out of space on it’s
C. 2050 MB HDD
D. 100000 KB B. Allow a computer to continue to run
if the computer runs out of space on it’s
267. An example of optical storage is?
ROM
A. CD
C. Allow a computer to continue to run
B. DVD if the computer runs out of space on it’s
C. Blu-Ray RAM
D. All of the above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
3. Data Representation and Number
Systems

3.1 Binary, Octal, Decimal, and Hexadecimal Number Sys-


tems
1. What is 27 in hexadecimal? 5. Find the decimal number of octal number
A. A 152
B. 1A A. 102
B. 106
C. 1B
C. 120
D. 2A
D. 100
2. A in base-16 is what in binary?
6. What is 12 octal in binary?
A. 1111
A. 1111
B. 0101
B. 1010
C. 1010
C. 1110
D. 0110
D. 1000
3. E in base-16 is what in decimal?
7. in base-8 is what in binary?
A. 10 A. 1111
B. 12 B. 1010
C. 14 C. 1110
D. 16 D. 1000
4. THE NUMBER SYSTEM WITH BASE 16 IS 8. Decimal number 141 to octal number
A. OCTAL A. 85
B. HEXADECIMAL B. 125
C. BIANRY C. 215
D. DECIMAL D. 210

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Binary, Octal, Decimal, and Hexadecimal Number Systems 188

9. What is D in decimal? 15. in base-2 is what in Hex?


A. 11 A. B
B. 19 B. C
C. 12 C. D
D. 13 D. E

10. TO CONVERT DECIMAL TO BINARY DIVIDE 16. What are the only two numbers you can

NARAYAN CHANGDER
THE DECIMAL NUMBER WITH use in binary?
A. 10 A. 0 and 1
B. 2 B. 1 and 2

C. 8 C. 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

D. 16 D. 1, 2, 4, 8, 16

11. Convert the Hex number 93 to decimal . 17. in base-10 is what in Hex?

A. 39 A. A

B. 132 B. B
C. E
C. 147
D. F
D. 150
18. What is 100010 in decimal?
12. Convert 0.65 into an octal number
A. 43
A. 6415
B. 34
B. 5146
C. 33
C. 4165
D. 29
D. 5614
19. Convert the binary number 1110 1011 to
13. in base-10 is what in octal? Hex .
A. 10 A. EA
B. 8 B. EB
C. 1000 C. BA
D. A D. BC

14. Convert the binary number 1100 0011 to 20. THE NUMBER THAT CONTAINS BOTH AL-
Hex . PHABET AND NUMBER IS
A. 11 A. HEXADECIMAL
B. A2 B. DECIMAL
C. C3 C. OCTAL
D. D4 D. BINARY

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Binary, Octal, Decimal, and Hexadecimal Number Systems 189

21. What is 8 in octal? 27. Convert the Hex number B9 to binary .


A. 10 A. 1011 1001

PRACTICE BOOK» NOT FOR SALE


B. 8 B. 1011 1000
C. 1000 C. 1011 1101
D. A D. 1010 1001

22. Convert the Hex number DA to binary. 28. Which of these is equivalent to the Hex
A. 1100 1010 number 1A?

B. 1101 1011 A. 16 + 8 + 2

C. 1101 1010 B. 8 + 4 + 2

D. 1101 1110 C. 16 + 8 + 1
D. 16 + 8 + 4
23. what is 1A in decimal?
A. 22 29. The Octal Numbering System have a range
of “8” digits which is
B. 24
A. 1, 2, 3, 4, 5, 6, 7, 8
C. 25
B. 0, 1, 2, 3, 4, 5, 6, 7, 8
D. 26
C. 0, 1, 2, 3, 4, 5, 6, 7,
24. The highest digit in Hexadecimal is D. 1, 2, 3, 4, 5, 6, 7
A. 15
30. The highest digit in Octal is
B. 14
A. 7
C. E
B. 6
D. F
C. 5
25. Convert the binary number 0101 0101 to
D. 4
Hex .
A. 44 31. Computers store all data using
B. 55 A. Binary
C. 66 B. Hexadecimal
D. 77 C. Decimal
D. Octal
26. Which of these are hexadecimal digits?
A. F 32. What is 1101101 in decimal?
B. G A. 109
C. 6 B. 95
D. 0 C. 104
E. H D. 113

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Binary, Octal, Decimal, and Hexadecimal Number Systems 190

33. What is 10 in hexadecimal? 39. Hexadecimal digits represents


A. 10 A. 1 Byte in data
B. 1010 B. 1 Bit of data
C. A C. 8 bits of data
D. 1100 D. 2 nibbles of binary values
34. What is 11011 in hexadecimal? 40. Convert the Hex number 1F to binary .

NARAYAN CHANGDER
A. A A. 0011 1111
B. 1A
B. 0000 1111
C. 1B
C. 0001 0111
D. 2A
D. 0001 1111
35. What is 12 in binary?
41. What base in decimal?
A. 1010
A. Base 2
B. 1100
B. Base 10
C. 1110
C. Base 100
D. 0111
D. Base 1
36. Which of the following is not a common
numbering system? 42. What is C in binary?
A. Binary A. 1100
B. Hexadecimal B. 1110
C. Octal C. 1000
D. Fractal D. 1010
37. What could be the maximum value of a sin- 43. octal number system means
gle digit in an octal number system?
A. 0-8
A. 8
B. 0-7
B. 7
C. 6 C. 0-9

D. 5 D. 0-10

38. One digit in Octal can represent up to 44. One digit in Hexa is can represent up to
digits in binary. digits in binary.
A. 4 A. 3
B. 3 B. 4
C. 2 C. 5
D. 5 D. 2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Two’s Complement and Floating Point Representation 191

3.2 Two’s Complement and Floating Point Representation

PRACTICE BOOK» NOT FOR SALE


1. What is the hexadecimal 2D in binary? 7. Which is NOT a disadvantage of fixed
A. 00011101 point binary numbers?
B. 00101110 A. cannot represent the range of num-
bers
C. 00101101
D. 00101011 B. cannot represent the accuracy of num-
bers
2. Convert 88 to normalised floating point bi-
C. easier to process
nary.
A. 0.1011000 0101 D. none of above

B. 1.0011000 0111 8. Convert 0.1110000 0011 (Floating Point


C. 0.1011000 0111 Binary) to denary
D. 0.1011000 0110 A. -7.0
3. Convert 00011011.0110 (Fixed Point No- B. 7.75
tation) to denary C. 7.25
A. 27.376
D. 7.0
B. 27.375
C. 27.374 9. Add 0.1100000 0001 and 0.1111100
0011 and normalise the result.
D. 27.377
A. 1001.0100 0100
4. What is the two’s complement of
01100010? B. 0.1001010 0100
A. 10011101 C. 1.0010100 0100
B. 11011101 D. 0.1010100 0111
C. 10011110
10. What is the normalised form of
D. 10011111 0.0000111 0111
5. Convert 00110100.1000 (Fixed Point No- A. 1.0110000 0011
tation) to denary
B. 1.0110000 0111
A. 52.25
C. 0.1110000 0111
B. 52.125
D. 0.1110000 0011
C. 52.5
D. 52.05 11. What is binary 0110 divided by binary
0010?
6. write 255 as binary
A. 11111110 A. 0011

B. 11111111 B. 0010
C. 00000000 C. 0101
D. 10000000 D. 0111

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Two’s Complement and Floating Point Representation 192

12. What is binary 0110 multiplied by binary 18. Convert 11.75 to Floating Point Notation-
0010? 8 bit mantissa and 4 bit exponent
A. 1000 A. 00001011.1100
B. 1110 B. 00001011.1010
C. 1100 C. 00001011.1110
D. 1010 D. 00000111.1100
19. What is the normalised form of

NARAYAN CHANGDER
13. what is 11101010 in hex?
1.1100011 0011?
A. EA
A. 1.0001100 0001
B. 1410
B. 1.0001100 0011
C. ea
C. 0.1001100 0001
D. 14A D. 0.1001100 0011
14. The hexadecimal value 7A16 is equivalent 20. Denary = 255Hex =?
to what decimal value?
A. AF
A. 122
B. 1F
B. 81
C. FA
C. 123
D. FF
D. 26
21. Binary 1110Hex =?
15. Convert 0.1010000 1111 (Floating Point A. 14
Binary) to denary
B. F
A. 0.3125
C. 15
B. 0.315
D. E
C. 0.75
22. Convert 1.75 to binary (Fixed Point Nota-
D. 0.625 tion)
16. Convert 11011.1001 to denary. A. 1.11
A. 27.8125 B. 1.1
B. 27.5625 C. 1.01
C. 31.5625 D. 1.011
D. 31.34375 23. Why do we carry out normalisation on
floating point binary numbers?
17. (8 bit signed mantissa / 4 bit signed ex-
A. To convert the number into a negative
ponent) what is the decimal number?
number
A. 5.625
B. To round a decimal number down
B. 11.5
C. To provide the maximum level of preci-
C. -5.625 sion
D. -11.5 D. To round a decimal number up

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 ASCII and Unicode Character Encoding 193

24. Convert 00101010 to decimal A. 0.1100000 0011


A. 48 B. 1.0100000 0011

PRACTICE BOOK» NOT FOR SALE


B. 44 C. 0.1100000 0111
C. 42 D. 1.0100000 0111
D. 41
28. What is 0.125 in fixed point binary (4 bits
25. Binary = 1101Hex =? Dec =? for the whole number / 4 bits for frac-
A. D, D tional part)?
B. 13, 13 A. 10001000
C. D, 13 B. 00000010
D. 13, D
C. 00001000
26. Convert 1.0111010 0100 (Floating Point D. 00011000
Binary) to denary
A. -7.25 29. Subtract 0.1011000 0011 from
0.1100100 0010 and normalise the re-
B. -9.5
sult.
C. -9.25
A. 1.0110100 0010
D. -9.125
B. 0.1110100 0010
27. Subtract 0.1110000 0011 from
C. 0.1101000 0010
0.1101000 0100 and normalise the re-
sult. D. 1.0110100 1000

3.3 ASCII and Unicode Character Encoding


1. The main purpose of character sets is: B. The fonts that a computer has in-
A. To allow humans to express alphanu- stalled.
meric characters in a binary table C. The possible characters that can be
B. To run the Internet represented by a computer system.

C. To simplify computer programming D. none of above

D. none of above 4. ASCII stands for

2. How do computers represent characters? A. American Standard Code for Informa-


tion Interchange
A. Using Binary
B. American Scientific Code for Informa-
B. Using Emojis tion Interchanging
C. Using Hexadecimal C. Absolute Standard Codes for Instruc-
D. Using Letters tion Interchange

3. A character set is D. none of above

A. What language can be used in a com- 5. Which of these is not an example of a Data
puter system. Set?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 ASCII and Unicode Character Encoding 194

A. ASCII 11. The following is true about character sets:


B. UNICODE A. Each letter has a unique code
C. BASIC B. Lower and upper case letters share
the same codes
D. none of above
C. ASCII is one of the latest character
6. How many bits are used in ASCII? sets to be adopted
A. 16 D. none of above

NARAYAN CHANGDER
B. 1 12. How many bits are used in Unicode?
C. 7 A. 8
D. 8 B. 16
7. How many bits are used in (standard) C. 2
ASCII? D. 32
A. 16
13. Why was Unicode developed in 1991?
B. 1
A. To improve the character sets on com-
C. 7 puters
D. 8 B. Needed so we could display non-
printing characters
8. ASCII uses one byte per character. Unicode
uses how many bytes per character? C. There was a need for a universal stan-
dard and more characters to cover all lan-
A. 2 bytes per character. guages on earth.
B. 3 bytes per character. D. To replace early character sets used
C. 4 bytes per character. on teletype and teleprinting machines
D. none of above 14. Choose the best answer about character
sets:
9. What is the maximum number of values
that can be represented in 7 bits? A. All characters in character sets are
stored in binary.
A. 127
B. Some characters in character sets are
B. 256 stored in binary.
C. 65, 536 C. Only binary characters in character
D. 128 sets are stored in binary.
D. none of above
10. ASCII is a character set that is saved in
form 15. Unicode can represent:
A. Binary A. 65, 536 different characters
B. ASCII B. 255 characters
C. Data Set C. 127 characters
D. Characters D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 ASCII and Unicode Character Encoding 195

16. What is meant by the term ‘character 17. The word “Hello” is made up of 5 char-
set’? (Choose two) acters. How many bits is this (hint:how
A. The characters that are recognised by many 1’s and 0’s are needed to write it)

PRACTICE BOOK» NOT FOR SALE


a computer. A. 40
B. Each character is represented by a
B. 60
unique binary number.
C. It only refers to ASCII. C. 80
D. It must be represented using 7 bits. D. 48

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4. Computer Hardware

NARAYAN CHANGDER
4.1 Input Devices
1. Which of the following is not a manual in- 4. RFID uses to read information.
put device? A. Radio waves
A. Keyboard B. Special ink
B. Digital Camera C. Visible red light
C. Mouse D. Pin
D. Microphone
5. What are the use(s) of a mouse?
2. Input device that reads text written in spe- A. opening software
cial magnetic ink. Often used at the bot-
B. closing software
tom of checks.
C. minimizing software
A. Magnetic stripe readers
D. all three
B. Optical Character Recognition
C. Optical Mark Recognition 6. Which touchscreen technology changes the
flow of electricity across the screen when
D. Magnetic Ink Character Recognition
the screen is touched?
3. What is manual input? A. Capacitive
A. Data is input into the computer by hand B. Infra-red
or speaking C. Resistive
B. Data is input into the computer directly D. none of above
by a machine
C. Data is input into the computer by a 7. Magnetic stripe reader reads information
sensor from

D. Data is input into the computer by an A. RFID tags


actuator B. Chips

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 197

C. Magnetic stripes 13. A device used to select commands for peo-


ple with restricted arm movements
D. Special ink

PRACTICE BOOK» NOT FOR SALE


A. Mouse
8. To convert analogue to digital data you B. Tracker ball
will need what?
C. Joystick
A. ADC
D. Driving wheel
B. DIG
14. What type of signal does a remote control
C. ANA use?
D. DDC A. Ultra Violet
B. Infrared
9. Which touchscreen is most appropriate for
smartphones C. Radioactive

A. Capacitive D. none of above

B. Infra-red 15. This can be used to record videos and pho-


tos. Also the data is stored in digital mem-
C. Resistive ory.
D. none of above A. Webcams
B. Video camera
10. Raw data that is fed into an information
system . C. Digital camera
A. Input D. Film camera

B. Out put 16. What is the difference between Bar code


and Quick Response (QR) codes:
C. Process
A. Bar code:black and white vertical lines,
D. none of above QR code matrix of filled in dark squares
11. This device converts photographs to digital B. Bar Code supports more character
images C. QR code is the earliest of the two bar
A. MICR codes
D. none of above
B. Optical scanner
C. OMR 17. Using what scanned text can be converted
to a text file?
D. Printer
A. OCR
12. A typical OCR system consists of a B. VCR
along with special software. C. RAD
A. special ink D. CAD
B. scanner 18. Which of the following is an input device?
C. RFID tag A. printer
D. laser pointer B. keyboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 198

C. speaker C. Ergonomic keyboard


D. projector D. Numeric keypad
19. This option is often used to open a docu- 25. This device reads a series of thick and think
ment on a computer black lines on an item
A. Clicking A. MICR
B. Double Clicking B. Barcode reader

NARAYAN CHANGDER
C. Dragging and dropping
C. OMR
D. Right clicking
D. Magnetic Strip Reader
20. What is used to quickly process answer
sheets for multiple choice examinations? 26. Keyboards are used to input the following
data, except;
A. RFID
A. Text
B. MICR
B. Number
C. OCR
C. Instruction
D. OMR
D. Image
21. Type of touchscreen that uses a grid of in-
visible LED beams and sensors 27. Where Quick Response (QR) codes is
A. Capacitive mostly used:
B. Infra-red A. store website addresses/URLs of the
advertiser
C. Resistive
D. none of above B. Products Prices
C. Encrypting data about users
22. This sensor is used for burglar alarms
D. at immigration counter scanning IC
A. Temperature
card
B. Humidity
28. Which is a device used together with a
C. Movement/Motion
graphics tablet?
D. PH
A. Mouse
23. Which device is used mainly for cheque pro- B. stylus
cessing?
C. tracker ball
A. Optical Character Recognition
D. none of above
B. Magnetic Ink Character Recognition
C. Optical Mark Reader 29. Allows users to input commands into the
D. none of above computer by tapping on virtual buttons.
A. Touch screen
24. An input device which the user can use to
type in numbers into a computer. B. ergonomic keyboard
A. QWERTY keyboard C. Steering wheel
B. Concept keyboard D. Remote control

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 199

30. Which input device would you use to cap- 36. What input device is best used to:play
ture sound? flight simulation games?

PRACTICE BOOK» NOT FOR SALE


A. Web cam A. Keyboard
B. Microphone B. Bar code Reader
C. Speakers C. Joystick
D. Monitor D. Printer
31. Select ALL of the input devices listed
37. to decimal
A. Microphone
A. 0
B. webcam
B. 1
C. Printer
C. 10
D. Keyboard
D. 010
32. This device has an alphanumeric keyboard
and is used for inputting text and numbers 38. What is the function of a microphone?
into a conputer.
A. Converts sound into digital form
A. Touch screen
B. Record video
B. Mouse
C. Listening to audio
C. Keyboard
D. Take pictures
D. Joystick
33. THE FINAL ANSWER GIVEN BY THE COM- 39. Which of the input devices listed below is
PUTER IS ALSO KNOWN AS ? the most suitable input devices for playing
computer games?
A. INPUT
A. Joystick
B. OUTPUT
B. Scanner
C. PROCESSING
C. Microphone
D. none of above
D. Digital camera
34. Reads magnetic information at the bottom
of cheques 40. ALL THE PROCESSING IS DONE BY
A. MICR A. MOUSE
B. OMR B. CPU
C. OCR C. MONITOR
D. Magnetic Strip Reader
D. none of above
35. Types of touchscreen that does NOT sup-
port the use of regular gloved hand 41. What is 0100 0110 in denary?

A. Capacitive A. 123
B. Infra-red B. 15
C. Resistive C. 10
D. none of above D. 70

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 200

42. A microphone works by: 47. A mouse works by:


A. Rotating a stationary ball to adjust the A. Rotating a stationary ball to adjust the
pointer on a screen pointer on a screen
B. Tracking the movement of a laser or B. Tracking the movement of a laser or
LED light across a flat surface LED light across a flat surface
C. Pressing keys down to generate differ- C. Pressing keys down to generate differ-
ent binary inputs ent binary inputs

NARAYAN CHANGDER
D. Turning analogue sound vibrations into D. Turning analogue sound vibrations into
electrical signals electrical signals
43. A computer chip is embedded into this with
48. A computer is a machine that works on the
customer information
principle of cycle.
A. Magnetic strip card
A. IPSO
B. Smart card
B. SOPI
C. MICR
C. POIS
D. OCR
D. POS
44. OMR and OCR are comes under cate-
gory of Input devices. 49. Device that recognises human physical
characteristics, such as fingerprints
A. Hand held Input Device
A. 2D scanner
B. Audio Input Device
B. Screen
C. Pointing Input Device
D. Optical Input Device C. AVR
D. Biometric devices
45. This device converts the text on a scanned
image or photograph into text that can ei- 50. WHICH OF THESE IS NOT AN INPUT DE-
ther be edited or looked up in a database. VICE?
A. Optical Mark Reader (OMR) A. SCANNER
B. Optical Character Recognition (OCR)
B. MICROPHONE
C. Magnetic Ink Character Recognition
C. MONITOR
(MICR)
D. MOUSE
D. Concept Keyboard

46. This device has a magnetic coil that vi- 51. A mouse, touchscreen, and a trackball are
brates when it is hit by sound waves. all examples of

A. Keyboard A. Scanning Device


B. Trackerball B. Voice-input Device
C. Capacitive Touch Screen C. Pointing Device
D. Microphone D. Output Device

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 201

52. This device can quickly read numerical data 57. Input device for sound data
that is entered as marks on a pre-printed A. Scanner
sheet such as a lottery ticket or a class

PRACTICE BOOK» NOT FOR SALE


register. B. Voice control
A. Optical Mark Reader (OMR) C. Voice recognition
B. Magnetic Ink Character Recognition D. Microphone
(MICR)
58. A process where scanned marks on a page
C. Optical Character Recognition (OCR) are automatically converted to inputs.
D. Musical Instrument Digital Interface A. OCR
(MIDI)
B. OMR
53. Which input device would you use to cap- C. MICR
ture video in real-time?
D. MSR
A. Web cam
59. to decimal
B. Sip and puff switch
A. 15
C. Microphone
B. 11
D. Monitor
C. 12
54. Computer, store data in storage systems, D. 13
the primary of which is referred to as RAM.
The cycle being described is the 60. Which pointing device is most commonly
A. Process used by smartphones and ATMs?
B. Input A. Mouse
C. Output B. Light Pen
D. Storage C. Digitizer Tablet
D. Touch Screen
55. Type of touchscreen that uses an electrical
current, sent from the four corners of the 61. Input device commonly found on laptops in-
glass screen stead of a mouse.
A. Capacitive A. Touch pad
B. Infra-red B. Sensors
C. Resistive C. Scanner
D. none of above D. Stylus

56. WORKING UPON INPUT IS KNOWN AS 62. Use of software to convert spoken words
into text.
A. INPUT A. Microphone
B. PROCESSING B. Voice control
C. OUTPUT C. Voice recognition
D. none of above D. stylus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 202

63. What type of devices are scanner and mi- 69. The process of capturing full-motion im-
crophone? ages and storing them on a computer’s
A. Input storage medium such as a hard disk or op-
tical disc by using this type of input.
B. Output
A. Video input device
C. Storage
B. Audio input device
D. none of above
C. Digital camera

NARAYAN CHANGDER
64. Below are uses for RFID except
D. none of above
A. contactless payment card
B. track movement of livestock 70. The input device used to play computer
C. quickly locate a particular item in a games is a
warehouse A. trackball
D. to quickly process cheques
B. joystick
65. Touchscreen with the most inexpensive C. touch pad
technology
D. digitizing tablet
A. capacitive
B. infra red heat 71. What is a scanner used for?
C. resistive A. To scan pictures and text
D. infra red optical B. to scan pictures
66. What is the full form of ‘ATM’? C. to scan text
A. Automatic Time Machine D. Can not scan a picture or a text
B. Automatic Teller Machine
C. Any Time Money 72. Advantage of BarCode

D. none of above A. Adjust the stock Control


B. Fast
67. A 2D barcode is also known as
A. QR code C. Produces Itemized bill

B. Special code D. All of the above


C. RFID code
73. Which of the following Input Device does
D. MICR code a supermarket use to input information
about a product very quickly and without
68. ALL THE INSTRUCTIONS GIVEN TO THE mistakes?
COMPUTER ARE KNOWN AS ?
A. Bar code scanner
A. PROCESSING
B. INPUT B. Chip and pin reader

C. OUTPUT C. Touch Screen


D. none of above D. All 3 are used.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 203

74. This type of device can be used to identify 79. How trackerball works?
individuals using unique features such as A. Touch the ball with finger
the iris pattern, finger prints or voice pat-

PRACTICE BOOK» NOT FOR SALE


tern B. Typing the buttons
A. Keyboard C. By rotating the large ball with hand
B. Barcode Scanner D. Rolling on the flat surface
C. Biometric device 80. Devices that allow you to put information
D. Magnetic Ink Character Recognition into the computer.
(MICR) A. Type

75. A light-sensing input device that reads B. Input


printed text and graphics and then trans- C. Output
lates the results into a form the computer
D. none of above
can process refers to
A. An Optical scanner 81. Which screen shines light across the screen
from the edges?
B. An Optical reader
A. Capacitive touchscreen
C. Fingerprint reader
B. Resistive touchscreen
D. none of above
C. Infra-red touchscreen
76. This device can be operated without hav- D. Surface Acoustic Wave screen
ing to move.
A. Light pen 82. Is an example of input device.
B. Keyboard A. Touch Screen
C. Remote control B. Printer
D. chip and pin reader C. Speakers
D. Monitor
77. An electronic device device that is designed
to detect and measuremovement of a per- 83. A small, flat, rectangular pointing device
son, animal or thing. that is sensitive to pressure and motion is
A. Motion Sensor called

B. Biometric Eye Scanner A. Touchpad

C. Webcam B. Touch-sensitive pad

D. Fingerprint Scanner C. touch screen


D. on screen keyboard
78. In an automated system, what type of de-
vice is a sensor? 84. QR Code is
A. Storage device A. Quick Reply
B. Processing device B. Quick Response
C. Input device C. Quantitative Reasons
D. Memory device D. Quality Research

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 204

85. Select one disadvantage of using key- C. light pen


board; D. digitizing tablet
A. Enable fast data entry of text
91. What does OMR stand for?
B. Entering data is slow when compare
with automatic methods A. Optical marked reference
B. offline marked read-only
C. Information entered instantly appears
on the screen C. optical mark recognition

NARAYAN CHANGDER
D. Very easy to use D. output mark reader

86. Describe RAM 92. What is the very first input device devel-
oped for the PC?
A. RAM is volatile
A. Mouse
B. RAM never stores data
B. Keyboard
C. RAM programs turn off if you close the
computer C. Touch Screen
D. RAM is the same as ROM D. Scanner

87. Which keyboard is better for people with 93. Used to convert books (hardcopy) into dig-
hand-related problems? ital versions (e-books).

A. QWERTY keyboard A. OCR


B. OMR
B. Numeric keypad
C. MICR
C. Ergonomic keyboard
D. RFID
D. none of above
94. A device that inputs moving images into a
88. Used to enter information on papers into
computer which is mainly used for video
a computer
conferencing.
A. Printer A. Digital camera
B. Scanner B. Video camera
C. QWERTY keyboard C. Web cam
D. Touchpad D. Film camera
89. Blu-ray disc 95. Which of the following is a scanning device
A. Input device A. Optical mark reader
B. Output device B. Touch pad
C. Storage device C. Light pen
D. Network device D. Remote control
90. The input device that enables you to enter 96. Which of these methods below are used to
drawings and sketches into a computer. quickly process cheques?
A. touchpad A. Chip and Pin reader
B. pointing stick B. Magnetic Stripe reader

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 205

C. RFID 102. Keyboard is


D. Barcode scanner A. an input device that contains keys

PRACTICE BOOK» NOT FOR SALE


E. Magnetic Ink Character Recognition users press to enter data and instructions
into a computer
97. A keyboard works by: B. a stationary pointing device with a ball
A. Rotating a stationary ball to adjust the on its top or side
pointer on a screen C. input device that directs movements
B. Tracking the movement of a laser or and actions of on-screen objects
LED light across a flat surface D. a mobile device that allows users to
C. Pressing keys down to generate differ- take pictures and store the photographed
ent binary inputs images digitally, instead of on traditional
film
D. Turning analogue sound vibrations into
electrical signals 103. WHICH OF THESE IS AN OUTPUT DE-
VICE?
98. Enters sound onto a computer
A. MOUSE
A. Microphone
B. PRINTER
B. Speakers
C. KEYBOARD
C. Touch Screen
D. SCANNER
D. Light pen
104. Choose the types of biometric input
99. A capacitive touch screen.
A. Face recognition
A. Uses pressure and conductivity to
work B. Microphone

B. Uses a humans electric field to work C. Fingerprint

C. Uses nothing to work D. Touch pad

D. Uses Hankai students to work 105. This mouse function displays a list of com-
mands or options on the screen depending
100. Which of the following device falls under on the application being used
Input, Output and Storage devices?
A. Clicking
A. Webcam
B. Double clicking
B. Monitor
C. Dragging and Dropping
C. Touch Screen Terminal
D. Right clicking
D. Microphone
106. In the “Chip and Pin Reader” method,
101. Which is the most used character layout what is used to ensure the person using
on a keyboard? the card is the actual owner?
A. QWERTY layout A. Name
B. ABCD layout B. Pin
C. Ergonomic keyboard layout C. Password
D. none of above D. Account number

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 206

107. What can a scanner scan? C. Mouse


A. Both picture and text D. Keyboard
B. Neither picture nor text
113. This device enables users to write di-
C. Text rectly on a touch screen
D. Picture
A. Gamepad
108. A ‘point and click’ device that is used to B. Mouse

NARAYAN CHANGDER
control a screen cursor and select menus
items. C. Keyboard

A. Joystick D. Stylus
B. Mouse 114. Which among the following is the most
C. Keyboard common device that accepts letters, num-
D. Concept Keyboard bers and symbols from a user?
A. Optical mouse
109. Touch pads are present on which type of
computer? B. Keyboard
A. mainframe C. Scanner
B. laptop D. none of above
C. PC
115. Do joysticks use pointers to navigate
D. none of above through the screen?
110. Input device used for games playing and A. Yes
flight simulators.
B. No
A. Game controllers
C. Not always
B. Joystick
D. none of above
C. Keyboards
D. Multimedia keyboard 116. What is screen resolution?

111. If you want to draw house plans, you A. The amount of pixels on a page
could prefer this device B. The most pixels on a page
A. Light Pen C. The amount of squares on a page
B. Graphic Tablet D. The least pixels on a page
C. Stylus
117. Barcode reader uses to read informa-
D. Mouse
tion.
112. Which input devices inputs letters, num- A. Radio waves
bers, symbols and special characters into
a computer? B. Special ink
A. Microphone C. Visible red light
B. Tracker Ball D. Pin

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 207

118. This device is suited to direction control in 123. Choose which are the direct data entry
some games as well as controlling physical and associated devices
devices such the tilt/pan on CCTV cameras, A. RFID

PRACTICE BOOK» NOT FOR SALE


an electric wheel-chair or robot vehicles.
B. Optical Mark Reader
A. Keyboard
C. Optical Character Reader
B. Touch screen D. Cathode Ray Tube Monitor
C. Mouse
124. This device is an input and an output de-
D. Joystick vice
A. Keyboard
119. What are input devices?
B. Stylus / Light pen
A. Hardware devices placed outside the
computer C. Barcode reader
D. Touchscreen
B. Hardware devices that are used for
producing report 125. Which input device is commonly used for
C. Hardware devices for data entry to the gaming?
computer A. Keyboard
D. Hardware devices that allow the user B. Mouse
to enter data C. Joystick
D. Barcode Scanner
120. What is a QR code?
A. A readable picture 126. Which input device allow only voice
data?
B. A black and white picture
A. Digital camera
C. A thing you dont use everyday
B. Microphone
D. A 2-D barcode C. Keyboard
121. Allows users to input commands into the D. none of above
computer by pressing on buttons. 127. This device uses two layers, when one
A. Touch screen layer is pressed down, it affects the elec-
trical current on the bottom layer.
B. ergonomic keyboard
A. Resistive Touch Screen
C. Steering wheel
B. Microphone
D. Remote control
C. Mechanical Mouse
122. What input device is used to:record hu- D. Trackerball
man voice into sequence of electronic sig-
128. What is the name of the input device used
nal
for typing letters and numbers?
A. Scanner A. Printer
B. Joystick B. Keyboard
C. Keyboard C. Scanner
D. Microphone D. Monitor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 208

129. A company wants to invest in an adver- 134. Which is the best input device for select-
tising strategy that will increase sales by ing text?
those people coming in contact with their
A. Mouse
advertisement. What would you recom-
mend they use? B. Keyboard
A. QR codes so people can access web- C. Speaker
sites more conveniently rather than typing
url D. CPU

NARAYAN CHANGDER
B. Sending personal emails to interested
135. Input devices used to measure physical
people
traits, such as sound, heat, or light.
C. Handing out fliers and promising dis-
counts to people who wish to buy A. Trackball
D. none of above B. Voice recognition

130. An example of an input device is C. Webcam


A. Printer D. Sensors
B. Keyboard
136. What is the cpu like?
C. Monitor
D. Speaker A. Brain

131. For Video conferencing over the internet, B. Head


what input device would you use? C. Heart
A. Graphics Tablet D. Hands
B. Barcode reader
C. Touch screen 137. This is made up of many layers of glass
that act like a capacitor
D. Webcam
A. Infra red optical
132. An input device which the user can use to
type in numbers in the numeric keyboard B. resistive
into a computer.
C. capacitive
A. QWERTY keyboard
D. infra red heat
B. Compact keyboard
C. Ergonomic keyboard 138. Whichof the following is an advantage of
D. Standard keyboard a Barcode Scanner?

133. Input device that reads printed text, A. they do not contain any added informa-
scans it, and converts it to text that can tion such as expiry date of items.
be edited in a word processor. B. In order to read the barcode, the bar-
A. Magnetic stripe readers code scanner needs to bequite close
B. Optical Character Reader C. Fast and accurate
C. Optical Mark Reader D. Barcode scanners need a direct line of
D. Magnetic Ink Character Reader sight tothe barcode to be able to read.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 209

139. A device used for video games, flight sim- 145. What is the most accurate definition of a
ulators, training simulators and for con- keyboard?
trolling industrial robots is?

PRACTICE BOOK» NOT FOR SALE


A. The device contains keys and special
A. Mouse button to launch media.
B. Light pen B. The device contains keys and buttons
C. Joystick and the user presses the keys and buttons
to enter data.
D. Keyboard
C. The device contains keys and buttons
140. Barcode reader to control a pointer or cursor on screen.
A. Input device D. none of above
B. Output device
146. What input device is used to:text from
C. Storage device
paper into the computer which can be
D. Network device EDITED?
141. What is the function of a mouse? A. Keyboard
A. Control the cursor B. OCR
B. Add text and images C. OMR
C. Draw on the screen D. MICR
D. Reboot the computer
147. Select two pointing input devices from
142. Which of the following is NOT a pointing the list below.
input device? A. joystick
A. Mouse B. OCR
B. Light Pen
C. trackball
C. Bar code reader
D. MICR
D. Touch Screen
148. Which device is used mainly for marking
143. Device that allows the user to put data multiple choice scripts?
into the computer
A. Magnetic Ink Character Recognition
A. INPUT DEVICES
B. Optical Mark Reader (OMR)
B. OUTPUT DEVICES
C. Optical Character Recognition (OCR)
C. STORAGE DEVICES
D. PROCESSING DEVICES D. none of above

144. Which of the following devices is the de- 149. Which screen is are made up of a layer
vices used to check the PSE Examination or of conductive polyester and a layer of con-
to check Questionnaire and survey? ductive glass?
A. Light Pen A. Capacitive touchscreen
B. Flatbed Scanner B. Resistive touchscreen
C. Optical Mark Reader C. Infra-red touchscreen
D. Joystick D. Surface Acoustic Wave screen

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 210

150. Tick all the pointing devices. 156. A device used in flight simulators:
A. Mouse A. remote control
B. tracker ball
B. Tracker ball
C. remote control
C. Joystick
D. touchpad
E. joystick D. smart board

NARAYAN CHANGDER
151. If you want to draw house plans or en- 157. An input device used to control DVD play-
gine you could prefer this device ers and multimedia projectors:
A. Light Pen
A. Joystick
B. Keyboard
B. Ergonomic keyboards
C. Speaker
D. Mouse C. Remote control

152. Tick all the input devices D. Touchpad


A. microphone
158. Type of touchscreen where the user
B. graphics tablet pushes one layer of material into another
C. printer to complete a circuit
D. projector A. Capacitive
E. scanner
B. Infra-red
153. Which screen makes use of ultrasonic
C. Resistive
sound waves?
A. Capacitive touchscreen D. none of above
B. Resistive touchscreen
159. Used by artists and designers to create
C. Infra-red touchscreen and store digital graphics into a computer
D. Surface Acoustic Wave screen
A. Touch screen
154. There are types of mouse.
B. Monitor
A. 3
C. Laptop
B. 2
C. 4 D. Graphics tablet
D. none of above
160. An optical reader that uses laser beams
155. What device doesn’t use a ball to move to read printed codes is called.
the cursor on the screen?
A. Bar code reader
A. Trackerball
B. RFID reader
B. Mechanical Mouse
C. Optical Mouse C. Magnetic Stripe Card Readers
D. none of above D. flatbed scanner

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 211

161. How is touch detected in an infra-red C. Both input and output


touchscreen? D. none of above

PRACTICE BOOK» NOT FOR SALE


A. When touched by a finger, there is a
change in the electric field at that position 167. Allows users to input commands into
the computer by pressing on buttons on
B. When touched by a finger, the infra- screen.
red beam is interrupted
A. Touch screen
C. Two sound wave transducers detect a
reduction in the sound wave amplitude B. ergonomic keyboard
D. When pressed by a finger, the two con- C. Steering wheel
ducting layers make contact and complete D. Remote control
a circuit
168. What is the used of sensor?
162. Below are information normally stored in
A. Used to process bank cheques
a product’s barcode except?
B. To control the pointer on the screen to
A. Product ID
selecting windows and so on.
B. Manufacturer
C. Inputting data into applications
C. Country of origin
D. A device that converts a real world
D. Price property into data that a computer can
process
163. Which of the following is a scanning input
device? 169. Touch screen is
A. Mouse A. a touch-sensitive display device.
B. Keyboard B. an input device that enables users to
C. Joystick scroll through files, menu and settings.
D. Optical Mark Reader C. a pointing device that fits comfortably
under the palm of your hand.
164. A uses LED to track movement
D. none of above
A. Keyboard
170. What input device is used to:Enter multi-
B. Mouse
ple choice test marks
C. Monitor
A. OMR
D. Scanner
B. OCR
165. Which is the input device used C. MICR
A. Scanner D. Magnetic Stips
B. speaker
171. Sensors can be used to measure all of the
C. printer following except
D. monitor A. Pulse
166. Is Cpu an input or an output device B. Temperature
A. Input Device C. MICR
B. Output Device D. Sound

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 212

172. Which of the following is/are example(s) 177. This device scans a pattern of dark and
of a voice input device? light lines with a laser. The reflected
pattern is converted into a number and
A. Speaker
typically used to identify a product in a
B. Microphone database.
C. Headphones A. Barcode scanner
D. Headset B. Biometric device

NARAYAN CHANGDER
C. joystick
173. A device which is useful for the disabled
people because they don’t have to move: D. Magnetic ink creator recognition
(MICR)
A. Scanner
E. laser pointer
B. remote control
C. keyboard 178. What does analogue mean in relation to
sensors?
D. mouse
A. The output takes on different binary
174. What is 0000 0101 in denary? values depending on the quantity being
measured
A. 123
B. The output is recorded in a log
B. 12
C. The output varies smoothly and contin-
C. 10 uously over time
D. 5 D. The output is analysed.

175. What input device is used to:to process 179. On which touchscreen is screen visibility
large number of cheques poor in strong sunlight
A. Keyboard A. infra-red heat
B. Scanner B. infra-red optical
C. MICR C. capacitive
D. Mouse D. resistive

176. How is touch detected in an Surface 180. What is the RAM like?
Acoustic Wave touchscreen? A. Brain
A. When touched by a finger, there is a B. Short term memory
change in the electric field at that position C. Long term memory
B. When touched by a finger, the infra- D. Distance memory
red beam is interrupted
C. Two sound wave transducers detect a 181. A trackball works by:
reduction in the sound wave amplitude A. Rotating a stationary ball to adjust the
D. When pressed by a finger, the two con- pointer on a screen
ducting layers make contact and complete B. Tracking the movement of a laser or
a circuit LED light across a flat surface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 213

C. Pressing keys down to generate differ- C. Quiet Reindeer


ent binary inputs D. Quaint Restroom

PRACTICE BOOK» NOT FOR SALE


D. Turning analogue sound vibrations into
electrical signals 187. An example of scanner is
A. printer
182. Input device commonly found on laptops
instead of a mouse in the form of a small B. barcode readers
panel containing different touch-sensitive C. light pens
areas. D. none of above
A. Touch pad
188. What two input devices could be used
B. Scanner with a VR flight training system?
C. Sensors A. Steering wheel/joystick
D. Stylus B. Motion sensor
183. Input device used in conjunction with C. bar code reader
touch screens, which sends a digital sig- D. OCR
nal to a compatible touchscreen, which in-
terprets the pressure as drawing on the E. RFID
screen. 189. An input is
A. Touch pad A. Any data and instructions entered into
B. Scanner the memory of a computer
C. Sensors B. Unprocessed data
D. Stylus C. Data that has been processed into a
useful form.
184. A pen shaped device which can sense
light, and is used to point at spots on a D. Any hardware component that allows
screen. users to enter data and instructions into
a computer
A. Light pen
B. Tracker ball 190. This device allows the user to select from
a range of options that are labeled using
C. Mouse icons or images.
D. Joystick A. Barcode Scanner
185. This input device are suitable for the peo- B. Mouse
ple who have disablility C. Keyboard
A. keyboard D. Concept Keyboard
B. mouse
191. This mouse function allows you to select
C. trackerball an item on the screen
D. touchpad A. Clicking
186. QR code is an abbreviation of code. B. Double clicking
A. Quick Response C. Dragging and Dropping
B. Quick Reply D. Right clicking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 214

192. Use this option to to move or copy an 197. What is a pixel?


item to a flash drive or hard disk drive A. A square
A. Clicking B. A square area that is filled with colour
B. Double clicking on a screen
C. Dragging and dropping C. A triangle area that is filled with colour
on a screen
D. Right clicking
D. A pentagon area that is filled with

NARAYAN CHANGDER
193. A mouse, touch-pad, and a trackball are colour on a screen
all examples of:
198. An input device on your smart phone that
A. Scanning Device you operate with touch is
B. Voice-Input Devices A. Touch pad
C. Pointing Device B. Touch screen
D. Output Device C. Touch-sensitive pad
D. Stylus
194. Select one disadvantage of using mice;
A. Faster to select icons and option when 199. How can a scanner recognise a character
compare to a keyboard of text using OCR technology?

B. Easy to navigate around document and A. It looks into each line of an image and
windows finds patterns in the black and white dots
which resemble letters stored in memory
C. Small size and less space taken
B. The scan head moves up and down the
D. Require flat surface in order to work page and stores the image
properly
C. The scanner stores the page and auto-
195. Which input device is used at Belize Social matically converts it into text
Security Board to sign and enter in your D. none of above
signature digitally?
200. Which touchscreen technology is NOT
A. Barcode Reader likely to / may NOT smash/shatter if
B. Graphic Tablet dropped hard
C. Flatbed Scanner A. Capacitive
D. Printer B. Infra-red
C. Resistive
196. Which of the following is a use of the nu-
meric keypad? D. none of above

A. Input text data and numeric data into 201. This device has a diaphragm and magnetic
a computer coil that vibrate when hit by sound waves.
B. Calculate and solve mathematical cal- A. Keyboard
culations B. Trackerball
C. Input numeric data at ATMs C. Capacitive Touch Screen
D. none of above D. Microphone

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 215

202. If you want to draw cartoon characters 208. Some hotels uses this to replace actual
or design clothing on the computer, you keys for their rooms.
would use this device.

PRACTICE BOOK» NOT FOR SALE


A. Bank card
A. Mouse B. Membership card
B. Graphic Tablet
C. Door card
C. Touch Pad
D. Smart card
D. Joystick
E. RFID tag
203. Input devices that measure body charac-
teristics 209. Which screen is made up of glass layers?

A. Optical scanners A. Capacitive touchscreen


B. Touch screens B. Resistive touchscreen
C. Biometric devices C. Infra-red touchscreen
D. Light pen D. Surface Acoustic Wave screen

204. Device that allows you to put information 210. A resistive touch screen.
into the computer is? A. Uses pressure and conductivity to
A. Input work
B. Output B. Uses a humans electric field to work
C. Storage Devices C. Uses nothing to work
D. Printer D. Uses Hankai students to work
205. Used to create digital copies of printed 211. A Computer mouse is another device.
documents into a computer
A. Input device
A. Printer
B. Output device
B. 2D Scanner
C. Pointing device
C. QWERTY keyboard
D. none of above
D. Touchpad
212. What can QR codes link to?
206. Early input devices are
A. an image
A. Keyboard
B. Punch cards B. a website

C. Physical switches C. a music file


D. Touchscreen D. all of the above

207. This category/ type of device allows a 213. Which of these terms is the definition
user to control a pointer on the screen “the physical parts of a computer” for?
A. pointing device A. Hardware
B. keyboard B. Software
C. touch pad C. Broadband
D. touch screen D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 216

214. Input devices that reads simple multiple- C. scanner


choice style answers by looking for marks
D. illuminator
on the paper.
A. Magnetic stripe readers 220. This device can be operated without hav-
B. Optical Character Reader ing to move closer to the devices.

C. Optical Mark Reader A. Light pen


D. Magnetic Ink Character Reader B. Keyboard

NARAYAN CHANGDER
215. What type of devices are scanner and joy- C. Remote control
stick? D. chip and pin reader
A. Input
221. This device connects to a sound card and
B. Storage allows the user to input speach and other
C. Output sounds.
D. none of above A. Touch screen
216. This device enables users to verify a per- B. Musical Instrument Digital Interface
son’s identity (MIDI)
A. Barcode Reader C. Microphone
B. Fingerprint Scanner D. Joystick
C. Scanner
222. OCR
D. Keyboard
A. detects marks on a paper
217. A light sensitive device that converts
B. detects unique ridges of a fingerprint
drawing, printed text or other images into
digital form is? C. understands and converts hand writ-
A. Keyboard ten text

B. Scanner D. detects the shape of characters


C. Plotter 223. A device mainly used for playing games
D. OMR A. keyboard
218. If you want to draw cartoon characters in B. OCR
the computer, you would use this device.
C. Joystick
A. Light Pen
D. Scanner
B. Graphic Tablet
C. Stylus 224. Which of the following is an example of
a voice input device?
D. Joystick
A. Speaker
219. When a barcode is scanned, it is illumi-
nated with a red light called . B. Microphone
A. laser C. Headphones
B. lighter D. Headset

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Input Devices 217

225. Which kind of touchscreen is generally 230. What is manual input devices?
mostly used in smartphones?
A. Data is input into the computer by hand

PRACTICE BOOK» NOT FOR SALE


A. Capacitive touchscreen / user
B. Resistive touchscreen B. Data is input into the computer directly
C. Infra-red touchscreen by machine

D. Surface Acoustic Wave screen C. Data is input into the computer by sen-
sor
226. How is touch detected in a resistive D. Data is input into the computer by ac-
touchscreen? tuator
A. When touched by a finger, there is a
change in the electric field at that position 231. A is a device that feeds or steams an-
image or video in a real time to or through
B. When touched by a finger, the infra-
a computerto a computer network, such as
red beam is interrupted
the Internet.
C. Two sound wave transducers detect a
A. Webcam
reduction in the sound wave amplitude
B. Printer
D. When pressed by a finger, the two con-
ducting layers make contact and complete C. Monitor
a circuit D. OMR
227. Digital cameras use to store data.
232. A devices used to read machine readable
A. RAM code in the form of numbers and pattern
B. ROM of parallel line of varying width.

C. HDD A. Keyboard

D. SSD B. Light Pen


C. Graphic Pad
228. This device can read numerical data that
is printed on cheques with magnetic ink us- D. Barcode Scanner
ing a special font.
233. The pen is a small input device used
A. Barcode Scanner to select and display objects on a screen.
B. Biometric Devices A. Ink
C. Magnetic Ink Character Recognition B. Light
(MICR)
C. Magnetic
D. Optical Character Recognition (OCR)
D. Stylus
229. Type of touchscreen that does NOT sup-
port multi-touch 234. QR Code can store
A. Capacitive A. Web addresses
B. Infra-red B. Any Text to be encoded in
C. Resistive C. Phone Number
D. none of above D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 218

235. A device that converts analogue data to B. Pointing device


digital
C. Pen input
A. MODEM
D. Game controller
B. ADC
C. COMPILER 237. Used by artists and designers to create
D. BINARY CONVERTER and input digitally drawn or created im-
ages into a computer
236. You use this type of input device on a flat

NARAYAN CHANGDER
surface to write, draw, or make selections. A. Touch screen
The flat surface may be a screen on a mon- B. Monitor
itor or mobile device, a signature capture
pad, or a graphics tablet C. Laptop
A. Touch screen D. Graphics tablet

4.2 Output Devices


1. uses of speaker 4. An application displaying a unique virtual
A. to share sounds from computer with keyboard on the screen and allowing you
others, playing music to use the mouse pointer or the touch
screen the way you do it with the hard-
B. a basic connection point for devices in ware keyboard.
a network-it passes data to all the devices
attached to it A. Braille keyboard
C. a plug-in interface card that displays B. Braille printer
progress and error codes generated dur- C. On screen keyboard
ing power-on self-test (POST) of a com-
puter D. Voice recognition
D. a device which can be slotted into a 5. limitations of headphones
computer to allow the use of audio com-
ponents for multimedia applications. A. can cause hearing loss, uncomfortable
if worn for long period, dangers not heard
2. Which is NOT energy efficient?
B. Smartphones can browse the Inter-
A. CRT Monitor net and run basic software programs like
B. TFT Monitor a computer. Smartphones use a touch
screen to allow users to interact with
C. LED Monitor
them
D. IPS Monitor
C. Give a better gaming experience in fly-
3. Which device would you not need to use if ing or some racing games
you had difficulty seeing?
D. expensive, very large and require
A. Braille Keyboard greater skills to use
B. Foot Mouse
6. There are some advantages and disad-
C. Braille Printer vantages for this device. Advantages:*
D. Subtitles Cheaper than other monitors*can be used

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 219

with light pensDisadvantages:* size is big- A. Input devices


ger
B. Output devices

PRACTICE BOOK» NOT FOR SALE


A. Lcd monitor
C. Storage devices
B. Led monitor
D. Adapter cards
C. IPS/LCD monitor
D. CRT monitor 12. Which of the following can an item’s data
be stored on?
7. It is used in a crowded environment to hear
audio. A. Magnetic Stripes
A. Printers B. Barcodes
B. Display devices C. RFID tags
C. Speakers D. Chip on a card
D. Headphones
13. Which of the following printers is popu-
E. Interactive white board lar with home users because they are rel-
8. This output device is uses sound to alert atively cheap to buy?
the user. A. Laser printer
A. Speakers B. Inkjet printer
B. Motors C. Dot Matrix printer
C. Buzzers
D. Wide Format printer
D. Heaters
E. 3D printer
E. Light/Lamp
14. description of Light Emitting Diode (LED)
9. Useful for producing architectural draw-
ings A. Can be connected to a computer, lights
A. impact printer up in response to electrical signals.

B. plotter printer B. External connector, similar to a USB


port but developed by Apple, that provides
C. thermal printer a high-speed connection between a com-
D. none of above puter and peripheral devices.
10. Which of the following CAN read from a C. Text sometimes cant be read properly,
distance? formatting can be lost
A. Magnetic Stripe Reader D. Used to process cheques by banks
B. Barcode Reader
15. What are the three types of Computer Pe-
C. Chip Reader and PIN Pad ripherals
D. RFID reader A. Input, Output and Storage Devices
11. The hardware that records (writes) B. Input, Output and USB Flash Drive
and/or retrieves (reads) items to and
C. Output, Input and Memory Card
from storage media. This description
refers to? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 220

16. Which device would you not need to use if 21. uses of plotter
you could only move your head/eyes? A. Used by architects planners and map-
A. Eye Tracker makers to print structural drawings and
maps
B. Screen Typer
B. phone calls, text to speech, recording
C. Braille Keyboard music
D. Sip/Puff Switch C. A 2-in-1 PC consists of a screen and

NARAYAN CHANGDER
a detachable keyboard and has the func-
17. A Storage Device that uses a Laser Light tionality of both a laptop computer and a
to read data. tablet
A. Optical Storage Device D. Used on almost all computers to view
and edit
B. Internal Storage Device
C. Computer Peripheral 22. What does WIMP stand for?
D. none of above A. Windows, Icons, Mouse pointers
B. Windows, Images, Menus, Pointers
18. Which of the following is an example of a
C. Windows, Images, Mouse pointers
program to write a document?
D. Windows, Icons, Menus, Pointers
A. Browser
B. Video Editor 23. What are Input Devices?
A. Devices which are used to give infor-
C. Word Processor
mation to the computer.
D. none of above B. Devices which are used to give infor-
mation to the computr.
19. Used mainly as video and data storage.
Holds over 7 times a CD’s capacity. C. Devices which we used to get informa-
tion from the computer.
A. Compact Disc (CD)
D. Devices which we use to store informa-
B. Blu-ray Disc (BD) tion on the computer.
C. Digital Video Disc (DVD)
24. Uses a high-intensity beam of light shone
D. none of above through three layers of changing pixels
A. LCD Projector
20. An output device which is able to draw
high quality images on very large pieces of B. LED Screen
paper. It is used by engineers, architects C. Speaker
and map-makers to draw plans of build-
D. 3D Cutter
ings.
A. Plotter 25. description of plotter

B. Printer A. Can be drum or flat bed-prints accu-


rately on very large paper sheets
C. Scanner
B. fragile, more expensive, smaller
D. none of above screen, battery goes flat quickly

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 221

C. networks that allow mobile broadband C. RFID Reader


from smartphone without wifi router-3x D. Magnetic Stripe Reader
faster than 3G

PRACTICE BOOK» NOT FOR SALE


D. to provide DC power for internal com- 31. A flash memory storage device that con-
ponents of a computer tains its own processor to manage its stor-
age.
26. Millions of tiny mirrors is functioning of A. Hard disks
B. USB Flash drives
A. LCD projector
C. Solid state drives
B. DLP projector
D. Optical disks
C. Both
E. Memory cards
D. NOne
32. Which of the following CAN read from
27. Best for photographs cheques?
A. Inkjet Printer A. MICR
B. Laser Printer B. OMR
C. 3D Printer C. OCR
D. none of above D. none of above
28. Which device would you not need to use if 33. Which device uses a diode to emit lights
you had difficulty hearing? through liquid crystal panels in order to
A. Speakers project an image to the user?
B. Eye Tracker A. A plasma panel
C. Subtitles B. An LCD
D. Earphones C. A DLP

29. uses of dot matrix printer D. A CRT

A. used to print in warehouses where du- 34. benefits of ink-jet printer


plicate forms (such as delivery notes) are A. expensive ink cartridges, running
required costs high, slow print speed
B. provides telecoms coverage world- B. Works like a photocopier-paper is
wide charged like the image, toner added and
C. Can read peoples input added to a heat and pressure applied
marking template quickly and accurately C. allows control of household objects
D. save space-used in most situations from smartphone or controller like Alexa
where specialised devise isn’t required D. Exteremely fast data connection over
30. Which of the following ALWAYS require a long distnces
database in order to access information? 35. Which device would you use if you had dif-
A. Barcode reader ficulty using your hands?
B. Chip Reader A. Braille Keyboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 222

B. Larger Keys 40. Name some Input Devices.


C. Magnifier A. Mouse
D. Screen Reader B. Printer
C. McDonald’s
36. A device that allows the user to view or
D. Network Interface Card
hear the data that has been entered into a
computer system. 41. What software allows you to create pro-

NARAYAN CHANGDER
A. Output Device fessional presentations?

B. Digital Light Projector (DLP) A. Microsoft Word


B. Paint
C. 2D Cutter
C. Microsoft Publisher
D. Liquid Crystal Display (LCD)
D. Microsoft Powerpoint
37. Which of the following printers create a lot
42. Which of the following are Microsoft Apps.
of noise?
A. Word
A. Laser printer
B. Numbers
B. Inkjet printer
C. PowerPoint
C. Dot Matrix printer D. Pages
D. Wide Format printer
43. This storage device is used in cameras and
E. 3D printer smartphones.
A. Optical Storage Device
38. Flat panel display that uses an array of
light-emitting diodes as pixels B. USB Flash Drive
A. LED Screen C. SD Card

B. Headphones D. Hard Drive

C. 3D Cutter 44. Which of the following is not a purpose of


output devices?
D. CAD/CAM
A. to transfer data to other devices
39. description of ink-jet printer B. to save data in the same order
A. prints on paper by spraying ink out of C. for videos to be seen
tiny nozzles-shaped by crystals or electric D. for audio to be heard
current
45. Which type of user interface is most suit-
B. dont require installed programs, very
able to somebody with a visual impair-
light, fast with good connection
ment
C. Works like a photocopier-paper is
A. Graphical User Interface
charged like the image, toner added and
heat and pressure applied B. Speech and Sound Interface

D. used in satellite communications, deep C. Command Line Interface


space radio communication, radar D. Menu Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 223

46. A portable flash memory storage device 51. Which one of these is an output device?
that you can plug in a USB port. A. Mouse

PRACTICE BOOK» NOT FOR SALE


A. Hard disks B. Projector
B. USB Flash drives
C. Keyboard
C. Solid state drives
D. Microphone
D. Optical disks
52. description of headphones
E. Memory cards
A. a pair of small loudspeakers worn over
47. An output device that lets you see your the ears
work as you go. It is the most commonly
B. relatively cheap and reliable, can dis-
used output device.
play text and graphics in a wide range of
A. Keyboard colours, quiet, do not waste paper.
B. Monitor C. might break or need replacing, can
C. Speaker only indicate 2 states such as on /off
D. Plotter D. Business documents can be scanned
then edited.
48. Which of the following is NOT a direct data
entry device? 53. More secure and more robust device
A. Scanner A. Magnetic stripe reader
B. Chip Reader B. Chip and PIN reader
C. RFID reader C. None of these
D. Barcode Scanner D. none of above
49. description of projector 54. Laser Printer uses
A. a device that connects to a computer A. Inkjet
and is used to project the video output
from the computer onto a wall or screen B. Toner

B. Used to allow users of mobile phone C. Raisin


networks to talk to each other D. All of the above
C. mounted at back of case, must provide
55. What is an example of a GUI
sufficient wattage
A. Microsoft Windows OS
D. Stored audio files can take up a lot of
memory.Voice commands can be difficult B. Apple Mac OS
to recognise. C. Android OS
50. Which part of the computer is called brain D. All the above
of the computer
56. A touch sensitive device, resembling a dry
A. mouse erase board, that displays the image on a
B. keyboard connected computer screen.
C. CPU A. Printers
D. printer B. Display devices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 224

C. Speakers 61. uses of headphones


D. Headphones A. playing music from computer, on the
E. Interactive white board move
B. A 2-in-1 PC consists of a screen and
57. RAM a detachable keyboard and has the func-
A. Random Allocated Memory tionality of both a laptop computer and a
B. Random Alternate Message tablet
C. networks that allow mobile broadband

NARAYAN CHANGDER
C. Random Access Memory
from smartphone without wifi router
D. Random Attempt Mode
D. a networking device that connects de-
58. Why does the computer system need a vices together by using packet switching
monitor? to receive, process, and forward data to
the destination device
A. To be able to see what is being dis-
played on the screen 62. A system that designs objects using soft-
B. A monitor allows the computer to have ware that produces 3D images. When
an aesthetic look ready it can be sent to a 3D printer.
C. It allows the computer to generate A. CAD/CAM
hardcopy output B. Digital Light Projector (DLP)
D. none of above C. 3D Printer
59. uses of monitor D. 2D Cutter

A. Used on almost all computers to view 63. Which was the first output device?
and edit A. speaker
B. Most common output device. Lets B. mouse
users view and modify computer contents
C. television
graphically
D. USB
C. quiet, fast, high quality printout, low
running cost 64. Which of the following are examples of
D. a storage media that does not involve output devices?
magnetic disks or any moving parts A. Data projector

60. benefits of projector B. LCD screen

A. lets large number of people view a pre- C. OCR


sentation D. OLED monitor
B. provides 2D, 3D and sometimes even 65. Which of these are Optical Storage De-
general purpose graphics processing vices?
(GPGPU) calculations for a computer
A. Floppy Disk
C. cables made from highly conductive
B. CD-RW
metal which carry electrical signals
C. Memory Card
D. An input device that controls the move-
ment of the cursor or pointer on a display D. DVD
screen in 2 dimensions E. CD-R

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 225

66. Lazer Printer uses 72. I am an input device which allows a user
to transmit letters, numbers and symbols.
A. Ink

PRACTICE BOOK» NOT FOR SALE


A. Camera
B. Toner
B. Mouse
C. Raisin
C. Keyboard
D. All of the above
D. Printer
67. Best for text 73. An output device that uses a rotating drum
A. Inkjet Printer A. Laser Printer
B. Laser Printer B. LCD Projector
C. 3D Printer C. Headphones
D. none of above D. Speaker

68. If x + 9x = 81, then what is x? 74. CPU


A. Central Performance Unit
A. 3
B. Central Processing Unit
B. 5
C. Central Portable Unit
C. 11
D. Central Placing Unit
D. 9
75. Matrix Printer uses
69. a printer is a A. A4 paper
A. input B. Carbon Copy paper
B. output C. Glossy paper
C. none D. None of the above
D. both 76. I am an output device that allows a user
to have a paper copy of what is on the
70. Used to store digital data. A common stor- screen.
age format used for audio.
A. Printer
A. Compact Disc (CD) B. Monitor
B. Blu-ray Disc (BD) C. Keyboard
C. Digital Video Disc (DVD) D. Game Controller
D. none of above 77. The newer type of monitor which is flat.
Displays are generally cheaper, thinner,
71. Control the pointer or insertion point for
lighter and produces higher quality im-
user with limited hand movement.
ages.
A. Braille keyboard A. LCD screen
B. Head mounted pointer B. CRT monitor
C. On screen keyboard C. Native resolution
D. Voice recognition D. Projectors

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 226

78. An item of hardware which is used to open C. Scanner


windows is called a
D. Flash Drive
A. Motor
E. SD Card
B. OCR
C. OMR 84. A device which is used for projecting an
image onto a screen or other surface.
D. Sensor
A. Projector

NARAYAN CHANGDER
79. This is an output device that uses many
B. Monitor
small mirrors to reflect light towards a
lens. This will display an image. C. Printer
A. Digital Light Projector (DLP) D. none of above
B. 3D Printer
85. is a moniter an input device
C. Liquid Crystal Display (LCD)
A. yessssssss
D. Actuator
B. nah
80. The *BLANK* executes simple instructions
C. no
very quickly.
A. Memory D. yis

B. Storage 86. Which of the following does NOT allow for


C. Monitor immediate processing by the microproces-
sor?
D. Processor
A. OMR
81. Which of these is NOT a Storage Device?
B. MICR
A. USB Flash Drive
C. Sensors
B. CD-R
D. Digital Camera
C. Digital Camera
D. Floppy Disk 87. Enables the recognition and translation of
spoken language into text by computers.
82. Which of the following is used to mark mul-
tiple choice question answer sheets for ex- A. Braille keyboard
aminations? B. Braille printer
A. MICR C. On screen keyboard
B. OMR
D. Voice recognition
C. OCR
D. none of above 88. A produces sound.
A. speaker
83. Select the items below which are not stor-
age devices. select 3 B. microphone
A. Web Camera C. sub-woofer
B. Microphone D. headphone

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 227

89. The noisiest one 95. limitations of laser printer


A. dot-matrix A. black and white are a bit more expen-

PRACTICE BOOK» NOT FOR SALE


B. 3D sive, colour are a lot more expensive than
ink jet.
C. thermal
B. More accurate than a mouse, and eas-
D. none of above ier and more accurate to draw designs
with
90. What is output?
C. a portable computer that uses a touch-
A. Typing data on a keyboard
screen as its primary input device
B. Using a mouse to draw in paint
D. light that is normally invisible to people
C. Getting data from a computer used for communication
D. none of above
96. An output device that uses a high powered
91. Which user interface makes use of WIMP? laser to cut materials from a variety of an-
gles producing a solid shape.
A. Command Line Interface
A. 3D Cutter
B. Graphical User Interface
B. CAD/CAM
C. Menu Interface
C. Digital Light Projector (DLP)
D. Touch Interface
D. 3D Printer
92. What is an Output Device.
A. Device used to eat. 97. limitations of plotter

B. Device used to get information from A. slow and expensive, cannot print pho-
the computer. tos

C. I have no idea. B. ability to transfer one file or a segment


of data from one format to another for-
D. none of above mat.
93. Select the Output Device from the follow- C. dvices are extremely portable, power-
ing. ful computers with touchscreen controls
A. Pencil D. a device to convert images or text on
B. Chocolate paper into a digital format that can be
used by the computer.
C. Printer
D. none of above 98. Everything is ultimately reduced to bits (bi-
nary digits).These individually or in groups
94. The screen is made up of blocks of red, represent information, whether *BLANK*
green and blue pixels. The screen uses lay- or *BLANK*, as binary numbers. (Select
ers of different types of liquid. two)
A. Liquid Crystal Display (LCD) A. Data
B. Actuator B. Instructions
C. Laser Printer C. Storage
D. LCD Projector D. Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 228

99. The is used to display information on C. Computer


the computer system. D. none of above
A. monitor
105. uses of projector
B. keyboard
A. In classrooms or for presentations to
C. mouse groups of people
D. system unit B. Short for Read-Only Memory, a stor-
age medium that is used with computers

NARAYAN CHANGDER
100. Which of the following printers is popu- and other electronic devices
larly used in healthcare application?
C. devices which are portable and allow
A. Laser printer you to communicate
B. Inkjet printer D. Short for SerialATA, a replacement for
C. Dot Matrix printer the Parallel ATA interface used in IBM
compatible computers
D. Wide Format printer
E. 3D printer 106. limitations of speaker
A. output sound can disturb others, high
101. This is an output device that uses a high quality ones can be expensive
powered laser to cut materials such as thin
metals and wood. B. Wherever fast, high quality printing is
required
A. 2D Cutter
C. display monitor that is able to sense
B. Liquid Crystal Display (LCD) the location of a finger touching the
C. Inkjet Printer screen
D. Laser Printer D. Short for small computer system inter-
face, a parallel interface standard used
102. Which of the following printer produces by Apple Macintosh computers, PCs and
the lowest print quality? many UNIX systems for attaching periph-
A. inkjet eral devices to computers

B. plotter 107. This is an output device that creates an


object by building layer upon layer of ma-
C. thermal
terial which could be plastic, resin or pow-
D. none of above dered metal.
103. Which interface would you commonly find A. 3D Printer
on a smartphone? B. 2D Cutter
A. Menu Interface C. Actuator
B. Command Line Interface D. Inkjet Printer
C. Graphical User Interface 108. Which of the following statement refers
D. Touch Interface to plotters.
A. Produces colour photo-lab quality pic-
104. Software Simply means.
tures
A. Hardware parts B. Used a laser beam and powdered ink
B. Programs to transfer images onto paper.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 229

C. forms characters and graphics by A. The speaker allows for input while the
spraying tiny drops of liquid ink onto a microphone produces output
piece of paper.

PRACTICE BOOK» NOT FOR SALE


B. The microphone allows for input while
D. A sophisticated printers used to the speaker produces output
produce high-quality drawings such as
C. They are not different, they look the
graphs, maps, engineering drawings
same
109. What is the keyboard shortcut for copy- D. none of above
ing something on the computer.
A. Control + A 114. limitations of inkjet printer

B. Control + B A. high cartridge cost, slower than laser,


documents can smudge before drying
C. Control + C
B. expensive ink cartridges, running
D. Control + D
costs high, slow print speed
110. Great at high volume printing C. a basic connection point for devices in
A. Inkjet Printer a network-it passes data to all the devices
attached to it
B. Laser Printer
D. Apps, Maps and Navigation., Search
C. 3D Printer information on net, Entertainment video,
D. none of above books, music, games, etc.

111. Which is best used to replace bar codes 115. Which of the following will cause
used in libraries? headache and eye-sight problems due to
A. Magnetic Stripe Reader flicker of screen?
B. Chip Reader and PIN Pad A. CRT Monitor
C. RFID Reader B. LED Monitor
D. none of above C. IPS Monitor

112. uses of ink-jet printer D. TFT Monitor

A. home use-low volume, high quality 116. description of monitor


sometimes required for photos
A. Most common output device. Lets
B. used in public places such as cash- users view and modify computer contents
points, ticket collection terminals graphically
C. special-purpose communication de- B. tills in shops, stock checking
vices similar to wireless routers on wire-
less local area networks (WLANs) C. a circuit board or card wih an ethernet
connection (RJ45)
D. easy to type text and numbers, compat-
ible with all desktops, wide variety avail- D. the most important component within
able a PC system. It is a PCB that houses many
of the essential parts of the PC and all con-
113. What is the most significant difference nections between the PC and peripheral
between a speaker and a microphone? go through it

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 230

117. Which of these are input devices? (TWO) 122. What is the difference between inkjet
A. Keyboard printer and laser printer?
B. Printer A. Inkjet printer-are used when low out-
put volumesLaser printer-are used when
C. Mouse high output volumes
D. Monitor
B. Inkjet printer-more expensive to buy-
118. This output device is used to rotate the Laser printer-cheaper
turntable in microwave ovens.

NARAYAN CHANGDER
C. Inkjet printer-slow printingLaser
A. Speakers printer-faster printing
B. Motors D. Inkjet printer-high quality printin-
gLaser printer-cheap high quality printing
C. Buzzers
D. Heaters 123. An output device that produces a hard
E. Light/Lamp copy of a document using thermal bubble
and piezoelectric technology.
119. Which part of the computer is called A. Inkjet Printer
VDU(Visual Display Unit)
B. Laser Printer
A. keyboard
C. LED Screen
B. monitor
D. Headphones
C. printer
D. scanner 124. uses of laser printer

120. Which of the following produces sound as A. Wherever fast, high quality printing is
output? required
A. Speakers B. to store program instructions that are
frequently re-referenced by software dur-
B. Motors
ing operation
C. Buzzers
C. storage space, form factor, data ac-
D. Heaters cess performance
E. Light/Lamp D. creates large files, difficult to use with
background noise, banned in some quiet
121. Which of the following statement refers
areas
to laser printer.
A. Produces colour photo-lab quality pic- 125. Uses powdered ink (toner)
tures A. Inkjet Printer
B. Used a laser beam and powdered ink B. Laser Printer
to transfer images onto paper.
C. 3D Printer
C. forms characters and graphics by
spraying tiny drops of liquid ink onto a D. none of above
piece of paper.
126. Plastic often used as the printing material
D. A sophisticated printers used to
produce high-quality drawings such as A. Inkjet Printer
graphs, maps, engineering drawings B. Laser Printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 231

C. 3D Printer 132. An output device that produces text and


D. none of above graphics on a physical medium such as pa-
per.

PRACTICE BOOK» NOT FOR SALE


127. Which is heavy and creates a glare on the A. Printers
screen?
B. Display devices
A. CRT Monitor
C. Speakers
B. TFT Monitor
D. Headphones
C. IPS Monitor E. Interactive white board
D. LED Monitor
133. A computer is a general-purpose ma-
128. Refers to the “blue laser” used to read chine.It stores its *BLANK* in the *BLANK*
the disc. Allows for six times more stor- (Select two)
age than a DVD. A. Storage
A. Compact Disc (CD) B. USB
B. Blu-ray Disc (BD) C. Instructions
C. Digital Video Disc (DVD) D. Memory
D. none of above
134. Which of the following statement refers
129. what is a output device to photo printer.

A. any device used to send data from a A. Produces colour photo-lab quality pic-
computer to another device or user. tures

B. computer hardware equipment B. Used a laser beam and powdered ink


to transfer images onto paper.
C. a file orginzer
C. forms characters and graphics by
D. a app spraying tiny drops of liquid ink onto a
piece of paper.
130. A digital computer contains a *BLANK*
and *BLANK*. (Select two) D. A sophisticated printers used to
produce high-quality drawings such as
A. Processor graphs, maps, engineering drawings
B. Joystick
135. What is the keyboard shortcut for select-
C. Memory ing everything?
D. Printer A. Control + K
131. A printer usually found in homes that B. Control + V
uses cartridges and can produced high qual- C. Control + W
ity photos
D. Control + A
A. inkjet
136. What is one advantage of a Command
B. laser
Line Interface?
C. dotmatrix A. It uses less processing power, so is
D. thermal quicker

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 232

B. It is easy for a beginner to use with hearing loss, come in large range of
C. It is accessible to people with visual colours
disabilities B. access your work on the go, view
D. There are a lot of accessibility func- movies
tions C. A computer with a foldable sceen and
keyboard which can be easily moved from
137. OMR is place to place
A. Optical Mark Reader

NARAYAN CHANGDER
D. allows user to connect without wires,
B. Optical Magnetic Reader standards are agreed, eas to set up
C. Optical maximum Reader 142. uses of LED
D. Optical metal Reader A. show status of electronic equipment vi-
sually, signs
138. Dot Matrix Printer uses
B. dvices are extremely portable, power-
A. A4 Paper
ful computers with touchscreen controls
B. Glossy Paper
C. More accurate than a mouse, and eas-
C. Carbon Copy paper ier and more accurate to draw designs
D. none of above with
D. Input device used for games playing
139. Why are some impact printers such as and flight simulators.
dot-matrix printer still in existence?
A. They are noisy. 143. is a webcam a input devise
B. They are useful for printing multiple A. no
copies using carbon paper. B. no
C. They do not usually print acceptable C. hmmmm
graphics.
D. yis
D. They are cheap.
144. description of dot matrix printer
140. benefits of speaker A. takes a digital signal and prints it on
A. everyone can hear audio output, can paper using a print head made of pins and
create atmosphere or ambience, help an ink ribbon
blind peaople via text to speech B. Short for Read-Only Memory, a stor-
B. playing music from computer, on the age medium that is used with computers
move and other electronic devices
C. reading large quantities of voting C. expensive aonnection kits, possibility
forms of hacked devices
D. to allow a computer to connect to a net- D. Digital video camera that allows you to
worl capture video input for your computer

141. benefits of light emitting diode (LED) 145. I am an output device that allows a per-
A. Cost effective way to show equipment son to listen to sounds/music.
status, can produce warning for people A. Headphones

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 233

B. Monitor C. knowledge or a set of tools which are


C. Keyboard currently in development to help make
things easier or resolve problems in the

PRACTICE BOOK» NOT FOR SALE


D. Mouse future
146. Which of the following is ideal when a D. show status of electronic equipment vi-
group needs to view the screen? sually, signs
A. CRT Monitor 151. From which device do get the hard copies
B. TFT Monitor from the computer?
C. IPS Monitor A. Scanner
D. LED Monitor B. Printer
C. Orange Juice
147. Which one of these devices is more suit-
able to use as an output in an environment D. Prenter
with very loud background noise? 152. Fires ink into the page
A. Microphone A. Laser Printer
B. Speaker B. Inkjet Printer
C. Monitor C. 3D Printer
D. Scanner D. none of above
148. Works layer by layer 153. An output device that produces sound and
A. Inkjet Printer allows the user to listen to music without
disturbing others
B. Laser Printer
A. Headphones
C. 3D Printer
B. Speaker
D. none of above
C. CAD/CAM
149. It is attached to computers, game con- D. Digital Light Projector (DLP)
soles and mobile devices to generate
higher-quality sounds. 154. Which device would you not need to use
if you had difficulty using your hands?
A. Printers
A. Larger Keys
B. Display devices
B. Magnifier
C. Speakers
C. Screen Typer
D. Headphones
D. Predictive Text/Hotkeys
E. Interactive white board
155. The output of a touch screen is usually
150. limitations of monitor produced on a
A. no permanent copy to keep and unsuit- A. TFT
able for users with visual problems.
B. LED
B. compatable with dozens of different
devices such as removable drives and C. IPS
cameras D. CRT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 234

156. Which of the following statement refers C. used to print in warehouses where du-
to ink jet printer. plicate forms (such as delivery notes) are
A. Produces colour photo-lab quality pic- required
tures D. Can be drum or flat bed-prints accu-
rately on very large paper sheets
B. Used a laser beam and powdered ink
to transfer images onto paper. 161. A device that uses signals to make a mag-
C. forms characters and graphics by net repel or attract a coil at the bottom of
a cone which pumps out sound.

NARAYAN CHANGDER
spraying tiny drops of liquid ink onto a
piece of paper. A. Speaker
D. A sophisticated printers used to B. 3D Cutter
produce high-quality drawings such as C. Digital Light Projector (DLP)
graphs, maps, engineering drawings
D. Digital Light Projector (DLP)
157. Used to create prototype and models 162. DLP stands for
A. Inkjet Printer A. Digital Light Projector
B. Laser Printer B. Detail Light Projector
C. 3D Printer C. Digital LED projector
D. none of above D. NOne

158. limitations of dot matrix printer 163. Which device would you use if you had
difficulty seeing?
A. print quality low, noisy
A. Sip/Puff Switch
B. Exteremely fast data connection over B. Larger Keys
long distnces
C. Subtitles
C. Input device used for games playing
D. Foot Mouse
and flight simulators.
D. the ability to work in different loca- 164. which of the following device is called
tions while storing data on the hard drive, pointing device.
wide variety of models available, inte- A. keyboard
grated keyboard > no desk required B. monitor
159. is a microphone a output device C. mouse
A. yes D. printer
B. no 165. A device that takes the text and im-
ages displaying on a computer screen and
C. maybe
projects them on a larger screen.
D. oh
A. Printers
160. benefits of laser printer B. Data projector
A. quiet, fast, high quality printout, low C. Speakers
running cost D. Headphones
B. data transfer rates, startup time E. Interactive white board

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 235

166. Which of the following is the largest in B. a plug-in interface card that displays
terms of size? progress and error codes generated dur-
ing power-on self-test (POST) of a com-

PRACTICE BOOK» NOT FOR SALE


A. Inkjet
puter
B. Laser
C. a device that connects to a computer
C. Plotter and is used to project the video output
D. Thermal from the computer onto a wall or screen
D. Exteremely fast data connection over
167. limitations of projector long distnces
A. expensive, difficult to set up and can
171. benefits of dot matrix printer
easily go wrong producing poor images
A. cheap to buy and run, can print quickly,
B. enable a person to install, remove,
good for harsh conditions, can print dupli-
or perform other actions on the hard-
cates
wareor softwarecomponents within their
computer B. dvices are extremely portable, power-
ful computers with touchscreen controls
C. to allow a computer to connect to a net-
worl C. identify problem> decide possible
cause>plan>test solution>confirm
D. allows the computer to send audio in- fix>document results>end
formation to an audio device, like speak-
ers, a pair of headphones, etc. D. more portable, smaller, less cords
than a desktop
168. Sensor main constituent is
172. It projects an image (or moving images)
A. ADC onto a surface.
B. DAC A. monitor
C. ABC B. projector
D. None of the above C. speaker
D. printer
169. benefits of plotter
A. prints high quality images on far bigger 173. Which of these are output devices?
paper than most printers can (TWO)
B. easy to type text and numbers, compat- A. Keyboard
ible with all desktops, wide variety avail- B. Printer
able
C. Mouse
C. covers large geographical area, af-
D. Monitor
fordable
D. allows non-verbal communication- 174. The processor is the component that
body language, eye contact etc A. Executes program instructions

170. limitations of LED B. Controls the operations of the system

A. might break or need replacing, can C. Stores the programs


only indicate 2 states such as on /off D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 236

175. Which of the following provides better D. Wide Format printer


picture quality when playing games and E. 3D printer
watching sports?
A. CRT Monitor 180. A removable flash memory storage de-
vice, usually no bigger than 1.5 inches in
B. TFT Monitor height or width, that you insert in and re-
C. IPS Monitor move from a lot in a computer, mobile de-
D. LED Monitor vice or card reader/writer.

NARAYAN CHANGDER
A. Hard disks
176. An output device that visually conveys
text, graphics and video information. B. USB Flash drives
A. Printers C. Solid state drives
B. Display devices D. Optical disks
C. Speakers E. Memory cards
D. Headphones 181. List three (3) output devices.
E. Interactive white board A. Printer
177. description of laser printer B. Speaker
A. Works like a photocopier-paper is C. Monitor
charged like the image, toner added and D. Pointing devices
heat and pressure applied
E. Pen Input
B. Very expensive-only used by banks
182. One of the disadvantages of a Dot Matrix
C. hardware capable of holding informa-
Printer is
tion either temporarily or permanently
that can be easilty transported A. Very noisy so not suitable for an office
environment.
D. need flat surface near to monitor,
leads can get caught up, older ones can B. They are only really fast if several
clog with dust copies are being made

178. Which device would you use if you were C. They produce ozone and volatile or-
paralysed? ganic compounds.

A. Foot Mouse D. Very cheap to buy and maintain

B. Eye Tracker 183. description of speaker


C. Braille Keyboard A. allows a computer to generate sound-
D. Subtitles either basic sounds like beeps, or more so-
phisticated sounds using a sound card
179. Which of the following printers is bet- B. a number expressed as base 16
ter suited for printing posters, maps and
plans? C. a device that connects to a computer
and is used to project the video output
A. Laser printer from the computer onto a wall or screen
B. Inkjet printer D. Easy to make mistakes when typing,
C. Dot Matrix printer time consuming, can lead to RSI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Output Devices 237

184. It is responsible for powering and moving B. Output Device


a motor in machinery
C. Computer

PRACTICE BOOK» NOT FOR SALE


A. Actuator
D. Internet
B. Inkjet Printer
C. LCD Projector 189. This output device is used to control the
movements of robots in a factory.
D. LED Screen
A. Speakers
185. Which of the following printers is best
B. Motors
suited for multi-part printouts?
A. Laser printer C. Buzzers

B. Inkjet printer D. Heaters


C. Dot Matrix printer E. Light/Lamp
D. Wide Format printer
190. ATM receipts and debit or credit card slips
E. 3D printer are printed using this type of printer.

186. What are TWO advantages of a Graphi- A. Impact printer


cal User Interface? B. Inkjet printer
A. It uses less processing power, so is C. Laser printer
quicker
D. Thermal printer
B. It is easy for a beginner to use
C. It does not take up a lot of memory on 191. The most common types of outputs are
a device harddrive soft copy and hard copy. Which of the
D. There are a lot of accessibility func- following device DOES NOT produce soft
tions copy?
A. Monitor
187. benefits of headphones
B. Printer
A. allow sound to be heard by the user
only (mostly), portability, usually inexpen- C. Projector
sive
D. Speakers
B. used anywhere, not dependent on lo-
cation 192. Which of these statements about printers
C. mouse, microphone, keyboard, joy- are true?
stick, webcam, MICR, OCR, OMR, barcode A. Inkjet printers are not very good at
reader printing clear text
D. easy to type text and numbers, compat- B. Inkjet printers are better suited to
ible with all desktops, wide variety avail- lower volume printing environments
able
C. 3D printers can work with a variety of
188. Devices which help to output or view the materials, not just plastic
data. D. Inkjet printers are better suited to
A. Input Device lower volume printing environments

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 Processing Devices 238

193. Which of the following printers produce B. Inkjet printer


low quality printouts and unsuitable for C. Dot Matrix printer
printing graphics?
D. Wide Format printer
A. Laser printer E. 3D printer

4.3 Processing Devices

NARAYAN CHANGDER
1. What is the correct information processing D. none of above
cycle.
6. This device is used in the 2nd part of the
A. Output, input, storage, process IPOSC cycle and its job is to turn data into
B. Process, input, storage, output information.
C. Input, process, output and storage A. VGU
D. Input. storage, process, output B. CPU

2. What of the next devices are used to input C. GPU


the user data. D. SPU
A. CPU, RAM Memory 7. The 5 main parts of the computer system
B. Microphone, Scanner are:
C. Scanner, Speaker A. Keyboard, harddrive, Speaker, mother-
D. Projector, Printer board, Printer
B. RAM, harddrive, network card, mother-
3. The part of the computer used for short- board, CPU
term memory storage.
C. Keyboard, harddrive, Speaker, mother-
A. Hard Drive board, CPU
B. Flash Drive D. RAM, harddrive, power supply, moth-
C. RAM erboard, CPU
D. FCD 8. What of the next device are processing de-
4. What is Magnetic Ink Character Recogni- vices
tion often on? A. CPU, RAM Memory
A. Till receipts B. Monitor, Keyboard
B. Cheques C. Microphone, Speaker
C. Barcodes D. Projector, Printer
D. none of above 9. Which of these is another name for the
5. Which of these would you not use an OMR CPU?
(Optical Mark Reader) for? A. Processor
A. Multiple choice tests B. Plotter
B. Voting forms C. Scanner
C. Barcodes D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 239

10. What of the next devices are output de- B. Monitor, Keyboard
vices C. Microphone, Speaker

PRACTICE BOOK» NOT FOR SALE


A. CPU, RAM Memory D. Projector, Printer

4.4 Storage Devices


1. A hard disk drive also called 6. What is meant by the term External?
A. HDD A. Outside the computer
B. SDD B. Difficult to damage
C. Computer C. Inside the computer
D. Storage D. none of above

2. What does the rotational drive use to 7. Which of the following is an example of
store the informations onto the platters? secondary storage (memory)?
A. Radiation A. Cache
B. Polarization B. RAM
C. Magnitizem C. SSD
D. Gama Waves D. ROM

3. what does SD card stand for? 8. When transferring data using magnetic
A. Secure Digital Card tape, the additional tape is called?

B. Small Device Card A. Secondary file

C. Smart Device Card B. Extra file

D. Secure Disk Card C. Updating file


D. Transaction file
4. A standard 120 mm, BLU-RAY can actually
hold of data. 9. Removable, portable storage device in-
A. 700 MB serted into a usb port

B. 500 MB A. flash drive

C. 4, 7 GB B. laser drive

D. 25, 0 GB C. optical drive


D. magnetic drive
5. Which medium stores the least amount of
information? 10. Two other types of portable SSD’s:
A. DVD A. Pendrive/thumbdrive
B. CD B. Magnetic Strip Card
C. HD C. flash memory Card
D. USB D. RFID based cards

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 240

11. Difference between Blu-Ray and DVDs C. 1.55 MB


(Choose two options): D. 1.44 MB
A. Smaller ‘pits’ and ‘bumps’ bigger stor-
17. We can use devices to store pictures,
age, 5 times than DVD
music, videos and documents
B. DVD have smaller storage size com-
A. storage
pared to Blu-ray
B. Data
C. Blu-Rays are used for high definition
C. Store

NARAYAN CHANGDER
sound track only
D. Comes with a secure encryption sys- D. Bank
tem 18. What type of storage medium would be
12. disk is used to store large amount of most suitable for backing up a laptop?
data A. USB
A. Hard B. Magnetic tape
B. CD C. Portable hard drive
C. DVD D. SSD card
D. none of above 19. Internal Hard Drives are

13. What do you use to click stuff? A. Inside an enclosure


B. Portable
A. Arrow
C. Inside a computer
B. Mice
D. Outside the computer case
C. A mouse
D. none of above 20. Which one of these is volatile memory?
A. HDD
14. What does a Control Panel do?
B. SSD
A. Controls your computer
C. Flash Drive
B. Change settings
D. RAM
C. For fun
21. Same as 1, 024 GB
D. none of above
A. 1 TB
15. It is a hardware used for saving, carrying B. 1 GB
and pulling out data.
C. 1MB
A. Input
D. 1 KB
B. Communication
22. Storage device that uses serial access
C. Storage
and in a very slow form of data access,
D. none of above called?
16. How much storage does a floppy disk A. Magnetic tape
hold? B. CD-R/CD-RW
A. 1.22 MB C. Memory stick
B. 1.77 MB D. HDD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 241

23. Typically stores 650mb-700mb of data on 28. Choose the most appropriate storage de-
it-usually music. vice for an all terrain camera crew tracking
lions across Africa

PRACTICE BOOK» NOT FOR SALE


A. DVD
A. Cloud Storage
B. Blu-ray
B. Solid State Storage
C. CD
C. Magnetic Storage
D. Floppy disk D. Optical Storage
24. Why is blue ray called like that? 29. Compact Disc-Read-Only Memory (CD-
ROM) discs can hold around of data
A. Refers to the Blue laser used to en-
grave the disc permanently A. 25-50GB
B. Refers to the name who originally in- B. 4.7GB
vented it Professor Blue Leach C. 800MB
C. Refers to the company which firstly re- D. none of above
leased it in the past
30. Which of these are optical storage?
D. Refers to the Blue laser used to used A. DVD
to read (and write) the disc
B. CD
E. Refers to the red laser used to used to
C. DVD-RAM
read (and write) the disc as red is a nicer
color than blue D. Blu Ray
31. Which word means:How much data the de-
25. Same as 1, 000 MB
vice can store
A. 1 TB A. Durability
B. 1 GB B. Capacity
C. 1MB C. Portability
D. 1 KB D. none of above
32. The type of primary memory that can store
26. Which of these has volatile memory .
data and instructions permanently.
A. ROM
A. RAM
B. RAM B. ROM
C. HDD C. Cache
D. SSD D. SSD

27. GB means 33. Blu-Ray discs are a form of what type of


storage?
A. 1 TB
A. Solid State
B. 1 GB B. Magnetic
C. 1MB C. Sequential
D. 1 KB D. Optical

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 242

34. Optical storage media: 40. Which of these storage devices uses serial
A. store data magnetically access to read data.
B. store data on their surface A. HDD
C. storage media with no moving parts, B. SSD
based on electronic circuits and using C. Magnetic tape
flash memory
D. DVD
D. there aren’t right answers

NARAYAN CHANGDER
E. Blu-ray
35. Two main use of Flash memory cards
A. Storing photos on digital cameras 41. Two advantages of thumb-drives / pen
drives:
B. Used only for burn high definition
movies A. Cheaper than CD’s and DVD’s
C. Mobile phone memory cards B. Doesn’t need additional software to
D. used as Security device to prevent soft- work on most computer
ware piracy (dongle) C. Portable and not affected by magnetic
36. One complete sets of fields is called? fields

A. Record D. All types of thumb-drives / pen drives


have larger storage capacity compared to
B. File Blu-ray disks
C. Field
D. Database 42. is a shiny, Silver-coloured disc
A. C.D.
37. Two disadvantages of Flash memory
cards: B. Hard Disc
A. Expensive per gigabyte C. Memory card
B. Encryption problems D. none of above
C. Lower storage capacity than hard disk
43. How is data stored on a Hard Disk Drive
D. Superseded by newer technologies
A. Using a high powered laser
38. The magnetic patterns left on a disk repre-
sent numbers. B. Using pits which represent 0s and 1s

A. binary C. With complex circuitry


B. hexidecimal D. With tiny magnets representing indi-
vidual bits
C. code
D. computer 44. the process of transferring items from
memory to a storage medium .
39. What do you use to read CDs/DVDs?
A. DVD ROM A. Access time

B. CD ROM B. Writing
C. CD DVD PLAYER C. Reading
D. none of above D. Backup

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 243

45. What does the term ‘Access speed ‘ refer C. 25 GB


to
D. 15 GB

PRACTICE BOOK» NOT FOR SALE


A. the amount of time required by storage
device to retrieve or read data 50. What advantages does a blue laser light
B. How long it takes a person to bring?
read/write a word document A. Can make the CD last longer
C. How long the storage media can rea- B. Smaller pits and bumps, so more space
sonably be expected to last
C. Movie becomes HD
D. The amount of data to be stored on the
device D. Cool light

46. What does volatile memory mean? 51. Computer memory is of two types:
A. After the computer closes, the data is A. Hard disk and Flash drive
saved
B. Hard Disk and Memory Card
B. Synonym for secondary storage
C. After the computer closes, the data is C. RAM and ROM
lost D. Internal memory and External memory
D. Synonym for primary storage
52. Capacity of a storage device is measured
47. One reason your computer may slow down in
would be use of due to the need of ad-
A. Bytes
ditional memory space.
A. Virtual memory B. Bits
B. Read Only Memory C. Hz
C. Southbridge D. none of above
D. Northbridge
53. What is offline-storage
48. How is a magnetic pattern turned into A. Storage which is not on the internet
data?
B. Storage which is volatile
A. An electric signal is generated from
the magnetic patterns C. Storage which cannot be deleted
B. An electric signal is created when the D. Storage which is external (outside) the
magnets touch the drive base system, but must be connected to the sys-
C. An electric signal is generated when tem for data to be retrieved and stored
the magnetic pattern is read from the disk
drive 54. Which type of storage is the most expen-
sive?
D. An electric signal is created when each
stack of drives is pushed together A. HDD

49. How much can a Blu-ray disk store? B. SSD


A. 7 GB C. Floppy Drive
B. 10 GB D. Blu-ray

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 244

55. What does HDD stand for? 61. Which storage device cannot be electroni-
A. Hard Driving Disks cally modified after manufacture?
A. HDD
B. Hard Drive Diagram
B. SSD
C. Hard Disk Dimensions
C. ROM
D. Hard Disk Drive
D. CD
56. External drive, flash drive, usb pen drive

NARAYAN CHANGDER
and cd-rom are examples of . 62. is plugged into USB port.
A. Primary storage A. Compact Disk

B. Secondary storage B. Hard Disk

C. Off-line storage C. Pen Drive

D. none of above D. DVD

63. can store more information than CD


57. Hardware consists of:
A. Pen Drive
A. Input devioces
B. DVD
B. Output Devices
C. Memory card
C. Storage devices
D. none of above
D. All of the above
64. Where is the OS stored on a computer?
58. What is the storage capacity of a 3 1/2-
inch Floppy? A. RAM

A. 3.2 KB B. Secondary Storage


C. CPU
B. 75 Bytes
D. Motherboard
C. 1.44 MB
D. 56.7 MB 65. Select all solid-state devices (flash mem-
ory).
59. Which storage device is flash memory? A. Floppy disk
A. Solid state drive B. SD card
B. floppy disk C. HDD
C. USB D. SIM card
D. none of above E. Pendrive
60. What type of memory needs to be con- 66. A standard 120 mm, CD-ROM can actually
stantly refreshed to not lose its value hold of data.
A. SRAM A. 700 MB
B. DRAM B. 500 MB
C. SSD C. 4, 7 GB
D. RAM D. 25, 0 GB

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 245

67. Which word means:How easy the device 73. Which of these is primary storage?
is to carry around (choose all that apply)

PRACTICE BOOK» NOT FOR SALE


A. Durability A. Portable HDD
B. Capacity B. SSD
C. Portability C. HDD
D. none of above D. ROM Chip
E. RAM
68. A single piece of information is called?
A. Record 74. Which device is the most durable?
B. File A. Magnetic Tape
C. Field B. Compact Disc
D. Database C. Hard Drive
D. none of above
69. The another name for Flash drive is
A. Hard Drive 75. Which one of the following is an example
of a storage device? Choose 2.
B. Pen Drive
A. Wire
C. CD Drive
B. USB Flash Drive
D. none of above
C. Computer
70. USB stands for
D. Floppy Disk
A. Uniform Serial Bus
76. Select the types of Storage Devices
B. Universal Serial Bus
A. Primary
C. Unique Serial Bus
B. Secondary
D. none of above
C. Magnetic
71. Magnetic storage media: D. Online and Cloud
A. store data magnetically
77. Which type of storage device can store the
B. store data on their surface most data?
C. storage media with no moving parts, A. SSD
based on electronic circuits and using
flash memory B. HDD

D. there aren’t right answers C. CD


D. Blu-Ray
72. What is the name of the spinning disk in a
Hard Disk Drive? 78. What do the initials DVD stand for?
A. Cone A. Data Versatile Disc
B. Platter B. Digit Versatile Disc
C. CD C. Digital Versatile Disc
D. DVD D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 246

79. Cloud storage is 85. What color laser does a CD use?


A. actually in the cloud A. Red
B. storage that can be accessed from any- B. Green
where using the internet C. Blue
C. robust because it has no moving parts D. Purple
D. backed up very regularly
86. the process of transferring items from a
storage medium into memory

NARAYAN CHANGDER
80. Which of these is not secondary storage?
A. Portable HDD A. Reading

B. SDD B. Writing
C. Allign
C. HDD
D. Back Up
D. DVD Disc
87. Two Examples of Serial (sequential Access)
81. Magnetic tape is still used for Method:
A. Archiving/Backing up of large data A. Magnetic Tape
B. Remote storage B. Flash drive
C. Playstation games C. Cassette Tape
D. Music albums D. CD ROM
82. are used to distribute all sorts of 88. Which type of storage device generally has
data:software (e.g. office applications or the largest capacities?
games), music, electronic books
A. Hard Drives
A. Pen drive B. Flash Drives
B. Hard disk C. SD Cards
C. CD-ROMs D. Optical Drives
D. none of above
89. What do you use to type, not write?
83. Where is data stored in an HDD A. Mouse
A. In RAM B. Keyboard
B. In magnetic surfaces of disk C. Phone
C. In capacitors D. Pen
D. In NAND chips 90. Advantage of SSD:
84. Which part of the DRAM holds bits of in- A. Lower power consumption and
formation? cheaper
A. SSD B. Run much cooler than HDDs and usu-
ally much larger storage space compared
B. Transistor
to HDD within the same price range
C. Interrupts C. Much Faster than HDD and No moving
D. Capacitors parts

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 247

D. Lower power consumption and used 96. What must you do before removing your
primarily as backup storage flash drive?

PRACTICE BOOK» NOT FOR SALE


A. Clean it
91. Which of the following specifications
would be better in terms of storage capac- B. Close all programs
ity speed of access to data? C. Turn off your computer
A. PC with Magnetic Storage of 2TB D. Eject it
B. PC with SSD drive of 500GB 97. I am the long-term storage part of the
C. Mobile Phone with SSD of 128GB computer. Software, documents and other
files are saved here.
D. none of above
A. random access memory (RAM)
92. The data stored in CD/DVD-ROM, is B. hard drive
stored as a series of?
C. motherboard
A. Pits and Lands
D. expansion slot
B. Digital media
98. A pen drive is attached to a computer
C. 1 and 2 through a port
D. Label and Tags A. Mouse
B. USB
93. are movable storage devices.
C. CPU
A. CD
D. none of above
B. DVD
C. Both 99. Select all optical-based storage devices.
A. SIM card
D. none of above
B. Blu-ray
94. File read/write speeds range anywhere C. DVD-R
from 50-120MB/s.
D. CD-ROM
A. HDD
E. Pendrive
B. ROM
100. Which storage device can be carried in a
C. RAM pocket easily?
D. SSD A. HD
95. This device is fixed within the computer B. FD
case. It is not intended to be a portable C. Pen drive
storage device. D. none of above
A. CD
101. Magnetic storage devices have
B. Flash memory
A. Spinning discs that contain tracks and
C. DVD sectors
D. Hard disk B. Floating gates to trap electrons

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 248

C. A read-write head that moves across C. Blu-ray


the magnetic discs D. CD-R
D. Has pits and lands that represent 0 or
1 107. Which optical disk has the highest mem-
ory?
102. Two Examples of Magnetic Storage Me- A. Blu-disk
dia
B. CD
A. internal hard disk drive

NARAYAN CHANGDER
C. DVD
B. Flash drive
D. none of above
C. DVD ROM
D. Portable hard disk drives 108. The physical parts of the computer that
you can touch and feel are called
103. Solidstate media
A. Hardware
A. there aren’t right answers
B. Software
B. storage media with no moving parts,
C. Storage
based on electronic circuits and using
flash memory D. None of these
C. store data on their surface 109. What does the word “obsolete” mean?
D. store data magnetically A. Slow technology
104. Which of the following is not a periph- B. Small data storage capacity
eral? C. No longer in use
A. mouse D. Broken
B. monitor
110. One Major disadvantage of DVD RAM is:
C. keyboard
A. Requires special and expensive soft-
D. motherboard ware to run
105. ‘A laser is shone onto the disc and the B. Not as compatible as R or RW format
light is reflected based upon whether it C. it is used only to record videos
hits a pit or land’ describes which storage
device? D. is affected by the cool weather

A. Cloud storage 111. The tray in which CD is placed is a part of


B. Optical storage CD

C. Magnetic storage A. keys

D. Solid State storage B. buttons


C. drive
106. Which of these optical devices is
best used to store high definition (HD) D. none of above
movies? 112. Two disadvantages of CD ROM
A. CD-RW A. Data transfer rate is slower compared
B. DVD to other storage medium

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 249

B. Not Robust-easily be damaged or 118. A single layer can store about 4.7Gb
scratched. of data.A double layer can hold over
9Gb of data.

PRACTICE BOOK» NOT FOR SALE


C. Have many moving parts like HDD
D. Not portable A. DVD
B. Flash memory
113. Three main reason that cause loss data in
the computer main storage devices C. Internal hard disk

A. Failure of the original secondary stor- D. External hard disk


age devices 119. What is usually stored on a CD?
B. Corrupted files A. Music
C. Hardware failures B. Games
D. Out of date Operating System C. ROM Data
114. Which is not a storage device? D. Films
A. usb 120. A USB pen drive with 2GB storage space
B. pen can store up to 1000 files. What is the
C. zip disk average file size then?

D. floppy disk A. 2 GB
B. 2 MB
115. This device is very portable as it can be
fitted into small electronic devices. C. 200 KB

A. SD card D. 0. You can’t store data in pen drives

B. Hard disk 121. Which type of storage is great for storing


C. Magnetic tape backups safely?

D. Server A. Primary
B. Secondary
116. Which type of disc drive can store the
most data? C. Offline

A. CD D. none of above

B. DVD 122. One example of good computing practice


C. Blu-ray A. Deleting cache and cookies regularly
D. none of above B. Formatting storage devices regularly

117. Although not used as much any more, C. Set up automatic schedule for backing
large organisations use this type of stor- up files regularly
age device to back up mass amounts of D. Stored backups data in the same stor-
data. age to main storage
A. CD 123. File read/write speeds range generally
B. DVD above 200 MB/s and up to 550 MB/s.
C. Blu-ray A. HDD
D. Magnetic tape B. ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 250

C. RAM 129. Which of the following is most commonly


found in PCs?
D. SSD
A. Solid State Storage
124. Without hard drive, a computer cannot B. Magnetic Storage
C. Cloud Storage
A. move
D. Optical Storage
B. work
130. Which type of storage uses a laser?

NARAYAN CHANGDER
C. progress
A. Magnetic
D. shutdown B. Optical
125. A is a computer disk drive that is C. Solid State
used to store information to removable D. none of above
diskettes.
131. What is ‘volatile’ storage?
A. Floppy Disk Drive
A. Storage which is deleted without
B. Hard disk drive power
C. Memory card B. Storage which remains in memory
without power
D. Flash drive
C. Storage which cannot be changed
126. What data can you change through ROM D. Storage which can be changed
A. Start-up instructions
132. The hardware device that are used to dis-
B. Anything you are working on stored in play the results is
ROM A. Monitor
C. Nothing B. Keyboard
D. none of above C. Mouse
D. CPU
127. What does SSD stand for?
A. Silicon Saving Device 133. What are secondary storage devices
for?
B. Solid Storage Device
A. A device use for calculating data
C. Storing Saving Drive B. A device used to store data temporar-
D. Solid State Drive ily
C. A device used to supply power to the
128. A is an optical storage device that is computer
fairly fragile and easy to break or scratch.
D. A device used to store data perma-
A. Flash memory nently
B. Magnetic Tape 134. Which of these is a storage device?
C. CD A. Mouse
D. Hard disk B. Keyboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 251

C. Flash drive 139. Which is not the most expensive per GB


of storage
D. CPU

PRACTICE BOOK» NOT FOR SALE


A. USB
135. Two advantages of Blu-Ray compared to B. SSD
CD/DVD disks:
C. HDD
A. Very fast data transfer rate
D. CD
B. Cheaper
E. DVD
C. doesn’t requires special player
140. The magnetic polarity produced by a con-
D. Data access speed is greater than ductor is directly related to the direction of
other optical media through the wire.
136. Two differences between CD-R/DVD-R A. current
and CD-RW/DVD-RW B. amps
A. CD-R/DVD-R are only record-able C. ampules
once and are used for Read Data only D. volts
B. CD-R/DVD-R holds more better quality
videos and imaged 141. Two characteristics of Direct (Random ac-
cess):
C. CD-RW and DVD-RW allows for data
A. Stores files so that they can instantly
to be written, erased and rewritten many
be accessed
times
B. No need to search through files to get
D. CD-RW and DVD-RW are cheaper than
to the one you want
CD-R/DVD-R
C. Files are stored one by one in a se-
137. is where software and some docu- quence
ments or pictures are stored onto a hard D. Data are to be stored alphabetically
drive or externally onto a device such as and sorted in order
a disk, which is easily accessible when re-
quired. 142. Storage devices run two processes
A. Primary storage A. central and process data
B. Secondary storage B. Writing and reading data

C. Enhanced data storage C. linked tasks and set of activities

D. Front side storage D. improving and managing data

143. A flexible removable magnetic disk (typ-


138. Which type of compact disc allows you to ically encased in a hard plastic shell) for
save, delete and add data? storing data.
A. CD-R A. Hard disc
B. CD-ROM B. Floppy disk
C. CD-RW C. Compact disc
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 252

144. Why might RAM not be the best for sec- C. VHS Tape
ondary storage?
D. External Hard drive
A. It is volatile meaning it loses all data
when power is cut off 150. Which device would you use:
B. small storage A. Optical Disk
C. Breaks easily B. Hard Drive
D. none of above C. Flash Memory

NARAYAN CHANGDER
145. Backing up refers to the copying of D. Magnetic Tape
files/data to a different medium in case
of a problem with the 151. Two main features of DVD-RAM
A. Main Storage Device A. Use number of concentric tracks
B. External Storage Device B. Once data is been recorded and the
C. Main Secondary Storage Device process has been finalised then the disks
become Read Only.
D. Hard disk drive
C. Storage size is smaller then CD-ROM
146. What is the name given to copies of data
or program files? D. Allows simultaneous read /write and
great longevity
A. Backups
B. Programs 152. Characteristics of a hard disk include .
C. Extras (select multiple answer)

D. Stores A. Access Time


B. Transfer Rate
147. The primary storage devices have
A. Direct contact with the CPU C. Reading

B. Indirect contact with the CPU D. Writing

C. Control over the CPU 153. The most durable storage device as it has
D. Partial connection with the CPU not moving parts

148. The following are types of storage de- A. Solid State Storage
vces except B. Magnetic Storage
A. Hard Disk C. Optical Storage
B. Monitor D. none of above
C. Floppy Disk
154. What is the magnet called in the HDD?
D. Memory card
A. Voice Actuator
149. Two Examples of Direct (Random Access)
Method: B. Voice Coil Actuator
A. Magnetic Tape C. Coil Actuator
B. Flash drive D. Voice Coil

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 253

155. Where is data stored in a CD? 161. Cloud storage is (select all that ap-
A. In its RAM plies)

PRACTICE BOOK» NOT FOR SALE


B. In pits and bumps A. actually in the cloud
C. In the scratches B. storage that can be accessed from any-
where using the internet
D. In the laser
C. robust because it has no moving parts
156. One main advantage of Portable hard D. backed up very regularly
disk drive compared to internal hard disk:
A. More stronger and durable compared 162. Which of these is primary storage?
to internal HDD A. Portable HDD
B. easy to move and transfer data/files B. SDD
from one desktop system to another C. HDD
C. is Cheaper than internal HDD D. ROM Chip
D. Where Operating system is stored and E. RAM
is essential part of desktop computers
163. How much data can a CD hold?
157. card is used widely in mobiles.
A. 7 GB
A. ATM
B. 11 GB
B. Memory Card/ SD
C. 3 GB
C. Credit
D. 5 GB
D. none of above
164. Which of this is a Magnetic storage me-
158. A type of portable storage that is similar dia?
to Flash Drives and is used in many digital
A. Smart Card
cameras.
B. DVD-ROMs
A. Hard Drive
C. Floppy Disc
B. Memory card or (SD Card)
D. USB
C. CD
D. Memory Stick 165. Which type of compact disc comes with
data already written on it?
159. Two disadvantages of Magnetic Tapes A. CD-R
A. Very slow data access times B. CD-ROM
B. Can be easily damaged if dropped C. CD-RW
C. Have many moving parts like HDD D. none of above
D. Affected by magnetic field
166. We have main types of storage de-
160. One disadvantage of DVD ROM is: vices.
A. Requires special software to run A. 3
B. Have to buy a separate DVD player B. 6
C. it is used only to record videos C. 2
D. is more expensive the thumbdrives D. 8

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 254

167. A CD has one long track on it full of C. Optical


A. Grooves and pot holes D. none of above
B. Pits and Lands 173. Magnetic storage devices have tick all
C. Bumps and Dots that apply (2 responses)
D. Dots and Grooves A. Spinning discs that contain tracks and
sectors
168. Which storage device might be best to
B. Floating gates to trap electrons

NARAYAN CHANGDER
use in a computer for secondary storage?
A. Solid state drive C. A read-write head that moves across
the magnetic discs
B. Hard Disk Drive
D. Has pits and lands that represent 0 or
C. Optical drive 1
D. none of above
174. What memory type is volatile?
169. Type of storage holds/stores data and A. RAM
applications temporarily or for a shorter
period of time while the computer is run- B. ROM
ning. C. Flash
A. RAM D. none of above
B. SSD
175. Two advantages of SSD:
C. Content management storage
A. Data access is considerably faster
D. Enhanced data storage than HDD
170. Which device has the least amount of B. Cheaper than HDD
storage space? C. More reliable as there are not moving
A. Hard Disk parts
B. Memory Card D. In applications where batch process-
ing is used (e.g.:utility billing)
C. Flash Drive
D. Floppy Disk 176. storage is bad because it is expen-
sive.
171. What type of storage are HDDs and
A. Flash
SSDs?
B. Optical
A. Primary Storage
C. Magnetic
B. Secondary Storage
D. none of above
C. Tertiary Storage
D. Storage Wars 177. Which type of storage would you use:

172. Which of these is not a type of Hard A. Optical Disk


Drive? B. Hard Drive
A. Magnetic C. Flash Memory
B. Solid State D. Magnetic Tape

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 255

178. What is unique about ROM? 184. CD Stands for


A. It can be deleted A. Circular Disk

PRACTICE BOOK» NOT FOR SALE


B. It cannot be changed B. Compact Disk
C. It is inside the computer C. Common Disk
D. It cannot be accessed externally D. none of above

179. Which device would you use:To store rela- 185. Two disadvantages of SSD:
tively large amounts of data in your home A. longevity, doesn’t last long as HDD
computer B. Very Expensive compared to HDD
A. Optical Disk C. High power consumption
B. Hard Drive D. Less reliable
C. Flash Memory
186. Select all magnetic-based storage de-
D. Magnetic Tape vices.
180. A is a hardware designed to store in- A. Floppy disk
formation B. Tape drive
A. Pen drive C. HDD
B. Storage device D. DVD
C. Hard disk E. SSD
D. none of above 187. memory is also known as Immediate
181. Why haven’t SSD’s been put in all com- Access Storage and is where data is stored
puter? on the main computer memory.
A. RAM
A. Too Expensive
B. ROM
B. Too Slow
C. Enhanced data storage
C. Very Fragile
D. Front side storage
D. Not reliable
188. with such advantages what storage de-
182. Which of this is a Solid-state storage me- vices do you know? very large, fast, low,
dia? fragile is moved, expensive
A. CD-ROMs A. fixed hard disks
B. Hard Disk Drive B. portable hard disks
C. USBs C. magnetic tapes
D. Magnetic Tape D. Blu-ray
183. Optical storage media, fairly fragile, 189. Name two storage devices for keeping
easy to snap or scratch. backup copies of photographs
A. Flash memory A. memory stick and CD ROM
B. Magnetic Tape B. DVD and flash drive
C. CD C. floppy disk and Flash drive
D. Hard disk D. Hotspot and wifi

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 256

190. One main advantage of Flash memory D. It is the action of using a storage de-
cards: vice to copy data and files to put them in
A. Cheaper than CD’s and DVD’s a different storage medium.

B. not easy to lose as they are bulky in 195. Difference between Main Memory Stor-
size age vs Secondary/Backing Storage (Q1):
C. Very compact and can easily removed A. Secondary:Usually used to store data
and used in another device while it is being processed by the CPU.

NARAYAN CHANGDER
D. All types of Flash memory have larger B. Main Memory:Data’s are hold perma-
storage capacity compared to Blu-ray nently
disks C. Secondary:Temporary holding data
191. Binary on an optical disc is read as D. Main Memory:Usually used to store ap-
what? plication software, operating system soft-
ware, files etc.
A. Bumps and Flat Surfaces
B. Magnetic 1s and 0s 196. What is a feature of DRAM?
C. Tiny Holes that light shines through A. They are much faster than SRAM
D. Tiny 1s and 0s printed on the disc B. They have a higher storage capacity
than SRAM
192. Which device would be most suitable for
C. They consume more power than SRAM
downloading and storing movies?
D. They are more expensive to manufac-
A. DVD
ture than SRAM
B. Floppy Disk
197. which one is not a storage device?
C. CD
A. RAM
D. none of above
B. PRINTER
193. What is a device that moves the head
C. DVD
over the disk?
D. FLOPPY DISK
A. actuator arm
B. agitator arm 198. Two types of storage medium:
C. activator arm A. Fixed:installed internally
D. actuating hand B. removable
C. Optical Storage
194. What is data access speed?
D. Laser reading base Storage
A. There are some storage devices which
will let you access to your data really 199. Floppy Diskette is a
quickly.
A. Primary storage device
B. Is when you put data in a place you are
aware of B. Secondary storage device

C. Devices that store information in mag- C. Tertiary storage device


netised dots D. University storage device

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 257

200. What are the storage devices that are B. Storage that can be disconnected from
real? the main computer unit, for example to
transfer files between computers.

PRACTICE BOOK» NOT FOR SALE


A. Floppy Disk
B. USB C. Moving a data, program or file from
memory onto secondary storage for later
C. Monitor use.
D. Hard disk drive D. none of above
201. The seat where the storage disk sits to 206. Which of these are obsolete?
operate is called the
A. Floppy Disk
A. Rotation drive
B. CD
B. Storage drive
C. Flash Drive
C. Storage seat
D. All of these
D. Storage work
207. Which is an example of a portable device
202. optical discs have data written onto or device can be taken from one place to
them when they are manufactured. This another?
data cannot be changed. A. smart TV
A. Read/write B. Laptop
B. Read-only C. wearable device
C. All D. cloud storage
D. none of above
208. The disadvantages of memory
203. Can a ROM chip be altered after the man- cards.Choose the correct answer
ufacturer has set the integrated informa- A. they can break easily
tion?
B. need very little power
A. No
C. are available in many sizes
B. Yes
D. are small, light and compact so are
C. Maybe very easily portable
D. None of the above
209. Which is the popular and handy storage
204. storage is good because it stores a device?
lot of data. A. CD ROM
A. Flash B. DVD
B. Optical C. Hard disk
C. Magnetic D. Pen drive
D. none of above
210. to write information on a storage
205. Magnetic storage is . medium

A. Storage that uses a surface which can A. Save


be magnetised to store data B. Load

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 258

C. Upload 217. Identify the importance of secondary


D. Restore storage such as Hard Disk Drive:
A. Safeguard against lost of data due and
211. Which is a disadvantage of fixed de- Backup
vices?
B. Safeguard against copyright
A. Cannot be moved from 1 place
C. Safeguard against having computer
B. Low processing power
components going bad or malfunction

NARAYAN CHANGDER
C. Low storage capacity
D. Safeguard against damage caused by
D. Easily transported hackers
212. How data is read by CD ROM: 218. Which storage device can only store a
A. Has moving header to read the data small amount of data?
B. is read by bouncing the laser beam off A. HD
the surface off the medium. B. FD
C. data is read directly from Microchip C. CD
D. Uses light and pin to read the data D. DVD
213. USB stand for what?
219. What is used to record data in a com-
A. Universal series bus puter?
B. Universal serial bus A. magnetism
C. Universal serial data B. unicorns
D. none of above C. processor
214. Typically stores 700mb of data on it . D. hard drive
A. DVD 220. Why is optical storage called optical?
B. Blu-ray A. Because they are created for movies
C. CD and games.
D. Floppy disk B. Because they save data as patterns of
dots that then are read by using a light at
215. Blu ray disk can store of data. a high power.
A. 50 GB
C. Because they can be used in different
B. 50 MB devices.
C. 50 KB D. Because they can save visible informa-
D. none of these tion.

216. Which drive is called the same as IDE? 221. Which of this is a Optical storage media?
A. Pata A. Magnetic tape
B. Sata B. Portable Hard Disc Drive
C. Atx C. Memory card
D. Vata D. Blu-Rays

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 259

222. Magnetic storage devices have (select 227. Which of the following is an advantage
all that applies) of Solid State Storage?

PRACTICE BOOK» NOT FOR SALE


A. Spinning discs that contain tracks and A. It has spinning disks to read the data
sectors B. The storage device is lightweight and
B. Floating gates to trap electrons silent
C. A read-write head that moves across C. SSDs are very cheap to buy and have
the magnetic discs lots of storage
D. Has pits and lands that represent 0 or D. none of above
1
228. What do optical drives use to read data
223. DVD was first invented in:1995CD was on CDs or DVDs?
invented in:1979When was Blue Ray in- A. Flash Memory
vented?
B. Metallic Tape
A. 1983
C. Magnetic Tape
B. 1994
D. Laser
C. 2000
D. 2016 229. Which of the following units could be
used to measure storage capacity of a USB
224. Two use of thumbdrives/pen drives: stick?
A. Transporting files between computers A. Mhz
B. Used only for burn high definition B. Ghz
movies C. Gb
C. Used for audio/music only D. Cm
D. Security device to prevent software
230. What three of these devices are consid-
piracy (dongle)
ered magnetic storage devices?
225. How data is stored in CD/DVD disks A. hard drive
(Choose two options):
B. floppy drive
A. Red laser lights is used to read and
C. tape drive
write data
D. processor drive
B. stores data in parallel tracks
E. memory drive
C. Uses blue laser to read and write data
D. Data is stored in ‘pits’ and ‘bumps’ on 231. This storage device needs a computer
the spiral track with a specific drive in order to read the
disk. Cannot be read by a CD drive or DVD
226. Which of these is the fastest drive. Used for high definition films.
A. Optical storage device A. Blu-ray
B. Magnetic storage device B. CD
C. Solid-state drive / Flash memory C. DVD
D. none of above D. Bluetooth

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 260

232. is a small, shiny, circular disk that can 237. When a lazer hits a bump area in an optic
store 700 MB of data. disc the light is reflected. Reflected light is
the corresponding a in which number
A. DVD
system?
B. CD
A. O binary
C. Blu Ray Disk
B. 1 binary
D. Pen Drive
C. 1 in hexadecimal

NARAYAN CHANGDER
233. memory chip is a permanent primary D. 0 in hexadecimal
storage where the instructions are stored
E. 1A binary
by manufacturers, and users are unable to
overwrite the information stored on this 238. The printers give a very high quality
device. output
A. RAM A. Inkjet
B. ROM B. Dot Matrix
C. CPU C. Laser
D. SSD D. none of above
234. A type of memory used by an operat- 239. Which of these are secondary storage de-
ing system to compensate for shortages of vices?
physical memory (RAM).
A. ROM
A. SSD
B. HDD
B. System memory
C. DVD
C. Virtual memory
D. SSD
D. GPU
E. Floppy disk
235. What is used as primary storage?
240. The major advantage of an is that it
A. RAM is capable of storing lots of data cheaply.
B. ROM A. HDD
C. Solid State Drive B. ROM
D. Hard Disk Drive C. RAM

236. What does USB stand for? D. SSD

A. Universal Stand Bus 241. Which is an example of a handheld device


B. Universal Small Bus A. Smartphone
C. Untitled Small Bus B. Desktop computer
D. Universal Secure Bus C. Games console
E. Universal Serial Bus D. Database server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 261

242. Why do we need secondary storage? C. Motherboard


A. To store important data E.G. the oper- D. Hard drive

PRACTICE BOOK» NOT FOR SALE


ating system
248. What type of storage device would
B. For cheese be most suitable for the distribution of
C. Because we do movies?
D. none of above A. Hard drive
B. USB
243. MS Word, Powerpoint, Paint are exam-
ples of C. DVD-ROM
A. Hardware D. DVD
B. Software 249. What type of Hard Drive is outside the
C. Storage devices computer in a portable enclosure?
D. None A. External Hard Drive
B. Hard Disk Drive
244. The physical parts of the computer are
called C. Solid State Drive
A. software D. Internal Hard Drive
B. hardware 250. What is the disadvantage of using mag-
C. computer parts netic storage devices?

D. computer case A. They can be easily affected by mag-


netic fields.
245. What is RW means in CD-RW? B. Because it uses blue lasers which have
A. Write once only shorter wavelengths.
B. Can only be read C. to make the copy of original data to in
case you lose your original data.
C. Can be written to or read from many
times D. it is a disk with bumps can be read by
laser
D. none of above
251. Which of the following is NOT an exam-
246. Which of the following is an example of
ple of a storage device?
primary storage (memory)?
A. SD Card
A. Hard drive
B. DVD
B. Flash drive
C. Computer Screen
C. CPU
D. Tape
D. ROM
252. In which device(s) is latency an issue?
247. The large circuit board where all compo-
nents inside a computer are connected to- A. SRAM
gether is called the B. DRAM
A. Smartboard C. SSD
B. Processor (CPU) D. HDD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 262

253. What type of storage device is the fol- 258. Why back up data? Pick 3 reasons
lowing a description of? Data is stored in A. Safeguard against loss data due to the
the form of tiny magnetised dots. Dots storage device failure
are created, read and erased by magnetic
fields created by tiny electromagnets. B. Safeguard against virus
A. Paper C. Safeguard against hackers

B. Optical D. 24/7 availability

NARAYAN CHANGDER
C. Magnetic 259. Which optic disc can store up to 25 GB of
D. Solid State data (per layer)?
A. DVD
254. Storage device that uses direct access
and in a very fast form of data access are B. CD
listed below, except? C. BLU RAY DISC
A. Memory sticks D. CD-P
B. DVD-ROM E. DVD-P
C. Portable HDD 260. If you were choosing a new desktop, why
D. Magnetic tapes might you choose an SSD compared to a
hard disc drive?
255. A(n) converts the magnetic pattern
A. quicker to boot up and much cheaper
from a hard drive platter into electrical
pulses. B. quicker to boot up, quieter, less prone
to damage
A. actuator arm
C. quicker to boot up and stores much
B. conductor
more data
C. write project
D. none of above
D. read/write head
261. Optical drives are used to read
256. Typically has the largest storage capacity
A. CDs
and is the cheapest per giga byte (Gb).
B. Flash Drives
A. Magnetic storage
C. Floppy Disks
B. Solid state storage
D. SSDs
C. Optical storage
D. none of above 262. How many Bits are in a Byte
A. 2
257. is not a removable storage device
rather it’s an inbuilt computer storage de- B. 4
vice C. 10
A. Hard Drive D. 8
B. Memory card 263. Two disadvantages of Internal hard disk
C. Flash drive drive:
D. Floppy disk A. More expensive than SSD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 263

B. Data transfer rate/data access time is 268. with such advantages what storage de-
slower than Optical Disks vices do you know? large, fast, high, ro-
bust, medium

PRACTICE BOOK» NOT FOR SALE


C. Can be easily damaged without cor-
rect shut down procedure A. Blu-ray
D. Have many moving parts B. CD
C. Flesh memory cards
264. Two advantages of CD-ROM
D. Memory sticks
A. Hold more data than floppy disks.
269. The spinning of the platters can some-
B. More durable and last longer than
times result in vibration.
thumbdrive
A. HDD
C. Compatible with audio systems.
B. ROM
D. Compatible with audio systems.
C. RAM
265. Having millions of transistors wired in D. SSD
a series on a circuit board, give the ad-
vantage of having no mechanical moving 270. Two Examples of Optical Storage Media
parts and therefore immediate access to A. Blu-ray
the data.
B. Flash drive
A. Hard Disk Drive (HDD)
C. DVD ROM
B. Blu-Ray
D. SSD
C. Universal Secure Disk Drive (USDD)
271. To access information on a storage
D. Solid State Drive (SSD)
medium
266. Two differences between CD ROM and A. Read
DVD ROM B. Load
A. Hold more data than CD-ROM’s C. Upload
B. CD ROM is used for video recording D. Restore
only
272. Which storage device use a blue laser?
C. Can record Videos in DVD with higher
resolutions. A. DVD Drive

D. CD holds 4.7 GB of data B. Blu-Ray Drive


C. CD Drive
267. Two advantages of Hard Disk Drive
D. USB Drive
(Magnetic Storage Media):
A. Very fast data transfer rate and fast 273. Which SSD is cheaper
access times to data A. Ones that use XNOR chips
B. No Moving parts so last long B. Ones that use NOR chips
C. Faster than SSD C. Ones that use XOR chips
D. Large storage capacity D. Ones that use NAND chips

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 264

274. What are correct storage devices? C. External


A. SSD D. CD
B. HHD 280. Cloud storage is
C. Motherboard A. enable you to download files over the
D. USB Stick internet too and can also suffer from long
download times
275. Two method of accessing data used by
B. sync folders on your computer or mo-

NARAYAN CHANGDER
storage medium:
bile device to folders on other machines
A. Serial (sequential Access) or into the cloud, allowing users to work
B. Queue (First in First out access) from a folder or directory across devices.
C. Top down access (Structured access) C. an Internet service that provides stor-
age to computer users
D. Direct (Random Access)
D. none of above
276. What are the differences between DVD
and DVD-RAM? 281. Typically stores 650mb of data on it-
usually music.
A. DVD-RAM is a spiral track
A. DVD
B. DVD-RAM allows numerous read-write
operations B. Blu-ray
C. DVD can last for over 30 years C. CD
D. DVDs can have more than 1 layer D. Floppy disk

277. What would be the most suitable stor- 282. When a lazer hits a pit area in an optic
age device for backing up a company net- disc the light is not reflected. Not reflected
work? light is the corresponding a in which
number system?
A. DVD
A. O binary
B. Solid State Drive
B. 1 binary
C. USB
C. A in hexadecimal
D. Magnetic tape
D. b in hexadecimal
278. Computer programs or applications that
tell a computer what to do is called 283. A DVD can store data than a CD.
A. Play Store A. equal
B. Software B. less
C. Hardware C. more
D. Application Manager D. none of above

279. and are the two types of memo- 284. I am known as the “brain” of the com-
ries present in a computer. puter because I receive information and
carry out commands. I tell other parts of
A. Internal the computer what to do and when to do
B. Hard disk it.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Storage Devices 265

A. processor (CPU) 290. When transferring data using magnetic


B. motherboard tape, the original file is called?

PRACTICE BOOK» NOT FOR SALE


C. power supply A. Main file
D. hard drive B. Master file

285. What does robust mean? C. Home file


A. No moving parts D. Genuine file
B. Moving parts 291. Which of the following describes the func-
C. SSD tionality of solid state storage?
D. USB Stick A. Traps electrons behind blocks of float-
ing gates
286. Two characteristics of Serial (Sequential
access): B. Spinning discs are read using a read-
A. Files are stored one by one in a se- write head
quence C. Access is only possible if you have a
B. Stores files so that they can instantly connection to the internet
be accessed D. Has a series of pits and lands that re-
C. Must search through the files one by flect light to a sensor
one until you get to the one you want.
292. What is the mechanism that records in-
D. Direct Access of data using search in- formation to and reads information from a
dexing magnetic medium?
287. What is the Access time for SRAM A. read/write head
A. 15 milliseconds B. read head
B. 20 nanoseconds C. CPU head
C. 25 nanoseconds
D. monitor
D. 30 nanoseconds
E. 60 milliseconds 293. This output device helps you to record
sound?
288. What is short for hard drive?
A. Microphone
A. HD
B. Speakers
B. HDD
C. Monitor
C. HRDV
D. none of above
D. USD
289. Which doesn’t contains moving parts? 294. Which of these are reasons for com-
puter systems requiring secondary stor-
A. HDS age? (Tick all that apply)
B. SSD
A. Secondary storage improves system
C. HDD performance
D. LCD B. Used to back up data stored in main
E. ROM memory/primary storage.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 266

C. Stores programs/data and files that D. Need for larger storage capacity (than
would be lost when the power is switched what RAM and ROM can provide).
off. E. Its required for Virtual Networks

4.5 Computer Memory


1. The data is stored in the computer’s mem- 6. Which of the following is NOT example of
ory in the form of non-volatile memory?

NARAYAN CHANGDER
A. Numbers A. CMOS
B. Alphabets B. Flash Memory
C. Bits C. RAM
D. Special characters D. ROM
7. Choose the print primitive for the ac-
2. There are types of memory in the com-
tion:Addition of 6 and 5.
puter
A. PRINT DIFFERENCE 6 7
A. 3
B. PRINT PRODUCT 6 7
B. 1
C. PRINT ADD 6 7
C. 4
D. PRINT SUM 6 7
D. 2
8. how many types basic parts of primary
3. A computer can understand only two memory are there
states:
A. 4
A. 0(ON) and 1(OFF) B. 3
B. 0(OFF) and 1(OFF) C. 2
C. 0(OFF) and 1(ON) D. 1
D. 0(ON) and 1(ON)
9. The information in a computer is stored in
4. Example for secondary memory the form of digits.

A. Pen drive A. Single


B. Binary
B. CD
C. Ternary
C. DVD
D. Multiple
D. All of the above
10. The is non-volatile or non-erasable
5. Which of the following is an Internal Mem- memory. It means that the data stored
ory? on it is permanent.
A. USB A. ROM
B. Hard Disk B. RAM
C. CD C. DVD
D. Memory Card D. CD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 267

11. What are the types of computer memory? 17. what is stored in RAM
A. Only Primary memory A. the bios

PRACTICE BOOK» NOT FOR SALE


B. Only Secondary Memory B. data and instruction for use by the CPU
C. Primary memory & Secondary Memory C. the operating system
D. None of these D. saved files for your games
12. Data store in is erased when the 18. WHAT DOES CPU STAND FOR?
computer is turned off.
A. CENTRA PROCESSING UNIT
A. Internal Memory
B. CENTRAL PROCESSING UNIT
B. External Memory
C. CENTRE PROCESSING UNIT
C. RAM
D. CENTRAL PROCESSING UNITE
D. ROM
19. is the smallest piece of data that can
13. Identify a type of RAM that has chips that be stored
must be re-energized constantly.
A. bits
A. SRAM
B. bytes
B. DRAM
C. Nibble
C. MRAM
D. none of above
D. none of above
20. The smallest unit for measuring Memory
14. Short videos and music is most likely mea-
in computer is
sured in
A. Bits
A. bytes
B. megabytes B. Byte

C. zettabytes C. KiloByte

D. yottabytes D. MegaByte

15. Which one is an example of flash memory? 21. Gated Latches are organized into matrices
(2-3) to

A. RAM A. save bigger files


B. ROM B. make it easier to read
C. SD Card C. safe space
D. Cache D. reduce the number of wires needed

16. WHAT IS BYTE? 22. Calculate how many bits are in ( car)
A. A FLASH DRIVE A. 24
B. A COLLECTION OF 4 BITS B. 32
C. A COMPACT DISK C. 64
D. A COLLECTION OF 8 BITS D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 268

23. what are the types of processors 28. What is Primary memory?
A. media processor A. refers to storage devices, such as hard
drives and solid state drives
B. microcontroller
B. computer memory that is accessed di-
C. EPROM rectly by the CPU.
D. EEPROM C. Non of them
D. none of above
24. how are the binary digits written?

NARAYAN CHANGDER
29. What is the smallest memory used to mea-
A. in number 2’s
sure a computer memory?
B. in number 1’s A. Terabyte
C. in number 8’s B. Bits
D. in number 0’s C. Megabyte
D. Gigabyte
25. A is a local storage space that holds
data being worked by the CPU 30. computer memory is measured in terms of
A. hard drive A. bits
B. processor register B. bytes
C. cells
C. operating system
D. units
D. none of above
31. Calculate how many bits are in ( school)
26. what is a hard disk? A. 48
A. It is the main storage medium for com- B. 64
puters. It is fixed inside the CPU Box. C. 32
B. Storage medium for portable devices D. none of above
like mobiles and digital cameras. Can
transfer images to a computer. 32. In , the touch screen is coated with
a materialin order to Store the electrical
C. optical storage device, can hold text, charges generated by a touch. Thecharge
graphics, images, videos. is measured by panels located at each cor-
D. Optical storage device, used to store ner of the device and processed.
high quality sound, games and movies. It A. resistive technology
is inserted to the CPU to see and observe
B. capacitive technology
the data.
C. surface wave technology
27. We’re late. The film by the time we D. none of above
get to the cinema.
33. What is firmware? (3-5)
A. will already start
A. A program in cache
B. will be already started B. Any hardware
C. will already have started C. Data in RAM
D. will be starting D. A program in ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 269

34. RAM stands for: 40. One is approximately 1, 000 bytes.


A. Random Accept Memory A. terabyte

PRACTICE BOOK» NOT FOR SALE


B. Read Only Memory B. gigabyte
C. Random Access memory C. megabyte
D. none of above D. kilobyte

35. Byte can hold different values 41. primary memory also know as
A. 64 A. main memory
B. 128 B. short memory
C. 256 C. no correct answer
D. none of above D. none of above

36. Internal memory is also known as: 42. WHAT DOES RAM STAND FOR?
A. Secondary memory A. RANDOM ACCESSIBLE MEMORY
B. Primary memory B. RANDOM ACCESS MEMORY
C. External memory C. REALLY ACCURATE MEMORY
D. none of above D. RANDOM ACCESS SOARING

37. Processed data is called 43. What is the Full Form of DVD?
A. Instruction A. Digital Video Disc
B. Input B. Digital Versatile Disc
C. Information C. Digital Voice Disc
D. none of above D. Both (A) & (B)

38. What is the purpose of ROM? 44. What are the types of Hard-Disk
A. To not be volatile. A. Non-Internal Hard Disk
B. To contain vital instruction for the com- B. Internal Hard Disk & External Hard
puter (e.g. Starting up). Disk
C. It has no purpose. C. Non-External Hard Disk
D. To randomly open memory without be- D. All of these
ing tasked to.
45. What is a Secondary memory?
39. The act of putting data into memory is A. refers to storage devices, such as hard
called drives and solid state drives
A. storing B. computer memory that is accessed di-
B. latching rectly by the CPU.
C. saving C. Non of them
D. writing D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 270

46. What type of device is a headset? 52. This contains the BIOS (Boot-up program)
A. Input (3-4)

B. Output A. ROM

C. Storage B. Secondary Storage


D. All of them C. Hard Disk
D. RAM
47. HOW MANY BYTES ARE IN A KILOBYTE?

NARAYAN CHANGDER
A. 1024 53. A/ An allows programmer to erase the
contents by exposing to ultraviolet light
B. 100
A. PROM
C. 1000
B. EPROM
D. 999
C. EEPROM
48. what is computer memory?
D. none of above
A. it is the internal memory of the com-
puter 54. what are types of RAM
B. it the external memory of a computer A. SRAM
C. it is a physical device used to store B. DRAM
data and instructions
C. PROM
D. it is the data stored in a computer in
D. NON
the form of 1’s and 0’s
55. A/ An allows programmer to erase the
49. Print primitive used to display the last
contents with an electrical signal.
word of a sentence.
A. PROM
A. PRODUCT
B. LAST B. EPROM

C. ADD C. EEPROM

D. FIRST D. none of above

50. Computer primary memory are of two 56. What is the Full Form of ROM?
types: A. Read Only Memory
A. Hard disk and Flash drive B. Random Access Memory
B. Hard Disk and Memory Card C. Read Only Message
C. RAM and ROM D. None of these
D. Internal memory and External memory
57. A computer can understand only the
51. One is about 1 million bytes. language
A. terabyte A. Java
B. gigabyte B. C++
C. megabyte C. Binary
D. kilobyte D. Octal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 271

58. Computer can store and process 64. Which one of those is not a type of Stor-
A. Binary and decimal numbers age?

PRACTICE BOOK» NOT FOR SALE


A. HDD
B. Decimal numbers
B. SSD
C. Binary numbers
C. SSHD
D. none of above
D. RAM
59. Arrange in ascending order the units of
65. Which of the following is the best defini-
memory TB, KB, GB, MB
tion of a bit?
A. TB>MB>GB>KB A. An electrical signal in a wire
B. MB>GB>TB>KB B. A physical signal that becomes a digi-
C. TB>GB>MB>KB tal signal
D. GB>MB>KB>TB C. A measure of computer graphics and
sound
60. which one is volatile memory D. A single 1 or 0 in a digital signal
A. kindergarten memory
66. I perform arithmetic operations and com-
B. primary memory parison operations
C. secondary memory A. The control unit
D. none of above B. The CPU
C. The ROM
61. HDD stands for
D. The ALU
A. hard disk drive
B. hard drive disk 67. Which memory is a volatile memory?
A. RAM
C. hard disk
B. ROM
D. none of above
C. None of these
62. Identify a RAM that stores data us- D. none of above
ing magnetic charges instead of electrical
charges. 68. WHAT 2 NUMBERS ARE BITS PRESENTED
BY?
A. SRAM
A. 1 and 2
B. DRAM
B. 10 and 1
C. MRAM
C. 1 and 0
D. none of above
D. 0 and 2
63. the two kind of main memory are 69. Gigabyte is
A. primary and secondary A. 1000 Megabyte
B. floppy disk and hard disk B. 1000 Gigabyte
C. direct and sequential C. 1000 Kilobyte
D. non of the these D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 272

70. Which storage device is NOT flash mem- 76. The following is a correct order of units of
ory? storage from lowest to highest:
A. RAM A. a bit, a nibble, a byte, a kilobyte, a
megabyte, a gigabyte, a terabyte
B. Micro SD
B. a bit, a byte, a nibble, a kilobyte, a
C. BIOS megabyte, a gigabyte, a terabyte
D. SD Card C. a bit, a nibble, a byte, a megabyte, a
kilobyte, a gigabyte, a terabyte

NARAYAN CHANGDER
71. Full form of CD-RW
D. a byte, a bit, a nibble, a megabyte, a
A. Compact Disc-Readable kilobyte, a gigabyte, a terabyte
B. Compact Disc-Recordable 77. USB stand for Serial Bus
C. Compact Disc Rewriteable A. Union
D. none of above B. Universal

72. Select all the units bigger than a byte. C. Unit


D. Under
A. Bit
B. Nibble 78. There’s somebody walking behind us. I
think .
C. KiloByte
A. we are following
D. MegaByte
B. we are being followed
73. Identify a RAM contains chips do not have C. we are followed
to be reenergized D. we are being following
A. SRAM 79. The part of computer which helps to store
B. DRAM information
C. MRAM A. Speed
D. none of above B. Accuracy
C. Memory
74. Which one is secondary storage? (2-3)
D. Arithemetic
A. ROM
80. Mr. Ali sends some money to the children
B. Hard Disk every month.The right passive voice of the
C. RAM sentence is
D. BIOS A. Some money is sends to the children
by Mr. Ali every month.
75. WHAT IS SHORT FOR BINARY DIGIT? B. Some money is sent to the children by
A. BITE Mr. Ali every month.
C. Some money sent to the children by Mr.
B. BINDIT
Ali every month.
C. BIT
D. Some money are sent to the children
D. BIZZLE by Mr. Ali every month.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 273

81. RAM-What happens when the electricity B. Gigabyte


Is turned off? (1-2)
C. Megabyte

PRACTICE BOOK» NOT FOR SALE


A. The data from the memory is saved
D. Kilobyte
onto the hard disk
B. The data from the memory is saved 87. What internal memory is called?
onto ROM
A. Primary memory
C. The data from the memory is saved
B. Secondry memory
onto flash memory
D. The data from the memory is not saved C. Non of them
D. none of above
82. Primary memory devices are
A. CD & DVD 88. The two kinds of main memory are
B. HARD DISK & PEN DRIVE A. Primary & Secondary
C. RAM & ROM B. ROM and RAM
D. NONE OF THE ABOVE C. All of above
83. Today, many serious childhood diseases D. none of above
by early immunization.
89. Which of the following statements are
A. are preventing true about Internal memory?
B. can prevent
A. Internal memory is built-in memory
C. prevent
B. When the computer is switched off, the
D. can be prevented data stored in Internal memory is erased
84. how is the size of RAM normally measured C. Data stored in Internal memory is easy
nowadays to access
A. in KB D. Data stored in Internal memory can be
B. in GB accessed fast

C. in MB 90. The is used to store all the instructions


D. with a measuring tape given by the user.
A. computer’s memory
85. Which one of these facts are false?
A. RAM can’t store permanent data B. storage room

B. ROM is memory that cannot be C. network card


changed by a program or user. D. touch screen
C. ROM is embedded, can’t be removed.
91. which is more expensive
D. If a computer loses power, all the data
is saved onto the RAM A. RAM
B. ROM
86. Which of the following is the largest mem-
ory size? C. BOTH
A. Terabyte D. NON

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 274

92. The intersections where the latches are lo- 98. HOW MANY BITS ARE IN A CRUMB?
cated are called a
A. 1
A. location
B. 2
B. matrix location
C. 3
C. memory address
D. 10
D. latch address
99. CD stands for Disk

NARAYAN CHANGDER
93. The network card is also known as
A. Continuous
A. sound card
B. Cotton
B. video card
C. Compact
C. ethernet card
D. Complete
D. none of above
100. Eight Bits make up a
94. what is HDD
A. byte
A. a metal disk which data for a computer
can be stored B. megabyte
B. removable storage device C. kilobyte
C. hard drive D. None
D. none of above 101. What is the fastest data storage in a com-
puter (6-9)
95. What is the full form of GB?
A. Registers
A. Gate Byte
B. Giga Byte B. RAM

C. Giga Bit C. ROM

D. none of above D. HDD

96. The primitive turns the head of the tur- 102. What is the full form of ALU?
tle towards the left side. A. Arithmetic Long Unit
A. PU B. Arithmetic and Logical Unit
B. LT C. None of these
C. PD D. none of above
D. RT
103. Full form of PROM is
97. What is the Full Form of RAM? A. Programmable Read Only Memory
A. Read Only Memory B. Erasable Programmable Read Only
B. Resume Access Memory Memory
C. Random Access Memory C. Read Only Memory
D. None of these D. Random Access Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 275

104. What is the difference between SRAM 109. A half byte is known as
and DRAM? A. data

PRACTICE BOOK» NOT FOR SALE


A. DRAM is physically bigger B. bit
B. DRAM needs its data to be refreshed C. half byte
otherwise it loses it
D. nibble
C. DRAM is faster
E. None of these
D. SRAM needs its data to be refreshed
otherwise it loses it 110. RAM or volatile memory stores informa-
tion .
105. Internal memory that stores the currently A. only when you ask it to
running programs in a computer.
B. when needed
A. RAM
C. only while the power is on
B. USB D. forever
C. ROM
111. Arrange the following in ascending or-
D. none of above der1KB 1PB 1GB 1TB 1ZB 1MB

106. Salma has a folder containing 0.25 ter- A. 1KB<1MB<1GB<1TB<1PB<1ZB


abyte of data . How many GigaByte is B. 1KB<1MB<1GB<1PB<1zB<1TB
that C. 1KB<1MB<1PB<1MB<1ZB<1GB
A. 250 Gigabyte D. 1GB<1KB<1MB<1PB<1TB<1ZB
B. 2.5 Megabyte
112. An OUTPUT device can
C. 25 Megabyte
A. can send data
D. none of above
B. can receive data
107. A kilobyte (kB) is bytes or 210 bytes C. can send and receive data
A. 1, 008 D. none of above

B. 1, 000 113. Whole-grain food products in most


C. 1, 024 large supermarkets across the United
States and Canada.
D. 1, 224
A. now can purchase
108. What is Volatile? B. can now be purchased
A. Loss of data when the computer is C. now to purchase
switched off. D. the purchase of which
B. Substances that will evaporate in room
114. what does a blu-Ray disk do?
temperature.
A. Shiny Circular Disk, Optical storage de-
C. Something to do with electricity.
vice, used to store high quality sound,
D. Liable to display rapid changes of emo- games and movies. Stores 5 times more
tion. than a DVD.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 276

B. Shiny circular disk, optical storage de- 120. SDD stands for
vice, can hold text, graphics, images, A. solid state drive
videos.
B. solid liquid gas
C. Storage medium for portable devices
like mobiles and digital cameras. C. state drive

D. Shiny circular disk, Optical storage de- D. non


vice, stores data and movies with high 121. features of RAM
video and sound quality. Stores 6 times

NARAYAN CHANGDER
A. faster
more than CD.
B. expensive
115. A / An is a blank ROM chip which al-
C. long life
lows programmer to write permanently
D. non
A. PROM
B. EPROM 122. What is the full form of CPU?
C. EEPROM A. Control Process Unit
D. none of above B. Central Processing Unit
C. Control Processing Unit
116. A group of 8 bits is called a
D. none of above
A. bit
B. byte 123. There are two types of computer memory

C. Gigabyte A. Primary Memory

D. Megabyte B. Bytes
C. KM
117. The memory which is inside the computer
D. Secondary Memory
A. External memory
124. What is the definition of memory?
B. Internal Memory
A. Electronic components that store in-
C. Paternal Memory
structions waiting to be executed by the
D. none of above central process unit
118. The lowest measurement of data? B. Electronic components that store in-
structions waiting to be executed by the
A. Megabyte
processor
B. Gigabyte
C. Electronic components that store in-
C. Nibble structions waiting to be executed by the
D. Byte motherboard
D. none of above
119. Select the device with smallest storage
capacity. 125. External memory are of types
A. CD-RW A. 4
B. DVD B. 2
C. Pen Drive C. 3
D. Floppy Disk D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 277

126. What is the largest measurement used to C. Capacitive technology


measure a computer memory?
D. none of above

PRACTICE BOOK» NOT FOR SALE


A. Zettabyte
B. Bytes 132. the BIOS is

C. Brontobyte A. black ink on screen


D. Yottabyte B. basic input output system

127. What is the CPU process? C. beginning input output system

A. Fetch-Decode-Execute D. big input output system


B. FDE 133. In , the touch screen device uses ultra-
C. FED sonic waves to process information. The
D. Decode-Fetch-Execute change in the waves is registered and in-
formation is sent to the controller. A sur-
128. An INPUT device can face wave touch screen can be easily af-
A. send data to another device, but it can fected by foreign elements like dust and
not receive data water.

B. receive data from another device, but A. surface wave technology


can not send data B. resistive technology
C. can send and receive data C. capacitive technology
D. none of above D. none of above
129. How does data/instructions move be-
tween the CPU and RAM? 134. WHAT READS A DVD?

A. Address Bus A. MAGNETS


B. Address and Data Buses B. LASERS
C. ROM C. HUMAN
D. none of above D. BOOK
130. I still can not believe it. My bicycle 135. What is example of secondary memory?
some minutes ago.
A. RAM
A. was stolen
B. ROM
B. was stealing
C. Hard disk
C. stolen
D. stole D. none of above

131. In , the touch screen device is layered 136. Another name for Primary memory
with ametallic electric conductor in order A. Internal Memory
to provide resistance to change in electric
current. B. Bytes
A. Resistive technology C. Bits
B. Surface wave technology D. Binary

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 278

137. RAM is also called 143. Bits stand for


A. Temporary Memory A. Binary Digits
B. Permanent Memory B. Binary Data
C. No correct answer C. Bi Data
D. none of above D. Biz Digits

138. What is the Full Form of CD-RW? 144. . “What a beautiful shirt you’re wear-

NARAYAN CHANGDER
ing!” “Thank you. It especially for me
A. Compact Disc-Read & Write by my mother.”
B. Control Disc-Rewritable A. is made
C. Compact Disc-Rewritable B. has made
D. Compact Disc-Record & Write C. made
139. Smallest measuring unit is D. was made
A. Megabyte 145. is the storage medium for portables
B. Kilobyte devices like digital cameras, mobiles.
C. Byte A. Flash drive

D. none of above B. CD
C. Memory card
140. WHAT STORES PHOTOS AND VIDEOS ON
A CAMERA? D. Hard disk

A. USB 146. Primary memory are of 2 types


B. DVD DISK A. RAM
C. SD CARD B. CD
D. LENS C. ROM
D. DVD
141. A computer is continuously paging to the
swap file. Discuss why this might be (5-8) 147. Kilobyte is
A. The hard disk is too slow A. 1028 bytes
B. There is not enough RAM B. 1000 bytes
C. The cache is too slow C. 1024 bytes
D. The virtual memory is too small D. 1025 bytes

142. Memory is divided into two types: 148. WHAT TYPE OF STORAGE IS A USB?
A. Internal memory A. MAGNETIC
B. Inside memory B. OPTICAL
C. External memory C. SOLIDE STATE
D. Outside memory D. SOLID STATE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 279

149. Approximate storage capacity of Blu-ray C. Exists as a chip on the motherboard


disc D. none of above

PRACTICE BOOK» NOT FOR SALE


A. 25 MB-1 TB
155. A combination of eight bits is called
B. 25 GB-50 GB
A. Kilobytes
C. 650-700 MB
B. Gigabytes
D. 4.7 GB-17 GB
C. Bytes
150. A is an expansioncard used in comput- D. Terabytes
ers to physically connect the device to a
network connection. 156. features for ROM

A. Network card A. it is not volatile


B. always retains its data
B. Sound card
C. used in embedded systems
C. Video card
D. used in calculators and peripheral de-
D. none of above
vices
151. Which statement is true? (1-3) 157. The highest measurement of data?
A. ROM contains the operating system A. Megabyte
B. RAM is part of the hard disk B. Gigabyte
C. RAM stores programs / data used by C. Kilobyte
the CPU
D. Petabyte
D. ROM is volatile
158. Choose the result of the following
152. The ‘Father’ of the hard disk drive code:Print [PA Revision ]
A. Rey Johnson A. Periodic
B. Kim Johnson B. PA Revision
C. Charles babbage C. Revision
D. Johnson D. PA

153. Binary langauge consists of and 159. I store the operating system of the com-
puter
A. Ones and Twos
A. ROM
B. Zeros and Twos
B. RAM
C. Ones and Tens
C. USB Drive
D. Zeros and Ones
D. DVD Drive
154. Which of the following is NOT TRUE
160. Terabyte is
about non-volatile memory?
A. 1000 Gigabyte
A. Data on most ROM chips cannot be
modified B. 1000 Megabyte
B. ROM is a memory chip that stores tem- C. 1000 TKilling
porary data D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 280

161. A gaming computer is “thrashing” the 167. Computer memory is divided into two
disk. Why? (5-7) parts
A. The processor is short of RAM A. Primary and Secondary Memory
B. The game uses high resolution graph- B. zero and one
ics C. Upper and Lower Memory
C. The screen uses too many colours D. CPU and Hard disk
D. The game takes up too much space 168. where does the processor exist

NARAYAN CHANGDER
162. Multiplexers are used to determine A. computer
A. which column to write to B. sensors
B. which row and column to write to C. desktop
C. which row to write to D. none of above
D. the memory address 169. You can write data more than once to this
device (1-3)
163. A popular storage device that is small in
A. DVD+R
size, scratch resistant and can be easily
carried from place to place. B. CD ROM
A. DVD C. ROM
B. Hard disk D. RAM
C. CD 170. Order these units of data storage in order
D. Flash drive from smallest to greatest.
A. bit, byte, gigabyte, megabyte, kilobyte,
164. A single character takes up of memory yottabyte, zettabyte
A. Bit B. bit, nibble, byte, megabyte, exabyte,
B. Byte terabyte
C. Giga Byte C. bit, nibble, byte, kilobyte, megabyte, gi-
gabyte, terabyte
D. none of above
D. none of above
165. A is a single dot on the computer
screen. 171. What are types of Primary memory?
A. Only RAM
A. Pixel
B. CD
B. card
C. Only ROM
C. laser beam
D. RAM & ROM
D. none of above
172. You can write data more than once to this
166. It is popularly known as Pendrive device
A. Flash Drive A. CD ROM
B. Memory Card B. RAM
C. Blu-ray disk C. ROM
D. CD D. DVD+R

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 281

173. What happens to RAM when the electric- C. input


ity is turned off? D. output

PRACTICE BOOK» NOT FOR SALE


A. The data from the memory is not saved
179. Data/Instruction stored in this internal
B. The data from memory is saved onto memory can only be read.
flash memory
A. DVD
C. The data from the memory is saved
B. ROM
onto the hard disk
C. RAM
D. The data from the memory is saved
onto ROM D. none of above

174. Computer stores information in 180. all of the following are non-volatile mem-
ory except
A. Byte
A. ROM
B. Decimal
B. PROM
C. can not store information
C. flash memory
D. none of above
D. RAM
175. Binary bits are typically in groups of 8.8 181. Full form of RAM
bits makes a
A. Read Only Memory
A. byte
B. Random Access Memory
B. bite
C. Record Only Memory
C. mouthful
D. Rewrite Only Memory
D. big number
182. is not a secondary storage device.
176. The act of getting data out of memory is A. DVD
called
B. ROM
A. reading
C. Flash Drive
B. retrieving
D. Memory Card
C. getting
183. Persistent memory stores information
D. opening
.
177. Which storage device is not flash mem- A. only when you ask it to
ory? (2-3) B. when needed
A. RAM C. forever
B. Micro SD D. while the power is off
C. BIOS
184. ROM is used for storing a special soft-
D. SD Card ware called
178. which contents are lost when the com- A. BIOS
puter turns off? B. EXCEL
A. memory C. WORD
B. storage D. PAINT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 282

185. The AND-OR Latch (select all that ap- 191. WHAT CONTAINS THE BOOTSTRAP
ply) LOADER?
A. has two inputs, set and reset A. RAM
B. outputs the stored value B. SD CARD
C. is basis for all memory C. ROM
D. stores a 0 or a 1 D. RIM

NARAYAN CHANGDER
186. A computer uses for storing data and 192. A storage device that is circular in shape
instructions. and can hold upto 700 MB of data.
A. Memory A. Blu Ray Disk
B. Keyboard
B. CD
C. Printer
C. DVD
D. Speaker
D. none of above
187. How much of a computers processing is
carried out by the CPU? 193. How many bytes are in a Gigabyte?

A. Some A. 100000000
B. most B. 10000
C. All C. 1000000000
D. none D. 10000000

188. which one is the secondary memory de- 194. full form of IPO cycle
vice
A. input-process-output
A. floppy disk
B. inside-product-outside
B. CPU
C. input-process-outside
C. mouse
D. none of above
D. ALU
195. memory is measured in
189. What is the full form of RAM
A. bits and bytes
A. Random Access Memory
B. liters
B. Read Access Memory
C. Read Automatic Memory C. kilograms

D. none of above D. none of above

190. Who invented Hard disk? 196. Example of volatile memory is


A. Charles Babbage A. Read Only Memory
B. Christopher Latham Sholes B. Random Access Memory
C. Reynold B. Johnson C. Random Only Memory
D. none of above D. Read Access Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.5 Computer Memory 283

197. what is the term for firmware C. the work that you save your document
A. a type of software that controls the D. the instructions needed to start up the

PRACTICE BOOK» NOT FOR SALE


computer computer including the bios
B. a type of software that controls a hard-
ware device 202. Four bits is called a
C. a type of device A. Bit
D. no correct answer B. Byte
198. It is a small in size, lightweight, remov- C. Nibble
able and re-writeable and It is used for D. none of above
copying and moving data from one com-
puter to another 203. flash drive used especially in digital cam-
A. Memory card eras and mobile phones
B. Pen drive A. Pen drive
C. All of the above B. CD
D. None of the above C. Memory card
199. what are the two types of internal mem- D. DVD
ory and which one is volatile and which
one is not? 204. WHICH ONE IS VOLATILE?
A. RAM and REM. REM is volatile and RAM A. ROM
is not volatile
B. USB
B. RIM and ROM. RIM is not volatile and
ROM s volatile C. SD CARD
C. RAM and ROM. RAM is not volatile and D. RAM
ROM is volatile
D. RAM and ROM. RAM is volatile and 205. This is volatile storage (1-3)
ROM is not volatile A. RAM
200. Which of the following is not the charac- B. Secondary Storage
teristics of RAM? C. ROM
A. RAM is read/write memory
D. Hard Disk
B. RAM holds data and instruction on
which we are currently working 206. is a display screen that reacts to the
C. RAM is Non-Volatile i.e, Permanent touch of a finger as it is sensitive to pres-
sure.
D. The amount of RAM in computer af-
fects the number of programs a computer A. Touch screen
can run at the same time. B. screen
201. ROM stores C. keyboard
A. the operating system D. mouse is a display screen that reacts
B. programs currently in use to the touch of a finger

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 284

207. WHAT TYPE OF STORAGE IS A BLU-RAY? C. The data from the memory is not saved
A. OPTICALE D. The data from the memory is saved
B. OPTICAL onto ROM
C. OPICAL 210. how many types of processors are there
D. OPTICA7 A. 5
208. is volatile or erasable memory. It B. 6
means that the data storedon RAM is tem-

NARAYAN CHANGDER
C. 3
porary, and it gets deleted when the com-
D. 4
puter isturned off or if the electricity sup-
ply is interrupted. 211. what is the full form of a DVD
A. ROM A. digital verse disk
B. RAM B. digital versa disk
C. DVD C. digital venrtrole disk
D. CD D. digital versatile disk
209. RAM-What happens when electricity is 212. Where does virtual memory live? (2-3)
turned off?
A. Cache
A. The data from the memory is saved
onto flash memory B. ROM

B. The date from the memory onto the C. RAM


hard disk D. Hard Disk

4.6 Motherboards and Expansion Cards


1. Pick the slots found in the motherboard. C. Bungie and Ubisoft
A. ATM slot D. Blizzard and Activision
B. Adapter card slot
4. Eddie was amazed at all of the options
C. Memory slot
available concerning the CPU selection for
D. Hard drive slot his new PC. Which of the following state-
ments is true concerning the CPU?
2. What does PCI stand for?
A. Peripheral Component Internet A. CPU’S are interchangeable on a moth-
erboard
B. Peripheral Component Interconnected
C. Peripheral Connecting Inter B. CPU’s only interact with the DIMM and
PCI slots on a motherboard
D. none of above
C. CPU’s must match up with the socket
3. What are the two major manufacturers of type on a motherboard
processors?
D. CPU’s within the Pentium 2 family of
A. Microsoft and Apple processors use socket 7 on the mother-
B. Intel and AMD board for installation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 285

5. The connection on a motherboard for hold- 10. RAM Chips are plugged into these slots.
ing the CPU is called the A. PCI Slots

PRACTICE BOOK» NOT FOR SALE


A. Sink B. Processor Slots
B. Socket C. Adapter Card Slot
C. Chipset D. Memory Slot
D. Plug
11. The system generates regular elec-
6. A support technician is working on a moth- tronic pulses that set the operating pace
erboard that is 12” x 9.6” and has seven of the system unit.
expansion slots. Which form factor is the A. processor
technician working with?
B. control
A. ATX
C. clock
B. mATX
D. cache
C. SFF
12. Controls high speed access to the RAM and
D. Mini-ITX
video card. It also controls the speed at
7. A support technician manages mostly dig- which the CPU communicates with all of
ital displays but has some older comput- the other components in the computer.
ers with video cards that can support both A. RAM modules
analog and digital monitors. What type
B. I/O connectors
of video card do these older computers
have? C. Northbridge
A. HDMI D. Expansion slots
B. DVI 13. What are expansion slots?
C. VGA A. used to house the computer’s memory
D. Display port modules
B. the electronic circuitry within a com-
8. Why does your motherboard need a bat- puter that carries out the instructions of a
tery? computer program by performing the ba-
A. to keep the computer in standby mode sic arithmetic, logic, controlling, and in-
B. to keep the system clock running put/output operations specified by the in-
structions
C. to power the North/South bridge
C. provide connectivity for the storage
D. As emergency backup power devices and optical drives.
9. A component on the motherboard is called D. a place in a computer where an expan-
an embedded or component. sion card can be inserted.
A. Hard wired 14. One of the users in your company notices
B. On-Board some strange behavior on his computer.
After describing what is being seen, you
C. Included do a little research and determine that the
D. Functioning best course of action is to update the UEFI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 286

firmware.Before performing the upgrade, A. Edit the BIOS to allow quad-core CPUs.
if possible, which of the following is the B. Read the motherboard documentation
BEST action to take? to identify which processors are sup-
A. Password protect the system. ported.
B. Upgrade the processor. C. Configure jumpers on the mother-
board to allow four CPU cores.
C. Connect the computer to a UPS.
D. Install the processor.
D. Change the motherboard bat-

NARAYAN CHANGDER
tery.Explanation E. Replace the VRM.

15. What is a motherboard? 19. What is the function of the memory slot?

A. A motherboard is the primary compo- A. To hold the RAM


nent of a computer that processes instruc- B. To hold the ROM
tions. C. To hold the CPU
B. A printed circuit board containing the D. To hold the ALU
principal components of a computer or
other device, with connectors into which 20. When Jane proudly displayed her new
other circuit boards can be slotted. motherboard, the senior tech scratched his
beard and asked, “What kind of ICH does
C. The processing unit
it have? ” What could he possibly be ask-
D. Where the memories are transferred ing about?
16. What is an electronic device that manipu- A. The PCI slot
lates information, or data? B. The PCIe slot
A. computer C. The Northbridge
B. typewriter D. The Southbridge
C. mouse 21. Which motherboard form factor was de-
D. printer signed to fit into legacy cases, and
takes up less space with fewer expansion
17. PCI uses a 32 bit or 64 bit parallel bus, slots?
uses a serial bus, which is faster than A. ATX
ta parallel bus because it transmits data in
packets. B. BTX

A. PCIe C. microATX

B. AGP D. NLX

C. ISA 22. A support technician is installing a PCIe


card that will use a combination of system
D. PCI-X
memory and dedicated memory. What
18. You have a computer system with a dual- type of card is the tech installing?
core processor. You would like to upgrade A. Graphics
to a quad-core processor, but you don’t B. Sounds
want to replace the motherboard.Which of
the following steps SHOULD you perform C. NIC
first? D. Wi-FI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 287

23. It refers to the parts of motherboard that you take to begin troubleshooting the is-
hold the processor or CPU Chip sue? (Select TWO).

PRACTICE BOOK» NOT FOR SALE


A. ATX Power supply A. Replace the power supply.
B. RAM Slot B. Remove any unnecessary components
C. Processor Socket and run the system.

D. SATA Connector C. Check the CPU fan power.


D. Check the thermal shutdown threshold
24. What is the function of a CPU slots? in the BIOS.
A. To house the USB port E. Check the power supply voltage
B. To house the processor switch.
C. To house the sound card 28. Which of the following is a standard num-
D. To house the memory cars ber of pins on a motherboards ATX Power
connection?
25. Intel and AMD have integrated which of
the following into their Atom and APU pro- A. 24
cessor lines that had not been integrated B. 18
before?
C. 6
A. A GPU
D. 32
B. A math coprocessor
29. How many individual one directional lanes
C. The frontside bus
connect a PCIex16 slot?
D. The memory controller
A. 8
26. o fix a problem you are having with your B. 16
PC, you have determined that you must
C. 24
flash the computer’s BIOS.Which of the fol-
lowing would MOST likely need to be com- D. 32
pleted prior to flashing the BIOS? (Select
30. This part of the chipset controls communi-
TWO).
cation between all the peripheral connec-
A. Properly identify the motherboard. tions, expansion ports, and plugs, and the
B. Download the flash utility or tool from other part of the chipset.
the manufacturer’s website. A. CMOS
C. Create a backup of the hard disk in the B. BIOS
event of a failure.
C. Southbridge
D. Test the memory to ensure that it is
functioning properly. D. Northbridge

E. Locate the flash utility or tool that was 31. A support technician is installing a new
shipped with your PC. hard drive on a computer. What type of
cable connector will the technician plug in
27. You have just finished upgrading the CPU to supply power to the drive?
in your desktop system. After running
for about 15 minutes, the system spon- A. 15 pin connector
taneously shuts down.Which steps should B. 7 pin connector

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 288

C. 4 pin connector C. They accommodate proper cooling of


D. USB connector the motherboard
D. They limit the throughput from the PCI
32. A support technician is connecting an ex-
bus
tended integrated drive electronics (IDE)
cable to a PC’s motherboard and knows 37. Which packaging is used for DDR SDRAM
that pin 1 on the cable must match up with memory?
pin 1 on the port. How can the tech know
where pin 1 is on the cable? A. 168-pin DIMM

NARAYAN CHANGDER
A. Pin 1 has a blue strip B. 72-pin SIMM
B. Pin 1 has a black stripe C. 184-pin DIMM
C. Pin 1 has a red stripe D. 240-pin DIMM
D. Pin 1 has a grey strip
38. Your Core i5 fan has a four-pin connector,
33. How much do motherboards cost? but your motherboard only has a single
A. $250 to $500 three pin header with the CPU FAN la-
bel. Which of the following will be the eas-
B. $100 to $200
iest solution to get the necessary cooling
C. $500 to $1000 for your CPU?
D. none of above A. Plug the four-pin connector into the
three-pin header.
34. Embedded components are almost always
configured through B. Buy an adapter.
A. The Task Bar C. Leave the plug disconnected and just
B. The Start Menu use the heat sink.
C. The Control Panel D. Add an extra chassis fan.
D. CMOS Setup
39. A computer is processing software instruc-
35. The primary ATX power connection on a tions on the central processing unit. How
motherboard is either is all computer software broken down to
be processed?
A. 20 or 24 pin
B. 4 or 8 pin A. Bus

C. 16 or 20 pin B. Binary
D. 18 or 24 pin C. RAM

36. You are installing a PCI card into a desktop D. System clock All computer software
computer, and you notice that there are works by running instructions in the cen-
small spacers inside of the PCI slot. What tral processing unit (CPU) and computers
function do these spacers provide? process all the software and data as the
ones and zeroes of binary code. A com-
A. They keep the PCI adapters at equal puter is processing software instructions
distances from each other on the central processing unit. How is
B. They ensure proper voltage to the all computer software broken down to be
adapter card processed?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 289

40. You find out that a disgruntled ex- A. northbridge


employee’s computer has a boot password B. southbridge
that must be entered before the operat-

PRACTICE BOOK» NOT FOR SALE


ing system is ever loaded. There is also C. i/o connectors
a password preventing your access to the D. cpu
BIOS utility. Which of the following moth-
45. Attached to the surface of the processor
erboard components can most likely be
packaging to cool the CPU
used to return the computer to a state that
will allow you to boot the system without A. Cycles per second
knowing the password? B. Multi-Core Processor
A. Cable header C. Hertz
B. Power supply connector D. Heatsink
C. Expansion slot 46. Which socket type is required for an AMD
D. Jumper Phenom II that uses DDR3 RAM?
A. AM2
41. Which bus architecture is most often seen
in today’s high-speed video adapters? B. AM2+
C. AM3
A. ISA Express
D. Socket 940
B. PCI
C. AGP 47. A support technician has removed the case
from a PC and sees a component in a
D. PCI Express square socket. What component has the
42. Which of the following socket types is re- support tech located?
quired for the Intel Core i7-9xx desktop A. RAM
series? B. Adapter
A. LGA 1366 C. CPU
B. LGA 1156 D. Drive
C. LGA 1155 48. This ports is located in the back panel of
D. LGA 775 the microprocessor that is used to conjoin
the outside hardware or computer devices.
43. Which of these motherboard types is
A. USB Port
best suited for small form-factor and low-
power functions? B. DVI Port
A. Mobile-ITX C. VGA
B. NLX D. I/O Port

C. ATX 49. Which of these send traffic across serial


“lanes” on a computer bus?
D. microATX
A. PCIe
44. Allows the CPU to communicate with B. PCI
slower speed devices including hard drives,
Universal Serial Bus (USB) ports, and ex- C. PCI-X
pansion slots. D. Mini-PCI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 290

50. How does clock speed affect computer per- 55. Which of the following BEST describes the
formance? chipset?
A. The higher the clock speed the slower A. Designed to be compatible with a spe-
the computer will run. cific type of memory module.
B. It improves the amount you can store B. Facilitates communication between
on the computer. the processor, memory, and peripheral
devices.
C. The higher the clock speed the better

NARAYAN CHANGDER
the performance. C. Allows you to expand the capabilities
of your computer by installing expansion
D. It will make loading program slower
cards.
51. Which of the following is an attached com- D. Connections to the motherboard’s
ponent of a motherboard? front panel connectors, which are also
called headers.
A. Processor
B. ROM 56. The PCI Express bus currently comes in
how many different slot sizes?
C. Sound Card
A. 1
D. Memory Slot
B. 2
52. What are the functions of motherboard? C. 3
A. Connects all the devices and compo- D. 4
nents attached.
57. Capable of executing multiple pieces of
B. Prints the graphics
codes simultaneously
C. Provides connectors for other periph-
A. Data Transfer
erals.
B. Multiplexer
D. Saves the data into permanent stor-
age. C. Hyperthreading
D. CPU
53. It is the part of the mother board that
holds the computer Memory or RAM. 58. A support technician opened a PC case
and observed a small computer system in-
A. ATX Power connector
terface (SCSI) connector plugged into the
B. Memory Slot motherboard. What can the technician
C. Hard Disk Drive know to be true about the connector?

D. PCI A. It connects the hard disk


B. Its using serial communication
54. The brain and heart of the computer where
C. it transfers data 1 bit at a time
most calculations take place.
D. It only support 1 device at a time
A. System Unit
B. Motherboard 59. What is the name for the routine that
tests the motherboard, memory, disk con-
C. Central Processing Unit (CPU)
trollers, video, keyboard and other system
D. Memory Slot hardware?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 291

A. CMOS C. the connector on the motherboard that


B. BIOS houses a CPU and forms the electrical in-
terface and contact with the CPU.

PRACTICE BOOK» NOT FOR SALE


C. POST
D. a hardware component that supplies
D. CSST power to an electrical device.
60. It is a technique used to enable a processor 64. The O in ROM stands for
to perform at a faster pace than its original
A. One
specification, but it can damage the CPU.
B. Open
A. Overtiming
C. Only
B. Maximizing
D. Often
C. Overclocking
D. Extension 65. You have just purchased a motherboard
that has an LGA 775 socket for an Intel
61. Brad has decided to disassemble his com- Pentium 4 processor. What type of mem-
puter system in an attempt to diagnosis a ory module will you need for this mother-
continuing power problem. Which of the board?
following would not be a recommended A. DIMM
procedure for Brad to follow.
B. RIMM
A. Standing on an antistatic mat
C. SIMM
B. Working with a non-magnetized screw-
D. CRIMM
driver
C. Wearing an ESD strap while the com- 66. Of these motherboard types, which one
puter is on has the largest footprint (biggest size)?
D. Working on a bare uncarpeted floor A. Mobile-ITX
B. Mini-ITX
62. A support technician needs to install a
legacy peripheral component interconnect C. ATX
(PCI) sound card. Which of the following D. microATX
statements about PCI is NOT true?
67. A manager directs a support technician
A. PCI Express supersedes PCI to plug a device into the communications
B. PCI uses parallel communications (COM) port. What port is the manager re-
ferring to?
C. The PCI card can fit into the PCIe slot
A. IDE
D. PCI is software compatile with PCIe
B. SCSI
63. What are memory slots? C. USB
A. a printed circuit board containing the D. Serial
principal components of a computer or
other device, with connectors into which 68. The process of upgrading or refreshing the
other circuit boards can be slotted. firmware stored on the ROM BIOS chip is
B. what allows RAM (computer memory) called
to be inserted into the computer. A. Flashing ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 292

B. Renewing The ROM A. Motherboard


C. Renewing The RAM B. Adapter card
D. Flashing RAM C. Hard drive
69. This is the standard motherboard form fac- D. Expansion bus
tor for most gaming machines due to its
room for expansion and RAM. 74. Which of these interface types would you
expect to find in a laptop computer?
A. Mini-ITX

NARAYAN CHANGDER
A. DIMM
B. ATX
B. AGP
C. Micro-ATX
C. PCI-X
D. SCSI
D. Mini PCI
70. our video card slot should be connected to
the chipset, also known as the Mem- 75. When talking about CPU connections, ZIF
ory Controller Hub, because this chipset is stands for
located closer to the CPU which allows for
A. Zero Inert Force
faster throughput of data.
A. North Bridge B. Zero Insertion Face

B. South Bridge C. Zero Inverse Force

C. I/O Controller D. Zero Insertion Force


D. PCIe 76. Which of the following is smaller than a
Mini-ITX form factor?
71. Responsible for the distribution of power
to the different components of the mother- A. Pico-ITX
board. B. Micro-ATX
A. Power Supply Unit C. ATX-E
B. Power Cables
D. ATX
C. Power Pathways
D. Power Receptor Supply Unit 77. This component is the connection between
the motherboard and the processor:
72. To avoid software-based virtualization, A. CPU socket
which two components need to support
hardware based virtualization? B. chipset
A. Memory C. northbridge
B. Hard drive D. ATX
C. CPU 78. The processor is plugged into this socket.
D. BIOS
A. Memory Slots
73. Which computer component contains all of B. Adapter Card Slot
the circuitry necessary for other compo-
C. Processor Slot
nents or devices to communicate with one
another? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 293

79. Which motherboard design style is most 84. A support technician is installing a cam-
widely implemented? era that requires the Universal Serial Bus
(USB) 3.1 standard. What type of connec-

PRACTICE BOOK» NOT FOR SALE


A. ATX
tor must the USB cable have?
B. AT
A. Type A
C. NLX B. Type B
D. Pico-NLX C. Type B Micro
80. Which of the following is most helpful D. Type c
when flashing the BIOS on a desktop com- 85. The Secondary ATX power or the CPU
puter system? power connection on a motherboard is ei-
A. Floppy diskette drive ther
B. Uninterruptible power supply A. 6 or 8 pin
C. An Internet connection B. 4 or 8 pin

D. The Windows administrator password C. 4 or 6 pin


D. 6 or 10 pin
81. Which of the following is NOT one of the
types of cargo carried through the embed- 86. Computers are only able to recognize two
ded wires that make up a bus? states of 0’s and 1’s known as

A. Electrical Power A. bytes


B. the binary system
B. Control Signals
C. code system
C. Thermal Compund
D. cache
D. Data
87. Which of the following is NOT typically on
82. One measure of CPU performance is the a front panel connection?
number of cycles or instructions it can per- A. Power button
form in a second-two examples of this
measurement are B. Video connector
C. HDD activity light
A. gigabytes, megabytes
D. Reset button
B. hyperthreading
C. gigahertz, megahertz 88. You press the front power button on a com-
puter and the system boots. Later, you
D. multicore press it briefly and the system hibernates.
When you press it again, the system re-
83. Which of the following is a socket technol-
sumes. You press and hold the button and
ogy that is designed to ease insertion of
the system shuts down. What is this fea-
modern CPUs?
ture called?
A. Socket 1366 A. Programmable power
B. ZIF B. Soft power
C. LPGA C. Relay power
D. SPGA D. Hot power

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 294

89. Which of these expansion slots has the B. Power supply


fastest transfer rates? C. Processor Slot
A. PCIex8 D. Adapter card
B. PCI-X
95. The A in RAM stands for
C. PCI
A. Accidental
D. PCIex1
B. Always

NARAYAN CHANGDER
90. This term refers to the amount of force C. Access
needed to install a CPU into a socket or
D. Apple
slot:
A. LGA 96. In this CPU architecture, the pins are on
the underside of the processor package:
B. ZIF
A. PGA
C. PGA
B. LGA
D. a lot
C. BGA
91. What to look for when buying a mother- D. ZIF
board?
A. Which one is the cheapest 97. Many older motherboards and expansion
stored setup data using a switch,
B. Make sure the motherboard you chose which has an on and an off position.
is compatible with your current (or new)
processor. A. DIP

C. Which is the coolest looking B. Jumper

D. none of above C. CMOS


D. BIOS
92. Which slot has a metal lever or latch?
98. Which of the following are the numbers of
A. Processor slot
pins that can be found on DIMM modules
B. Adapter card slot used in desktop motherboards? (Choose
C. Memory slot two.)
D. none of above A. 180
B. 184
93. Which factors could affect the performance
of the CPU? C. 200
A. The physical size of the CPU. D. 204
B. The clock speed, number of cores and E. 240
cache size
99. What is cache memory?
C. How heavy the CPU is. A. A very large, temporary memory
D. How many fans the CPU has B. A very small but expensive memory
94. Which of the following is the build-in com- C. It is used to store data and programs
ponent of a motherboard? permanently
A. RAM D. It is a type of payment

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 295

100. If a motherboard fan connection has 4 105. is a temporary storage area of mem-
pins instead of 3, what does that allow? ory that stores the contents of frequently
used data or instructions.

PRACTICE BOOK» NOT FOR SALE


A. temperature monitoring
A. cache
B. fan speed control
B. RAM
C. error reporting
C. read-only memory (ROM)
D. electric fault protection
D. processor
101. When talking about CPU’s the term LGA 106. Motherboard is also known as except
stands for
A. Main Board
A. Laser Grid Array
B. System Board
B. Land Grid Array C. Central Board
C. Laser Graph Array D. MoBo
D. Land Graph Array 107. Which of the following is used to store
data and programs for repeated use? In-
102. is a technique used to make a proces-
formation can be added and deleted at will,
sor work at a faster speed than its original
and it does not lose its data when power
specification.
is removed.
A. overclocking
A. Hard drive
B. throttling B. RAM
C. super clock C. Internal cache memory
D. multicore D. ROM

103. What is the name of the data connection 108. Which of the following is most likely NOT
commonly used for hard drives and optical a symptom that a motherboard or proces-
drives? sor is failing?
A. RAID A. The system begins to boot but then
powers down.
B. ATX
B. The power button on the tower quits
C. RAM working.
D. SATA C. An error message displays during the
boot.
104. A support technician needs to connect the
D. Intermittent Windows or hard drive er-
USB port on a portable monitor to an HDMI
rors occur.
port on a laptop to extend the laptop’s dis-
play. What kind of cable will the techni- 109. What is a processor socket?
cian use to accomplish this? A. a type of computer memory that can be
A. SCSI accessed randomly
B. Adapter B. A processor socket is the connector on
the motherboard that houses a CPU and
C. EIDE
forms the electrical interface and contact
D. DVI with the CPU.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 296

C. fan inside, or attached to, a computer A. towers


case used for active cooling, and may re- B. form factors
fer to fans that draw cooler air into the
case from the outside, expel warm air C. sizes
from inside, or move air across a heat sink D. squares
to cool a particular component.
114. Together the Northbridge and South-
D. a hardware component that supplies bridge are called the?
power to an electrical device
A. Chipset

NARAYAN CHANGDER
110. It is commonly known as a bridge of the B. BIOS
I/O cards of the computer i.e. LAN card,
C. CMOS
WIFI card, USB expansion card and sound
card. D. Bridges
A. IDE Connector 115. The PCI sound card in your computer has
B. PCI Slot stopped working. You decide to use the
motherboard’s integrated sound until you
C. Memory Slot can replace the PCI sound card. After re-
D. SATA Connector moving the PCI sound card and powering
on the computer, you have no sound, and
111. In this CPU architecture, the pins are in the built-in sound card does not show up in
the socket instead of on the processor: Device Manager.To solve this issue, which
A. LGA of the following is the BEST action to try
first?
B. BGA
A. Edit the CMOS settings and enable the
C. PGA
onboard sound.
D. ZIF
B. Enable the sound card in Device Man-
112. You have been using the same computer ager.
for several years. To extend its service C. Update the drivers for the device.
life, you decide to upgrade the proces- D. Update the necessary audio codecs.
sor. You check the motherboard documen-
tation and purchase the fastest processor 116. Select devices that can be attached via
supported by the motherboard. However, the motherboard port.
when you start the computer, it beeps reg- A. Printer
ularly, nothing is displayed on the screen,
and it doesn’t start.While troubleshoot- B. Internal hard disk drive
ing this computer, which of the following C. Mouse
would be BEST to try first? D. Power supply
A. Upgrade the motherboard.
117. Which of the following is not controlled
B. Return the CPU for a new one. by the Northbridge?
C. Press F8 while booting the computer. A. PCIe
D. Update the UEFI firmware. B. SATA
113. Motherboard sizes are called and will C. Cache Memory
effect your choice of other components. D. AGP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 297

118. The I in ITX form factor stands for: B. 3.4 GHz


A. Integrated C. 2.2 GHz

PRACTICE BOOK» NOT FOR SALE


B. Intense D. 2.8 GHz
C. Internal
123. PCIex16 is commonly used for video
D. Intrepid cards now, but this was a previous type
119. Which of the following statements re- of expansion port which held video cards
garding most connectors and ports is NOT for household PC’s in the past.
true? A. AGP
A. They use edge contacts B. PCI-X
B. they use internal connection points C. DVI
C. they use keying
D. Coax
D. they are reversible
124. It is commonly known as the i s a com-
120. This chip is used to help boot the com- puter’s central communications backbone
puter and manage the flow of data be-
tween the hard drive, video card, key- A. I/O ports
board, mouse, and more. In newer PCs B. Processor Zip Socket
is has been upgraded to UEFI and is often
integrated into the motherboard as flash C. USB Port
memory. D. Motherboard
A. RAM
125. What memory chips would you find on a
B. CPU stick of PC3-16000
C. BIOS
A. DDR-2000
D. POST
B. DDR3-2000
121. What are registers used for? C. DDR3-16000
A. To check that students are in school. D. PC3-2000
B. To temporarily hold bits of data
needed by the CPU. 126. A support technician needs to install an
C. To make sure that the CPU runs prop- optical disk drive in a tower. How will the
erly. technician access the drive bay?

D. To make the CPU faster. A. through the side panel


B. Through the front panel
122. Oscar is shopping for a new laptop. He
has narrowed his choices down to four C. Through the rear panel
computers. Each laptop is equipped with D. Through the bottom of the rear panel *
a different central processing unit (CPU). The technician will access the media drive
Oscar wants to make sure he chooses the bay through the front panel. The front
fastest one. Which of the following pro- panel also provides access to a power
cessors would perform the fastest? on/off switch, and light-emitting diodes
A. 1.3 GHz (LEDs) to indicate drive operation.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 298

127. Which one is not other names for the date is set back to January 1, 1990.Which
motherboard? of the following is the MOST likely cause
A. main board of this anomaly?

B. system board A. The CMOS chip on the motherboard is


loose.
C. logic board
B. The CMOS battery has failed.
D. hardware board
C. The CMOS chip is failing.

NARAYAN CHANGDER
128. Where all your files are permanently D. The CMOS settings are not being saved
stored. before powering off the computer.
A. Hard Drive
133. This part joins the USB port of the front
B. CD Drive panel
C. Floppy Drive A. USB Connector
D. RAM B. USB Hub
129. The notches on an expansion slot are of- C. USB port
ten physical indicators of: D. USB panel
A. The possible power requirements of 134. The PCI Express bus architecture sounds
that card similar to the PCI bus architecture. What
B. The possible transfer speeds of that is the primary architectural difference be-
card tween PCI and PCI Express?
C. The upgrade potential of that card A. PCI provides for higher throughput
D. The expected heat output of that card than PCI Express
B. PCI is a parallel bus architecture and
130. What type of expansion slot is pre- PCI Express is a serial bus architecture
ferred today for high-performance graph-
ics adapters? C. PCI has more communication lanes
than PCI Express
A. AGP
D. PCI is a newer specification than PCI
B. PCIe Express
C. PCI
135. A device issues a , which is a command
D. ISA to the processor to wait for slower devices
to catch up.
131. A bus that does NOT run in sync with the
system clock is called a(n) bus. A. Wait State
A. Synchronized B. Pause Command
B. Expansion C. Stop Commansd
C. Data D. Synchronized command
D. Memory 136. PCIe communicates over this type of bus
architecture.
132. An employee complains that every time
they turn their computer off, the com- A. Serial
puter’s time is set to 12:00 p.m., and the B. Express

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 299

C. Parallel A. It was an HDMI cable


D. Not this one B. It was a display port cable

PRACTICE BOOK» NOT FOR SALE


137. The chipset is made up of two compo- C. It was a lightning cable
nents. What are they? D. It was a thunderbolt cable
A. cpu and ram 142. Solon has a very buggy computer that
B. network interface card and graphics keeps locking up at odd moments and re-
card booting spontaneously. He suspects the
C. northbridge and southbridge motherboard. How should he test it?

D. HDMI and USB A. Check settings and verify good compo-


nents.
138. Function of expansion card slots are to B. Verify good components and document
hold all testing.
A. Sound card C. Replace the motherboard first to see if
B. Graphic card the problems disappear.
C. Network card D. Check settings, verify good compo-
D. All of the option nents, replace components, and docu-
ment all testing.
139. Most CPU sockets and processors in use
today are built around the PGA. What 143. In computer architecture, a bus is:
does PGA means? A. the delay before the transfer of data
A. Pin Grid Array begins following the instructions for the
transfer to happen
B. Pin Grind Architecture
B. a measurement of the transmission ca-
C. Panel Grid Architecture pacity of a network or system
D. Panel Graded Architecture C. a communication system that trans-
fers data between components inside a
140. Power Supply
computer
A. A device that provides power to a com-
D. how external ports like the back panel
puter.
are connected onto the motherboard
B. A device that cools the internal parts of
a computer. Most computers have more 144. What is the combined total speed of a
than one. PCIe 2.0 x16 slot?
C. The case that holds all of the internal A. 500MBps
computer parts. B. 16Gbps
D. The card that plugs into the mother- C. 8GBps
board and runs the monitor(s).
D. 16GBps
141. A support technician plugged a monitor
with a USB C cable connector into a USB 145. helps speed the processes of the com-
C port on the computer, but the monitor puter because it stores frequently used in-
would not function. Why would the moni- structions and data.
tor not work? A. flash memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.6 Motherboards and Expansion Cards 300

B. read-only memory (ROM) C. Network protocol


C. memory cache D. A wireless encryption standard
D. RAM 150. The most common RAM slots on con-
146. There are two types of adapter card slots, sumer motherboards today are
the AGP and PCI. What does AGP stands A. DROM
for? B. DIMM
A. Accelerated Graphics Adapter

NARAYAN CHANGDER
C. SSD
B. Accelerated Graphics Port D. CMOS
C. Peripheral Component Interconnect
151. Which hardware component is responsi-
D. none of above ble for ensuring that a CPU operates at a
regular temperature?
147. is a small amount of memory which
is a part of the CPU-closer to the CPU than A. Heat sink
RAM. B. Power supply
A. Cache C. Hard drive
B. Core D. RAM
C. Intel
152. PCI and PCI-X communicate over this
D. Clock speed type of bus architecture
148. Which motherboard design style features A. Parallel
smaller size and lower power consump- B. Serial
tion?
C. Express
A. ATX
D. Dual
B. AT
153. ZIF refers to the amount of force needed
C. Micro ATX
to install a CPU into the motherboard
D. ITX socket or slot?

149. What is Advanced Technology Ex- A. Zero Inserted Force


tended? B. Zero Insertion Force
A. Hard drive interface C. Zither Initial Fraction
B. Motherboard form factor type D. Zither Ignition Frame

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
5. Computer Software

5.1 Types of Software


1. It is a process that shrinks files so that less A. A large technology company
disk space is occupied. B. A car garage
A. Compression C. A local shop
B. Compiler D. A student
C. Interpreter
5. The application software used to combine
D. none of above text and graphics to design brochures, ad-
2. It is a program that acts as an interface vertisements and books.
between the user and the computer hard- A. Multimedia software
ware and controls the execution of all B. Desktop publishing software
kinds of programs.
C. Word processing software
A. Utility Software
D. Graphics software
B. Device Driver
C. Programming Software 6. Software that is released along with it’s
source code that can be inspected and
D. Operating System edited is called
3. A helps us to create professional look- A. Open Source
ing documents quickly and efficiently. B. Closed Source
A. Multimedia software C. Bespoke
B. Graphic Software D. Proprietary
C. Word Processor
7. description of closed source
D. Presentation software
A. programs whose source code is not
4. Which of these would require custom writ- published so cannot be altered (propri-
ten software? etary software)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 302

B. system that perform only one process B. WORD PAD


at a given time, and it carries out the next C. EXCEL
process in the queue only after the cur-
D. POWER POINT
rent process is completed.
C. error message contains IP address, 13. Which 3 of these are advantages of open
error type and code for other info source software
D. File Transfer, Viruses and Malware, A. you can inspect the code and see how
File Size, Speed, Memory Issue it works

NARAYAN CHANGDER
B. there are large communities of devel-
8. A bank thinks of getting a database pack- opers to support it
age. They have particular needs, such as
C. Every version has been thoroughly
having their logo on every screen and tim-
tested before being released by the devel-
ing employees performing tasks. The best
oper
software in this case would be:
D. It can be easily customised and
A. bespoke changed to meet your needs
B. off the shelf
14. The following type of software will typi-
C. open source cally have the biggest number of users:
D. none of above A. off the shelf
9. Classification of System Software are B. proprietory

A. Operating System C. bespoke


D. none of above
B. Billing System
C. Language Processor 15. Select ALL appropriate answers. General
purpose software consists of:
D. Utility Software
A. Single purpose software
10. Which of the following is an application B. Custom written software
software?
C. Integrated packages
A. mouse D. Specialist software
B. system
16. Which of the following is NOT a type of
C. chip operating system?
D. Microsoft Paint A. MacOS

11. An example of the software would be B. Google


C. Linux
A. Printer driver
D. Windows
B. Mouse
C. Keyboard 17. The memory that a CPU can access directly
is called (a), which stores bootstrap in-
D. none of above structions.
12. WHICH OF THE FOLLOWING IS WORD A. primary memory
PROCESSING SOFTWARE? B. RAM
A. MS WORD C. ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 303

D. secondary memory 22. Categories of software are


E. hard disk A. Operating System

PRACTICE BOOK» NOT FOR SALE


F. solid state drive B. MS Word
C. System Software
18. Which of the following is NOT an operat- D. Application Software
ing system?
23. These sets of instructions are called
A. YouTube
A. Data
B. Windows
B. Software
C. MAC OS
C. Programs
D. none of above D. none of above
19. An is needed to operate a computer. 24. John needs to exchange information with
It controls the overall activities of a com- a lot of people, sending documents back
puter. forth. He wants to get a data handling
software that will keep track of his ex-
A. Operating system
penses and revenues. The best software
B. Monitor in this case would be:
C. Keyboard A. off the shelf
D. Printer B. open source
C. bespoke
20. Certain computing projects in education D. none of above
and science are free and maintained by a
diverse community of people. Their soft- 25. WHAT IS ANTI VIRUS
ware is usually distributed as: A. EXAMPLES:MCAFEE, NORTON ETC
A. open source B. CD DVD
B. charity C. REMOVES MALICIOUS PROGRAMS
FROM THE COMPUTER
C. off the shelf
D. none of above
D. none of above
26. examples of antivirus are
21. description of off the shelf A. AVG
A. software designed to provide a gen- B. Norton
eral set of features that a broad range of C. Winzip
customers will find useful, such as web
browsers, apps and gamers D. Mc cafee

B. easy to keep track, team members can 27. Software is made up of and soft-
be anywhere, action taken quickly ware.

C. software used in business A. Internal and external


B. Application and system
D. an interactive computer application for
organization, analysis and storage of data C. Operating and utility
in tabular form D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 304

28. Microsoft Office and similar software is an C. 4


example of: D. 12
A. off the shelf E. 5
B. bespoke
34. Which of the following is NOT a category
C. open source of application software?
D. none of above A. System
B. General Purpose

NARAYAN CHANGDER
29. SOFTWARE IS USED TO CREATE A
COPY OF THE DATA C. Integrated
A. BACKUP D. Custom Written
B. Application 35. Which of the following are examples of de-
C. System vices that use embedded software
D. none of above A. Microwave
B. Mobile Phone
30. How many types of operating system are
there? C. iPad
A. 1 D. All of these
B. 2 36. Software that you can use but do not have
C. 3 access to the actual code is called

D. 4 A. Bespoke
B. Close Source
31. :Allows users to create, edit a docu-
C. Open Source
ment. Example:MS Word, Word Pad etc
D. Off the shelf
A. Spreadsheet Software
B. Multimedia Software 37. :Allows users to store and retrieve
vast amount of data. Example:MS Access,
C. Word Processing Software
MySQL, Oracle etc.
D. Database Software A. Spreadsheet Software
E. Presentation Graphic Software B. Multimedia Software
32. Which of the following would generate C. Word Processing Software
hardware interrupts? D. Database Software
A. Division by zero E. Presentation Graphic Software
B. Printer out of paper
38. description of shareware
C. User presses a key
A. software that is available free of
D. Program crash charge and often distributed informally
for evaluation, after which a fee may be
33. COMPUTERS ARE CLASSIFIED INTO requested for continued use
GENERATIONS
B. transferring information from one
A. 8 place to another using a range of tech-
B. 20 niques

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 305

C. staying connected, find people with 44. The program that controls the computer
common interests, spread information A. Operating System
very fast

PRACTICE BOOK» NOT FOR SALE


B. Generic
D. Software that is written just for the
customer or for a particular purpose C. Custom
D. Utility
39. Software that is created by a company and
relased for anyone to buy is called 45. Which of the following is not an example
A. Bespoke of freemium?
A. Canva
B. Proprietary
B. Netflix
C. Open Source
C. VLC media player
D. Off the shelf
D. Spotify
40. IS A MULTITASKING OPERATING SYS-
TEM. 46. software detects, and removes the
virus.
A. WINDOWS
A. cleanup
B. ANDRIOD
B. backup
C. DATABASE
C. antivirus
D. ANTI-VIRUS
D. none of above
41. Find the odd one:
47. When storing a sound, a computer uses (a)
A. MS office Word is the number of bits per sample.
B. Microsoft PowerPoint A. sampling
C. Mozilla Firefox B. set intervals
D. Google Chrome C. sample rate

42. A is a collection of programs. D. Hertz


E. sample resolution
A. Software
F. kibibytes
B. Operating System
G. data analysis
C. Application software
H. once per second
D. System Clean Up
I. colour depth
43. Language processor translates to J. sound quality
A. Machine language to Programming
language 48. What does the term integrate means?

B. Programming language to Machine A. to separate


language B. to take out
C. English to machine language C. to put together/combine
D. Machine language to English D. to delete

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 306

49. Choose the correct pair. C. Tally software


A. compression, utility D. Presentation software
B. compression, application
55. Which of the following software is created
C. compression, system specifically for a company or individual.
D. none of above A. Integrated
50. Select ALL appropriate answers. What are B. General Purpose

NARAYAN CHANGDER
the TWO main categories of software? C. Custom Written
A. Operating system software D. none of above
B. System software
56. Types of System Software:
C. Application software
A. Language Processors
D. Gaming software
B. Utility Software
51. Copyrighted software made available for C. Operating System
use, free of charge, for an unlimited time.
D. All of these
A. Malware
B. Shareware 57. Set of programs developed to perform spe-
cific tasks.
C. Freeware
A. System software
D. Proprietary
B. Application software
52. These are programs that identify, reject
C. Operating system
and eliminate software viruses.
A. Backup Software D. Anti-Virus software

B. Antivirus Software 58. The type of System software that acts as


C. Computer Games a link between the user and the hardware
and enables them to work together
D. Word processing software
A. Utility software
53. Software that is available free of charge B. Operating System
and often distributed informally for evalu-
ation, after which a fee may be requested C. Language Processor
for continued use D. Compression Software
A. In-app purchases
59. :Allows users to create image, audio,
B. Freeware video etc. Example:Real Player, Media
C. Shareware Player etc.
D. Off-the-shelf A. Presentation Graphic Software
B. Database Software
54. General purpose Application Software are
C. Spreadsheet Software
A. Word Processing software D. Word Processing Software
B. Electronic Spreadsheet E. Multimedia Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 307

60. WHAT DO YOU MEAN BY DISK DEFRAG- 65. Which of these is an operating system
MENTATION? A. Safari

PRACTICE BOOK» NOT FOR SALE


A. Disk defragmenter is a system utility B. Android
for locating and consolidating fragmented
files and folders to improve system perfor- C. Fifa 2017
mance . D. Norton Antivirus
B. DISK DEFRAGMENTATION MEANS TO 66. A operating system allows multiple
GIVE THE DISK A FRAGRANCE. users on different computers to access a
C. DISK DEFRAGMENTATION MEANS TO system at the same time.
SWITCH OF THE DISK. A. Single-User
D. NONE OF THE ABOVE B. Multi-User
61. description of bespoke C. Multitasking
A. software specially designed and writ- D. none of above
ten for a single organisation or group of
users 67. The type of System software that per-
forms tasks related to managing the com-
B. high initial costs, requires input from puter, its devices and programs
staff and takes a long time
A. Operating system
C. slow data restoration, privacy of
backed up data, offsite provider might go B. Language processor
out of business C. Utility software
D. you can usually ‘roll back’ to this state D. Application software
if you get into trouble
68. FULL FORM OF “OS” IS:-
62. General software that anyone can buy A. ON SCHEDULE
A. Operating System B. OPTIONAL SOURCE
B. Generic C. OPERATING SOFTWARE
C. Custom D. none of above
D. Utility
69. HOW MANY TYPES OF UTILITY PRO-
63. System Software: GRAMS ARE THERE?
A. Consists of the operating System. A. 1
B. performs a useful function. B. 4
C. Is the outside of the computer. C. 8
D. Controls the computer. D. 3
64. software are used by specific institute 70. Identify where bootstrap instructions are
for special purpose. stored
A. system software A. ROM
B. Customized Software B. RAM
C. general purpose C. Secondary Storage (e.g. hard disk)
D. none of above D. Cache Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 308

71. MS Word is an example of software 76. description of open source


A. Presentation software A. computer software with its source
B. DBMS software code made available with the rights to
study, change, and distribute
C. Spreadsheet software
B. code is optimised for fast execution,
D. Word processing software
program is verified, user can execute the
72. How does the OS handle file manage- program on different computer

NARAYAN CHANGDER
ment? C. an electronic message sent in real
A. Deals with movement, editing and time via the Internet and therefore imme-
deletion of data diately available for display on the recipi-
ent’s screen
B. Colour codes data
D. software written to control machines
C. Translates data into binary
or devices that are not typically thought
D. None of these of as computers
73. It is used to create video, animation, 77. Select ALL appropriate answers. Applica-
sound, graphics, and text with a high de- tion software can be categorized as:
gree of interaction.
A. General purpose
A. MS Word
B. Specialist application software
B. MS Access
C. CorelDRAW C. Profession oriented application soft-
ware
D. Windows Media Player
D. Custom written application software
74. description of embedded
78. (a) when the computer is first powered on.
A. software written to control machines
or devices that are not typically thought A. application software
of as computers B. operating system
B. training isnt customised to your indus- C. firmware
try, less expensive, regular updates
D. hardware
C. software that combines text, sounds,
images and video to present information E. bootstrap
D. program that transforms source code 79. WHAT IS APPLICATION SOFTWARE?
written in a programming language (the
source language) into another computer A. THAT ALLOWS A USER TO PERFORM
language MAINTENANCE TYPE TASKS
B. ARE ALL PROGRAMS THAT PERFORM
75. Software that you can but but do not have
SPECIFIC TASKS FOR USERS.
access to the actual code is called
A. Bespoke C. INCLUDES EVERY COMPUTER RE-
LATED OBJECTS THAT YOU CAN PHYSI-
B. Proprietary CALLY TOUCH AND HANDLE LIKE DISKS
C. Open Source
D. Off the shelf D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 309

80. Microsoft Office and Windows are exam- 86. increases disk capacity bycompressing
ples of: files before saving them on the hard disk.

PRACTICE BOOK» NOT FOR SALE


A. Freeware A. Antivirus
B. Proprietary B. Disk Compression
C. open source
C. Operating System
D. none of above
D. Calculator
81. Software is divided into categories.
87. Which of the following is also known as
A. 4
Tailor-Made
B. 3
A. System
C. 2
B. Integrated
D. none of above
C. Custom Written
82. System Software is
D. General Purpose
A. not needed on your computer.
B. found in the monitor. 88. What is a single purpose application soft-
C. general purpose software. ware?
D. none of above A. The application software covers a sin-
gle broad application area.
83. Software can be classified as
B. The application software covers a nar-
A. WIN RAR, SYSTEM SOFTWARE row application area.
B. OPERATING SYSTEM, APPLICATION
C. The application software covers a cus-
SOFTWARE
tom application area.
C. UTILITY SOFTWARE, OPERATING SYS-
TEM D. The application software covers a sin-
gle broad word processing area.
D. SYSTEM SOFTWARE, APPLICATION
SOFTWARE 89. is the process of shrinking files on a
84. Which of the following is NOT a general disk.
purpose software A. Compression
A. Microsoft Publisher B. Back Up
B. Microsoft Paint C. DTP
C. Microsoft Word
D. DBMS
D. Microsoft Office
90. A lot of scientific projects run on soft-
85. makes space by removing unused an-
ware.
dunnecessary files.
A. open source
A. system cleanup
B. File management B. proprietory
C. MS word C. expensive
D. Printer D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 310

91. Software whose source code is available 96. What is backup?


free of charge for the public to use, copy, A. It is a program to chat or call to anyone
modify, sub-license, or distribute in times of emergencies
A. Closed source software B. This is a process of recovering data, or
B. Freeware an accidental loss.
C. Shareware C. It is a process of making viruses and
resulting of making the hard disk fall
D. Open source software

NARAYAN CHANGDER
D. none of above
92. operating system allows only one user
97. A COMPUTER IS A MACHINE.
to use computer system at any given time.
A. TIRED
A. Multi user
B. FUNNY
B. Single user
C. SMALL
C. Multi Tasking
D. INTELLIGENT
D. none of above
98. A collection of programs stored and run on
93. Companies who want software specific to the hardware and help the user work on
their individual needs can choose between the computer.
which 2 types of software A. Hardware
A. Open Source B. Software
B. Proprietary C. Utility
C. Off the shelf D. Devices
D. Custom Written 99. OS stands for
A. Organization Systems
94. Your teacher wants to calculate the grades
for all the students in the class, which ap- B. Open and Save
plication software would you recommend C. Operational Systems
to her? D. Operating System
A. Microsoft Word
100. Select ALL examples of application soft-
B. Microsoft PowerPoint ware:
C. Microsoft Excel A. iOS
D. none of above B. Adobe Photoshop
C. Android OS
95. The following is not a good reason to use
bespoke software: D. 21st Century ICT
A. the need to perform a very wide range 101. Data transmitted over the internet is bro-
of tasks ken down into (a)
B. special features only needed by one A. packets
company B. routers
C. low computer skills of employees C. out of order
D. none of above D. reordered

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 311

E. packet switching 107. An manages the computer’s hard-


F. corrupted ware & software.

PRACTICE BOOK» NOT FOR SALE


G. restored A. Utility software

H. servers B. File management

I. fetch-execute cycle C. Operating System

J. the fetch-execute cycle D. Disk compression

102. :Allows users to create visual presen- 108. Open source software is free
tation. Example:MS Power Point A. true
A. Word Processing Software B. false
B. Multimedia Software C. Sometimes
C. Spreadsheet Software D. none of above
D. Presentation Graphic Software 109. The act of examining the computer sys-
E. Database Software tem, drives, or files for possible virus or
malware attack is known as
103. This software acts as a link between
A. Backup
hardware and software
B. Scanning
A. System Software
C. Disk Management
B. Antivirus Software
D. none of above
C. Utility Software
D. Application Software 110. TO DEFRAGMENT YOUR DISK FIRST
CLICK
104. The instructions that tell the computer
A. Shut down
what to do is
B. Start
A. Hardware
C. landscape
B. Input
D. none of above
C. Software
D. Output 111. These programs carry out precise and
accurate tasks.It helps manage, maintain
105. Software is split into categories. and control all computer resources.
A. 4 A. Operating System
B. 3 B. Application System
C. 2 C. Utility System
D. none of above D. None of the above
106. An example of software would be 112. Which of the following is NOT an OS
A. MS Power Point A. Windows 85
B. keyboard B. Microsoft Office 2000
C. monitor C. Linux
D. printer D. Windows XP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 312

113. what is BIOS B. disk defragmentation


A. CONTROLS THE WORKING OF THE EN- C. disk scanning
TIRE SYSTEM D. none of above
B. BASIC INPUT OUTPUT SYSTEM
119. Which of the following calculations would
C. NONE OF THE ABOVE
cause overflow in a computer system that
D. none of above only uses an 8-bit register to store the cal-
culation result?

NARAYAN CHANGDER
114. What information might you find in the
header of a data packet? A. 122 + 47
A. IP address of sender B. 200 + 122
B. IP address of destination C. 150 + 106
C. The contents of the message D. 84 + 69
D. Error-checking bits 120. TWO EXAMPLES OF SYSTEM SOFTWARE
E. Packet Number ARE:
A. OS(OPERATING SYSTEM)
115. IC STANDS FOR:
B. MS WORD
A. INTERGRATED CIRCUITS
B. VACCUM TUBES C. WORDPAD

C. MICROPROCESSOR D. DEVICE DRIVERS

D. none of above 121. Choose all the examples of application


software.
116. The application software used to arrange
and store large amount of information in A. Web Browser
organised manner B. Word Processor
A. Graphics software C. Antivirus
B. Multimedia software D. Spreadsheet
C. Database management software
122. How can the performance of a computer
(DBMS)
be improved?
D. Presentation software
A. Increase the number of CPU cores
117. POWERPOINT IS AN EXAMPLE OF THIS B. Use cache memory
SOFTWARE
C. Buy a second display
A. APPLICATION SOFTWARE
D. Increase the clock speed of the CPU
B. OPERATING SYSTEM SOFTWARE
C. DATABASE SOFTWARE 123. WHAT ARE THE TWO TYPES OF SOFT-
WARE?
D. ANTI-VIRUS SOFTWARE
A. SYSTEM SOFTWARE & APPLICATION
118. retrieve the data from different seg- SOFTWARE
ments of the memory. B. DATABASE SOFTWARE & PAINTING
A. disk compression SOFTWARE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 313

C. HOME SOFTWARE & APPLICATION 129. HOW MANY TYPES OF SOFTWARE ARE
SOFTWARE THERE?

PRACTICE BOOK» NOT FOR SALE


D. NONE OF THE ABOVE A. 8
B. 10
124. Which of the following is an example of
proprietary software? C. 4
A. Antivirus D. 3

B. Canva E. 2

C. Google Chrome 130. what is operating system


D. Microsoft Office A. a system that acts as an interface be-
tween user and hardware
125. Off the shelf is an old fashioned term B. allows to maintenance type taska
because we don’t really buy software in
shops any more. What would be a more C. both
appropriate name D. none of above
A. ready to use 131. IS AN EXAMPLE OF SOFTWARE.
B. downloadable A. HARD DISK
C. compiled and ready B. MS WORD
D. software C. CD-ROM
D. DVD DRIVE
126. An application designed to be down-
loaded to a handheld device. 132. Choose all the examples of system soft-
A. system unit ware.
B. malware A. Operating System

C. mobile app B. Notes Application


C. Disk Cleanup
D. Instagram
D. Calculator
127. Contains ads to generate revenue for the
developers. 133. Which of these is an example of Open
Source Software?
A. Nagware
A. Google Chrome
B. Adware
B. Internet Explorer
C. Donationware
C. OS X
D. Crippleware
D. Microsoft Excel
128. What is Operating System 134. They operate and control devices and pe-
A. a system that acts as an interface be- ripherals plugged into a computer.
tween user and hardware A. Utility Software
B. allows to maintenance type taska B. Device Driver
C. both C. Programming Software
D. none of above D. Operating System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 314

135. Example of Operating System is 141. utility scans for file errors and direc-
A. Compiler tory structure errors.
B. Windows A. Scanning
C. Antivirus B. Error Checking
D. System Clean Up C. Backup
D. none of above
136. Software are of two types

NARAYAN CHANGDER
A. Input and output 142. IN WHICH YEAR PROGRAMS WERE
WRITTEN BY ‘’LADY ADA LOVELACE”
B. System software and Application soft-
ware A. 2011
C. Application software and operating B. 1943
system C. 1937
D. Utility software and Language proces- D. 1843
sor
143. are two examples of SYSTEM SOFT-
137. Select all the types of application soft- WARE
ware:
A. Antivirus, Disk Checker
A. Microsoft Excel
B. Operating system, Disk cleaner
B. Windows
C. Utility software, Screen saver
C. Web Browser
D. Operating system, Utility Software
D. Microsoft Word
144. Software that is available free of charge
138. An antivirus program is an example of
what type of software A. Shareware
A. Utility B. Cheapware
B. Operating System C. Freeware
C. Application D. Open source ware
D. Custom 145. Which of the following will be the most
139. Example of utility software is expensive?
A. Compiler A. Open Source Bespoke Software
B. Windows B. Closed Source Bespoke Software
C. Antivirus C. Open Source Off-The-Shelf Software
D. Android D. Closed Source Off-The-Shelf Software

140. Select ALL appropriate answers. Choose 146. PROGRAMS USED BY COMPUTER ARE
examples of Integrated packages: CALLED
A. Office 2021 A. PRINTERS
B. Libre Office B. COMMUNICATORS
C. Microsoft Word C. HARDWARE
D. Google Suite D. SOFTWARE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 315

147. Some software programs develop 152. Off-The-Shelf Software is


rapidly, gaining new features and adapt- A. widely available
ing to new uses, very often very spe-

PRACTICE BOOK» NOT FOR SALE


cialised and experimental. The best soft- B. cheaper to purchase
ware in this case would be: C. has more support available
A. open source D. all of these
B. proprietory 153. There are types of software
C. bespoke
A. 3
D. none of above
B. 2
148. Which of the following is a type of inte- C. None Of these
grated software?
D. none of above
A. Microphone
B. Microsoft Office 154. The games you download and play on
your tablets are all.
C. Micosoft Excel
A. OS
D. mouse
B. System Software
149. Why does unicode support more charac-
C. Application Software
ters than ASCII?
D. Computer hardware
A. Because it is more modern
B. Because it was developed internation- 155. Something which is connected to a com-
ally, not just by Americans puter, for example keyboard or printer
C. Because there are more available bits A. Utility
per character B. Peripheral
D. Because it requires more processing C. GUI
power to calculate
D. Interrrupt
150. WHICH OF THE FOLLOWING IS AN EX-
AMPLE OF SOFTWARE 156. Which of the following are functions of
an operating system?
A. HARD DISK
A. Translating program code into binary
B. CD-ROM
B. Determining the registers available in
C. MS WORD a CPU
D. DVD-DRIVE
C. Managing memory
151. :Allows users to create document D. Managing peripherals
and perform calculation. Example:Excel,
E. Providing user accounts
Lotus1-2-3 etc.
A. Spreadsheet Software 157. An example of system software is:
B. Multimedia Software A. Word Processors
C. Word Processing Software B. Antivirus
D. Database Software C. Web browsers
E. Presentation Graphic Software D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Types of Software 316

158. The application software used to create 164. Identify the Operating system.
video, animations, sound and graphics. A. Linux
A. DBMS
B. Unix
B. Multimedia software
C. MacOS
C. Presentation software
D. Windows
D. Desktop publishing software
E. MS Office

NARAYAN CHANGDER
159. Windows 2000 and Linux are all exam-
165. Which of the following task is NOT man-
ples of
aged by the Operating System?
A. Application software
A. Managing memory resources
B. Types of Custom Written Software
B. Providing a firewall to protect the com-
C. System Software puter
D. Installed by a regular computer user C. Accessing a website and view web
pages
160. If a computer’s IP address changes every
time it connects to the network, it is D. Dealing with security e.g. usernames
and passwords
A. static
B. dynamic 166. Select ALL appropriate answers. Exam-
ples of single purpose software are:
C. IPv4
A. Microsoft Word
D. IPv6
B. Microsoft Excel
161. Select ALL examples of system software:
C. Libre Office
A. Microsoft Office
D. Adobe Photoshop
B. Windows 11
C. Mac OS 167. A small office is thinking about getting
productivity sofware for typing up letters
D. Android OS and simple spreadsheet modelling. Their
needs and budget are modest. The best
162. Operating system is software
software in this case would be:
A. application software
A. off the shelf
B. system software
B. bespoke
C. utility software
C. none of the above
D. none of above
D. none of above
163. A software designed for end user for spe-
cific task. 168. description of freeware

A. Application Software A. software that is available for use at no


monetary cost
B. System Software
B. a protocol for collecting information
C. Operating System from, and configuring, network devices,
D. None of the above such as servers, printers, hubs, switches,

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 317

and routers on an Internet Protocol (IP) B. Device Driver


network C. Programming Software

PRACTICE BOOK» NOT FOR SALE


C. using the Internet for telephone or
D. Operating System
videophone communication
D. makes it less likely that software will 172. The three types of software are the fol-
fail, increasing customer satisfaction lowing except
A. System Sofware
169. Example of Language processor is
A. Compiler B. Media Software

B. Interpreter C. Utility Software


C. Assembler D. Application Software
D. All of these 173. System Softwares are
170. Software made specially for a particular A. Operating system
customer B. Utility Software
A. Operating System C. Application Software
B. Generic D. Language processor
C. Custom
174. Which of these is something an operating
D. Utility
system does?
171. These are programs that are used to A. Displaying a website
write, develop, test, and debug other
B. Calculating a budget
software, including apps and system soft-
ware. C. Playing a game
A. Utility Software D. Writing files to the hard disk drive

5.2 Operating Systems


1. Which mobile operating system feature C. Where more than one computer is
helps you avoid accidentally placing a call used to carry out instructions
or taking a picture? D. none of above
A. Virtual personal assistant
3. Which of the following is an example of a
B. Pinch gesture global setting on a Windows system?
C. Dock A. Desktop background picture
D. Lock screen B. Screen resolution
C. Accent color
2. What is multiprocessing?
D. Screen saver
A. The computer has more than one core
processor 4. RAM is

B. where tasks are done apparently at A. Random Only Memory


the same time B. Read Only Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 318

C. Random Access Memory 10. What is application software?


D. Read Access Memory A. Physical hardware we can touch
B. It is needed by the system to control
5. Which of the following kinds of software
hardware and run applications
consists of the programs that control or
maintain the operations of a computer and C. Provides a user interface and man-
its devices? ages memory
A. System D. Software that performs a task to ben-

NARAYAN CHANGDER
efit the user
B. Application
C. Program 11. What is the main advantage of a GUI?
A. Reduces the cost of computing
D. Management
B. Makes the computer easier to use
6. What are the 3 main operating systems?
C. Required a less powerful computer
A. MAC OS D. Does not need updating
B. Linux
12. Which operating system is like a UNIX op-
C. Windows erating system with a GUI?
D. Firefox A. Windows

7. Which part of the computer system is re- B. Linux


sponsible for where files are stored when C. BOSS
saved to secondary storage? D. Solaris
A. Operating system
13. Which utility protects against viruses?
B. Input device
A. Antivirus
C. Compiler
B. Restore Utility
D. Applications
C. Search Utility
8. What is meant by data compression? D. File Compression
A. Reducing the size of a file 14. VOIP communication does not have quality
B. Increasing the size of a file of service guarantees. It uses this instead.
C. Adding more pixels to an image A. It utilises something called ‘Hit and
Hope’
D. Emailing a file
B. It utilises something called ‘best ef-
9. Which of the following functions does the fort’
operating system not provide? C. It utilises something called ‘best at-
A. Monitors health and functionality tempt’
B. Folder and file structure D. It utilises TCP so it doesn’t matter
C. Interface between user and hardware 15. What type of interface does an Amazon
D. Coordinate tasks between application Echo use?
software A. Natural Language Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 319

B. Command Line Interface 21. Which is not a process state?


C. Graphical User Interface A. waiting

PRACTICE BOOK» NOT FOR SALE


D. Menu Interface B. terminated
16. What is the operating system responsible C. blocked
for? D. redirected
A. managing the hardware, processor
22. From which of the following areas in Win-
time and memory
dows 10 can you access Desktop cus-
B. managing only the hardware and soft- tomization settings?
ware
A. Desktop drop-down list
C. managing hardware, and application
B. Desktop Customization wizard
software and allocating processor time
and memory C. Calculator app
D. controlling processor time only D. Control Panel

17. Which term relates to a multiuser system 23. Why is it important to keep the operating
A. batch jobs system up to date?
B. timesharing A. To impress your friends
C. serial processing B. To avoid buying a new one
D. punch cards C. To protect your computer form mal-
ware
18. The term OS is short for?
D. Because it’s the law
A. Apple
24. Tags and instructions developed by the cre-
B. Operating Software
ator which tell the foundation of the sys-
C. Operating System tem and how it was created
D. Overload System A. UNIX
19. These are examples of mobile operating B. source code
systems C. C++
A. Windows server and Windows Desk- D. Java
top
B. Android and OSI 25. What is the fullform of GUI?
C. Androde and IOS A. Graphic User International
D. Android and IOS B. Graphical Uses Interface
C. Graphical User Interface
20. Which of these is NOT a task of Operating
Systems D. Graphical Users International
A. communicating with the user 26. What is the purpose of an operating sys-
B. communicating with the hardware tem?
C. managing memory A. Manage software on computer
D. browsing the Internet B. Manage hardware on computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 320

C. Manage all hardware & software on 32. SJF is short for


computer A. Shortest Job First
D. none of above B. Software Job First
27. Which of the following type of OS allow C. System Job First
more than one user to make use of the D. Shortest Job Final
operating system resources at the same
time? 33. Which part of the operating system will re-
move data that is no longer needed to free

NARAYAN CHANGDER
A. Single task up space for other programs being used?
B. Multi-user A. Memory management
C. Multi task B. File and disk management
D. Real-time C. User management

28. You can arrange the tiles by: D. User interface

A. You can’t move them 34. Which of the following statements relates
to paging?
B. Right Click
A. Refreshing the current in memory cells
C. Dragging and Dropping
B. Fixed size memory blocks
D. Double click
C. Variable sized memory blocks
29. Choose the Apple operating system D. Logical divisions of memory
A. Windows
35. Which part of the operating system will
B. Android allocate memory to applications to allow
C. Linux more than one piece of software to be run
at once?
D. Mac OS X
A. Memory management
30. What is one reason there is a greater per- B. File and disk management
centage of Windows users than Mac OS
C. User management
X?
D. User interface
A. Not as good
B. Do not meet the individual needs 36. Question 8:Windows, Icons, menus and
Pointers are all part of this? (1-4)
C. More expensive
A. Graphical User Interface
D. Bad reviews
B. Command Line Interface
31. What does a file extension tell your com- C. Menu Interface
puter? D. No User Interface
A. Which file name to display
37. Which components of a computer system
B. Where a program is saved would you associate a device driver with?
C. What type of program to open A. CPU component:ALU
D. When the file was created B. Primary memory:RAM & ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 321

C. CPU component:cache 43. Machine which can be programmed to con-


D. Peripherals trol symbols

PRACTICE BOOK» NOT FOR SALE


A. network
38. What type of operating system would you
recommend for an aircraft auto-pilot sys- B. computer
tem?
C. software
A. Real time
D. source code
B. Embedded
C. Distributed 44. Some operating systems have the ability
D. Multi-user to manage multiple desktops. This feature
is called what for Windows?
39. What program is used to start and shut
down a computer or mobile device, pro- A. Work Spaces
vide a user interface, manage programs B. Spaces
and memory, and provide file manage-
C. Task View
ment, among other functions?
A. An operating System D. Task Manager
B. A File Utility 45. Which of the following best describes the
C. A System Utility ‘first come first served’ scheduling algo-
D. Application Software rithm?

40. Question 5:Dividing processor time be- A. Deals with the processes that are esti-
tween processes so that they appear to mated to take the smallest number of CPU
multitaskis known as:(1-3) cycles first with time slicing

A. Time Slicing B. Uses multiple queues to change the or-


der of process execution based on priori-
B. Fish Slicing
ties
C. Time waiting
C. Deals with each user or task in the or-
D. Idle Time der in which they arrive
41. Common functions of OS are (select all that D. Deals with each process based on an
apply) calculating a estimated time remaining to
A. Manage programs complete
B. Manage memory
46. Memory management
C. Provide user interface
A. allocates time for processes to use the
D. Administer security
CPU
42. A graphical user interface can be identified B. is responsible for creating, deleting,
by the it displays. renaming of files and folders
A. commands
C. organises programs and data that are
B. data presently being used by the CPU
C. icons D. is the method by which the user inter-
D. network acts with the computer system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 322

47. The following describes what process? 52. Why is virtual memory used?
Asymmetric (public key) encryption is used A. To store the most frequently used
first to establish the connection, which is instructions and data in the processor,
then replaced with symmetric encryption speeding up the computer
(called the session (Session Key) for the
duration B. To allow access to documents in the
cloud, anytime, anywhere
A. HTTP
C. To extend the storage capacity of the
B. PKI (HTTPS)

NARAYAN CHANGDER
computer
C. WEP D. To allow more programs to execute
D. WPA2 than could be possible with the physical
RAM available
48. Terminal is a common tech launch point for
which 2 operating systems? 53. Which Operating System function allows
more than one program can run at the
A. WindowsmacOS
same time?
B. AndroidLinux
A. User Interface
C. LinuxiOS
B. Memory Management
D. macOSLinux
C. User Management
49. The ability of the processor to stop what D. File Management
is currently doing and instead service a
request from hardware or software is 54. An operating system used to run on mo-
known as bile devices such as mobile phones, tablets,
and other hand held devices
A. hardware handling
A. Mobile-OS
B. buffer handling
B. Traveling-OS
C. interrupt handling
C. Apple-OS
D. error handling
D. MS-DOS
50. The technique of swapping items between
memory and storage is called. 55. The common security triad CIA stands
for?
A. caching
A. Confidentiality, Internet, Availability
B. buffering
B. Confidentiality, Integrity, Authentica-
C. thrashing
tion
D. paging
C. Confidentiality, Integrity, Availability
51. What is the top folder of the file tree D. Confidential, Integrity, Available
called?
56. Process management .
A. .jpg
A. allocates time for processes to use the
B. windows CPU
C. ? B. is responsible for creating, deleting,
D. the root renaming of files and folders

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 323

C. stores programs and data that are 61. Which cannot self replicate?
presently being used by the CPU A. Virus

PRACTICE BOOK» NOT FOR SALE


D. is the method by which the user inter- B. Trojan Horse
acts with the computer system
C. Worm
57. Which operating system is the Android OS D. none of above
based off of?
A. Mac OSX 62. defines Wi-Fi, what security scope’s did it
service? a. Authenticationb. Availabilityc.
B. Linux Integrityd. Confidentiality
C. Unix A. all of the above
D. Windows NT Kernel B. a, b and c
58. is typically a deployment of a combi- C. b, c and d
nation of on-device applications and con- D. a, c and d
figurations, corporate policies and certifi-
cates, and backend infrastructure, for the 63. Recycle Bin to Windows is what Trash Can
purpose of simplifying and enhancing the is to
IT management of end user devices. A. Mac
A. MDM (Mobile Device Manager) B. Linux
B. DMM (Device Mobile Management) C. IBM
C. MDM (Mobile Device Management) D. none of above
D. MMD (Management of Mobile Devices)
64. What does the hibernate mode option do?
59. What is the main advantage of a virtual A. Saves any open documents and pro-
machine? grams to RAM, turns off all unneeded func-
A. It allows you to install and run virtual tions, and then places the computer or de-
reality software vice in a low-power state
B. It speeds up the execution and running B. Shuts down the operating system so it
of programs cannot be accessed without a password
C. You can run software on a machine for C. Saves any open documents and pro-
which it wasn’t originally designed grams to a hard drive before removing
D. It executes source code power from the computer or device
D. Starts the screen saver and keeps pro-
60. Used for most home/office computers and grams and files open and ready to be ac-
for personal or business matters. It is also cessed with the touch of a button
seen on servers and tablets (phones less
successful).Considered one of the most 65. Which command displays network
user-friendly and is a closed source OS adapters installed on a Linux Machine?
A. Unix A. ifconfig
B. macOS B. ipconfig /all
C. Windows C. ifconfig-a
D. Android D. ipconfig

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 324

66. Any program that makes a computer run B. Linux


A. hardware C. Windows
B. code D. macOS
C. program
72. System for communication between two or
D. software more computers
E. compiling A. network

NARAYAN CHANGDER
67. Windows is the Product of? B. server
A. Apple C. internet
B. HP D. supercomputer
C. Dell 73. Essentially a secure cyrptoprocessor that
D. Microsoft can store cryptographic keys.

68. This is also known as memory resident, A. TPM (Trusted Platform Microproces-
which means it remains in memory while sor)
the computer or mobile device is running B. TPM (Trusted Platform Module)
A. graphical interface C. PTM (PlatformTrusted Module)
B. kernel D. CKL (Crypto Key Logger)
C. ROM
74. What controls a computer’s basic opera-
D. virtual display tions?
69. Worldwide, publicly accessed network A. Operating system
A. supercomputer B. RAM
B. internet C. RAM
C. aparnet D. Software system
D. firewall 75. This is needed to ensure security of a given
70. Which type of operating system only sup- operating system is maintained
ports textual commands to interact with A. FDisk
the computer? B. Storage management
A. Graphical User Interface
C. WPA2
B. Real-Time Operating System
D. Patch Management
C. Distributed Operating System
76. Which of these is an example of systems
D. Character User Interface
software?
71. This runs on proprietary hardware only, A. Operating system
with an emphasis on speed, dependability
B. Spreadsheet
and accuracy. It is partially open source
but it’s kernel is based on Unix. C. Word processor
A. iOS D. Web browser

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 325

77. Which of these devices can have an REAL 83. What is defragmentation?
TIME operating system?
A. Rearranging files to occupy contiguous

PRACTICE BOOK» NOT FOR SALE


A. Server space.
B. Gaming console B. Speeding up processing.
C. ATM
C. Rearranging the RAM.
D. Tesla car
D. Rearranging processes queued for
78. A system usually designed to handle large processing.
volumes of data periodically such as calcu-
lating tax payable is an example of what 84. The following is not a part of GUI:
kind of system?
A. command prompt
A. single user
B. scroll bar
B. batch
C. text box
C. real-time
D. network D. radio button

79. Safari, is a native app for which OS? 85. What is the need for malware protection
A. Android on a system?
B. Apple IOS A. To send emails
C. ISO B. to block malicious code from running
D. Titan C. to keep it running efficiently
80. Software program that carries out some D. to prevent malicious code from run-
action ning and to remove malicious code
A. process
86. SmartCard/Token authentication is consid-
B. command
ered as
C. software
A. Knowledge
D. direction
B. Possession
81. Where is the BIOS stored?
C. Biometric
A. ROM & flash memory
D. none of above
B. Optical disk
C. Virtual memory 87. Why is virtual memory needed?
D. RAM
A. The hard disk may not be large enough
82. What happens when a computer runs out to store all the files
of RAM? B. A user may want to access files stored
A. Virtual networks can be used on remote servers in the cloud
B. Virtual storage is used C. A computer cannot multi-task when it
C. Virtual servers are used runs out of memory
D. Virtual memory is used D. Networks need to kept secure

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 326

88. Which is not a type of OPERATING SYS- 93. Windows, Icons, menus and Pointers are
TEM SOFTWARE? all part of this?
A. Windows 7 A. Graphical User Interface
B. LINUX B. Command Line Interface

C. Mac OS C. Menu Interface


D. No User Interface
D. RAM
94. Which of the following is a set of programs

NARAYAN CHANGDER
89. Which Operating System function enables containing instructions that coordinate all
access levels to be given? the activities among computer hardware
A. User Interface resources?
B. Peripheral Management A. Management System

C. User Management B. Disk Base System


C. Operating System
D. File Management
D. Boot System
90. Managing computer memory by the oper-
95. Which of the following is the best defini-
ating system does not include this process:
tion of a multi-user operating system?
A. connecting printers and other periph-
A. An operating system intended to serve
eral devices
and process data as it comes in, typically
B. releasing memory not used for a while without buffering delays
C. loading programs into memory as a B. Any operating system designed to al-
user opens them low multiple processes to be carried out
at the same time
D. protecting one program’s memory
area from being used by the other pro- C. The software is spread over a collec-
gram tion of independent and physically sepa-
rate computers
91. Authentication methods that uses numer- D. Any operating system designed to al-
ous, distinguishable landmarks, different low multiple users to connect from differ-
peak and valleys. ent locations or computers at the same
A. Iris Recognition time

B. Fingerprint Recognition 96. What is Malware?


C. Voice Recognition A. Types of Networks
D. Facial Recognition B. Types of Hardware
C. Types of Software
92. A process is a
D. Types of Social Media
A. program in execution
97. What manages the hardware and runs the
B. program on the hard drive software?
C. high level program A. Computer Systems
D. low level program B. Dedicated Systems

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 327

C. Embedding Systems 103. Computer power option that saves any


D. Operating Systems open documents and running programs or
apps to memory turns off all unneeded

PRACTICE BOOK» NOT FOR SALE


98. This runs on proprietary hardware only, functions and places the computer in low
with an emphasis on security including power state.
strong encryption. It is closed source and A. smart mode
has it’s own app store
B. server mode
A. iOS
C. sleep mode
B. Linux
D. source mode
C. android
D. macOS 104. Kelly has several documents open on her
laptop, and is working concurrently in each
99. Which based operating system is Mi- one. She is about to leave for several
crosoft Windows? hours to attend an off-site social function,
A. CUI but will return to her documents later in
the day. Which option below would save
B. Real-Time Operating System the most power and still ensure that she
C. GUI can pick up right where she left off?
D. Distributed Operating System A. Hibernating the laptop.

100. Windows 10 and Windows 7 are exam- B. Putting the laptop to sleep.
ples of: C. Shutting down the laptop.
A. IOS Phone D. Displaying the lock screen.
B. Android
105. Used to select multiple files in a series
C. Microsoft Windows
A. Control Key
D. none of above
B. Shift Key
101. *A ******* is a type of malware*It is a C. Task Bar
standalone program that does need to at-
D. Ram
tach itself to an existing program in order
to spread 106. What does Kernel mean?
A. Virus A. Hardware of the OS
B. Trojan Horse B. Central component of the operative
C. WAN system
D. Worm C. Is the processor of the system
D. Is a Firmware
102. How can a trojan infect your pc?
A. On memory sticks. 107. All of the following are examples of stor-
B. Through email attachments. age except

C. By being disguised as legitimate soft- A. SSD


ware. B. Flash drive
D. Dodgy web links C. HDD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 328

D. Linux A. Internal clock triggers suspending a


E. External drive running process
B. Shutdown to start triggered by the
108. Which operating system are IOS applica- user pressing the off button
tions designed in?
C. Memory parity error
A. Windows 8.1/10
D. Arithmetic overflow
B. Unix

NARAYAN CHANGDER
C. Mac OSX 113. Which of the following below is not a
cloud model described by Microsoft?
D. Linux
A. Private cloud
109. Which is NOT a characteristic of desktop
operating systems? B. Hosted private cloud

A. It supports a single user C. Public cloud


B. It runs single-user applications D. Local cloud
C. It supports print servers
114. The LXSS manager is a component of
D. It shares files and folders on a small
A. Linux OS to support the virtualization
network with limited security
of Windows
110. This operation closes all files, shuts down B. Windows OS to support Linux’s system
the computer and then restarts it. calls
A. Hibernate C. macOS X to support Windows’ system
B. Shut Down calls
C. Restart D. Android to support the virtualization of
Windows Phone
D. Sleep

111. An operating system manages printing 115. These are small computer programs that
using spooling. In doing so what does the allow operating systems to read pieces of
operating system do? hardware connected to your computer

A. Data is stored on hard disc/in mem- A. Device


ory/stored in a queue B. Driver
B. Ensures that data is stored and can be C. Device Driver
retrieved correctly from any disk drive
D. Hardware
C. Ensures that all programs and data in-
cluding itself is stored in correct memory 116. Which of the following operating sys-
locations tems can you freely modify if you choose?
D. Communicates with and receives data A. OS X
input to a keyboard/mouse/other valid in-
put device B. iOS
C. BlackBerry
112. Which of the following is NOT an exam-
ple of a hardware invoked interrupt D. Linux

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 329

117. Which of the following statements is NOT 122. Latest Version of Windows Series is?
true about user interfaces? A. Windows 8

PRACTICE BOOK» NOT FOR SALE


A. A user interface instructs the com- B. Windows 8.1
puter how to display information on the
screen. C. Windows 10

B. Most computers today use a command- D. Windows 19


line interface. 123. The operating system that a computer
C. GUI operating systems use menus and uses sometimes is called which of the fol-
visual images such as buttons. lowing?
D. A user interface controls how you en- A. Base
ter data and instructions. B. Platform
118. On select an item C. Index
A. Click D. Boot System
B. Right Click 124. The operating system is held
C. Drag & Drop A. in permanent storage and loaded into
D. none of above RAM when the computer is booted up
B. in the loader program
119. Which is the layer of a computer system
between the hardware and the user pro- C. in the boot up program
gram? D. none of above
A. None 125. What is the best definition of the term
B. Operating Environment ‘paging’?
C. Operating System A. The logical division of memory
D. System Environment B. The organisation of memory into fixed
size units
120. A network OS will provide user user C. The splitting of a large program into a
names to identify users and and pass- number of procedures
words to
D. The organisation of memory into differ-
A. Authenticate Users ent sized units
B. Validate Users
126. The CPU (central processing Unit) is
C. Scan Users sometimes called the
D. Secure Users A. brains of the computer
121. What native application would be used to B. eyes of the computer
edit text in Linux? C. ears of the computer
A. Notepad D. none of the above
B. Notepad++
127. A device’s capability of supporting older
C. Paint devices, as well as newer devices.
D. Nano A. backward recovery

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 330

B. blackout B. Multi-tasking
C. backward balance C. Distributed
D. backward compatible D. Embedded
128. Where do multiple documents line up in a 133. BIOS stands for
printer?
A. Basic Instruction Operating System
A. Glossary
B. Basic Information Output System

NARAYAN CHANGDER
B. Queue
C. Index C. Basic Input Output System

D. Roster D. Binary Information Output System

129. What type of device is used to detect 134. Which of these is NOT a Stand-alone OS?
physical changes in things such as light, A. Ubuntu
temperature or object proximity.
B. Linux
A. Sensors
C. Microsoft Mac
B. Magnets
C. Mice D. Mac OS X

D. Cameras 135. What technology makes WiFi calling pos-


sible?
130. Which of the following mobile operating
systems has the largest install base in the A. VOIP
world? B. WiFi
A. Android
C. WiMax
B. Blackberry 10
D. WWAN
C. Windows 10 Mobile
D. iOs 136. Which of the following is not one of the
most common operating systems for per-
131. A small program tells the operating sys- sonal computers?
tem how to communicate with a specific
A. Microsoft Windows
device.
B. IBM
A. docking station
B. driver C. Linux

C. dock D. Mac OS X
D. downlink 137. Which of the following passwords fol-
lows a suggested strength?
132. What type of operating system can be de-
scribed by a company creating online ex- A. Password1
aminations where single question papers
B. p4ssword
are sent to different terminals for students
to sit the paper independently C. Password
A. Real Time D. P@ssw4d

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 331

138. What happens when RAM is full? C. Licences OS


A. The computer crashes D. Limited OS

PRACTICE BOOK» NOT FOR SALE


B. Virtual Memory is used
144. Which of the following application stores
C. An interrupt is raised is compatible with Apple IOS?
D. The computer explodes A. App Store.
139. Select ALL the statements that are true B. Windows Marketplace.
about Operating Systems.
C. Google Play.
A. They are hardware devices
D. BlackBerry World.
B. All computers require them to operate
C. They can also be found on Mobile de- 145. How can the OS help manage security of
vices. the system?
D. They allow users to interact with the A. The OS can hire backup
computer.
B. User accounts may be password pro-
140. This following is an example of a periph- tected
eral. C. Files can self destruct after a set time
A. Processor
B. Main Memory (RAM) D. none of above
C. Hard Disk Drive
146. Which of the following best describes the
D. ROM round robin scheduling algorithm?
141. Which scheduling algorithm allocates CPU A. Deals with each process in the order
time to each process in turn? in which they arrive
A. Round robin B. Deals with each process in turn allocat-
B. Shortest Job First ing each a time slice of processor time

C. Shortest Time Remaining C. Deals with each process aiming to


complete the process requiring the least
D. First Come, First Served amount of processing time first
142. One of The file system basic functions D. Uses many queues to prioritise pro-
A. Determine the free space in the hard cesses for execution
drive
147. A more inefficient alternative to inter-
B. Operating System software rupts involves continually checking hard-
C. determining the physical location of ware for servicing requests in a continual
the file on the hard drive loop. This process is known as
D. none of above A. loop handling

143. Linux is the? B. loop servicing


A. Open Source OS C. polling
B. Friendly OS D. keep checking the postbox

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 332

148. What is one of the significant problems 153. What is the method of multitasking that
with virtual memory? requires the operating system to give con-
trol to a running process, and wait for that
A. Disk thrashing
process to finish?
B. Disk becomes full
A. Cooperative multitasking
C. Disk threading B. Shared multitasking
D. Disk requires buffering C. Preemptive multitasking

NARAYAN CHANGDER
149. What type of Software is needed to con- D. Basic multitasking
trol the computer’s hardware?
154. What does user management mean in the
A. Programming Software context of an operating system?
B. Systems Software A. Providing for different users to log in
C. Application Software to a computer retaining their settings and
security
D. Bespoke Software
B. Providing real-time communication
150. A segment of memory or storage in which such as video calling
items are placed while waiting to be trans- C. Providing anti-virus protection
ferred from an input device or to an output D. Providing for different users to collab-
device. orate on the same document online
A. brownout
155. Which company is responsible for the An-
B. blogging droid operating system?
C. buffer A. Apple
D. burning B. Samsung
C. Google
151. Which of the following a suitable wire-
less security protocols? a. WPA2b. D. Windows
WPA1c. WPAd. WEP
156. Which of the following is NOT a network
A. a, b and c operating system?
B. b, c and d A. Windows Server 2003
C. a, c and d B. Banyan VINES
D. all of them C. Unix
D. Xerox Network Systems
152. Question 1:What type of Software is
needed to control the computer’s hard- 157. System software is a set of needed for
ware? (1-3) a computer to
A. Programming Software A. program, work
B. Systems Software B. instructions, pause
C. Application Software C. instructions, work
D. Bespoke Software D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 333

158. When an ISR is run, the address of the B. multitasking


process is loaded into which register? C. multiprocessing

PRACTICE BOOK» NOT FOR SALE


A. Interrupt Register D. multi-threading
B. Memory Address Register
164. Diving processor time between processes
C. Control Unit so that they appear to multitask is known
D. Program Counter as:
A. Time Slicing
159. Which of the following statements re-
lates to segmentation? B. Fish Slicing
A. Variable size memory blocks C. Time waiting
B. Fixed size memory blocks D. Idle Time

C. Fetching the next instruction as the 165. What is the first thing that needs to hap-
current one is being decoded pen when an interrupt is detected?
D. Parts of files distributed across a disk A. Change the process state of the cur-
rently executing process to blocked
160. The following is not a function of an op-
B. Load the interrupt service routine
erating system:
C. Pop registers off the memory stack
A. Checking for viruses
D. Push the current contents of CPU reg-
B. Directing information from peripheral isters onto the memory stack
devices like a mouse or a printer
C. Allowing users to open applications 166. The user can’t modify the source code
and/or distribute
D. Allocating the computer’s memory be-
tween different tasks. A. Shareware
B. Open Source
161. Who might send out an emergency
C. Closedwaire
alert?
D. Closed Source
A. Mr. Doering
B. Trump 167. Which of the following Wireless proto-
cols is the most secure?
C. Obama
A. WEP
D. Professional Organizations
B. WPA
162. Bytecode is an example of . C. WPA2
A. Machine code D. WINS
B. Assembly language
168. Which type of system needs interactive
C. Source code processing
D. Intermediate code A. Calculating the electricity bill for you
customers
163. One of the capabilities of operating sys-
tems:The computer is capable of operating B. On-Line check in for flights
multiple applications at the same time. C. Controlling an airplane in the air
A. multi-user D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 334

169. Designed to be a small, flexible system C. virtual center


for use by computer programmers D. ROM
A. LINIX E. RAM
B. UNIX
173. Why would an organisation utilise
C. C++ BYOD? a. Increased productivity of staffb.
D. Java Staff balance of professional and personal
livesc. Workplace flexibilityd. Reduced

NARAYAN CHANGDER
170. Which of the following are benefits to cost to the organisation
encrypting a mobile phone? a. The de-
A. a, b and c
vice cannot be unlocked without the pass-
codeb. The information on the users phone B. b, c and d
is unable to be read without the decryp- C. a, c and d
tion codec. This phone is no longer able to
D. all of the them
make or receive phone callsd. The phone is
not able to connect to unsecured wireless 174. You need to prepare a brand-new replace-
networks ment hard drive for storage. What is the
A. a and b only first step needed to get it ready?
B. c and d only A. Format the drive

C. b and d only B. Install an OS

D. a and c only C. Install a file system


D. Create a partition
171. What statement best describes an oper-
ating system 175. Ext2, Ext3 is an example of Linux
A. It is software that provides nice inter- A. Process scheduling
faces to the user for them to run software B. Linux Process scheduling
application.
C. Memory address
B. It provides a GUI to the user and con-
D. File system
nects you to the internet to look at things.
C. An operating system is a system pro- 176. Which of the following services is not
gram that controls and organises the gen- managed by the operating system?
eral operation of the computer. It basi- A. User access rights
cally tells the hardware what to do.
B. Multitasking
D. An operating system operates the ma-
C. File management
chine, and proves an interface for the
user. D. ROM

172. The core of an operating system that 177. Choose two words to describe Dis-
manages memory and devices, maintains tributed Operating System.
the internal clock, runs programs, apps, A. Enter commands, shows menus and
data, and information is called this. options
A. kernel B. Specific time period, used in robots
B. hub C. Interconnected, integrated computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 335

D. Textual commands, does not have any D. All of above


graphics
183. is the standard for?

PRACTICE BOOK» NOT FOR SALE


178. Reorganizes the files and unused space A. Ethernet
on a computer’s hard disk so that the op-
erating system accesses data more quickly B. Bluetooth
and programs and apps run faster. C. Cryptography
A. image viewer D. Wi-Fi
B. screen saver
184. Which of these is not a function of an OS:
C. disk defragmenter
A. Provide a user interface
D. disk cleanup
B. Communicate with hardware
179. What is a virtual machine? C. Allow the computer to multi-task
A. An interpreter that translates interme- D. Improves CPU performance
diate code
B. A computer system which runs soft- 185. When using the interface shown in the ac-
ware in the cloud companying figure, the set of instructions
entered into a computer is called which of
C. A design for a hypothetical machine the following languages?
D. A computer in the cloud A. Command
180. which of these scheduling methods pro- B. Window
cesses jobs in the order they arrive? C. Instructional
A. round robin D. Prompt
B. shortest remaining time
186. Preemption means
C. shortest job first
A. process can be paused by system
D. first come first served
B. process cannot be halted once execu-
181. Windows utilises the following patch tion begins
management tool?
C. process has high priority
A. WDS (Windows Deployment Services)
D. process is short
B. WSUS (Windows sequencial update
services 187. What is the name of the process that can
occur with frequent use of virtual mem-
C. WSUS (Windows Server Update Ser-
ory?
vices)
A. Paging
D. WDS (Windows download services)
B. Thrashing
182. File system File system is?
C. Swapping
A. The shell keeps the end users access
kernel . D. Caching

B. uses to name, store, and organize files 188. what is the main part of the operating
on a drive system
C. produce basic information about data A. user interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 336

B. kernel B. Multi-tasking
C. system utilities C. Single task OS
D. device drivers D. Real-time
189. You are going to purchase a new iPhone. 194. Which of these tasks is a function of the
Which operating system will be instead on operating system?
it?
A. Scanning a photograph
A. iOS

NARAYAN CHANGDER
B. Copying a file
B. OS X
C. Producing a database report
C. iPhone OS
D. Adding data to a spreadsheet
D. ion know

190. The following is not a type of Systems 195. A computer uses to organize all of
Software the different files and applications that it
contains.
A. Device Drivers
A. Folder
B. Utility Programs
B. Icons
C. Applications
C. Trash Can
D. Operating Systems
D. Applications
191. Which Operating System function en-
ables the allocation of folders? 196. factor-authentication (2FA) involves
A. User Interface A. Username and password
B. Memory Management B. username, password and random gen-
C. User Management erated code
D. File Management C. username and random generated code
D. password and passport
192. What is the best definition of the term,
‘memory management’? 197. When you save your document to your
A. The use of hard disk space to store run- computer, where is it stored?
ning jobs when main memory runs out of
A. in the cloud
space
B. in a folder
B. The process of system administrators
setting limits on memory usage C. on the Internet
C. The process of organising the com- D. on a hard drive
puter memory flexibly
198. Which of the following are benefits of
D. An operating system tool to allow the
compressing data? Tick two answers.
user to divide up their hard drive and main
memory A. Files are quicker to download
B. Files take up less disk space
193. A type of OS which can respond instantly
to any inputs or sensors C. The data is secured against viruses
A. Multi user OS D. The data is defragmented

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 337

199. Define the term BYOD 204. Which of the following is a disadvantage
A. Bring your own dessert of a graphical user interface?

PRACTICE BOOK» NOT FOR SALE


B. Bring you ordinary device A. It is intuitive to learn

C. Bring your own device B. It requires a powerful device


D. Bring yellow and orange devices C. It is easy to switch between applica-
tions
200. What’s an operating system?
D. It is simple to use
A. the low-level software that supports
a computer’s basic functions, such as 205. Which of the following statements about
scheduling tasks and controlling peripher- OS is not true:
als. A. OS use Memory Management to try
B. the machines, wiring, and other phys- and minimise the use of virtual memory
ical components of a computer or other B. Drivers use protocols to allow devices
electronic system. to communicate with peripherals
C. the programs and other operating in- C. The BIOS is used to load the operating
formation used by a computer system into memory, from backing stor-
D. an electronic device for storing and age when the computer is turned on
processing D. File management in an operating sys-
tem, is restricted to creating, moving,
201. what is the most widely used operating
deleting and editing files & folders.
system?
A. blackberry 206. Why is it important that you name a doc-
B. linux ument correctly?

C. windows A. To allow anyone to access the file.

D. ios B. So that it doesn’t feel lonely.


C. To find it easily.
202. What is systems software?
D. none of above
A. Physical hardware we can touch
B. Software needed by the system to con- 207. Which of the following is the collection
trol hardware and run applications of stored settings that ensure your cus-
tomizations are in effect whenever you log
C. Software that performs a task to ben-
on?
efit the user
A. Your user profile
D. Ready made software available to any-
one to purchase B. Your domain
C. Your lock screen
203. Windows 10 and Windows Vista are ex-
amples of: D. Your permission level
A. IOS Phone 208. Removes a program or app as well as any
B. Android associated entries in the system files.
C. Microsoft Windows A. file compression
D. none of above B. file manager

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 338

C. uninstaller 213. Which company makes the Windows op-


erating system?
D. screen saver
A. Microsoft
209. Which of the following OSs use the NT B. Google
kernel
C. Amazon
A. Windows 7
D. Linux
B. Windows 3.11

NARAYAN CHANGDER
214. Which of these is NOT an example of in-
C. Mac OS X terrupt
D. Chrome OS A. Power-fail interrupt

210. One of the capabilities of operating sys- B. Clock interrupt


tems:A program can be broken into smaller C. An I/O device sends a signal request-
parts that are loaded as needed by the op- ing service
erating system. This feature allows dif- D. desktop wallpaper changed
ferent parts of a program to be run at the
same time. 215. When a program is loaded, what does the
A. multi-tasking operating system do?
A. Defragment the memory
B. multi-threading
B. Extend the amount of virtual memory
C. multiprocessing
C. Allocate memory for the program
D. multi-user
D. Defragment the drive the program was
211. A administrator is responsible for loaded from
managing computers that are connected to 216. What best describes virtual memory?
a shared printer.
A. Storage in the cloud
A. system
B. The cache memory in the processor
B. database
C. Using the hard disk as if it were mem-
C. technology ory
D. network D. Data is not lost when the computer is
switched off
212. What is the MAIN purpose of end-to-end
testing? 217. What port number is SSH associated
with?
A. To run alternative configurations to
find the best one. A. 21
B. 23
B. To ensure data integrity between sys-
tem components. C. 22
C. To run all components at their maxi- D. 80
mum capacity.
218. Question 9:Operating Systems will allo-
D. To identify areas for improved perfor- cate sections of RAM to the processes as
mance. part of:(4-6)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 339

A. Processor Management 223. Being able to run several applications at


B. File Management the same time is known as

PRACTICE BOOK» NOT FOR SALE


C. Peripheral Management A. Multi tasking

D. Memory Management B. Application management


C. Multi cores
219. What is an advantage of Action
D. Application control
Launcher?
A. Increases the bandwidth of your apps 224. Where are deleted files sent to prevent
you from accidentally deleting files?
B. Allows quicker access to applications
A. Trash Can/Recycle Bin
C. Manages Application
B. A folder
D. Calibrates your screen
C. They are automatically deleted
220. Select the operating system used on the
D. none of above
Chromebook?
A. Chrome OS 225. Mobile devices are updated through a
software distribution method called OTA,
B. Android
what does this stand for?
C. Windows
A. Over the Air
D. Linux
B. Offering The Algorithm
221. Windows 7 and Windows Vista are pro- C. On the Adapter
duced by:
D. Off the AppServer
A. Apple
226. This serves as a security device between
B. Google a computer and Internet sites or between
C. Microsoft multiple computer networks
D. none of above A. hardware

222. What is the purpose of anti-virus soft- B. software


ware (Utility systems software)? C. firewall
A. For security-scramble data using a key D. operating system
to encrypt so it can’t be understood. To
decrypt a key is needed to put it into its 227. Round Robin Scheduling falls under the
original form. category of

B. For security-prevents unwanted ac- A. Non Preemptive Scheduling


cess to or from a private network or the B. Preemptive scheduling
internet. Messages can be blocked based C. Both Above
on criteria e.g. website addresses.
D. None of the above
C. For security-scans for and removes
malicious files. 228. Operating systems are responsible for
D. For security-to block and remove pro- logging users in and out. This function is a
grams designed to get your personal in- part of:
formation. A. user interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 340

B. memory management 234. The tutor that created this quiz?


C. managing hardware and devices A. Conrad
D. none of above B. Nirosha
229. To allow a user to interact with an Oper- C. Andy
ating System-it must have a ?
D. Shep
A. User Connection
235. The OS provides a platform that enables

NARAYAN CHANGDER
B. User Interface
what to be run?
C. Virtual Connection
A. Applications
D. Remote Access
B. Hardware
230. Why use HTTPS? a. Increases user’s
trust and confidenceb. Protects user’s sen- C. Cache
sitive informationc. Allows quicker deliv- D. Processes
ery of webpagesd. Increases Organisa-
tion’s reputation over the internet 236. A company has 20 employees each of
A. all of the above whom have a personal computer. Each em-
ployee needs to be able to run several pro-
B. a, c and d
grams at any given time. Which type of
C. b, c and d operating system would work best?
D. a, b and d A. Single-user, single task operating sys-
tem
231. where is Task bar is Located in Windows
A. Top B. Single-user, multi-task operating sys-
tem
B. Bottom
C. Multi-user operating system
C. Right
D. Unix operating system
D. Left

232. Question 11:This following is an example 237. These are example of Mobile OS Except
of a peripheral (7-9) for
A. Processor A. iOS
B. Main Memory (RAM) B. Symbian OS
C. Hard Disk Drive C. Linux OS
D. ROM D. Android OS
233. Which of the following means the operat-
238. Which of the following does an operating
ing system automatically configures new
system not do
devices as users install them?
A. Operational Buffering A. Manages memory (RAM)

B. Plug and Play B. Manages printing using spooling


C. Virtual Memory C. Manages the ALU
D. Page Logging D. Manages security

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 341

239. Which is not in the PCB B. Mac OS X and Linux


A. Process state C. Mac OS X and Chrome OS

PRACTICE BOOK» NOT FOR SALE


B. resources needed D. Mac OS X, Linux, and Chrome OS
C. program counter 245. Which of these mobile operating system
D. processor size are open source?

240. A portion of software that controls how A. Windows Mobile


you enter data and instructions and how B. Linux
information is displayed on the screen. C. Android
A. user response D. Apple iOS
B. user interface
246. What is the purpose of system clean-up
C. video response tools (Utility systems software)?
D. user name A. For system optimisation-to rearrange
241. Which would be the most efficient way parts of files on a hard drive that have be-
to store files on your computer? come fragmented. This puts then back to-
gether for quicker access.
A. In well organized folders and subfold-
ers B. For system optimisation-to search and
remove files no longer needed.
B. All on your desktop
C. For system optimisation-to make files
C. In one folder smaller so they take up less space.
D. In the recycle bin D. For backing up-copying files to a sec-
242. Operating Systems need to manage Sys- ond medium away from the originals for
tem ? (1-3) safe keeping.

A. Objectives 247. Control Panel containing add/remove


B. Electricity programs, device manager and Trou-
bleshooting are tech launch points for
C. Restores which operating system?
D. Resources A. Windows
243. Question 2:The following is not a type of B. Android
Systems Software (4-6) C. Linux
A. Device Drivers D. macOS
B. Utility Programs
248. Which one of the following statements
C. Applications about OS is NOT true?
D. Operating Systems A. Operating Systems are the interface
244. Peter, a friend of yours, has a piece of between computer hardware and the user
software that was written for Mac OS X. B. The CPU can run multiple processes at
Which of the following OSs will that soft- the same time
ware run on? C. A computer can support several appli-
A. Mac OS X only cations being open at the same time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 342

D. Peripherals require software called 253. What is the difference between pag-
“drivers” in order for the OS to control ing and segmentation in memory manage-
them ment?
A. Paging splits the process to be loaded
249. This is the abbreviation given the the
into equal size blocks
cryptography technique used by HTTPS
B. Paging splits the process to be loaded
A. PIK into variable sized, logical blocks
B. PEKI

NARAYAN CHANGDER
C. Paging allocates frames to hold the
C. PKI data on the hard drive
D. KPI D. Paging is used on Windows computers,
segmentation on MacOS
250. Which is NOT an example of a peripheral
254. Which part of Operating system is re-
device?
sponsible for sending basic instructions
A. Printer and managing the hardware?
B. Monitor A. Kernel
C. Projector B. Shell
D. Computer C. The shell allows the user develop the
D. Freeware
251. What is the purpose of a firewall(Utility
systems software)? 255. Which of these is not a file type?
A. For security-scramble data using a key A. .txt
to encrypt so it can’t be understood. To B. .pdf
decrypt a key is needed to put it into its
C. .exe
original form.
D. .pp
B. For security-prevents unwanted ac-
cess to or from a private network or the 256. Which of the following is NOT a feature
internet. Messages can be blocked based of embedded systems?
on criteria e.g. website addresses.
A. Capable of carrying out a wide variety
C. For security-scans for and removes of tasks
malicious files. B. Often resource limited
D. For security-to block and remove pro- C. Typically designed for a single purpose
grams designed to get your personal in-
formation. D. Includes a simple or no user interface

257. Which file and disk management tool at-


252. A user interface where the user interacts tempts to locate a file on your computer or
with menus and icons is called: mobile device based on specified criteria?
A. Graphical User Interface A. Locator
B. Graphical Super Interface B. Search
C. Command Line Interface C. Seeker
D. Command Super Interface D. Find

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 343

258. space in memory where user processes 264. What is intermediate code?
run.
A. Code that has been compiled and is

PRACTICE BOOK» NOT FOR SALE


A. user management about to be linked to libraries
B. providing a user interface B. Code that has been compiled to run on
C. Multitasking process a virtual machine
D. None of Above C. Low level code that is translated to ma-
chine code
259. Places all the parts of a file in one loca-
tion D. The code produced by a interpreter
A. zipped
265. What is a D.O.S
B. malware
A. Denial of service
C. defragmenters
B. Delay of service
D. disk clean up
C. Downing of service
260. which of these scheduling methods sepa-
rates processes into categories based on D. Destruction of service
their needs for the processor
266. Which part of the operating system deals
A. round robin
with the movement, editing and deletion
B. shortest remaining time of data?
C. shortest job first A. Memory management
D. first come first served
B. File and disk management
E. multi level feedback queue
C. User management
261. Where was BOSS developed?
D. User interface
A. Madras, India
B. Mumbai, India 267. Which f these is a type of Operating Sys-
tem
C. Chennai, India
D. Delhi, India A. Multi User Single Application
B. Single User Single Application
262. Which ones not an example of malware
C. Multi User Multi Tasking
A. spyware
B. viruses D. Single User Multi Tasking
C. adware 268. Program which acts as a boundary be-
D. Josh tween a computer user and the computer
itself
263. Which of these is NOT a Mobile OS?
A. software update
A. iOS
B. Symbian OS B. operating system
C. Linux OS C. network
D. Android OS D. hardware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 344

269. Which of the following are you likely to 274. Application software is
find between multiple school buildings in a A. help the user run specific tasks like
city wide school district? word processors, web browser, email,
A. Peer-to-peer clients, games, etc
B. LAN B. run tasks like the operating systems,
utilities, etc
C. WAN
C. help the user run things down
D. none of above

NARAYAN CHANGDER
D. run tasks like the doing my homework,
270. The ability for a computer to execute revision, etc
more than one task simultaneously
275. With which of the following file systems
A. multitasking can you not rename a file when it’s open?
B. multiprogramming A. ext3
C. multiprocessing B. ext4
D. timesharing C. XFS
D. NTFS
271. This is open source, acts like Unix, com-
posed of just the kernel and not the OS so 276. Which of the following best describes the
that it can be built off of, and is has over ‘multi-level feedback queue’ scheduling al-
300 different types of distributions gorithm?
A. Linux A. Handles processes in the order in
which they arrive
B. macOS
B. Handles each process in turn
C. Uni
C. Handles different queues using priori-
D. Windows ties to promote and demote processes
272. An operating system developed by Apple D. Handles the processes requiring the
used for the iPhones, iPads, and iPods least amount of time to complete first
A. Apple-IOS 277. Which of the following is not a job typ-
B. Mac-OS ically handled by an operating system’s
kernel?
C. Android-OS
A. Managing the use of RAM
D. Linux
B. Handling priority levels assigned to
programs
273. You just deleted a shortcut to an impor-
tant work presentation. What happened C. Managing interactions with the CPU
to the data in the presentation? D. Displaying a GUI
A. Nothing
278. Which type of User Interface contains
B. It’s in the Recycle Bin/Trash Windows, Icons, Menus, and Pointers?
C. It’s deleted A. Command Line Interface
D. It’s in the recovery partition B. Graphical User Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 345

C. Menu Interface 284. Which of these scenarios might result in


D. No User Interface a printer raising an interrupt? (select all
that apply)

PRACTICE BOOK» NOT FOR SALE


279. Windows 10 is successor of?
A. paper jammed
A. Windows 8
B. sudden power cut
B. Windows 7
C. Windows 9 C. empty paper tray

D. None of These D. printer buffer empty

280. Which of these is NOT an operating sys- 285. Before a document prints it waits in the
tem?
A. Windows A. BIOS
B. Linux
B. buffer
C. itunes
C. boot process
D. Android
D. swap
281. Which best describes the position of an
operating system within a computer sys- 286. Operating system used on PC platform or
tem? IBM computer.
A. Operating system > Hardware < Ap- A. IOS
plications
B. Windows XP
B. Hardware > Applications < Operat-
ing system C. Android
C. Applications > Hardware < Operat- D. Mac OS
ing system
D. Hardware > Operating System < Ap- 287. In which of these places might you be
plications most likely to find a peer-to-peer net-
work?
282. By combining the words ‘malicious’ and
‘software’ we get the word ‘malware’. A. On the Internet
What does malicious mean? B. In a home
A. Malicious means delicious. C. In a large office building
B. Malicious means Mali Juice.
D. In a hospital
C. Malicious means harmful.
D. None of these 288. A role of the operating system that helps
keep storage devices well organized and
283. Which of the following is not a resource maintained.
managed by the OS?
A. Application Management
A. CPU
B. Cache B. Disk Management

C. Graphics Processor C. Service Management


D. Data D. Device Management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 346

289. Which of the following is the best defini- C. Device


tion of an interrupt service routine? D. Virtual
A. A software routine that prevents your
system from crashing if it gets an inter- 294. What is POST?
rupt A. Power on Sequence Test-is the diag-
B. A software routine to handle inter- nostic testing of the keyboard, random ac-
rupts which can only be invoked by soft- cess memory, disk drives, and other hard-
ware ware when the PC is turned on

NARAYAN CHANGDER
C. A software routine that hardware or B. Please Operate Speedy Thanks-is the
software invokes in response to an inter- diagnostic testing of the keyboard, ran-
rupt dom access memory, disk drives, and
other hardware when the PC is turned on
D. A software routine which is always in-
voked by a user interrupt action C. Power on Self Test-is the diagnostic
testing of the keyboard, random access
290. Which of the following is a VPN technol- memory, disk drives, and other hardware
ogy when the PC is turned on
A. UDP D. Power on Self Test-is the diagnostic
testing of the human body when it wakes
B. TCP
from sleep.
C. L22P
295. Which type of User Interface is text-
D. L2TP based and requires the user to write com-
291. Which of the following is least likely to mands?
be the reason for an automatic update. A. Command Line Interface
A. Improving Functionality B. Graphical User Interface
B. Enhancing Security C. Menu Interface
C. Modifying Device Drivers D. No User Interface
D. Providing Decryption 296. An open-source, Linux-based mobile op-
erating system made by Google for smart-
292. A type of systems software
phones and tablets.
A. Utilities
A. iOS
B. Closed source software
B. Chrome OS
C. Open source software
C. Android
D. Off the shelf software D. OS X
293. In this kind of memory, the operating 297. How do you select a file or folder inWin-
system allocates a portion of a storage dows Explorer?
medium, usually the hard disk or a USB
flash drive, to function as additional RAM. A. [Ctrl][X]
What kind of memory is this? B. Single-click it.
A. Performance C. shortcut menu
B. Managed D. Folder

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 347

298. What is the ‘Power on self-test’ D. To provide a platform on which users


(POST)? can run programs

PRACTICE BOOK» NOT FOR SALE


A. Program that handles power failures 303. Left, Center, Right, and Justify are op-
while a computer system is running tions for which tool located on the toolbar
B. Program that passes control of the op- or ribbon?
erating over to the user A. Zoom
C. A routine that checks that the hard- B. Line Spacing
ware is installed correctly before loading
C. Bulleted Lists
the operating system
D. Text Alignment
D. Program that loads the operating sys-
tem 304. A file that has been squeezed down us-
ing compression software to make the file
299. What is the best description of a Kernel?
smaller so it can travel faster between
A. A program that is installed after an OS modems.
has been installed A. zipped
B. An application used by everyday user B. small
C. A program that is at the core of a com- C. compression
puter’s OS
D. cookie
D. A piece of hardware that controls the
OS 305. Question 10:This piece of software is
used to control hardware devices and al-
300. This application allows for an invite to be low an Operating System to make use of
sent to a 3rd party for remote help. the hardware (7-9)
A. RDP A. Device Management
B. Remote Desktop B. Device Driver
C. Remote Assistance C. Device System
D. SSH D. Hardware Peripheral Device
301. What does BIOS stand for? 306. Which of the following would be consid-
A. Bonus Input/Output System ered as a MAJOR disadvantage to imple-
menting BYOD to a company?
B. Basic Interface Output System
A. Company data loss
C. Basic Input/Output System
B. Increased bandwidth used
D. Basic Input/Outsource Shape
C. Malware infections
302. What is one purpose of systems soft- D. Personal data loss
ware?
307. Round Robin is also known as
A. To turn source code into machine code
A. Merry go round
B. To synchronise the movement of data
between the registers in a CPU B. circle drive
C. To create documents such as letters C. time slicing
and spreadsheets D. time sharing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 348

308. Question 3:A Virtual Machine is said to 313. Google’s Linux based operating system
(7-9) designed to work primarily with web
apps.
A. Allow the user to play games with Vir-
tual Reality Glasses A. Chrome OS
B. Allow the user to virtually use an Oper- B. Foxfire
ating System
C. Windows 10
C. Allow a MAC to run on Windows
D. iOS

NARAYAN CHANGDER
D. Hide the complexities of the hardware
from the user 314. A list of options a user can choose from
is a .
309. One of the operating system’s functions
A. list
is peripheral management. What is meant
by a “peripheral”? B. tab
A. A type of printer C. menu
B. Any additional hardware device D. form
C. Files and folders 315. From the hard drive’s perspective, mov-
D. The user ing a file is a analogous to which of the
following actions?
310. A message sent by the OS to change the
A. Copy and paste
CPU schedule is known as
B. Cut and paste
A. Interupt
C. Delete and paste
B. Poll
D. Renaming
C. Cache
D. Defrag 316. This has a centralized OS kernel which is
responsible for managing the entire sys-
311. What are the utilities is an OS called that tem. Is considered the mother of most OS
enable programs such as a screen reader? (1965), is proprietary but some versions
are free for development use
A. Accessibility options
A. macOS
B. Reading options
B. Linux
C. User options
C. Unix
D. User account settings
D. MS-Dos
312. Biometric authentication that uses
pattern-recognition techniques based on 317. How many satellites does GPS need to
high-resolution images of the retinal work?
A. Iris Recognition A. 2
B. Fingerprint Recognition B. 4
C. Voice Recognition C. 6
D. Facial Recognition D. 8

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 349

318. is an operating system that is de- D. Ensures that programs/data do not


signed specifically to support a network. corrupt each other

PRACTICE BOOK» NOT FOR SALE


A. Stand-alone OS
323. What is a multi-user operating system?
B. Server OS
A. Computer tasking shared by people
C. Mobile OS
B. multiple users can log in a use the com-
D. Free OS puter at the same time
319. A synonym for operating system is C. In on the cloud supported
A. Platform D. Each user has one porcess
B. FUI 324. Which of the following devices found in
C. Hard Drive the home is NOT an embedded system?
D. Driver A. Electronic coffee maker

320. Original source code is made freely avail- B. Personal laptop


able C. Washing machine
A. Free Source D. Central heating boiler
B. Closed Source
325. Which type of screen relies on the electri-
C. Open Source cal properties of the human body to detect
D. Freeware where a display was tapped?
A. Resistive Touchscreen
321. Which of the following is a function of the
operating system? B. Capacitive Touchscreen
A. To compose and send email. C. SAW
B. To edit photographs and other high- D. Infrared
resolution images.
326. Question 7:To allow a user to interact
C. To control communication and manage with an Operating System-it must have a
files. ? (1-3)
D. All of these are operating system func- A. User Connection
tions.
B. User Interface
322. An operating system manages processes. C. Virtual Connection
In doing so what does the operating sys-
tem do? D. Remote Access
A. Ensures that different processes can 327. A set of programs that coordinate all the
utilise the CPU and do not interfere with activities among computer or mobile de-
each other or crash vice.
B. Allows creation and deletion of user A. RAM
accounts
B. ROM
C. Communicates with and receives data
input to a keyboard/mouse/other valid in- C. firmware
put device D. operating system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 350

328. Icons, menus and windows are part of: 333. Mainframe computers would most likely
A. Graphical user interface make use of which of the following types
of OS?
B. System security
A. Single task
C. Applications and user files
B. Multi-user
D. Graphics or games packages
C. Multi task
329. A type of applications software
D. Real-time

NARAYAN CHANGDER
A. Translators
B. Operating system 334. What does a server do?
C. Off the shelf or Bespoke software A. It provides the basic functions of a
D. Libraries computer
B. It connects computers together
330. What are the 3 most common operating
systems for personal computers? C. It provides a particular service and
manages resources
A. Linux
B. Microsoft Windows D. It is the computer’s memory

C. Mac OS X 335. On a Mac this is called a “Menu Bar”,


D. all of the above on on the Windows desktop screen it is a
“Task Bar”. Where is this located on your
331. What is the purpose of encryption soft- screen?
ware (Utility systems software)?
A. Right Side
A. For security-scramble data using a key
to encrypt so it can’t be understood. To B. Top
decrypt a key is needed to put it into its C. Left Side
original form.
D. Bottom
B. For security-prevents unwanted ac-
cess to or from a private network or the 336. Extremely fast computer which can per-
internet. Messages can be blocked based form hundreds of millions of instructions
on criteria e.g. website addresses. every second
C. For security-scans for and removes A. supercomputer
malicious files.
B. computer
D. For security-to block and remove pro-
grams designed to get your personal in- C. hardware
formation. D. software
332. If an interrupt needs to be serviced, the
337. BIOS is a part of which function?
current contents of the CPU are placed
A. In other registers A. Memory Management

B. In secondary storage B. Bootstrap Process


C. On a stack in main memory C. Process Management
D. In a queue in main memory D. System Restore

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 351

338. Which of the following application 343. A file extension of .xlsx means that the
browsers is compatible with Android? file contains what?

PRACTICE BOOK» NOT FOR SALE


A. App Store. A. An image
B. Safari B. A Word document
C. Google Play. C. An application
D. Chrome D. An Excel document

339. What type of account is created automat- 344. A signal sent by a hardware or software
ically when Windows is installed on a com- to the CPU indicating that something needs
puter? attention is
A. Administrator account A. a system call
B. Standard user account B. interrupt
C. System administrator account C. paging
D. Guest account D. blocking

340. Keeping track of the location of processes 345. Open a shortcut Menu
in memory and allocating space to new pro- A. right click
cesses is known as B. click
A. Memory Management C. double click
B. Process Management D. none of above
C. Memory Scheduling
346. What does the OS manage to allow multi-
D. Process Scheduling tasking?
341. , like Microsoft Suite, are programs A. Hard disk
that are designed to help users to be more B. Memory and CPU
productive with their personal tasks. C. Motherboard
A. Software D. none of above
B. System Software
347. Which of the following is not a method
C. Application software used by the OS to manage memory:
D. Utility program A. Segmentation
342. *may open a “back door” into your com- B. Defragmentation
puter system through which your personal C. Virtual Memory
information can be harvested.*It can also
D. Paging
use your computer power and network
bandwidth to send thousands of spam 348. Microsoft utilises this open source SSH
emails to others. solution
A. Virus A. OpenSSH
B. Trojan Horse B. SSHOpenSystem
C. WAN C. SSHOpen
D. Worm D. OpenSecureSH

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 352

349. HTTPS utilises what port number? C. Voice Recognition


A. 43 D. Facial Recognition
B. 80 355. The 3 types of Ubuntu installations are:
C. 443
A. Server, Taskbar and Core
D. 8080
B. Taskbar, Desktop and Core
350. A system tool used to clean up your disk C. Server, Desktop and Core

NARAYAN CHANGDER
A. Disk clean up D. none of above
B. Cookie
356. Which of the following is required to cre-
C. defragmenter ate Apple iOS apps?
D. GUI A. SDK
351. What is a multitasking computer? B. Xcode
A. Multiple users can be logged in at the C. Google IDE
same time D. Apple Development
B. A CPU core that can run more than one
process at a time 357. Is a non-computer OS, targeted for smart-
phones, open source and has it’s own app
C. Multiple programs can be running at store. Considered a flexible OS because
the same time users can tweak the OS as they wish.
D. A computer that can handle multiple in- A. iOS
put devices.
B. Android
352. A file extension of .mp4 means that the C. Windows
file contains what?
D. Linux
A. A video
B. An application 358. A popular multitasking UNIX based oper-
ating system that runs on a variety of per-
C. An image
sonal computers, servers, and devices.
D. A compressed file
A. Chrome OS
353. Apple’s mobile operating system specifi- B. Foxfire
cally made for Apple’s mobile service.
C. Linux
A. Windows
D. iOS
B. Foxfire
C. iOS 359. part of an operating system’s job with pe-
ripheral management is providing an area
D. Chrome OS of memory called a This compensates
354. A disadvantage of this authentication for the speed difference between the CPU
method is that ridge patterns can be af- and external devices such as printers
fected by cuts, dirt, or even wear and tear. A. track
A. Iris Recognition B. buffer
B. Fingerprint Recognition C. steeplejack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 353

D. billboard 365. An example of a potential deadlock situ-


E. edam cheese ation is

PRACTICE BOOK» NOT FOR SALE


A. a one way bridge
360. If you have a problem in the HTTP server,
who is responsible for solving it? B. a two way bridge

A. Network admin C. a single lane bridge

B. website admin D. a one way train line


C. Sales Manager 366. Password/Pin authentication is consid-
D. none of above ered as
A. Knowledge
361. Physical and mechanical components of
a computer such as the monitor, mouse, B. Possession
chips, keyboard, etc. C. Biometric
A. firewall
D. none of above
B. software
367. Who can establish standard user accounts
C. supercomputer
that allow alterations to security set-
D. hardware tings?

362. This type of operating system can be im- A. Key Users


proved and enhanced by users B. Any Users
A. MacOS C. Secured Users
B. UNIX D. Administrators
C. Windows 7
368. What is the best definition of the term
D. Windows 10 segmentation?
363. Interrupts are also particularly used by A. The organisation of fixed sized mem-
operating systems to take control back of ory blocks
the processor every fixed time period in
B. The logical division of memory blocks
order to implement which function?
C. The physical division of memory blocks
A. security
D. The logical division of a hard disk into
B. utility management
partitions
C. multi-tasking
D. none of above 369. Telnet is an insecure method of remote
management of a system. What port does
364. In the Bootstrap Process, which is first? it utilise?
A. POST A. 20
B. Load BIOS B. 21
C. Charge of electricity to system C. 22
D. Load OS D. 23

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 354

370. THE IS THE MAIN CIRCUIT BOARD B. Any operating system designed to al-
OF A COMPUTER. ALL COMPUTER COM- low multiple processes to be carried out
PONENTS ARE ATTACHED TO IT. at the same time
A. MOTHERBOARD C. An operating system intended to serve
B. EXPANSION CARDS and process data as it comes in, typically
without buffering delays
C. VIDEO CARD
D. Any operating system designed to al-
D. HARD DRIVE low multiple users to connect to it from

NARAYAN CHANGDER
371. Question 4:Dividing tasks so that the Op- different locations at the same time
erating System appears to multitask is 376. When does BIOS run?
dealtwith under:(4-6)
A. Runs after Windows loads
A. Memory Management
B. Runs before you shut down
B. File Management
C. Runs after you log in
C. Processor Management
D. Runs before Windows loads
D. Peripheral Management
377. A translates computer code to control
372. What is information?
and interface with various pieces of hard-
A. hardware and electronics ware, making it usable to an operating sys-
B. software and hardware tem.
C. hard drive, processor A. Kernel
D. (or data) in paper or electronic format B. I/O tower

373. What does VPN stand for? C. Device driver

A. virtual private network D. Monitor

B. video parallel network 378. Which is the best advantage of using Win-
C. video port network dows?

D. virtual port network A. The price


B. The security
374. Which of the following would not be con-
sidered metadata for a spreadsheet file? C. Availability of Software
A. Read-only attribute D. the people
B. Calculation inside the file 379. runs external devices
C. Name of the file A. device runners
D. Full size B. device drivers
375. Which of the following is the best defini- C. device instructors
tion of a distributed operating system? D. none of above
A. A program is executed over a collec-
tion of independent and physically sepa- 380. Which of the following is NOT a step of
rate computers with the results being re- the information system process?
turned to a central server A. Gather

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 355

B. Create 385. Group of 8 bits is called?


C. Store A. Recod

PRACTICE BOOK» NOT FOR SALE


D. Process B. Byte
381. How many applications can be processed C. File
by the CPU at a time? D. none of above
A. 1
386. Which of the following is a segment of
B. 2
memory or storage, such as the disk in
C. 3 the accompanying figure, in which items
D. Several are placed while waiting to be transferred
from an input device or to an output de-
382. A process on a computer is a vice?
A. program in execution A. Process
B. program on the hard drive B. Index
C. high level program C. Buffer
D. low level program D. Throttle
383. An infrastructure technician needs to
387. What does the user interface do?
modify a Linux configuration file using a
text editor. Which of the following util- A. Allows users to communicate with the
ities COULD be used? a) Vi or Vim.b) computer
Gimp.c) Pico.d) Nano. B. Downloads programs and applications
A. a, b and c only.
C. Manages printers and scanners
B. b, c and d only.
D. Acts as the essential center of a com-
C. a, b and d only. puter operating system
D. a, c and d only.
388. What is an example of short term mem-
384. The four managers of an Operating Sys- ory?
tem are.
A. SSD
A. Peripheral Management, Memory
B. RAM
Management, Security Management, Pro-
cess Management C. HDD
B. Peripheral Management, Memory D. Google Drive
Management, Security Management, Mul-
titasking Management 389. What kind of operating system would a
Mars Rover robot require
C. Data Management, Memory Manage-
ment, Process Management, File Manage- A. Batch
ment
B. Interactive
D. Peripheral Management, Memory
C. Real TIme
Management, Process Management, File
Management D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 356

390. what are the purposes of an operating B. Desktop elements


system? C. User accounts
A. to manage applications D. Settings app
B. to run the computers hardware
396. The new Windows browser is called:
C. to take over the world
A. Cortana
D. to protect you from viruses
B. Internet Explorer

NARAYAN CHANGDER
391. Programs which direct the operation of
C. Edge
computers; instructions for a computer
D. Windows Vista
A. hardware
B. firewall 397. What is the purpose of backup programs
(Utility systems software)?
C. computer
D. software A. For system optimisation-to rearrange
parts of files on a hard drive that have be-
392. Programs that are running while you are come fragmented. This puts then back to-
on a computer but are not in use are in the gether for quicker access.
B. For system optimisation-to search and
A. foreground remove files no longer needed.
B. background C. For system optimisation-to make files
C. virtual network smaller so they take up less space.

D. VPN D. For backing up-copying files to a sec-


ond medium away from the originals for
393. is an embedded operating system re- safe keeping.
sides on a ROM chip on a mobile device or
consumer electronic device. 398. Which of these devices can have an
MULTI-TASKING operating system?
A. Stand-alone OS
A. Laptop
B. Server OS
B. Microwave oven
C. Mobile OS
C. Simple mobile phone
D. Free OS
D. Playstation 4
394. This piece of software is used to control
hardware devices and allow an Operating 399. Choose the Microsoft operating system
System to make use of the hardware. A. Windows
A. Device Management B. Android
B. Device Driver C. Linux
C. Device System D. Mac OS X
D. Hardware Peripheral Device
400. The process of starting a computer or mo-
395. The ability for different people to use the bile device from a state when it is powered
same computer is made possible through: off completely.
A. Open-source software A. warm boot

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 357

B. cold boot 406. Which of the following is the process of


C. memory reset starting or restarting a computer or mobile
device?

PRACTICE BOOK» NOT FOR SALE


D. coding
A. Booting
401. VOIP stands for what? B. Lauching
A. Voice Obatum Internal Protocol
C. Loading
B. Voice Over Internet Protocol
D. Keying
C. Vocal Observations In Practice
407. What is the reason computer memory
D. Voice Over Instable Protocol
needs to be managed?
402. What is an Operating System? Is the one A. the amount of memory in a computer
that. is limited
A. Is a software that manages the com- B. to protect your data from hackers
puter hardware and software
C. applications can’t be trusted to use
B. Is a huge program that allows you to memory properly
write and connect to the net
D. none of above
C. is commomly known as the brand of
computers 408. A file system is.
D. It is the system followed by the opera- A. The memory of the computer
tor
B. used when we store documents in USB
403. Most modern OS integrate what into the memories
kernel? C. How are the file named and logically
A. GUI stored in the hard drive
B. Hardware D. they have batteries and need to be
C. Processes charged

D. Cache 409. Memory organization is the process of


which of the following? (choose all that
404. MacOS is designed on which operating apply)
system?
A. periodically saving documents
A. Android
B. assigning memory resources to opti-
B. Unix
mize system preformance
C. Linux
C. backup up the hard drive
D. MSDOS
D. controlling and coordinating computer
405. Which of the following controls the orien- memory
tation of your phone?
410. The Operating System is a program that
A. Gyroscope allows different and various pieces of
B. Accelerometer hardware to with each other.
C. Geotracking A. applications, software
D. Capacitive B. software, application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 358

C. applications, communicate 416. A windows folder shared with a dollar


D. software, communicate sign ($) after it USUALLY indicates what?
A. It is write protected.
411. Fred, a co-worker, heard about new soft-
ware called Lollipop. Which operating sys- B. It is US region specific.
tem is the referring to?
C. It is hidden.
A. iOS
D. It is finance related.
B. OS X

NARAYAN CHANGDER
C. Android 417. Which of the following consists of one
or more chips on the motherboard that
D. Chrome OS
hold items such as data and instructions
412. Which of these devices can have an while the processor interprets and exe-
BATCH operating system? cutes them?
A. Server A. POST
B. Gaming console B. ROM
C. ATM C. RAM
D. Tesla car
D. Basic Input Output System
413. Which of the following is a private combi-
nation of characters associated with a user 418. Operating system is a set of programs
name that allows access to certain com- that connects and manages software with
puter resources?
A. Password A. System
B. Username B. User
C. Folder C. Hardware
D. Cipher D. Application
414. The kernel can be stored in
419. Why do we need Operating Systems? Be-
A. ROM cause it
B. RAM
A. Enables the user to interact with the
C. the Hard Disk computer
D. Computer Disk B. Protect your computer from viruses
415. What is a service pack? C. Is of obligation to run the computer
A. A collection of software updates. D. Because of the applications
B. A form of spyware.
420. Which of these is NOT a Server OS?
C. A power mode designed to provide
emergency power during a power outage. A. Linux
D. A collection of Desktop backgrounds, B. OpenSolaris
sounds and themes that you can find on-
C. Solaris
line and then download and install on your
system. D. Microsoft Windows 10

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 359

421. Which Operating System function en- C. Windows NT Kernel


sures any device can be used with the op- D. Unix
erating system, as long as a driver is avail-

PRACTICE BOOK» NOT FOR SALE


able for it? 427. who created windows
A. Memory Management A. dwayne johnson
B. Peripheral Management B. jimmy savile
C. Bill Gates
C. User Management
D. steve jobs
D. File Management
428. Which of the following types of memory
422. This is a type of system software has the slowest access speed?
A. Disk Cleaner A. RAM
B. Notepad B. Virtual memory
C. Backup and restore C. Processor registers
D. VideoLAN D. Cache

423. The performs memory and hardware 429. What does the term file management
component tests on startup, during a pro- mean?
cess called the Power-on Self Test (POST). A. How your manager is able to find your
A. Kernel file.
B. BIOS B. The way in which we organise our files
and documents on the computer.
C. Device driver
C. How you organise the rough edges of
D. CPU your nails
424. FCFS is operates similar to a D. none of above
A. stack 430. What is the purpose of memory manage-
ment?
B. sorting algorithm
A. To store data in the most efficient man-
C. circle
ner
D. queue B. To optimize the use of RAM
425. Which of the following uses an embedded C. To start the computer and operating
operating system? system quickly
A. Computer D. To allocate system resources stored in
ROM
B. Smart Phone
C. GPS 431. Which of the following should be per-
formed in order to prevent an issue with
D. Tablet information system?
426. Which operating system is iOS based off A. Decreasing security on computers
of? B. Increasing expenses/costs
A. Linux C. increasing complexity of systems
B. Mac OSX D. Increasing security on computers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 360

432. Which of the following is utility soft- C. Operating System


ware?
D. Database software
A. Backup software
B. A game 438. Google Docs or Microsoft Word allows
you to:
C. A word processor
A. create, edit, share and store forms for
D. A web browser
user input.
433. The remote desktop protocol (RDP) al-

NARAYAN CHANGDER
B. create, edit, share and store web-
lows for remote desktop to a PC. What pages and sites.
port number does it function over?
C. create, edit, share and store spread-
A. 389
sheet documents.
B. 80
D. create, edit, share and store word-
C. 21 processing documents.
D. 3389
439. Which of the following application stores
434. What is windows XP? is compatible with Android?
A. legacy operating systems A. App Store.
B. current operating system
B. Windows Marketplace.
C. Shareware software
C. Google Play.
D. none of above
D. BlackBerry World.
435. Which of these tasks is the responsibility
of the operating system? 440. This is a feature that can be found on dif-
A. The power-on self test ferent operating systems is where data is
stored and and a way for the user to find
B. The user interface the data.
C. Synchronising the flow of data be-
A. File structures and paths
tween registers
D. The initial boot sequence B. RAID storage system
C. manage multiple desktops
436. Which is the most secure way of remotely
access a system D. tech launch points
A. Telnet
441. Ubuntu is an open-source Operating Sys-
B. HTTPS tem. This means that:
C. SSH A. it is very expensive
D. Nano B. you pay for the operating system but
437. Which of the following software man- not for the applications.
ages the files and folders on your com- C. the original code is open to devel-
puter’s hard disk drive? operns and programmers to change it ac-
A. Word processing software cording to their needs.
B. Anti-virus software D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 361

442. Dividing tasks so that the Operating Sys- C. Hard copy


tem appears to multitask is dealt with un- D. none of above
der:

PRACTICE BOOK» NOT FOR SALE


A. Memory Management 448. If there is not enough RAM. Virtual mem-
ory is created by the Operating System.
B. File Management
Virtual memory is
C. Processor Management
A. memory that is not real
D. Peripheral Management
B. part of the hard drive allocated as RAM
443. RDP stands for? C. a type of sheep
A. Remote Desktop Programming D. a type of goat
B. Response Device Protocol
449. What is an advantage of a Multi-Level
C. Remote Deployment Protocol Feedback Queue?
D. Remote Desktop Protocol A. Gives processor time to each process
444. With which of the following do users in- in turn
teract with menus and visual images such B. Allows processes to be prioritized
as icons, buttons, and other objects to is-
C. Always completes the shortest pro-
sue commands?
cesses first and so is very responsive
A. Graphical user interface (GUI)
D. Ensure that some processes become
B. Menu-driven interface deadlocked
C. Performance-monitor interface
450. What is the CPU?
D. Command-line interface
A. Circled processing unit
445. A type of OS which would be suited to B. Storage device
use inside aeroplane autopilot systems or
nuclear reactors C. Central processing unit

A. Distributed D. Hard drive


B. Multi-tasking 451. What format is an Android Application
C. Embedded gonna be created as?
D. Real-time A. SDK
B. APK
446. Where is BIOS stored?
C. xCode
A. On the RAM
D. Android Studio
B. On the Motherboard ROM
C. On the GPU 452. All operating systems provide these func-
D. in the CPU tions:
A. Providing a user interface, Managing
447. The out put of the printer is known as the memory, Managing the hardware
A. Print out B. Backing up information, creating
B. Soft copy user’s documents, assessing the Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 362

C. Creation of new programs, deleting B. CPU Timing


and creating files, connecting to other C. CPU Clocking
computers
D. CPU Sorting
D. None of the above
458. What is the BIOS?
453. Which of these is a function of the oper- A. Basic input operating system
ating system?
B. Basic inward outward software
A. To provide tools to create graphics for

NARAYAN CHANGDER
an animation C. Firmware
D. Brown Indigo Orange Silver
B. To maintain the computer system
C. To check all the components are con- 459. On which OS would you use the
nected to the motherboard correctly Ctrl+Window Switcher key to create a
screen capture?
D. To load the first instructions to boot
the computer A. Windows
B. Linux
454. Which of the following is NOT a function
of an operating system: C. Mac OS X
D. Chrome OS
A. Providing an interface between the
user and the hardware 460. SSH allows for remote management of a
B. Managing memory system. Whats does SSH stand for?
C. Allowing the user to organise files A. Secure Software hosting
D. Managing peripherals B. Secure Socket host

E. Creating documents C. Security Socket Host


D. Secure software host
455. An error in a program.
461. One disadvantage of virtual memory is:
A. rat
A. It requires a lot more configuration
B. snake than primary memory
C. bug B. It slows the computer down because
D. fly of the extra data transfer needed
C. It uses up a lot more RAM instead of
456. is a complete operating system that
hard disk space
works on a desktop computer, notebook
computer, or mobile computing device. D. If the remote server is not available
you cannot access your files
A. Stand-alone OS
B. Server OS 462. Which of these are effective strategies
for managing memory on a PC?
C. Mobile OS
A. Increasing the amount of RAM in your
D. Free OS computer
457. Allocating time on the processor to indi- B. Buying a larger hard drive
vidual processes is known as C. Closing down unused programs
A. CPU Scheduling D. Installing a faster CPU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 363

463. At which point in the fetch-decode- 468. The grouping of jobs that require similar
execute cycle are interrupts checked for resources
and processed?

PRACTICE BOOK» NOT FOR SALE


A. timesharing
A. They are checked independently from B. serial processing
the F-D-E cycle
C. multiprogramming
B. After decode but before execute
D. batch processing
C. After fetch but before decode
469. RAM and ROM are both
D. At the end of each F-D-E cycle
A. primary storage
464. Software that help to keep your com- B. secondary storage
puter running efficiently like anti virus
products are called? C. clocking devices
D. on the CMOS
A. Web Sites
B. Utility Programs 470. What would you NOT use a router for?
C. Operating System A. To run applications on your computer

D. Application Programs B. To share information with another


computer
465. Searches for and removes unnecessary C. To connect with another device
files
D. none of above
A. disk cleanup
471. What is the most common way people’s
B. disk defragmenter computers get infected by a virus?
C. image viewer A. Receive a call
D. backup and restore B. Install a new hardware
466. Your friend Michel just purchased a C. Download email attachments
Chromebook and wants to know where his D. None of these
files are stored. What do you tell him?
472. CPU performance is measured through
A. On the hard drive
B. In the system RAM A. Current Root directory
C. In the cloud B. MHz
D. Chromebooks do not store files C. Throughput

467. What do you press on the DELL com- D. None of Above


puter keyboard in order to open the BIOS 473. Who founded Apple Computer?
screen?
A. Steve Jobs
A. F6
B. Steven Fry
B. Esc
C. Bill Gates
C. F2
D. Steve Wozniak AKA THe Great and
D. Tab Powerful Woz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 364

474. In Windows and Mac, the User Interface 479. In which language was Unix originally
is known as written?
A. Home Screen A. C language
B. Desktop B. Assembly language
C. Taskbar C. Java
D. GUI D. C ++

NARAYAN CHANGDER
475. You have the choice of using SSH or telnet 480. Which of the following is not a state that
to remote manage a machine, what would a process in memory can be in?
you choose? A. Ready to run
A. telnet as the commands are built into B. Running
all operating systems
C. Blocked
B. SSH as it provides encryption of the
commands being sent and recieved D. Paused

C. telnet as it provided encryption of the 481. What is meant by the term multi-
commands being sent and received tasking?
D. SSH as all systems have it installed so A. Having more than one user profile so
its there to use different people can log into the same
computer.
476. How many subdirectories are you al-
lowed to create within a single directory B. Running multiple applications at the
is an OS? same time by giving each a small time-
slice of processor time.
A. It depends on the OS
C. Having more than one operating sys-
B. 32, 000 tem installed and choosing which to boot.
C. 64, 000 D. Running multiple applications at the
D. Unlimited same time by having more than one pro-
cessor.
477. Which is the best advantage of using Mac
OS? 482. Which of the following Windows dialog
box features allows you to select several
A. The price
options?
B. The publicity
A. Drop-down lists
C. Better graphic design
B. Radio buttons
D. the people
C. Check boxes
478. Which command displays all network D. Command buttons
adapters installed on a Windows PC?
483. If the interrupt is raised by a program
A. ifconfig rather than a piece of hardware it is
B. ipconfig /all known as a
C. ifconfig-a A. device driver interrupt
D. ipconfig B. operating system interrupt

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 365

C. peripheral interrupt 489. What are virtual servers?


D. software interrupt A. A server design specifically for virtual

PRACTICE BOOK» NOT FOR SALE


reality programs
484. What is an example of emergency notifi-
cation? B. A server which can only operate in the
cloud
A. Amber Alert
C. The process of using software to cre-
B. Domino’s Pizza ate multiple instances of a server
C. Mom Missed Call D. A server that handles virtual memory
D. Doering Edmodo Post
490. when a computer has been taken over by
485. Which of the following secures data in criminal malware it is called what?
transit?
A. a bing
A. FTP
B. a bang
B. Block level encryption
C. a bit
C. IPSec
D. a bot
D. File level encryption.
491. Which of the followings is not GUI oper-
486. Choose the Microsoft Operating System ating system?
A. Windows A. DOS
B. Android B. Windows
C. Linux
C. iOS
D. Mac OS X
D. Linux
487. Which one of these is an automatic input
492. Which of the following is not a way to
device?
open the Start menu on a Windows-based
A. Optical Mark Recognition computer?
B. Mouse A. Ctrl+S
C. Keyboard B. Ctrl+Esc
D. Scanner C. Click the Start button
488. What is meant by the term ‘embedded D. Press the Start key on the keyboard
system’?
493. The operating system provides an inter-
A. A type of system designed to control
face between . (There are two correct
other systems
answers)
B. A virtual system within a system
A. users and hardware
C. A system built into a smart building
B. application and hardware
D. System with a dedicated function
C. motherboard an applications
within a larger mechanical/electrical sys-
tem D. windows and macOS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 366

494. Select the best choice for the statement. 498. Which type of interface uses WIMP ele-
Acomputer icon is a(n): ments?
A. embedded computer A. Command Line Interface
B. small image on a Windows screen tha-
B. Graphical User Interface
trepresents a file or folder
C. file containing the full image of thes- C. Touch Interface
mall one displayed D. Voice Interface

NARAYAN CHANGDER
D. folder
499. Which touchscreens need to be constantly
495. Which of the following is a unique combi- calibrated?
nation of characters, such as letters of the
alphabet and/or numbers, that identifies A. Resistive Touchscreen
one specific user? B. Capacitive Touchscreen
A. Client
C. New Touchscreens
B. Username
D. Gyroscope Screens
C. Password
D. Cycle 500. A IS THE PRIMARY DEVICE THAT
496. What is the purpose of spyware detec- A COMPUTER USES TO STORE INFORMA-
tors (Utility systems software)? TION.

A. For security-scramble data using a key A. CD ROM


to encrypt so it can’t be understood. To B. ROM
decrypt a key is needed to put it into its
original form. C. HARD DRIVE
B. For security-prevents unwanted ac- D. BIOS
cess to or from a private network or the
internet. Messages can be blocked based 501. A multitasking operating system that is
on criteria e.g. website addresses. available for computers manufactured by
C. For security-scans for and removes Apple.
malicious files. A. OS X
D. For security-to block and remove pro-
grams designed to get your personal in- B. Chrome OS
formation. C. Windows 10
497. Which of the following is not true of a D. Linux
virtual machine?
A. Allows one OS to be run within another 502. Which is NOT a function of Operating Sys-
tems?
B. Allows older applications to be run
within their own environment A. Booting the Computer
C. Allows multiple virtual servers to be B. Networking
set up on a single physical server
C. Streaming content
D. Allows access to virtual resources
which make the computer more powerful D. Device Management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 367

503. It is a computer operating system; a sys- 508. which of these scheduling methods pro-
tem that is designed primarily to support cesses jobs FIFO but then with a limited
workstation, personal computer, and, in time slice (quantum)

PRACTICE BOOK» NOT FOR SALE


some instances, older terminal that are A. round robin
connected on a local area network (LAN).
B. shortest remaining time
A. Network Operating System
C. shortest job first
B. WAN
D. first come first served
C. MAN
D. OSI 509. Which of the following commands ap-
pears in the Insert menu or tab?
504. The operating system is responsible
for which software/hardware functions? A. Table
Choose all that apply B. Undo/Redo
A. CPU usage C. Bold
B. RAM usage D. Line Spacing
C. Hard drive access
510. An operating system manages security.
D. Keyboard access In doing so what does the operating sys-
E. Mouse access tem do?

505. Which of the following operating sys- A. Ensures that different processes can
tems is free and open-source? utilise the CPU and do not interfere with
each other or crash
A. Windows
B. Allows creation and deletion of user
B. Mac OS X accounts
C. Linux
C. Communicates with and receives data
D. UNIX input to a keyboard/mouse/other valid in-
put device
506. Which one of the following is not true?
A. kernel is the first part of operating sys- D. Ensures that programs/data do not
tem to load into memory during booting corrupt each other

B. kernel is made of various modules 511. What is the purpose of file compression
which can not be loaded in running oper- software (Utility systems software)?
ating system A. For system optimisation-to rearrange
C. kernel is the program that constitutes parts of files on a hard drive that have be-
the central core of the operating system come fragmented. This puts then back to-
D. kernel remains in the memory during gether for quicker access.
the entire computer session B. For system optimisation-to search and
remove files no longer needed.
507. VOIP utilises the following protocol?
C. For system optimisation-to make files
A. TCP
smaller so they take up less space.
B. PI
D. For backing up-copying files to a sec-
C. HTTP ond medium away from the originals for
D. UDP safe keeping.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 368

512. In an OS, the scheduling of processes is 516. An advantage of having different user ac-
done by counts on a computer
A. the shell (.e.g. bash) A. They are cheap, fast and reliable.
B. the graphical user interface (e.g., B. They are easy to use for all users
gnome) C. They can be time consuming to setup
C. the file system D. You can setup security for different
users, particularly helpful with children so
D. none of the above

NARAYAN CHANGDER
they don’t delete your files and restrict
513. You just copied a file from the Work di- their access
rectory to the Projects directory on your 517. A type of OS which can run on a stan-
Windows PC. What happened to the file dalone PC (or other device) and supports
on the hard drive? the use of running more than one job simul-
A. Nothing taneously

B. The file was removed from the Work A. Multi user OS


directory and placed in the Projects direc- B. Multi-tasking
tory C. Single task OS
C. The file was not moved, but a new D. Real-time
pointer record was created associating
the file with the Project’s directory 518. What is the purpose of a scanner

D. The file was copied to a new location A. to convert images or text on paper to
on the hard drive and was associated with a digital format
the Project’s directory B. to record audio data
C. to print paper copies of files
514. Why is systems software needed? Tick
all that apply D. to play audio data

A. To provide an interface between soft- 519. What is FIFO Algorithm?


ware and hardware. A. first executes the job that came in last
B. To control the memory so that many in the queue
apps can be opened at the same time. B. first executes the job that came in first
C. To allow the computer system to turn in the queue
on. C. first executes the job that needs mini-
mal processor
D. To help maintain or configure a com-
puter system. D. first executes the job that has maxi-
mum processor needs
515. What kind of operating system would be
520. Linux us defined as a , which is also
needed for payroll processing
the core of an operating system.
A. Batch A. Distribution
B. Interactive B. Version
C. Real TIme C. Kernel
D. none of above D. Shell

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 369

521. Mac OS X operating systems are named 526. This allows equipment such as fax ma-
after: chines, printers and files to be “served”
to multiple computers

PRACTICE BOOK» NOT FOR SALE


A. Birds
A. server
B. Fish
B. hardware
C. Wild Cats
C. software
D. Wild Animals
D. computer
522. Which of these Virtual Assistants is de-
527. Mobile device management software al-
signed for Android
lows which of the followinga. Remote
A. Google Wipeb. Trackingc. Security Policy enforce-
B. Siri mentd. Encryption
C. Cortana A. a and b only
D. Yahoo B. a, b and c only
C. b, c and d only
523. An operating system manages backing
D. all (a, b, c and d)
store. In doing so what does the operating
system do? 528. DOS is an acronym for
A. Document is printed when printer is A. Data Operating System
free/in correct order B. Disk Operating System
B. Ensures that data is stored and can be C. Data Operating Software
retrieved correctly from any disk drive
D. Disk Operating Software
C. Ensures that all programs and data in-
cluding itself is stored in correct memory 529. What can an operating system do?
locations A. Allow the hardware and software to
D. On a multi-tasking O/S ensure that all communicate?
tasks appear to run simultaneously B. Make a computer run faster

524. How does a computer virus infect a pc? C. Make tea


D. carry out hospital operations
A. Email attachments
B. Attached to files on memory sticks 530. What is the best description of disk
thrashing?
C. Suspicious web links
A. The read-write head on a disk moving
D. All of the above more than it needs to as a result of disk
525. Which of the following regularly pro- fragmentation
vides new features or corrections to a pro- B. Spending more time transferring in-
gram? structions than executing them
A. Speed Read C. Sending more data from the RAM to
the disk than the controller can cope with,
B. Automatic Update
therefore requiring buffering
C. Recurring Restandardization D. Backing up data to more than one disk
D. Cold Fix at a time using RAID strategies

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 370

531. What system loads first when booting a 537. Which of the following is NOT a desktop
PC? operating system?
A. BIOS A. OS X
B. Word processor B. Windows
C. Operating system C. Chrome OS
D. Firmware D. Google Android
532. If an OS has the ability to run more than

NARAYAN CHANGDER
538. Why do we use a backup utility instead
one program simultaneously what is this of copying and pasting files onto a memory
called? stick?
A. Mutlihandling A. Its an easy interface to use.
B. Multitasking B. It optimises the files that are frag-
C. Multiuser mented by puttin gthem back together.
D. Multiprogram C. Because it is automated, the users will
not forget to backup to a designated drive.
533. The operating system is a type of
D. It cleans the computer of viruses and
A. system software other malicious software
B. general purpose software
539. The purpose of the GUI is to
C. utility software
A. hide the complexities of the machine
D. application software
from the user
534. What is the name of new built in browser B. Guide the user
included in windows 10?
C. to make the screen look nice
A. Oprah
D. none of above
B. Edge
C. Super internet explorer Pro 540. One of the capabilities of operating sys-
tems:Two or more users have individual ac-
D. none of above counts that allow them to work with pro-
535. The memory returned by a call to malloc grams and peripheral devices at the same
comes from the time.
A. data segment A. Multi-user
B. heap segment B. multiprocessing
C. text segment C. multitasking
D. stack segment D. multithreading

536. Which is the definition of free software? 541. Which of the following is a benefit of a
Command Line Interface?
A. The freedom to study how the program
works, and change it A. Does not need a powerful computer
B. The freedom is cheap software B. Easy for inexperienced users to learn
C. The free in the use C. Recognises slang words
D. fredom of the designer D. Looks pretty

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 371

542. What is the purpose of disk defragmen- C. FAT


tation (Utility systems software)? D. HFS

PRACTICE BOOK» NOT FOR SALE


A. For system optimisation-to rearrange
parts of files on a hard drive that have be- 547. What is an Operating System?
come fragmented. This puts then back to- A. Physical parts of a computer
gether for quicker access.
B. A keyboard
B. For system optimisation-to search and
C. A videogame
remove files no longer needed.
D. Software that let a user work with a
C. For system optimisation-to make files
computer
smaller so they take up less space.
D. For backing up-copying files to a sec- 548. Provides a graphical view of all of the
ond medium away from the originals for drives, folders and files on your computer
safe keeping. A. Windows Explorer
543. What is the best way to shut down a com- B. Picture View
puter? C. ROM
A. Press the power button on the com- D. RAM
puter case.
B. Click Start, Power, Shut down, then let 549. Networks, servers, mainframes, and
the process complete. supercomputers allow hundreds to thou-
sands of users to connect at the same time,
C. Press CTRL+ALT+DEL twice. and thus their operating systems are re-
D. Press ESC. ferred to as which of the following?
A. Single User
544. Example of a real time control system
B. Multiuser
A. Payroll processing
C. Multi processing
B. Seat booking system
D. Single processing
C. Engine control unit in a car
D. none of above 550. Select the free operating system with a
version called Ubuntu?
545. Before the operating system is com-
pletely running the handles the start A. iOS
up instructions. B. Android
A. RAM C. Windows
B. ROM D. Linux
C. CPU 551. Which of these is an example of a high
D. BIOS priority interrupt?

546. Which of the following file systems does A. Printer out of paper
not have a built-in security? B. Hard drive failure
A. ext3 C. Keyboard press
B. ext4 D. Interval timer expires

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 372

552. The information contained in a file system 558. The CPU is the of the computer.
A. The computer characteristics A. Knee
B. the direction web B. Brain
C. Location, name, type of flie . C. Body
D. Type of OS, tipe of memory, name D. Heart

553. A interacts with a user and responds 559. A system designed to prevent unautho-
immediately or almost immediately to re- rized access to or from a private network

NARAYAN CHANGDER
quests. A. Adware
A. Multiuser system B. Firewall
B. Time Sharing system C. Antiviruis
C. Real-Time system D. Spyware
D. Multisharing system 560. If somebody is using a laptop at a coffee
554. What native application would be used shop, how are they likely connected to a
to run commands in a Windows environ- network?
ment? A. Wired
A. commando B. 3G
B. Command Prompt C. Wi-Fi
C. Terminal D. none of above
D. Nano 561. Public and Private keys are needed as
part of which cryptography technique?
555. Choose the correct examples of Real-
Time operating systems. A. Symmetric (Private Key)
A. Windows CE B. WEP
B. Linux C. Asymmetric (Shared Key)
C. Unix D. HTTPS
D. Lynx OS 562. From the hard drive’s perspective, mov-
ing a file is analogous (or similar) to which
556. Which one is not an operating system? of the following actions?
A. iOX A. Copy and paste
B. Windows B. Cut and paste
C. Android C. Delete and paste
D. Poloroid D. Renaming
557. Select the operating system used on our 563. What language do operating systems
desktop computers? use?
A. iOS A. The operators language
B. Android B. Binary Code
C. Windows C. Code
D. Linux D. XOXO

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 373

564. Hard drive space that can work as RAM. 569. When the OS creates temporary RAM on
the Hard Drive it is known as
A. Virtual Memory

PRACTICE BOOK» NOT FOR SALE


A. Virtual Memory
B. Application software
B. Cache
C. System Software
D. Driver C. Registering
D. Defragmenting
565. The combination of Linux-based files that
gets released as a product is called what? 570. Which of the following are NOT Operat-
A. Distribution ing Systems (tick all that apply)

B. Version A. iOS

C. Kernel B. Linux

D. Source C. Samsung
D. iPhone
566. Wich is the best advantage of using
Linux? E. MacOSX

A. family of open-source operating sys- 571. What protocol can be used for authenti-
tems, cation on a VPN connection?
B. The design A. CHIP
C. The programs B. CHOP
D. the people C. CHEP
567. What do operating systems provide? D. CHAP
A. A backspace button that you can press. 572. Processor scheduling is one of the func-
B. Communication from you to the com- tions managed by the OS. Which one is a
puter. scheduling method used by the scheduler
C. A server that makes the keyboard A. Round To It
work. B. Round Table
D. Communication between your touch-
C. Round Robin
screen and the speakers.
D. none of above
568. This is a feature that can be found on
different operating systems for grouping 573. A role of the operating system that man-
your open applications and to increase pro- ages applications or programs that are in-
ductivity stalled on a system.
A. File structures and paths A. Application/Program Management
B. RAID storage system B. Service Management
C. manage multiple desktops C. Access Control/Protection
D. tech launch points D. Windows Settings App

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 374

574. File management . C. Putting instructions and data the CPU


A. allocates time for processes to use the is not using to secondary storage to load
CPU in ones that it currently needs

B. is responsible for creating, deleting, D. Putting documents onto a removable


renaming of files and folders storage medium for safe keeping just in
case the original data becomes corrupted
C. stores programs and data that are
presently being used by the CPU 579. A file type that mostly can do harmful ac-

NARAYAN CHANGDER
tion in the computer is:
D. is the method by which the user inter-
acts with the computer system A. .txt
B. .docx
575. The User Interface in Android is called:
C. .exe
A. Desktop
D. none of above
B. Home Screen
C. Taskbar 580. Which utility organizes files efficiently on
the hard drive?
D. Main Menu
A. Uninstaller
576. a set of programs containing instruc- B. Disk defragmenter
tions that work together to coordinate all
the activities among computer hardware C. Backup Utility
resources D. File Manager
A. Operating system 581. Which of the following is not an operat-
B. System Software ing system?
C. Application software A. iPadOS
D. Utility program B. Windows
C. Linux
577. Where are programs executed from?
D. Microsoft
A. Primary storage:RAM & ROM
B. Peripherals 582. A user interface made up of a command
prompt is called:
C. Secondary storage:Hard disk/SSD
A. Graphical User Interface
D. Tertiary storage:External mounted
drives B. Super User Interface
C. Command Line Interface
578. Virtual memory can be explained as:
D. Command User Interface
A. Putting instructions into a memory
space in the CPU so that it doesn’t need 583. A group of computers that share re-
to fetch them again from the RAM if they sources are called what?
are needed soon afterwards A. A network
B. Putting documents you have created B. A router
into the cloud so you can work on them
anytime, on any computer connected to C. A server
the internet D. A personal computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 375

584. How does a worm infect a computer? C. Software will not install
A. E-mail attachments D. You won’t get pester anymore when
you want to run something

PRACTICE BOOK» NOT FOR SALE


B. Through security loopholes, your com-
puter is not up to date 590. System Preferences and the Utility Folder
C. Suspicious web links are tech launch points for which operating
system?
D. On memory sticks
A. Windows
585. attack is an attempt to make an online B. Android
service unavailable by overwhelming it
C. Linux
with traffic from multiple sources.
D. macOS
A. DDos
B. Virus 591. What should be done prior to performing
an operating system upgrade?
C. Service Hacker
A. unplug the computer
D. Trojan Horse
B. backup data
586. The operating system provides an inter- C. create a folder on the desktop with
face between . (choose two) user data
A. users and hardware D. check your email
B. application and hardware 592. What is a utility program?
C. motherboard an applications A. A program that performs tasks for the
D. windows and macOS user
B. A program necessary in order for the
587. Example of a batch processing system system to operate
A. Payroll processing C. A program that allows free access to
B. Seat booking system the software and its source code
C. Engine control unit in a car D. A program that ensures the system
runs smoothly
D. none of above
593. Before purchasing software, make sure
588. Select the operating system used Mac- to
Books or iMacs? A. unplug your computer
A. Chrome OS B. check the system requirements
B. Android C. restart your computer
C. MacOS X D. remove user permissions
D. Linux 594. Which of the following is a non pre-
589. What is the risk of not using user access emptive scheduling algorithm?
control (UAC) within Windows? A. Shortest remaining time
A. It downloads viruses B. Multi-level feedback queues
B. Software can run without the user C. Round robin
knowing D. First come first served

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 376

595. Which of the following is not systems B. The software is spread over a collec-
software? tion of independent and physically sepa-
A. Web Browser rate nodes

B. Anti Virus C. An operating system intended to serve


and process data as it comes in, typically
C. Firewall
without buffering delays
D. Zip Compression
D. Any operating system designed to al-

NARAYAN CHANGDER
596. POST is short for low multiple users to connect to it from dif-
ferent locations / computers at the same
A. Power On Self Test
time
B. Power Off Self Test
C. Program On Self test 601. Which company was created by Bill
Gates?
D. Program Off Self Test
A. Windows
597. What do device drivers do?
B. Macintosh
A. Allows the OS to communicate with
hardware C. Android
B. Drives around the motherboard D. Blackberry?
C. Increases the amount of storage
602. What doesn’t an operating system do?
D. none of above
A. Sorts out data on disk drives
598. Using part of the hard disk as if it were
RAM is known as what? B. Deals with security

A. Virtual memory C. Turns binary in to denary


B. Virtual server D. Deals with transferring data from the
C. Virtual reality CPU

D. Virtual network 603. If you want to record on the paper of


what you are doing, you’ll need a
599. Allison and Jessica send messages to
each other at their place of employment A. calculator
using an online chat room. What is this
B. monitor
process called?
A. Real-time operating C. keyboard

B. Unix serving D. printer


C. Firewall manipulation
604. Contains no permanent data storage de-
D. Network messaging vices to be managed
600. Which of the following is the best defini- A. Distributed
tion of a multi-tasking operating system? B. Multi-tasking
A. Any operating system designed to al-
C. Embedded
low multiple processes to be carried out
at the same time D. Real-time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 377

605. Which of the following is an advantage 610. When choosing an Operating System one
of an IPSec VPN? needs to keep in mind:

PRACTICE BOOK» NOT FOR SALE


A. VPN tunnel is torn down once transfer A. cost, software compatibility and hard-
of data is finished. ware
B. Can only connect one IP address on B. cost, ease of use and hardware
each end of the tunnel. C. availability, software compatibility and
C. Uses WEP to encrypt traffic between cost
nodes on the VPN. D. none of above
D. Public keys are not exchanged be-
611. A short line of text that a web site puts
tween nodes.
on your computer’s hard drive when you
access their website. They may be used
606. What are the most popular operating sys-
to monitor your computer.
tems?
A. Malware
A. Nintendo Switch
B. Cookies
B. Windows and Mac OS X
C. Short text
C. Apple
D. Linux
D. Microsoft
612. Make copies of files in case of loss.
607. In a operating system, the purpose of the
A. backup
stack is
B. subfolder
A. To store the return addresses of called
functions C. rename
B. To keep the parameters of called func- D. copy
tions 613. An operating system manages peripher-
C. To store local variables als such as input and output devices. In
doing so what does the operating system
D. All of the above
do?
608. Which of these devices can have an A. Ensures that different processes can
MULTI USER operating system? utilise the CPU and do not interfere with
A. Personal computer each other or crash

B. Simple mobile phone B. Allows creation and deletion of user


accounts
C. Mainframe
C. Communicates with and receives data
D. Smartphone input to a keyboard/mouse/other valid in-
put device
609. Which is NOT a type of malware?
D. Ensures that programs/data do not
A. Virus corrupt each other
B. Worm
614. Which of these is an example of an oper-
C. Trojan horse ating system?
D. Sandwich A. Windows

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 378

B. Word 620. Operating Systems will allocate sections


C. Excel of RAM to the processes as partof:

D. PS3 A. Processor Management


B. File Management
615. iPad would most likely run on the
C. Peripheral Management
platform
D. Memory Management
A. Windows RT

NARAYAN CHANGDER
B. Mac iOS 621. What mobile payment service uses the
physical phone?
C. Android
A. SMS
D. LINUX
B. Direct Mobile Billing
616. What is a ‘POST’?
C. NFC
A. Permanent On Self Test
D. Mobile Web Payments
B. Permanent On Service Test
622. Operating Systems need to manage Sys-
C. Power On Self Test
tem ?
D. Power On Service Test A. Objectives
617. Which of the following helps distinguish B. Electricity
individual computers, serving the same C. Restores
purpose as a street address
D. Resources
A. Firewall
B. Metropolitan area networks 623. How does the OS provide memory man-
agement?
C. Transmission control protocol
A. By moving data to secondary storage
D. Graphical user interface
B. By allocating processor time between
618. Question 6:Operating Systems need to different programs
manage System ? (1-3) C. By making the communication possible
A. Objectives between the input and output devices and
the computer
B. Electricity
D. By allocating areas of memory to dif-
C. Restores
ferent programs so that each program
D. Resources can run effectively

619. When a hard drive becomes fragmented 624. Which of these is NOT a characteristic of
reading and writing files becomes a Network operating system?
?
A. It is for use in a SOHO environment
A. Faster
B. It provides increased security com-
B. Slower pared to desktop operating systems
C. No different C. It runs multi-user applications
D. Harder D. It supports multiple users

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 Operating Systems 379

625. A signal sent by a hardware or software 630. This operating system provides great us-
to CPU indicating that something needs at- ability for home and business users.
tention

PRACTICE BOOK» NOT FOR SALE


A. Linux Server
A. disturbance
B. Windows Desktop
B. interrupt
C. waiting C. Windows Server

D. exclusion D. Spiceworks

626. Which of these is an advantage to using 631. What native application would be used to
a command-line interface over a GUI? run commands in a Linux environment?
A. More interactive A. cmd
B. Easier to use
B. Command Prompt
C. Less resource heavy
C. Terminal
D. none of above
D. Nano
627. What is the best definition of the term
‘scheduling’? 632. The process of starting or restarting a
A. Method used by your operating system computer is called.
to manage a users calendar
A. kick starting
B. The process which handles the start up
of a computer system on boot up B. driving
C. Term used to describe what jobs get C. reviving
loaded into main memory and when
D. booting
D. Maximising the use of the processor
time between open processes E. charging

628. Which of these are operating system 633. The operating system that a computer
functions? uses sometimes is called this.
A. Processor, CPU and capacitor manage- A. platform
ment
B. firmware
B. Peripheral, CPU and power-supply
management. C. software
C. CPU, RAM, Storage and network man- D. file
agement
D. all of the above 634. The earlier versions of Windows used to
run on a former operating system known
629. Instructions that enable the operating as:
system to interact with a device.
A. Windows 3.1
A. Virtual Memory
B. Application software B. Android

C. System softwarre C. MSDOS


D. Driver D. Windows XP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 Utility Programs 380

635. Windows, Icons, menus and Pointers are C. Read Only Memory
all part of this? (1-4) D. Random Only Memory
A. Graphical User Interface
637. The last character in a file name, after the
B. Command Line Interface
period that usually identifies the program
C. Menu Interface used to create the file
D. No User Interface A. Windows Exploer
636. ROM B. Android-Os

NARAYAN CHANGDER
A. Read Only Memory C. File Extension
B. Read Onsite Memory D. Windows 10

5.3 Utility Programs


1. Spyware is 4. What is the purpose of an Incremental
A. software that installs itself on your Backup?
computer and then gathers information A. Changes the files of everyone on the
about passwords, what Internet sites you system
visit and other confidential information.
B. Allows a user to see what is going on
B. used to help protect your computer
in the computer
against viruses.
C. used to tell you how much storage C. Backs up only the files that have been
space is free on your computer changed by users
D. automatically deletes browsing his- D. Backs up all the files that by all users
tory.
5. Which of the following is not a “Manage-
2. Which part of the operating system will ment” role of an operating system?
move data from the RAM to the virtual
memory to allow the computer to perform A. Memory Management
tasks as though the computer had more B. Peripheral Management
RAM?
C. File Management
A. Memory management
B. File and disk management D. Audio Management
C. User management E. Process Management
D. User interface
6. A(n) is a program that warns or blocks
3. What is the purpose of Utility Software? you from potentially fraudulent or suspi-
Click all that apply cious Web sites.
A. To keep the computer organised A. phishing filter
B. To ensure it has up to date software
B. adware remover
C. To ensure the system runs efficiently
C. Web filter
D. To translate machine code into high
level code D. Trojan horse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 Utility Programs 381

7. Which method of backup takes longer to C. detect and repairs disk problems
perform? D. to improve system performance

PRACTICE BOOK» NOT FOR SALE


A. Incremental
13. Which ones are true in relation to backups.
B. Full
A. It is a copy of computer
C. Fragmented data/files/programs taken and stored
D. Differential elsewhere so that they can be restored
after a data loss event.
8. The software that manages the hardware
and software resources in a computer sys- B. A Full Backup is a complete backup of
tem. all files present on a disk.

A. Operating System C. An incremental backup only backs


up those files which have been al-
B. Utility tered/changed/edited since the last
C. Application backup.
D. Driver D. A restore process means the backed
up files will be restored back to where
9. I think I have a virus on my computer, I they were originally backed up from.
should use a to get rid of it.
A. Antivirus 14. Non-volatile storage not directly accessi-
ble by the CPU and used for long-term stor-
B. Firewall age of programs and data.
C. Automatic backup A. Primary storage
D. Disk cleanup B. Secondary storage
10. A is a specific named location on a C. ROM
storage medium that contains related doc- D. Cache
uments.
A. file 15. What is Encryption software used to do?

B. buffer A. Permanently change data

C. utility B. Revert data to something it wasn’t be-


fore
D. folder
C. Change data so it is unreadable by an
11. What part of the system software enables interceptor
multi tasking? D. Change data so it is readable by an in-
A. Memory management terceptor
B. File management 16. Which is true regarding a desktop screen
C. Processor management “short cut”.
D. Peripheral management A. Windows shortcut is an icon that
points to a program or data file.
12. A computer maintenance utility helps
B. Shortcuts can be placed on the desk-
A. identify and fix relationship problems top or stored in other folders, and clicking
B. identify and fix operating system prob- a shortcut is the same as clicking the orig-
lems inal file.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 Utility Programs 382

C. Deleting a shortcut does not remove A. Key


the original file.
B. Answer
D. Its the quickest path for a creepy crea-
ture to crawl from one side to the other C. Code
side of the screen D. none of above
17. Automatic updates
22. A fragmented hard drive is one in
A. make sure your computer has the lat- which ?

NARAYAN CHANGDER
est security patches and updates for soft-
ware installed. A. Program instructions and data are
spread across tracks and sectors on the
B. creates business documents. hard disk drive
C. shows how much storage space is left B. Programs and instructions are
on a computer. grouped together to occupy a continuous
D. transfers files to other computers. section of the hard disk drive

18. A firewall C. A hard disk drive that has been


dropped and broken into lots of pieces
A. controls and inspects incoming and
outgoing network traffic to prevent unau- D. The hard disk drive is split into portions
thorised access each representing a different logical drive
B. creates business documents
23. What allows a user to interact with the
C. creates a restore point Operating system?
D. searches for malicious programs and
A. User connection
either deletes or quarantines them
B. User interface
19. The operating system on most mobile
devices and manyconsumer electronics, C. Virtual connection
called a(n) , resides on a ROM chip D. Remote access
A. network operating system
24. What can utility software do for you? Se-
B. embedded operating system
lect all options that are true.
C. stand-alone operating system
A. You can configure a computer eg con-
D. stand-alone utility program figure a mouse for left hand/right hand
20. Keep track of where a program is in the use, change resolution
Fetch-Decode-Execute cycle is B. It lets you analyse the use of disk
A. Process Management space, which folders are large in size eg
file manager
B. CPU Scheduling
C. It can lets you optimize your computer,
C. Process Scheduling
for example organise the files better, unin-
D. CPU Management stall programs you don’t use or need
21. If your encrypted data was intercepted, it D. It lets you maintain your computer,
would be unreadable unless the thief had meaning keep it working efficiently for ex-
the decryption ample by using defrag utility

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 Utility Programs 383

25. It is a program that allows you to view C. Back-up


images and animation, listen to audio, and
D. Compression
watch video files.

PRACTICE BOOK» NOT FOR SALE


A. Windows 10 31. What isn’t an example of Utility Software
B. Open Office A. Encryption
C. Windows Media Player B. Task Manager
D. Windows Voice Recorder
C. Kernel
26. A utility program D. Anti-Virus
A. monitors and maintains a computer
system 32. “Making a duplicate of all the users work”
B. sends emails is a description of what?

C. makes sure the CPU is fast enough A. Defragmentation


D. produces office documents B. Drivers

27. Encryption the data to make it unread- C. Task Manager


able D. Backup
A. Scrambles
33. Antivirus software
B. Changes
A. searches for malicious programs and
C. Updates
either deletes or quarantines them
D. none of above
B. creates business documents
28. Re-organises the files by putting the re-
C. makes the hard drive run more effi-
lated files next to each other
ciently
A. Encryption
D. creates a restore point
B. Compression
C. Defragmentation 34. What happens during Defragmentation?
D. Auto-Update (pick 2)
A. Information is rearranged on a USB
29. System information and diagnosis can
B. To make the retrieval of data quicker
A. show how much storage space is free
on a hard drive C. Information is rearranged on a Hard
B. delete temporary internet files Drive
C. create a new user account D. To make the retrieval of data slower
D. searches for malicious programs and
35. What is an advantage of a Full Backup?
either deletes or quarantines them
A. It is expensive
30. To scramble data so that it is unreadable
is a form of .? B. The access to the back up is quick
A. Encryption C. The access to the back up is slow
B. Defragmentation D. The entire process is very quick

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.3 Utility Programs 384

36. What are the benefits of an Incremental 41. I am running out of space on my hard drive,
Backup? (pick 2) I should use the tool.
A. It is quicker than a full back up A. disk cleanup
B. It will incur less traffic on the system B. email
C. It will copy all the files in one go for C. disk defragment
every user D. backup
D. It is slower than full backups
42. which of these is a task utility softwares

NARAYAN CHANGDER
37. You want to write/record/store text, DON’T perform( select all that apply )
graphics, audio, and video files on a record- A. deleting data
able or rewritable CD, DVD, or Blu-ray B. contract softwares
Disc. Which software would you use?
C. manages all files and applications
A. Disc Recording Software
D. computer backup
B. Disc Ruining Software
43. Which of the following is not a piece of
C. Disc Burning software
Utility Software?
D. none of above
A. Encryption
38. In the Windows 7 operating system, B. Compression
provides an enhanced visual look, addi-
C. Defragmenter
tional navigation options, and animation.
D. Translator
A. Windows Aero
B. Plug and Play 44. Which method of backup is quicker to per-
form once an initial backup file is created?
C. Mac OS X
A. Full
D. Windows 7 Starter provides an en-
B. Differential
hanced visual look, additional navigation
options, and animation. C. Fragmented
D. Incremental
39. A is a small program that tells the op-
erating system how to communicate with 45. GUI stands for
a specific device. A. Galaxy using interface
A. buffer B. Grandad uses internet
B. driver C. Graphical user interface
C. performance monitor D. Graphical using interface
D. device
46. I am about to install a new program but
40. Which of the following are functions of a want to make sure I can revert back to the
file manager? computers current state if anything goes
wrong, I should before I do anything
A. displaying a list of files on CD, DVD or
else.
HDD
A. set a system restore point
B. organizing files in folders
B. switch off the firewall
C. Sorting files and folders
C. empty the recycle bin
D. Creating shortcuts
D. send an email to my teacher
CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS
5.4 System Software 385

5.4 System Software

PRACTICE BOOK» NOT FOR SALE


1. Which of the following tasks is NOT per- 6. Utility programs which included in most OS
formed by the operating system? provide the following functions:managing
A. managing computer memory filesviewing imagesuninstalling programs
scanning disksDefragmenting disks Back-
B. managing the CPU ing up files and disksWhich function of OS
C. managing the formatting in a letter related to this description?
D. managing input devices A. Monitoring Performance
B. Providing file, disk and system man-
2. These programs convert programming in-
agement tools
structions written by programmers into a
language computers understand and pro- C. Establishing an Internet Connection
cess
D. Managing memory
A. Converter
E. Starting and shutting the computer
B. Linguistic
C. Translator 7. Two dangers of not updating operating
system software are ?
D. None of the above
A. You loose the license rights
3. Most desktop and laptop computers today B. You computer will defragment
use this type of operating system.
C. Your computer is vulnerable to attack
A. real-time
D. You miss out on new features
B. single-user/single-task
C. single-user/multitasking 8. How many instructions can be carried out
D. multi-user per pulse of the clock?
A. 1
4. A type of operating system which allows
more than one program to run at the same B. 1000
time. C. 100000
A. Multi-tasking operating system D. 10000000
B. Multi-user operating system
9. Allows users to copy, or backup, selected
C. Real time operating system
files or the contents of an entire storage
D. Distributed operating system medium to another storage location.Which
utility program refers to this description?
5. Which sort of user is suited to using a
command-line interface? A. Restore Utility

A. Software Tester B. Disk Defragmenters


B. Network Technician C. File Compression Tools
C. Programmer D. Backup Utility
D. Web Developer E. Antivirus Program

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 386

10. Each device attached to your computer has 15. State three (3) examples of Server OS.
a special program called a(n) that en- A. BlackBerry OS
ables the device and operating system to
communicate with each other. B. Android OS
A. device driver C. UNIX
B. translator D. Solaris
C. interpreter E. NetWare

NARAYAN CHANGDER
D. device configurator 16. What are the causes of data loss?
11. holds many components of the system A. Head crash
and provides connectors for other periph- B. Malfunctions
erals.
C. Controller failure
A. USB
D. Virus attack
B. Touch screen
C. Motherboard 17. The role of the Program Counter (PC) is
to
D. CPU
A. Hold the current instruction being exe-
12. Unencrypted messages are called which? cuted
(1-3)
B. Holds the address of the next instruc-
A. Plaintext tion to be executed
B. Ciphertext C. Holds the address of the memory loca-
C. Keytext tion where data is fetched to be fetched
from or written to
D. Originaltext
D. Used to temporarily store data that is
13. A local football club wants to use a com- read from/written to memory
puter to store all its members’ records. It
wants to keep the club accounts as well 18. An incremental backup.
as send letters to its members. Select A. Makes copies only of the new files
the THREE types of software the club will
need. B. Saves your backup to secondary stor-
age
A. Presentation
C. Makes copies of all files
B. Database
D. Makes a copy of the entire drive
C. Spreadsheet
D. Wordprocessing 19. A is a flash device with a storage ca-
pacity similar to a small hard drive. They
E. Measurement
are faster than hard drives, they have no
14. This was one of the first operating sys- moving parts, and they have lower power
tems ever written consumption than hard drives.
A. Linux A. Solid State Drive
B. UNIX B. Hard Disk Drive
C. Microsoft Windows C. Optical Drive
D. Macintosh OS D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 387

20. Programs and other operating information 25. What is the main benefit of proprietary
used by a computer is called software?

PRACTICE BOOK» NOT FOR SALE


A. Software A. It has been thoroughly tested.
B. Hardware B. It can be changed by anyone.

C. Binary Code C. It is expensive.


D. none of above
D. Peripherals
26. A type of utility program used to reduce
21. A(n) operating system supports two or the size of a program is
more processors running programs at the
same time. A. a file compression program
B. a troubleshooting program
A. virtual
C. an anti-virus program
B. indexed
D. an un-install program
C. multiprocessing
D. fault-tolerant 27. Name of the software which controls hard-
ware devices?
22. What do we call groups of online servers A. Device management
that allow you to easily share and store B. Device system
documents outside of your local com-
puter? C. Peripheral firmware

A. Desktops D. Device driver

B. Cloud computers 28. An OS manages multiple programs and pro-


cesses while you use the computer.Which
C. Mainframes function of OS related to this description?
D. Laptops A. Providing user interface
23. A set of instructions that tell the computer B. Controlling a network
what to do. C. Managing programs
A. Program D. Managing memory
B. Path name E. Starting and shutting the computer
C. WYSIWYG 29. components in a processor are:
D. Multitasking A. Control processing unit and Mathemat-
ical Unit
24. A user is the combination of hardware
B. Logical unit and mathematical unit
and software that helps people and com-
puters communicate with each other. C. Control unit, arithmetic and logical unit

A. panel D. System unit and processing cycle

B. system 30. Search for and removes unneces-


sary/temporary files on computers and
C. surface
mobile.Which utility program refers to this
D. interface description?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 388

A. File Manager B. Disk Scanning Program


B. Disk Cleanup C. Backup Utility
C. File Compression Tools D. Data Recovery Utility
D. Spyware Remover
E. Antivirus Program 36. These are programs that make copies of
files to be used in case the originals are
31. A is a thick magnetic disk encased in lost or damaged

NARAYAN CHANGDER
a thicker protective shell. It consists of
A. Backup programs
several aluminum platters, each of which
requires a read/write head for each side. B. Antivirus
A. Hard Disk Drive C. Utility Software
B. Solid State Drive
D. None of the above
C. Optical drive
D. Flash drive 37. The is a small symbol displayed on the
screen that moves when the user moves
32. Which of the following are types of soft- the mouse
ware?
A. icon
A. System Software
B. menu
B. Programming Software
C. Operating Software C. window

D. Application Software D. pointer

33. These are programs that works with the 38. This is also known as a photo editor, this
operating system to allow communication specialized graphics program edits or mod-
between a device and the rest of a com- ifies digital photographs.
puter system
A. Presentation
A. Antivirus
B. Spreadsheet
B. Utility software
C. Device Driver C. Image Editor
D. None of the above D. Word Processor

34. The BIOS (Basic Input Output System) is 39. A virtual machine
stored in
A. uses secondary storage instead of
A. RAM
RAM when the computer runs out of space
B. ROM on the main memory
C. Virtual Memory B. allows software to act as hardware,
D. Cache running code or an operating system
within another OS.
35. Utility Programs that:Makes a duplicate
copy of selected file or entire hard disk C. can only be used through the internet
A. Program Uninstaller D. relies on cloud storage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 389

40. For a very large and complex system 45. State two examples of Backup and Re-
which needs multiple processors, you store utility program.
would use a OS:

PRACTICE BOOK» NOT FOR SALE


A. Finder
A. Embedded B. Spyware Doctor
B. Real Time C. Time Machine
C. Distributed D. Backup and Restore
D. Multi-Tasking E. Contig
E. Multi-User
46. Operating system utilities is
41. Which of the following is NOT a common A. Computers that perform system main-
type of operating system? tenance and administrative tasks
A. Firefox B. Programs that perform system mainte-
B. Mac OS X nance and administrative tasks
C. Windows C. Hardware that perform system main-
D. Linux tenance and administrative tasks
D. Disks that perform system mainte-
42. Which of these are types of storage nance and administrative tasks
A. RAM
47. A(n) utility allows users to copy se-
B. ROOM lected files or an entire hard disk to an-
C. RUMMING other storage medium.
D. ROM A. copy
B. restore
43. This type of OS can be found on devices
such as printers, ATM’s and Cars. Usually C. safeguard
only has one job and is often designed for D. backup
specific hardware in mind.
A. Real-time operating system 48. Where the result of an arithmetic and log-
ical operation are stored?
B. Embedded system
A. In Accumulator
C. Distributed operating system
B. In Cache Memory
D. multi-tasking system
C. In ROM
44. Define cold boot. D. In Instruction Registry
A. Turning on a computer that has been
powered off completely. 49. The instructions that tell the computer
what to do is called:
B. Using the operating system to restart
a computer. A. Hardware

C. Always restart the computer. B. Input

D. Turning on computer without connect- C. Software


ing the plug. D. Output

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 390

50. This type of software copies data from a C. File Compression Tools
hard drive to another storage device, such D. Backup Utility
as a CD-R drive.Lesson 7-2
E. Antivirus Program
A. program utility
B. driver utility 55. Select a device which contains an embed-
ded system
C. back-up utility
A. Toaster
D. compression utility

NARAYAN CHANGDER
B. Kettle
51. A single user/ operating system al-
C. Microwave Oven
lows a single user to work on two or more
programs that reside in memory at the D. Iron
same time.
56. Example of system software are:-Choose
A. multitasking ALL that apply.
B. interfacing A. Microsoft Word
C. command-based B. Linux
D. throttle C. Unix
52. A type of specialized suite that includes D. Windows 8
a variety of programs designed to make E. Mozilla firefox
computing easier and safer.
A. System software 57. What does the systems software include
from the following?
B. Application software
A. Utility software
C. Utility
B. Drivers
D. None of the above
C. Operating system
53. Emulated computer environment that sim-
D. Hardware
ulates hardware and can be used for
running OS’s separate from the physical 58. Which type of operating system is used
(host) computer. Replicates the function- to control large equipment and to regulate
ality of a physical machine factory operations? Lesson 7-1
A. Multi-tasking machine A. real-time
B. Physical machine B. single-user/single-task
C. Virtual machine C. single-user/multitasking
D. Multi user machine D. multi-user
54. Reorganizes files and unused space on a 59. Which operating system is used for mobile
hard disk so that operating system access devices?
data menu quickly and program run faster.
Which utility program refers to this de- A. Android
scription? B. Android and IOS
A. Restore Utility C. Utility
B. Disk Defragmenters D. Anti-virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 391

60. Which of the following functions might be 65. When it comes to SCHEDULING, choose the
carried out by user management features THREE options that best describes it.
on an operating system? *choose all ap-

PRACTICE BOOK» NOT FOR SALE


A. Program that is used to run certain
propriate answers* hardware at specific times
A. Identifying which are users are on the B. Automatically checks for updates
network
C. Automatically perform certain routine
B. Creating a default log-off time for all housekeeping tasks
users
D. Schedulers can be set to run in off-
C. Monitor network usage by each user peak times
D. Create or change access rights for an 66. What are examples of Operating Sys-
individual user tems?
61. These represent the minimum hardware A. Word, Chrome, Defrag
configuration required in order to success- B. Firefox, Disk Repair, Word
fully install and run an application
C. Word, Chrome, Firefox
A. Drivers
D. None of the above
B. Software requirement
67. Which of the software below is best suited
C. System requirement for an automatic washing machine?
D. Hardware Specification A. Control program
62. Full backup. B. Database
A. Makes copies only of the new files C. Measuring program
B. Saves your backup to secondary stor- D. Search engine
age E. Word processor
C. Makes copies of all files 68. What is the purpose of a firewall in Secu-
D. Only allows you to make a double copy rity Management?
A. To prevent the execution of unautho-
63. User Interface of MS-DOS is
rized programs on a computer
A. Command line interface B. To scan and remove viruses from a
B. Menu-driven interface computer
C. Graphical user interface (GUI) C. To manage the execution of processes
on a computer
D. none of above
D. To check all incoming and outgoing net-
64. Select all the types of secondary storage work traffic on a computer
A. RAM 69. Which is NOT a resource the OS manages?
B. ROM A. Processor
C. Hard Disk Drive B. Memory
D. Cloud Storage C. Input/Output
E. Solid State Drive D. Topology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 392

70. A good antivirus software will deny any 75. Operating systems need to manage
access to unauthorised users.Choose the what?
best synonym of the underlined word.
A. Objectives
A. not allow
B. Electricity
B. resume
C. Restoration of files
C. permit
D. Resources
D. update

NARAYAN CHANGDER
76. Which of the following is a feature of a
71. Which of the following is NOT a type of utility program?
application software?
A. It is unavailable to users.
A. Word processor
B. It is part of an integrated package.
B. Spreadsheets
C. It is written by application users.
C. Windows
D. It is considered to be systems soft-
D. Smart Draw ware.
72. With the Macintosh Operating System
77. Utility software is extra software that
where do you go in order to make any
the Operating System doesn’t provide for.
changes to your computer (desktop back-
Tick three utility software
ground, printer settings, trackpad ges-
tures, etc )? A. Virus Scanner
A. System Preferences B. Excel
B. Finder C. System monitor
C. Mission Control D. Disk defragmenter
D. Launchpad E. Application software

73. What lets you do many things, like write 78. Sorting, Formulas and Charts are all fea-
book reports and stories? tures of which type of software?
A. Antivirus Software A. Spreadsheet Software
B. Email B. Desktop Publishing Software (DTP)
C. Duct Tape C. Database Software
D. Application Programs D. Presentation Software
74. Linux is software, which means its E. Word Processing Software
code is provided for use, modification, and
redistribution. 79. A hard disk drive contains
A. open source A. disks
B. client/server B. platters
C. upgradable C. CDs
D. multitasking D. no moving parts

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 393

80. Searching is when: B. Soft Boot


A. Refers to the process of converting C. None of the above

PRACTICE BOOK» NOT FOR SALE


(extracting) a compressed file back to the
original size D. none of above

B. File Explorer allows you to search for a 85. Which of the following is NOT a capability
file based on certain criteria:file size, type of UNIX?
of file, partial file name, date accessed
and even text in file A. It is multiuser
C. Saving data om a format that can be B. It is multitasking
read by different version of same applica- C. It is a network OS
tion or new application. Menu option ‘Ex-
port’ or ‘Save As’. D. It is only for supercomputers
D. Opening or ‘reading’ data created in
86. Which of the following is NOT a type of
different version of the same application
user interface?
or new application.
A. Command-driven
81. Linux based OS developed by Open Hand-
set Alliance (including Google). B. Application programming interface
(API)
A. Windows Mobile
C. Menu-driven
B. Windows Embedded
C. Android D. Graphical user interface (GUI)
D. none of above 87. Define multiprocessing.
82. A Virtual Machine is said to A. Allows a single user to work on two or
A. Allow the user to play games with Vir- more programs at the same time.
tual Reality Glasses B. Allows only one user to run one pro-
B. Allow the user to virtually use an Oper- gram at a time.
ating System C. Supports two or more processors run-
C. Allow a MAC to run on Windows ning programs at the same time.
D. Hides the complexities of the hard- D. Enables two or more users to run pro-
ware from the user gram simultaneously.
83. Which of the following is a type of soft-
88. Which of the following is the first step in
ware?
the boot process?
A. Application programs
A. The BIOS is activated by turning on the
B. Replicate programs computer
C. Logical programs B. The BIOS checks that all devices are
D. Relative programs operational
84. It is starting of a computer that has been C. The OS is loaded into RAM
turned off D. Configuration and customization set-
A. Warm Boot tings are checked

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 394

89. This is a utility program of Windows Op- 94. A collection of related data
erating System that removes unnecessary A. Data Type
files
B. Information
A. File History
C. Blog
B. Disk Cleanup
D. Database
C. Optimize Drives
D. Defragmenter 95. Which is the correct statement regarding

NARAYAN CHANGDER
the “Application Software”?
90. Which one of these best describes a Graph-
A. *A set of programs that are written
ical user Interface?
for a specific purpose and provide the
A. They are easy to use because they required functionality is called software
make use of icons. package.
B. They can be complicated for inexperi- B. It may be a single program or a set of
enced users. programs
C. They use special command to do tasks. C. *The software that a user uses for ac-
complishing a specific task is the applica-
D. none of above tion software.
91. Which bus sends the request to the RAM D. Control the computer hatrdware and
requesting the next instruction to be exe- software.
cuted?
96. Which of these NOT popular to be use in
A. Address Bus Desktop?
B. Data Bus A. Windows OS
C. Control Bus B. Blackberry OS
D. none of above C. IOS
92. Will Kim Jong Un meet Donald Trump? D. Linux OS
A. There is a strong possibility E. Windows 10
B. No 97. Fill in the blank. the whole program
C. Donald Trump will meet North Korea’s one statement at a time.
leader Kim Jong Un A. Compilers
D. North Korea is threatening to cancel
B. Interpreters
President Donald Trump’s summit with
Kim Jong Un because of planned U.S. mil- C. Translators
itary drills with South Korea. D. none of above
93. Stores the results of calculations made by 98. If a file is fragmented it means that .
the ALU.
A. It is broken and no longer readable
A. Program Counter
B. Parts of the file are scatters in differ-
B. Memory data register ent places on the hard disk
C. Accumulator C. Parts of the files data has been deleted
D. Current Instruction register and cannot be recovered

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 395

D. Parts of the file are stored sequentially B. Empty spaces collected together (1)
on the hard disk C. Files are moved to be stored together

PRACTICE BOOK» NOT FOR SALE


99. Choose three (3) types of Operating Sys- (1)
tem. D. Fewer disc accesses are needed (1)
A. Desktop Operating System E. More disc access are needed (1)
B. Utility Program 104. Which part of the operating system will
C. Server Operating System split the disk in storage sectors and decide
D. Mobile Operating System which sectors to write data to?
A. Memory management
E. Application Software
B. File and disk management
100. Operating system software that allows
C. User management
more than one user to access the same
data is called: D. User interface
A. Multitasking operating system 105. Provides Internet connection. Wired con-
B. Multi-user operating system nectionsWireless connectionsWhich func-
tion of OS related to this description?
C. Single-user operating system
A. Monitoring Performance
D. File managing operating system
B. Providing file, disk and system man-
101. is designed to solve a specific prob- agement tools
lem or to do a specific task.
C. Establishing an Internet Connection
A. Application Software
D. Managing memory
B. b) System Software
E. Starting and shutting the computer
C. c) Utility Software
106. This type of back-up is slowest to restore
D. d) User program
from?
102. The on-screen tools you use to interact A. Incremental
with a computer are called the Lesson
B. Differential
7-1
C. Full
A. operating system
D. Fragmented
B. interface
C. applications 107. Which of the following is a proprietary
OS for desktop and laptop computers?
D. controls
A. Windows
103. A restaurant has a computer-based or- B. iOS
dering system which is running slowly. A
technician has said that the hard disc drive C. Android
is fragmented.Explain how defragmenta- D. Linux
tion software could overcome the issue of
the slow computer system. 108. What is an embedded system?

A. Files on the hard disc drive are moved A. Computers embedded into computers
(1) B. Computers built into other devices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 396

C. Computers that sleep C. Google Chrome/Safari


D. Micro computers D. Ethernet Cable
109. What is the Operating System? 114. Operating system developed in the late
A. The software that manages many of 1960s for midrange servers
the basic tasks of the computer
A. Windows
B. A specific type of Application Software
B. MAC OS

NARAYAN CHANGDER
C. The software that provides an environ-
ment for other software to run in C. UNIX

D. None of the above D. LINUX

110. A utility software is used to 115. Which utility temporarily removes redun-
A. Maintain a computer dancies in a file to reduce the file size?

B. Provides options to manage your files A. Disk Cleanup


and folders B. File Compression
C. Allows the os to manage the hardware C. Error-checking
devices
D. Defragment and Optimize Drives
D. Allows each user to have different ac-
counts on the system 116. File Management
111. Something having no permission to per- A. Provides a method to communicate
form an action is: with the system
A. inauthorised B. Provides options to manage your files
B. disauthorised and folders
C. unauthorised C. allows the os to manage the hardware
D. misauthorised devices
D. Allows users to have different ac-
112. Keeps track of stored files on com- counts
puter so they can be retrieved when
needed.Which utility program refers to 117. The role of the Current Instruction Regis-
this description? ter (CIR) is to
A. File Manager
A. Hold the current instruction being exe-
B. Disk Cleanup cuted
C. File Compression Tools B. Hold the address of the current in-
D. Spyware Remover struction to be executed dividing it into an
opcode/operand
E. Antivirus Program
C. Hold the address of the memory loca-
113. I use what application to go to web- tion where data is fetched to be fetched
pages? from or written to
A. Wifi D. Used to temporarily store data that is
B. Internet Explorer / Firefox read from/written to memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 397

118. An example of a menu interface is a 124. State three types of Utility Program.
A. Pop-up A. Desktop OS

PRACTICE BOOK» NOT FOR SALE


B. Pop-down B. File Manager
C. Push-pull C. Backup and restore Utility
D. Pull-up D. Disk Defragmenters
119. High Level Languages (Python, VB, C#) E. Subject Directory
need to be translated into before it can
125. Choose the best answer. The follow-
be executed by the microprocessor.
ing are considered as system support pro-
A. Machine Code grams except for:
B. Mnemonics A. Utility programs
C. Assemblers B. Backup utilities
D. Compliers C. Data recovery software
120. Splits memory and/or programs into log- D. Operating system
ical blocks containing modules or routines
126. For a system which needs a guaranteed
A. Paging response rate, you would use a OS:
B. Segmentation A. Embedded
C. physical memory B. Real Time
D. splitting C. Distributed
121. A single user/single operating sys- D. Multi-Tasking
tem allows only one user to run one pro- E. Multi-User
gram at a time.
A. throttle 127. Needle on a magnetical drive that writes
data to the disc
B. function
A. read/write head
C. indexing
B. read/write pit
D. tasking
C. read/write land
122. A web browser is an example of? D. read/write needle
A. Operating system software
128. The role of scheduling is
B. Application software
A. To make sure tasks get as much time
C. The Internet software as they need on the CPU
D. A touch screen interface B. To make sure that all tasks get time
123. What type of software am I? Windows on the processor and respond in a reason-
able time
A. Operating System
C. To make sure that the user does not
B. Application software have to wait for processes to run
C. Utility software D. To prevent the user from crashing the
D. none of above computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 398

129. With a graphical user interface (GUI), you B. driver.


can C. plug and play.
A. see the graphic of the computer.
D. configure device.
B. interact with menu and images.
135. This was one of the first operating sys-
C. play with the games.
tems ever written.Lesson 7-2
D. interfere the graphic.
A. Linux

NARAYAN CHANGDER
130. Which of these is an example of a periph- B. UNIX
eral device?
C. Microsoft Windows
A. Processor
D. Macintosh OS
B. Main Memory (RAM)
C. Hard Disk Drive 136. Designed to search for files on the user’s
hard drive
D. Monitor
A. Search Tools
131. Which one is not the example for applica- B. Diagnostic Programs
tion software?
C. Disk Management Programs
A. *Word Processing Software
D. Uninstall utilities
B. *Spreadsheet Software
C. *CAD/CAM Software 137. speeds up your hard disk
D. Anti Virus Software A. It protects your system from Trojans
and viruses
E. *Accounting Software
B. Disk defragmenter
132. The 2 types of system software are:
C. It looks at your current system re-
A. Application software sources
B. Operating system D. none of above
C. Business software
138. Uses data structures consisting of data
D. Utility software fields and methods together with their in-
133. What type of back-up is slowest to re- teractions (objects) to design programs
store from? A. Procedural programming
A. Fragmented B. Object-oriented programming
B. Incremental C. Declarative programming
C. Differential D. Functional programming
D. Full
139. Which type of interface uses ‘WIMP’
134. I plug my pendrive into the USB port. Au- A. Command line
tomatically, the window popup with the
B. Graphical
content inside of my pendrive. This pro-
cess called C. Menu
A. coordinate tasks. D. Natural language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 399

140. What law was created to counteract C. Full backups take longer to complete
hacking? Under this law it is an offence to and require more disk space
gain unauthorised access to computer ma-

PRACTICE BOOK» NOT FOR SALE


D. Menus are easy for users to under-
terial without permission, or destroy unau- stand but can be restrictive in terms of
thorised software/data intentionally. choices
A. Data Protection Act
144. State three (3) examples of Mobile OS.
B. Computer Misuse Act
A. BlackBerry OS
C. Regulation of Investigatory Powers
B. Android OS
Act (RIPA)
C. UNIX
D. Copyright Act
D. iOS
141. The role of the Memory Address Register
E. NetWare
is to
A. Hold the current instruction being exe- 145. A folder or directory can contain:
cuted A. Files
B. Hold the address of the next instruc- B. Folders
tion to be executed dividing it into an op- C. Programs
code/operand
D. All of the above
C. Hold the address of the memory loca-
tion where data is fetched to be fetched 146. State two examples of Spyware pro-
from or written to gram.
D. Used to temporarily store data that is A. Finder
read from/written to memory B. Spyware Doctor
142. Below are 2 advantages and 1 disadvan- C. Spyware Terminator
tage for Graphical User Interface.Choose D. Windows Explorer
the disadvantage
E. MyDefrag
A. The user doesn’t need to memorise the
commands 147. A screen causes a monitor’s screen to
display a moving image or blank screen if
B. Simple to use for beginners
no keyboard or mouse activity occurs for
C. Takes up a lot of processing power and a specified period of time.
memory
A. manager
D. none of above
B. saver
143. How many of the following statements C. utility
are FALSE? ( choose as many as are appro-
D. protector
priate)
A. An incremental backup is more 148. The purpose of a disk defragmenter is
straightforward to restore than a FULL to
backup A. Recover deleted files from the hard
B. A Command Line Interface Operating disk
system is more intuitive to a user than a B. To move applications from RAM to the
GUI hard disk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 400

C. To put together sections of files which 154. Utility programs are usually ?
are physically separated on a hard disk A. Part of the operating system
D. To remove files which are no longer B. Purchased as a disk from a store
needed
C. Only needed if you connect to the inter-
149. A signal from a software program, hard- net
ware device or internal clock to the CPU. D. Very expensive to buy
A. process
155. Select the software below that is APPLI-

NARAYAN CHANGDER
B. Instruction CATION software.
C. processor scheduling A. Spreadsheet
D. Interrupt B. Google Chrome

150. What are the reasons for compressing C. Utilities


video files for sharing on the internet. D. Wordprocessing
A. To use less capacity on the storage E. Windows 10
medium.
156. An Operating system is:
B. To enable a faster transfer of data. A. hardware software that controls all ac-
C. For security. tivities that take place in a computer
D. To allow streaming. B. memory software that controls all ac-
tivities that take place in a computer
151. Assembler is used as a translator for?
C. system software that controls all activ-
A. Low level language ities that take place in a computer
B. High Level Language D. storage software that controls all ac-
C. COBOL tivities that take place in a computer
D. C 157. It acts as an intermediary between the
user and the computer.
152. software, such as operating systems
and utility programs, consists of the pro- A. Operating System
grams that control or maintain the opera- B. Information System
tions of a computer and its devices. C. Disk Management System
A. System D. none of above
B. Application
158. Pre-emptive version of shortest job first.
C. Management If a new job requires less time than the
D. Program job that is currently running, then the cur-
rently running job is terminated so that the
153. It is an environment in which a piece of shorter job can run. Long jobs may not
software is executed. reach the front of the queue
A. File Management A. Shortest job first
B. Disk Management B. First come first served
C. User interface C. Shortest remaining time
D. Digital Platform D. High priority job

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 401

159. It is the outermost layer of the operat- B. A compiler converts the whole of a
ing system that provides a way for you to higher level program code into machine
communicate with the operating system. code in one step.

PRACTICE BOOK» NOT FOR SALE


A. Kernel C. A compiler is general purpose lan-
guage providing very efficient execution
B. Shell
D. All of the above
C. File system
164. The discs that are used to store instruc-
D. none of above
tion in a magnetic hard drive are called
160. What lets the computer’s hardware and A. usb
software work together? B. ssd
A. Operating System C. platter
B. Application Software D. actuator
C. Monitor 165. Designed for mobile phones
D. Central Processing Unit A. Windows Mobile
B. Windows Embedded
161. Which of the following is NOT a Windows
utility program? C. Android
A. Disk Cleanup D. none of above

B. Desktop Cleanup 166. These are programs that organize, ana-


lyze and graph numerical data such as bud-
C. Defragment and Optimize Drives
gets and financial reports
D. System Restore A. Database
162. Julian buys a new laptop with a sys- B. Suite
tem information utility and a diagnosis util- C. Utility
ity.Describe, using examples, the purpose D. Spreadsheet
of the system information and diagnosis
utilities.Select the description and exam- 167. A person who designs the programs in a
ple of Diagnosis utilities. software package is called:
A. displays important data about the cur- A. User
rent state of the computer B. Software Manager
B. -e.g. temperature, free memory, net- C. System Developer
work speed, % processor used D. Software Programmer
C. attempts to detect / resolve items that
168. It is a type of program that protects com-
are not working correctly
puter systems from viruses and other dam-
D. e.g. missing drivers, network connec- aging programs.
tion A. Antivirus
163. What is true for the compiler? . B. Utility software
A. A compiler does a conversion line by C. File compression programs
line as the program is run D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 402

169. Why we need to have secondary stor- C. File Compression Tools


age? D. Spyware Remover
A. Store large volume of data that exceed E. Antivirus Program
the capacity of main memory
B. Perform arithmatic and logical opera- 174. Which one of the following is not a Utility
tions Program?

C. To give power to the system too A. Disk defragmentation tool

NARAYAN CHANGDER
D. To help processor in processing B. Disk formatter
C. Web browser
170. This program contains data needed by a
program to operate an input or output de- D. Anti-Virus software
vice
175. Two examples of software
A. program utility A. Mouse and word
B. driver utility B. OS and Internet Browser
C. backup utility C. Keyboard and Mouse
D. compression utility D. OS and webcam
171. Application software consists of: 176. Which of the following is NOT The role of
A. Entertainment software the operating system:
B. Productivity software A. Providing the user interface
C. Speciality software B. Managing programs
D. All of the above C. Preventing basic security

172. What are the TWO things the Task Man- D. Managing hardware
ager does? 177. The operating system lets you change
A. Provides some information about the some features of the , such as the look
computer’s performance and the applica- of the background or the placement of the
tions and processes running. icons.Lesson 7-1
B. Helps you find the missing documents A. options
scattered all over the hard-drive of the B. programs
computer.
C. desktop
C. Gathers information on the processing
and compiling of modern documents and D. memory
related aspects. 178. Which of the following Windows utility
D. Most often used to terminate a pro- programs arranges pieces of files on your
cess or program that is not responding. hard drive to allow for faster access?

173. Reduce the size of a file(s).Which utility A. Disk Cleanup


program refers to this description? B. Defragment and Optimize Drives
A. File Manager C. Error-checking
B. Disk Cleanup D. Task Manager

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 403

179. Utility programs are usually ? 184. This is the general term for any program
A. Part of the Operating System and procedure running within your com-
puter system.

PRACTICE BOOK» NOT FOR SALE


B. Bought on a disk from a store
A. Software
C. Only needed if you connect to the In-
ternet B. Hardware
D. Very Expensive to buy C. Peopleware
180. The von Neumann architecture proposes D. None of the above
the design for a stored program computer
where both and are stored in the 185. Detects and deletes spyware and other
same memory. similar programs.Which utility program
refers to this description?
A. instructions & data
A. File Manager
B. data & power
C. questions & answers B. Disk Cleanup
D. ant & dec C. File Compression Tools

181. An operating system that organizes and D. Spyware Remover


coordinates how multiple user access and E. Antivirus Program
share resources on a network. This de-
scription refers to 186. What is a definition of Operating Sys-
A. Mobile OS tem?
B. Desktop OS A. A set of instructions that tell the com-
puters what to do
C. Server OS
D. none of above B. A software that performs specific func-
tions for any business or industry
182. For a simple system with very limited
C. A hardware used to enter data and in-
processing power, you would use a
structions by the user for example input
OS:
information in the computer
A. Embedded
D. A set of programs containing instruc-
B. Real Time tions that coordinates all the activities
C. Distributed among computer hardware resources
D. Multi-Tasking
187. Clock speed is measured in cycles per sec-
E. Multi-User ond. 3GHz means
183. The instructions for the microprocessor A. 3000 cycles (instructions) per second
have two parts. The two are called B. 3 million cycles (instructions) per sec-
and ond
A. opcode and operand
C. 3 cycles cycles (instructions) per sec-
B. operator and opcode ond
C. instruction and data D. 3 billion cycles (instructions) per sec-
D. ant and dec ond

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 404

188. Give two examples of utility software A. Application Software


A. Word and anti-virus B. Antivirus
B. Compression software and Power- C. Virtualization
point D. Utility Software
C. Disk defragmenter and file manage-
194. This type of back-up is quicker to restore
ment software
from?
D. none of above
A. Incremental

NARAYAN CHANGDER
189. Which one is not a computer management B. Differential
software?
C. Full
A. Operating system software.
D. Fragmented
B. Device drivers.
195. This operating system is installed on
C. System Utilities more than 90 percent of personal comput-
D. Translator software ers.

190. What kind of software is copyrighted by A. Linux


the author? B. UNIX
A. Shareware C. Microsoft Windows
B. Proprietary software D. Macintosh OS
C. Open Source 196. Allows the user to compress the size of
D. All of these are copyrighted by the au- large files for easier storage.
thor A. Compression Software
191. The following are the types of system B. Antivirus Software
software, except C. Computer games
A. Utility programs D. Presentation applications
B. Operating systems 197. Choose the best answer. The following
C. Application programs are considered as roles of the operating
D. Device driver program system except for:
A. Management of the processor.
192. Describe the purpose of system utility
B. Management of the RAM.
software
C. Management of input/output.
A. Computer system maintenance
D. Management of the motherboard.
B. To keep personal infomation secure
C. Washing machine 198. The Windows app used for locating files
and folders is .
D. Lets the user interact with the com-
puter A. Disk Manager
B. Finder
193. These are programs that perform specific
tasks related to managing computer re- C. File Explorer
sources D. Library Explorer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 405

199. Optical disks use and to represent 204. Events that occur between the time you
the digits 0 and 1. turn the computer on and when it becomes
ready to use.

PRACTICE BOOK» NOT FOR SALE


A. pits and lands
A. Boot process
B. flats and dips
B. Program check
C. ups and downs
C. Start-up
D. ants and decs
D. Operating System Set-up
200. Two MAJOR category of software are:
205. Below are 2 advantages and 1 disadvan-
A. system software and utility programs tage for Command Line Interface.Choose
B. operating system and system soft- the disadvantage
ware A. Takes up less memory
C. utility programs and operating system B. Takes less processing power
D. system software and application soft- C. Can be very confusing to a beginner
ware D. none of above
201. System software is software which al- 206. What is the name of the default browser
lows a computer to run and to be main- that comes with the Macintosh Operating
tained.The two main types of system soft- System?
ware are and
A. Opera
A. PowerPoint B. Safari
B. Utility software C. Spotlight
C. Operating system software D. Firefox
D. Application Software
207. Which of the following is NOT a software
202. This type of visual display lets you use a interface?
mouse to interact with the workspace on A. Command-driven
the computer screen.Lesson 7-1 B. Touch screen
A. graphical user interface (GUI) C. Menu-driven
B. desktop D. Graphical User Interface (GUI)
C. operating system
208. What type of back-up is quicker to re-
D. BIOS store from?

203. When two programs try to occupy the A. Incremental


same space in RAM, one or both may do B. Differential
this C. Full
A. resolve D. Fragmented
B. load
209. Which of the following is not considered
C. run to be system software?
D. crash A. Graphics presentation software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 406

B. Operating system B. load


C. Utility program C. run
D. Language translators D. crash

210. Simple applications that can be down- 215. Software that allows or help user to per-
loaded cheaply; do not have capabilities of form related specific tasks
full version. A. Operating System
A. App

NARAYAN CHANGDER
B. Utility Program
B. Application C. Word Processing
C. Operating System D. Application Software
D. Software Program 216. What software would be used to create
211. Data Compression a website

A. Maintain a computer A. Image editing software


B. Word processor
B. Provides options to manage your files
and folders C. Presentation software
C. Allows the os to manage the hardware D. Web authoring software
devices
217. What does the word autonomous mean?
D. Reduces the size of a file
A. to act on their own without human in-
212. Compared to open source software, retail put
software are generally: B. to be able to process information
A. Less safe quicker than a human
B. Safer C. to be able to drive a car

C. The same D. to create a robot

D. none of above 218. Which type of utility program that works


as a tool to reorganise files & unused
213. What is Application Software? space on computer’s hard disk?
A. Software that manages the running of A. File manager
the computer hardware and other soft-
B. Defragmenter
ware
C. Disk cleanup
B. Specific purpose software used for
specific tasks D. Device driver
C. Software that runs in the background 219. What does the term” Defragmentation”
of a computer system mean?
D. None of the above A. Putting the fragmented data together
214. When two programs try to occupy the B. Makes space on the HDD by getting rid
same space in RAM, one or both may do of any unused
this.Lesson 7-1 C. Scans your computer for viruses.
A. resolve D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 407

220. Optimizing the use of main memory 225. The on-screen tools you use to interact
(RAM) with a computer are called the

PRACTICE BOOK» NOT FOR SALE


A. Memory Management A. interface
B. System Management B. applications
C. File Management
C. controls
D. Database Management
D. operating system
221. What is the function of Process Manage-
ment in an operating system? 226. An example of the computer’s hardware
A. Ensuring that antivirus software is al- would be
ways up-to-date A. MS Word
B. Managing the execution of programs
B. MS Publisher
on a computer
C. Communicating with the firewall to C. Keyboard
check network traffic D. none of above
D. Offering the ability for data recovery
and system restore 227. Process of starting or restarting a com-
puter.
222. Select the functions of an operating sys-
tem from the list below. A. Start the computer.
A. file management B. Booting.
B. storage management C. Cold computer.
C. user interface D. Warm computer.
D. process management
E. Internet browser 228. There are four layer structures that in-
dicate where the operating system soft-
223. What are the two types of User Inter- ware and application software are located.
faces? What is the name of the first layer?
A. Text-Based and Graphics-Based A. User
B. Graphics-Based and Audio-Based
B. Hardware
C. Audio-Based and Text-Based
C. Application
D. None of the above
D. Operating System
224. Lossless compression is ?
A. Usually performed on video files 229. Which of the following are components of
the CPU ( select as many as appropriate)
B. When some original data is lost and
the original file cannot be re-created A. Control Unit
C. The original file can be re-created from B. Buses
the compressed file
C. Arithmetic & Logic Unit
D. Turning the text into a format that only
a reader with a key can decrypt it D. Dedicated Registers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 408

230. Which of the software below is best 235. Allows the user to compress the size of
suited for typing letters? large files for easier storage sending data.
A. Control program A. Compression Software
B. Database B. Antivirus Software
C. Measuring program C. Computer games

D. Search engine D. presentation apllications

NARAYAN CHANGDER
E. Word processor 236. Controls how users enter data and in-
structions and how information is dis-
231. UNIX is an example of this type of oper- played on the screen. Which function of
ating system.Lesson 7-1 OS related to this description?
A. real-time A. Providing user interface
B. single-user/single-task B. Controlling a network
C. single-user/multitasking C. Managing programs

D. multi-user D. Managing memory


E. Starting and shutting the computer
232. what can store the most data
237. Which of the following is not a utility pro-
A. DVD gram?
B. BLU-RAY A. Disk repair program
C. CD B. Backup program
D. none of above C. Spreadsheet program

233. To scramble data so that it is unreadable D. File defragmentation program


is a form of ? (4-6) 238. Which of the following best describes a
A. Compression command line interface?
B. Encryption A. It is made up of colourful icons to click
on.
C. Backing Up
B. It is operated using special com-
D. Defragmentation mands.

234. Organizes and coordinates how multiple C. It is operated by touching the screen
users access and share resources on a net- with your finger.
workWhich function of OS related to this D. none of above
description?
239. These are designed to run all of its appli-
A. Providing user interface cations and services thru a web browser.
B. Controlling a network A. Real-time OS
C. Managing programs B. Internet/Web OS
D. Managing memory C. Multi-user OS
E. Starting and shutting the computer D. Network OS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 409

240. This model is an iterative approach to 244. is the process of starting or restart-
software delivery that builds software in- ing a computer.
crementally from the start of the project,

PRACTICE BOOK» NOT FOR SALE


A. Launching
instead of trying to deliver it all at once
near the end. B. Loading
C. Booting
A. the waterfall lifecycle model
D. Keying
B. Spiral model
C. Agile modelling 245. What is the purpose of Anti-Virus soft-
ware?
D. Extreme programming
A. To keep the computer safe from mali-
241. UNIX is an example of this type of oper- cious software
ating system. B. To keep people safe from other people
A. real-time C. To keep the computer safe from de-
fragmantation
B. single-user/single-task
D. To keep data safe
C. single-user/multitasking
246. Protects a computer against viruses.Which
D. multi-user
utility program refers to this description?
242. Assess and report information about vari- A. File Manager
ous computer resources and devices.Which B. Disk Cleanup
function of OS related to this description?
C. File Compression Tools
A. Monitoring Performance
D. Spyware Remover
B. Providing file, disk and system man-
E. Antivirus Program
agement tools
C. Establishing an Internet Connection 247. Which one of these best describes open
source software?
D. Managing memory
A. A type of operating system.
E. Starting and shutting the computer
B. Free software downloaded from the in-
ternet.
243. A good algorithm has which properties?
C. Software bought from a shop.
A. It should allow invalid inputs
D. none of above
B. It must always terminate at some
point 248. Which of the statements best describes
Application software?
C. It should execute efficiently, in as few
steps as possible A. Performs a specific task for computer
users
D. It should be designed in such a way
that other people will be able to under- B. Includes programs designed to help
stand it and modify it if necessary. programmers

E. It has clear and precisely stated steps C. Is used to control the operating sys-
that produce the correct output for any set tem
of valid inputs. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 410

249. Compression is: management, memory management, con-


A. Additional data stored about a file trols hardware, etc

B. Property of file that can be set A. Application software


B. Operating system
C. Basic information about files, name,
size and date modified C. system software
D. Process of reducing the size of a file D. control unit
255. Programs written in low-level languages

NARAYAN CHANGDER
250. Most supercomputers use the operat-
ing system. (select all that apply)
A. UNIX A. are less memory intensive
B. Linux B. allow the programmer to directly con-
trol hardware (in embedded systems)
C. Windows
C. easy to write and test
D. iOS
D. easy to run on any machine
251. Designed for consumer and industrial de-
vices that are not personal computers 256. State two examples of Disk Defrag-
menters program.
A. Windows Mobile
A. Finder
B. Windows Embedded
B. Spyware Doctor
C. Android
C. MyDefrag
D. none of above
D. Windows Explorer
252. Which is NOT considered application soft- E. Contig
ware?
257. Which is faster to restore?
A. Word
A. Full Backup
B. Photoshop
B. Incremental Backup
C. Android
C. Only one backup needs to be restored
D. Audacity
D. The full back up needs to be restored
253. This testing is carried out by the software first then each incremental backup
developer’s in-house testing team.It is es-
258. Which Operating System function en-
sential because it often reveals both errors
ables allocation of folders? (1-3)
and omissions in the system requirements
definition. A. User Interface
A. Beta testing B. Memory Management
B. Alpha testing C. User Management
C. Black box testing D. File Management
D. White box testing 259. Lossy compression is ?
254. The software that runs on a computer A. Usually performed on text
that is responsible for the management of B. When some original data is lost and
the computer. Provides user interface, file the original file cannot be re-created

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 411

C. The original file can be re-created from B. Allocating memory to an application in


the compressed file the most effective manner

PRACTICE BOOK» NOT FOR SALE


D. Turning the text into a format that only C. Keeping track of which memory ad-
a reader with a key can decrypt it dresses are available and which are taken
260. The two major types of system software D. None of the above
programs are utility programs and the
265. Which one of these best describes appli-
A. supervisor programs cation software?
B. application software
A. Antivirus software.
C. user interface
B. Software that allows you to make
D. operating system . slideshows and type letters.
261. Which is not in the category of software C. Software that keeps your computer
market? system healthy.
A. *OEM Software stands D. none of above
B. *Open-Source Software
266. These operating systems control a single
C. *Retail Software desktop computer
D. Embedded software A. Stand-alone operating system
262. Which of these are examples of Operat- B. Network operating system
ing system?
C. File compression program
A. WinZip
D. Embedded operating system
B. Haiku
C. Windows 267. State two examples of Antivirus pro-
gram.
D. Android
A. Finder
263. What is Security Management in an oper-
B. Avira
ating system responsible for?
A. Managing the execution of programs C. Kapersky
on a computer D. PhoneClean
B. Controlling the amount of time a pro- E. WinZip
cess has access to a computer’s re-
sources 268. User Management
C. Ensuring that antivirus software is up- A. Provides a method to communicate
to-date and scanning regularly with the system
D. Creating and managing user accounts B. Provides options to manage your files
on a computer and folders
264. What is Memory Protection? C. allows the os to manage the hardware
devices
A. Ensuring that two running applications
do not use the same addresses in main D. Allows each user to have different ac-
memory counts on the system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 412

269. software is privately owned soft- 274. Which of the following is an example of
ware and limited to a specific vendor or a peripheral?
computer model. A. Processor
A. Stand-alone B. RAM or Main Memory
B. Freeware C. Hard disk drive
C. Proprietary D. ROM
D. Shareware
275. Which one of these best describes a func-

NARAYAN CHANGDER
270. This interface requires the user to type in tion of an operating system?
codes or words A. It allows the users to run apps.
A. Command Line B. It connects all of the components with
B. Graphical cables.
C. Menu Driven C. It makes the computer system faster.

D. none of above D. none of above


276. These are programs typically used to cre-
271. What is the function of interface?
ate sophisticated commercial websites.
A. Provides an interface to interact with
A. Game Design Programs
the operating system
B. Presentation Graphics
B. Allows multiple applications to run at
the same time C. Illustration Programs
C. Provides tools to manage and organ- D. Web Authoring Programs
ise hardware 277. Which statement define the software?
D. Provides user accounts and pass- A. *Software is a set of instructions that
words. setting up policies to provide user govern the computer about the drawing
rights over the computer and typing to be performed.
272. It is intended to serve real time applica- B. *Software is a set of programs that in-
tion that process data as it comes in. structs the computer about the tasks to be
A. Network OS performed.

B. Real-time OS C. *Software is a set of hardware por-


tions that the control about the memory
C. Multi-user OS and the hard disk to carryout results.
D. Internet/Web OS D. None of the above.
273. What are the two broad categories of 278. A(n) interface controls how users en-
computer software? ter data and instructions into a computer
A. System Software ANDUtility Software. and how information is displayed on the
screen.
B. Utility Software ANDApplication Soft-
ware. A. control
C. System Software AND B. utility
D. Application Software ANDCAD, CAM C. user
Software. D. management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 413

279. Open Source Software is ? C. To clean up the useless data.


A. NOT safe D. none of above

PRACTICE BOOK» NOT FOR SALE


B. Safe 285. What is the purpose of peripheral man-
C. KIND OF safe agement (as a part of the Operating Sys-
D. The safest tem)?
A. Provides a method to communicate
280. It is used to support computer infrastrac- with the system
ture?
B. Manages your programs
A. Operating System
C. Allows the Operating System to man-
B. Device Drivers age the hardware devices
C. Middleware D. Allows users to have different ac-
D. Utility Software counts

281. [Select all appropriate answer]Example 286. A computer program that controls a par-
of Application software ticular device that is connected to your
A. Photoshop computer for configuration?

B. Excel A. Operating System

C. Word B. Middleware

D. Windows C. Device Drivers

E. All of these D. Utility Software

282. All memory is measured in what? 287. What law states that your data can be
handed over to the police or security ser-
A. Meters (m) vices to prevent terrorism and crime?
B. Volume (v) A. Data Protection Act
C. Giga Bytes (GB) B. Computer Misuse Act
D. Inches (in) C. Regulation of Investigatory Powers
283. It is a program that acts an interface Act (RIPA)
between the software and the computer D. Copyright Act
hardware.
288. The predominate personal operating sys-
A. Cache tem developed by Microsoft Corporation
B. Operating system A. Windows
C. CPU B. MAC OS
D. RAM C. UNIX
284. Why will someone encrypt their files? D. LINUX
A. To scramble their data so that unautho- 289. Key job of the operating system. Al-
rised users can’t access it. lows programs to be stored safely and ef-
B. To scramble their data so that they get ficiently. Restricts each program to access-
confused. ing and amending its own area of data.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 414

A. Processor scheduling 294. Quality Developers is a company that


writes programs to do specific jobs for
B. Interrupt service routines
other companies. These programs are
C. Memory management called
D. Backing store management A. general-purpose software
B. special-purpose software
290. The following is NOT a type of Systems
Software? C. custom-purpose software

NARAYAN CHANGDER
D. off-the-shelf software
A. Device Drivers
B. Utility Programs 295. A full-featured software that can run
complex software like a word processor
C. Applications or spreadsheet.
D. Operating Systems A. Application
B. Apps
291. What rearranges parts of the file on the
disk drive to move them all to the same C. Software Program
area for quicker access? D. Operating System
A. Firewall 296. Define multitasking.
B. Disk Defragmentation A. Allows a single user to work on two or
C. File Compression more programs at the same time.
B. Allows only one user to run one pro-
D. Encryption
gram at a time.
292. What is the first thing that happens when C. Supports two or more processors run-
a computer is switched on ning programs at the same time.
A. Try and find and load the operating sys- D. Enables two or more users to run pro-
tem gram simultaneously.
B. Instructions perform some basic hard- 297. Select all the application software:
ware tests A. Spreadsheets
C. Process of loading the operating sys- B. Word Processors
tem is called booting the computer
C. Browsers
D. Computer looks for instructions to fol- D. Operating System
low (on ROM)
E. Anti-Virus
293. What is the purpose of a user interface 298. Segmentation:
(as a part of the operating system)
A. Splits processes into variable sized
A. Provides a method to communicate pieces
with the system
B. Splits processes into set sized pieces
B. Is a graphical layout C. Keeps processes together in RAM
C. Is user management D. Places processes wherever there is
D. Allows users to have different ac- space in RAM
counts E. Can cause stack overflow

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 415

299. Aryan buy a new printer. If the new 304. A(n) operating system enables two
printer attached to a computer, the or more users to run programs simultane-
must be installed before the device can be ously.

PRACTICE BOOK» NOT FOR SALE


used.
A. multiplied
A. driver
B. multiuser
B. kernel
C. engaged
C. platform
D. rasterized
D. manager

300. Each platter on a magnetic hard drive is 305. Which of the following statements is not
broken down into tracks. What part of the true
track is data stored into? A. Buses typically consist of 8, 16, 32 or
A. Section 64 lines
B. Sector B. Most modern computers use a range
C. Track Segment of general purpose registers rather than
a single accumulator
D. Quadrant
C. Memory is divided into units called
301. The layout arrangement of the different WORDS which are variable in size
devices in a network?
D. The ALU can perform mathematics
A. Open System with fixed and floating point numbers, as
B. Closed Sytem well as logical shifts and boolean logic
C. Network Topology
306. Software is;
D. Computer Network
A. instructions that control processing
302. Which of the following are examples of
B. programs or sets of instructions
Utility Software?
C. the meeting point between parts of a
A. Word Processor
system
B. Anti-virus software
D. the general term of components
C. Web Browser needed to perform a task
D. Disk Defragmenter
E. Fortnite 307. What is the User Interface (UI)?
A. The part of the Operating System that
303. to optimize the use of RAMWhich func- manages memory optimization
tion of OS related to this description?
B. The part of the Operating System that
A. Providing user interface
enables the user to interact with the sys-
B. Controlling a network tem
C. Managing programs C. The part of the Operating System that
D. Managing memory manages hardware devices
E. Starting and shutting the computer D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 416

308. At the start of the process the require- C. Presentation software


ments are defined and the developers D. Web authoring software
work towards an initial prototype. Each
successive loop around the spiral gener- 313. RAM stores (select all that apply)
ates a refined prototype until the product A. Operating System
is finished.
B. Files/Programs you are currently us-
A. Waterfall life cycle model ing
B. Agile modelling

NARAYAN CHANGDER
C. BIOS
C. Spiral model D. Backup data
D. Rapid application developement
314. When you purchase a personal computer,
309. Which of the following tasks is NOT per- it usually has system software installed on
formed by the operating system? Lesson its hard disk.
7-1 A. True
A. managing computer memory B. False
B. managing the CPU C. Not Sure
C. managing the formatting in a letter D. none of above
D. managing input devices
315. The process of starting or restarting a
310. How much storage space do you need on computer is called bootingWhich function
your hard drive in order to install and use of OS related to this description?
an application successfully? A. Providing user interface
A. Just enough space to hold the program B. Controlling a network
files
C. Managing programs
B. Applications never use any hard drive
space D. Managing memory

C. Enough space to hold the program files E. Starting and shutting the computer
and any data files you might produce 316. Which of the following is designed to con-
D. Just enough space to hold your data trol the operations of a computer?
files A. Application Software
311. A file utility is a utility that shrinks B. System Software
the size of a file(s). C. Utility Software
A. unit D. User
B. compression
317. This program contains data needed by a
C. matrix program to operate an input or output de-
D. conversion vice.Lesson 7-2

312. What software would be used to create A. program utility


a logo B. driver utility
A. Image editing software C. backup utility
B. Word processor D. compression utility

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 417

318. It is an online diary or commentary C. The user interacts with the machine
A. Article via the operating system

PRACTICE BOOK» NOT FOR SALE


D. Operating system intermediates be-
B. Channel
tween the hardware and the user
C. Site
E. Run for specific tasks.
D. Blog
323. Which of the following is easy to remem-
319. The role of the Memory Data Register is ber and makes Graphical User Interfaces
to user-friendly?
A. Hold the current instruction being exe- A. Icons
cuted B. Menu
B. Hold the address of the next instruc- C. Mouse
tion to be executed dividing it into an op-
D. Window
code/operand
C. Hold the address of the memory loca- 324. The of the operating system enables
tion where data is fetched to be fetched users to communicate with the computer
from or written to system.

D. Used to temporarily store data that is A. window


read from/written to memory B. modem
C. network adapter card
320. Designed for Apple Mobile phones and
mobile devices. D. user interface
A. iPhone OS 325. Which software is designed to solve a
B. BlackBerry Operating System specific problem or to do a specific task?
A. Application Software
C. Palm OS and Palm webOS
B. System Software
D. Symbian OS
C. Utility Software
321. An integrated software package: D. User
A. Can transfer data from one component
326. What does a full backup entail?
to another very easily
A. Makes copies only of the new files
B. Costs less than individual applications
B. Saves your backup to secondary stor-
C. Takes up less disk space than individ-
age
ual applications
C. Makes copies of all files
D. All of the above
D. Only allows you to make a double copy
322. Which statement is incorrect regarding
327. Utility programs are usually ? (1-3)
operating systems?
A. Part of the Operating System
A. A software on the machine interacts
with the hardware via the operating sys- B. Bought on a disk from a store
tem C. Only needed if you connect to the In-
B. Any computer system you use has an ternet
operating system D. Very Expensive to buy

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 418

328. Which tasks are the memory manager re- C. data compression
sponsible for (as a part of the Operating D. anti-virus
System)
E. firewall
A. Swapping applications and data be-
tween RAM and virtual memory 333. These allows the devices to communicate
B. Allocated sections of memory to appli- with the operating system of the computer
cations A. Operating system

NARAYAN CHANGDER
C. Communicating with peripheral de- B. Utilities
vices connected to the computer C. Device Drivers
D. Allows the end user to control the com- D. Translators
puter effectively
334. is an electronic component that store
329. C:denotes a(n) directory that is at the instructions waiting to be executed by the
top of the filing structure of a computer. processor
A. sub A. Random fetching memory
B. cluster B. Random execute memory
C. root C. Random access memory
D. domain D. Random devices

330. It is the two or three or four letters af- 335. An OS which you would use in day-to-day
ter the dot in a filename. It also indicates life on a normal school computer is a
what kind of file you are dealing with. A. Embedded
A. File name B. Real Time
B. File extension C. Distributed
C. File size D. Multi-Tasking
D. File management E. Multi-User

331. Helps manage the system resources, in- 336. Solid state drives contain floating gates
cluding memory management and schedul- to represent 1’s and 0’s. What are the ad-
ing. All Applications use this to send and vantages to SSDs? (select all that apply)
receive data to and from devices which lies A. Fast access speeds
below the operating system.
B. Small, light and portable
A. operating system
C. Quiet
B. Kernel
D. No moving parts
C. Control Unit
E. Cheap
D. Application software
337. What is File Management?
332. Which of the following are examples of A. The part of the Operating System that
utility system software (hint:not security) manages the memory of the system
A. encryption software B. Specific purpose software used for
B. defragmentation specific tasks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 419

C. The part of the Operating System that B. Word Processing


performs specific tasks such as creat- C. Presentation
ing, opening, closing, deleting, renaming,

PRACTICE BOOK» NOT FOR SALE


copying, moving files D. Reference

D. None of the above 343. Delete temporary files.

338. The utility automatically creates du- A. File Compression Programs


plicates of your libraries, desktops, con- B. Backup and recovery utilities
tacts, and favorites to another storage lo- C. Clean Up Utilities
cation.
D. Security programs
A. System Restore
B. Time Capsules 344. This is the program that helps to boot
up the computer. Usually stored on flash
C. File History memory so that it can be updated. Also al-
D. Carbonite lows settings such as boot order of disks
to be changed and saved by the user
339. State two examples of Disk Cleanup pro-
gram. A. Loader

A. Finder B. BIOS

B. Windows Disk Cleanup C. Basic input output system

C. Windows Explorer D. none of above

D. PhoneClean 345. is a type of system software that al-


E. WinZip lows a user to perform maintenance-type
tasks
340. Windows OS, Mac OS, Linus are exam- A. Operating system
ples of operating systems used for
B. System Software
A. Laptop & Computers
C. Application software
B. Tablets and Phones
D. Utility program
C. Ipad and Iphones
D. none of above 346. What kind of problems are solved by al-
gorithms?
341. A type of software that allows a single A. Compression algorithms
physical computer to operate as though it
were two(2) or more separate and inde- B. Route-finding algorithms
pendent computers. C. Encryption algorithms
A. Virtualization D. Internet-related algorithms
B. Antivirus 347. Make the backup and restoration process
C. Utility easier
D. None of the above A. File Compression Programs

342. Microsoft excel is an example of Soft- B. Backup and recovery utilities


ware. C. Clean Up Utilities
A. Spreadsheet D. Security programs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 420

348. What type of software am I? Spread- 353. Which is not a computer translator?
sheet software, e.g. Microsoft Excel A. Interpreter
A. Operating System B. Compiler
B. Application software C. Word Processor
C. Utility software D. Assembler
D. none of above
354. Amin buys a new computer with an op-

NARAYAN CHANGDER
349. This following is an example of a periph- erating system and some utilities.State
eral (7-9) two functions of the operating sys-
tem.Answers:4
A. Processor
A. Provides interfaces between user and
B. Main Memory (RAM) computer / Determines look and feel of
C. Hard Disk Drive the computer

D. ROM B. Provides a platform for software to


run
350. Select the true statements about operat- C. Manages peripherals used by the sys-
ing systems: tem
A. A computer can only have one OS D. Manages memory
B. The OS manages memory, storage, se- E. Operates the system
curity, printing and other useful functions
of the system 355. Reduce the size of files so they take up
less storage space on a storage medium or
C. The OS provides a user interface can be transmitted faster over the Internet
D. All OSes allow you to use multiple pro- A. File Compression Programs
grams at once
B. Backup and recovery utilities
351. It involves looking at the program specifi- C. Clean Up Utilities
cation and creating a set of test data that
covers all the inputs and outputs and pro- D. Security programs
gram functions 356. People are;
A. Functional testing A. instructions that control processing
B. Black box testing B. individual facts input into a system
C. White box testing C. software not fully understood by most
D. Alpha testing users
D. users of a system
352. protects your system from Trojans
and viruses 357. Choose the best answer. It is an inter-
face that displays text, and its commands
A. Virus Scanner
are usually typed on a command line using
B. System monitor a keyboard.
C. Disk defragmenter A. Command prompt
D. none of above B. Graphical User Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 421

C. Text-based User Interface C. Proprietary software


D. none of above D. Shareware software

PRACTICE BOOK» NOT FOR SALE


358. How does Process Management allow
363. Performs tasks at the same time.
the computer to appear to be multitask-
ing? A. Simultaneous Processing
A. By executing multiple applications at B. Multiprocessing
the same time
C. Parallel processing
B. By switching between applications
quickly and efficiently D. none of above

C. By giving each application exclusive ac- 364. Which utility is used to exit from a non-
cess to all computer resources responsive program?
D. By executing only one application at a A. Task Manager
time, but with higher priority for certain
applications B. Disk Cleanup

359. Designed for BlackBerry devices. C. System Refresh

A. iPhone OS D. File Explorer


B. BlackBerry Operating System
365. There are two types of backup.Answers:2
C. Palm OS and Palm webOS
A. Full
D. Symbian OS
B. Incremental
360. What software would be used to create
C. Partial
an information sheet e.g. a revision mat
A. Image editing software D. Complete

B. Word processor 366. It is the essential center of a computer


C. Presentation software operating system that serves as the core
D. Web authoring software that provides basic services for all other
parts of the OS.
361. With a , users interact with menus A. Shell
and visual images such as icons, buttons,
and other objects to issue commands. B. File system
A. command-line interface C. Kernel
B. menu-driven interface D. none of above
C. performance-monitor interface
367. which of these does the Operating Sys-
D. graphical user interface (GUI)
tem manage
362. Which kind of software will offer a free A. Memory
trial for a short time before you need to
pay? B. The CPU
A. Open source software C. The motherboard
B. Freeware D. The keyboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 422

368. These are operating systems that are en- C. Allow a MAC to run on Windows
tirely stored within a device D. Hide the complexities of the hardware
A. Stand-alone operating systems from the user
B. Network operating systems 374. Which is NOT a utility program?
C. Embedded operating systems A. Word processor
D. None of the above B. Compression software
369. Designed for use with smart phones. C. Back-up

NARAYAN CHANGDER
A. iPhone OS D. Disk organisation
B. BlackBerry Operating System 375. State two examples of File Manager Util-
C. Palm OS and Palm webOS ity program.
D. Symbian OS A. Finder
B. Windows Disk Cleanup
370. To share one processor’s power between
multiple people, you would use a OS: C. Windows Explorer
A. Embedded D. PhoneClean
B. Real Time E. WinZip
C. Distributed 376. Select the true statements about memory
D. Multi-Tasking paging:

E. Multi-User A. Processes are split into equal sized


frames
371. Utility Programs that:Recover corrupted B. A page table is used to record all the
/ accidentally deleted data pages
A. Program Uninstaller C. Unused pages are swapped out of
B. Disk Scanning Program main memory and into virtual memory
C. Backup Utility D. Processes are split into variable sized
D. Data Recovery Utility frames
377. Software applications are most likely to
372. Utility Programs that:Reorganize all scat-
list what kind of operating system require-
tered data and restore file in contiguous
ment?
location
A. An operating system cost
A. Program Uninstaller
B. An operating system speed
B. Disk Defragmenter
C. A minimum operating system version
C. Backup Utility
D. A maximum operating system version
D. Data Recovery Utility
378. Files can be grouped together into these
373. A Virtual Machine is said to (7-9)
A. folders
A. Allow the user to play games with Vir-
tual Reality Glasses B. utilities
B. Allow the user to virtually use an Oper- C. programs
ating System D. operating systems

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 423

379. These runs single user applications and 384. In which of the following file formats can
shares files and folders on a small net- music files be compressed?
work.

PRACTICE BOOK» NOT FOR SALE


A. gif
A. Desktop OS
B. jpeg
B. Virtualization
C. mp3
C. Mobile OS
D. mpeg
D. Network OS
385. File attribute is:
380. An application programming interface
A. Additional data stored about a file
(API) is
B. Property of file that can be set
A. the code the CPU recognizes to per-
form a procedure in an application C. Basic information about files, name,
size and date modified
B. the code to interface between an appli-
cation and a peripheral like a printer D. Process of reducing the size of a file
C. the currently active part of an applica- 386. Which of the following is not an example
tion of general-purpose applications
D. the code to interface between an appli- A. Apple Pages
cation and RAM
B. Google Slides
381. Data Harvesting Scandle who is respon- C. Microsoft Publisher
sible
D. Microsoft Excel
A. Facebook
B. Cambridge analytica 387. Device drivers

C. Both A. allow peripherals to communicate with


the OS
D. None
B. allow users to communicate with the
382. The following is not a type of Systems OS
Software (4-6) C. allow peripherals to work directly with
A. Device Drivers the CPU
B. Utility Programs D. allow users to change settings of their
peripherals
C. Applications
D. Operating Systems 388. Which of the following components or pe-
ripherals might be listed in the minimum
383. This is restarting a running computer requirements for an application?
without turning off the power.
A. Video system
A. Warm boot
B. CD drive
B. Soft boot
C. Network connection
C. None of the above
D. All of these may be part of the mini-
D. none of above mum requirements for some application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 424

389. Which one of these is not System Soft- C. Something which moves data around
ware? the CPU
A. Android D. none of above
B. Norton Anti-virus 394. Interpreter is used as a translator for
C. Apple macOS A. Low level language
D. Office 365 B. High Level Language

NARAYAN CHANGDER
390. What is the purpose of Utility software? C. Internet language
A. To keep the computer maintained and D. C
in working order 395. Data is;
B. To control how the computer operates A. individual facts input into a system
C. To manage resources available to B. physical units that make up a system
hardware
C. programs or sets of instructions
D. none of above
D. users of a system
391. Choose the answers that are TRUE.
396. File property is:
A. Cache memory is built into various
A. Additional data stored about a file
components on a computer, including the
processor. B. Property of file that can be set
B. Cache memory is cheaper, because it C. Basic information about files, name,
is slower than normal memory (RAM) but size and date modified
it can increase the overall performance of D. Process of reducing the size of a file
a computer quite dramatically.
397. These are used to control and coordinate
C. In general, the higher the speed of the
computer that are linked together.
CPU, the slower it will perform.
A. Desktop OS
D. Fragmentation has no affect on speed
of SSDs. B. Virtualization
C. Mobile OS
392. is computer software that causes a
computer to perform useful tasks beyond D. Network OS
the running of the computer itself. 398. It is the program that runs and manages
A. System software the computer
B. Utility software A. Application Software
C. Application software B. System Software
D. none of above C. Programming Languages
D. Internet
393. An operand is
A. The operation to be performed on a set 399. Which one of these is an Open source
of data software?

B. The data with which an operation is to A. MySQL


be performed B. Steam

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 425

C. Skype C. Robotics
D. none of above D. Educational

PRACTICE BOOK» NOT FOR SALE


400. Process of splitting memory and/or pro- E. Computer Games and Environment
grams up into blocks of the same physical 405. Which of the following is/are Online
size. Storage?
A. Segmentation A. One Drive
B. Paging B. Icloud
C. Virtual memory C. Google Drive
D. Physical memory D. All of them
401. Which one is not a developing software 406. What is Mac operating system known
category? as?
A. Programming language A. iOS
B. Translator software B. OS X
C. Linker and Loader C. Windows
D. System Utilities softwares D. Windows 10
402. A(n) operating system is a complete 407. A rectangular area that can contain a doc-
operating system that works on a desktop ument, program, or message.
computer, notebook computer, or mobile
computing device. A. Window

A. multitasking B. Textbox

B. media-based C. Title Bar

C. single-user D. None of the above

D. stand-alone 408. Operating system that are designed


specifically for mobile devices and many
403. User interfaces can be:Command Line In- consumer electronics deviceThis descrip-
terfaceGraphical User InterfaceSelect the tion refers to
description and examples for Graphical
User Interface. A. Mobile OS

A. Text based B. Desktop OS

B. E.g. DOS, Raspbian (for Raspberry Pi) C. Server OS

C. Contains Windows, Icons, Menus, D. none of above


PointersVisual 409. Used with mobile phones, GPS devices,
D. E.g. Windows 10, Windows 8, Android, and other mobile devices
Mac OS A. iPhone OS
404. Types of application software: B. Embedded Linux
A. Business C. Symbian OS
B. Operating System D. BlackBerry Operating System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 426

410. Which of the following are examples of B. Application software


Application Software? C. Utility software
A. Word Processor D. none of above
B. Anti-virus software
416. Which of the software below is best
C. Web Browser
suited for doing research on the internet?
D. Disk Defragmenter
A. Control program
E. Fortnite

NARAYAN CHANGDER
B. Database
411. Three functions of the operating system C. Measuring program
A. User Interface, multitasking, commu- D. Search engine
nicates with hardware via device drivers
E. Word processor
B. User Interface, multitasking, saving
C. fetch, decode and execute instructions 417. Decompressing is when:

D. memory management, fetching in- A. Refers to the process of converting


structions, user interface (extracting) a compressed file back to the
original size
412. Which type of software would a game B. File Explorer allows you to search for a
be? file based on certain criteria:file size, type
A. Utility software. of file, partial file name, date accessed
and even text in file
B. An operating system.
C. Saving data om a format that can be
C. Application software.
read by different version of same applica-
D. none of above tion or new application. Menu option ‘Ex-
port’ or ‘Save As’.
413. Remove programs from your hard drive
without leaving bits and pieces behind D. Opening or ‘reading’ data created in
different version of the same application
A. Search Tools
or new application.
B. Diagnostic Programs
418. Who Will Walk Meghan Markle Down the
C. Disk Management Programs
Aisle at the Royal Wedding?
D. Uninstall utilities
A. Thomas Markle Sr
414. This programs organizes, analyzes, and B. her close friend, Jessica Mulroney
graphs numerical data
C. Meghan would walk herself
A. Presentation
D. Doria Ragland her mother
B. Word Processors
C. Image Editor 419. User interfaces can be:Command Line In-
terfaceGraphical User InterfaceSelect the
D. Spreadsheet description and examples for Command
415. What type of software am I? Presenta- Line Interface.
tion software, e.g. Microsoft PowerPoint A. Text based
A. Operating System B. E.g. DOS, Raspbian (for Raspberry Pi)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 427

C. Contains Windows, Icons, Menus, 425. Julian buys a new laptop with a sys-
PointersVisual tem information utility and a diagnosis util-
ity.Describe, using examples, the purpose

PRACTICE BOOK» NOT FOR SALE


D. E.g. Windows 10, Windows 8, Android,
Mac OS of the system information and diagnosis
utilities.Select the description and exam-
420. This operating system is designed to run ple of System information utilities.
on computers made by Apple.Lesson 7-2 A. displays important data about the cur-
A. Linux rent state of the computer
B. UNIX B. -e.g. temperature, free memory, net-
work speed, % processor used
C. Microsoft Windows
C. attempts to detect / resolve items that
D. Macintosh OS
are not working correctly
421. What type of software am I? Email soft- D. e.g. missing drivers, network connec-
ware e.g. Microsoft Outlook tion
A. Operating System
426. A type of software that allows you to cre-
B. Application software ate, play, and edit photo, audio, and video
C. Utility software files.

D. none of above A. Database


B. Presentation Software
422. Which is faster to back up and why?
C. Word Processor
A. Full Backup
D. Graphics and Multimedia Software
B. Incremental Backup
C. More files will need to be backed up 427. What do you call a program in execu-
tion?
D. Less files need to backed up as only
those that have changed since last time A. Command
need to be backed up. B. Process

423. A type of system software that allows a C. Task


user to perform maintenance-type tasks. D. Instruction
A. System software 428. What are the advantages of using a mag-
B. Utility software netic hard disk? (select all that apply)
C. Operating system A. Store large amounts of data
D. Desktop stand-alone B. Low cost

424. Which of the following is not a feature of C. Fastest speed


an OS? D. Very portable
A. User Interface 429. What is an application?
B. Systems Design A. The apps you have on you phone
C. User Management B. Programs that are designed to per-
D. Memory Management form a specific task

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 428

C. A form created by someone made to C. That all processes have a fair use of
fill out resources and that processes with higher
D. none of above priority are executed first
D. That all data on the computer is secure
430. The name of the interface used by blind and protected from unauthorized access
persons to perform operations on a com-
puter is 435. Which of the following is not mobile op-
erating system?
A. sensor

NARAYAN CHANGDER
A. Blackberry
B. icon
B. Android
C. braille
C. Windows Phone
D. touch screen D. a-phone
431. is a multitasking operating system 436. Networks, servers, mainframes, and
developed in the early 1970s by scientists supercomputers allow hundreds to thou-
at Bell Laboratories. sands of users to connect at the same time,
A. Linux and thus are
B. Perl A. single user

C. NetWare B. single processing


C. multiuser
D. UNIX
D. multiprocessing
432. Fill in the blank:Open Software
437. Windows, icons, menus and pointers are
A. Source all part of what?
B. Site A. Graphical user interface
C. Resource B. Command line interface
D. none of above C. Menu interface
D. Objects interface
433. A small program that allows a specific pe-
ripheral device to communicate with a com- 438. Memory-management technique that
puter system uses hard drive space as additional RAM
A. Driver Programs A. Virtual Machine
B. Firmware B. Virtualization
C. Operating System C. Virtual Memory
D. none of above D. Virtualbox
439. The physical objects that make up the
434. What does the scheduling management
computer system:
system in Process Management ensure?
A. Software
A. That each process has exclusive ac-
cess to all computer resources B. Storage
B. That the computer is always running C. Input
the latest version of its operating system D. Hardware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 429

440. Diagnose and repair problems related to C. are programs or sets of instructions
your hard drive D. are physical units that make up a sys-
tem

PRACTICE BOOK» NOT FOR SALE


A. Search Tools
B. Diagnostic Programs 446. Recordable CDs contain a dye covered
C. Disk Management Programs surface which is translucent to light and
can be burnt to stop the reflection. What
D. Uninstall utilities
‘burns’ the CD?
441. which of the following are false about the A. laser
operating system B. high intensity light
A. deal with file management C. magnetic stamp
B. manages system security D. fire
C. organise the CPU and its processing
447. Which of the following best describes li-
tasks
censing?
D. help send and receive data
A. Official rules of rights to a program
442. A type of software used to create and B. A way to identify a program
manipulate documents that contain text C. Car license plate attachment
and graphics.
D. A form of coding
A. Database
448. To scramble data so that it is unreadable
B. Spreadsheet
is a form of ?
C. Word Processor
A. Compression
D. Graphics and Multimedia Software
B. Encryption
443. Which of the following is the function for C. Backing up
compression tool? D. Defragmentation
A. To shrink the size of the file
449. Software is used to control hardware de-
B. To manage the files in folder vices and allow an OS use the hardware
C. Perform file management related task A. Device Management
B. Device Driver
D. none of above C. Device System
444. what does the cloud use to work D. Hardware Peripheral Device
A. a hard disk 450. A acts as a barrier between your com-
B. the internet puter and the internet. Checks which pro-
grams are trying to access your computer
C. usb stick
via the internet, or internet via your com-
D. hard drive puter.
445. A black box; A. Anti-Virus
A. is instructions that control processing B. Switch
B. is software not fully understood by C. Firewall
most users D. Blockwall

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 430

451. Which of the software below is best 456. is software which allows a computer
suited for storing records of books in a li- to run and to be maintained.
brary? A. Application software
A. Control program B. System software
B. Database C. MS Word
C. Measuring program D. none of above
D. Search engine 457. These enables users to collaborate on doc-

NARAYAN CHANGDER
E. Word processor uments with other online.
A. Cloud Storage
452. You cannot use an operating system’s file
manager to B. Email

A. create new folders C. Cloud Computing


D. All of the above
B. delete files
C. shut down the computer 458. This operating system is installed on
more than 90 percent of personal comput-
D. launch applications ers.Lesson 7-2
453. These are general-purpose programs that A. Linux
creates text-based documents. B. UNIX
A. Word Processors C. Microsoft Windows
B. Spreadsheet D. Macintosh OS
C. Presentation 459. Pre-installed permanent software of a
D. Image Editor computer’s system is:
A. deviceware
454. A type of suite that is stored at a server
on the Internet and is available anywhere B. firmware
you can access the internet. C. hardware
A. Database D. software
B. Email 460. The process of carrying out a command is
C. Cloud called:
D. None of the above A. Fetching
B. Controlling
455. What are the two main categories of soft-
C. Storing
ware?
D. Executing
A. Operating Systems and Application
Software 461. Proprietary operating system for comput-
B. System Software and Word Process- ers made by Apple Corporation.
ing Software A. Windows
C. Application Software and Productivity B. MAC OS
Software C. UNIX
D. None of the above D. LINUX

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 431

462. What are the disadvantages of using op- C. Creating and managing passwords
tical disks? (select all that apply) and usernames

PRACTICE BOOK» NOT FOR SALE


A. slow access speeds D. Files can be deleted, renamed and re-
B. fragile and easy to break organised
C. very expensive 467. An opcode is
D. not portable A. The operation to be performed on a set
of data
463. Which of the following memory and CPU
management functions does the OS per- B. The data with which an operation is to
form in order to allow the system to mul- be performed
titask C. Something which moves data around
A. Each application is allocated a differ- the CPU
ent memory space so that their data does D. none of above
not interfere with each other
B. The OS moves unused parts of memory 468. Which of these is not one of the three
to storage and swaps it out as necessary main types of software?
C. The OS splits CPU cycles up between A. Operating Systems
open applications B. Applications
D. The OS Prioritises processes so that in- C. Programming Languages
structions are executed in an efficient or-
D. Media Players
der

464. Most operating system perform similar 469. What is the function of the operating sys-
functions, except tem that provides the user interface?

A. Scheduling jobs A. A symbol that appears on the display


screen and that you move to select objects
B. Control a network and commands
C. Managing programs B. A program that controls a display for
D. Distributed programs the user (usually on a computer monitor)
and that allows the user to interact with
465. Which is not a type of System software? the system)
A. Device drivers
C. A type of user interface which allows
B. Utility programs people to interact with computer with im-
C. Applications ages rather than text commands
D. Operating systems D. A single user/multitasking operating
system allows a single user to work on
466. Which of the following ARE features of two or more programs that reside in mem-
user management for an Operating Sys- ory at the same time
tem?
470. Google Docs, Microsoft Office 365 and
A. Different users can be given different
Zoho Office are examples of
access rights
B. New users can be given network ac- A. Specialized Suite
counts B. Cloud Suite

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 432

C. Utility Suite 476. Which one of these best describes propri-


D. Office Suite etary software?
A. A type of operating system.
471. Reverses the backup process and returns
B. Free software downloaded from the in-
backed up files to their original form.
ternet.
Which utility program refers to this de-
scription? C. Software bought from a shop.
A. Restore Utility D. none of above

NARAYAN CHANGDER
B. Disk Defragmenters 477. Embedded systems can be found in (select
C. File Compression Tools all that apply)
D. Backup Utility A. Washing Machines

E. Antivirus Program B. Alarm Systems


C. Computers
472. What is the function of antivirus? (There
are two answers) D. Laptops

A. Protect computer against virus. 478. Tool in optical drive that reads informa-
tion
B. Protect computer from bacteria.
A. needle
C. Damaging the computer program.
B. laser
D. Remove computer form viruses.
C. tape
473. How many different languages of pro- D. sensor
gramming are there? (estimate)
A. All programming is in one 479. These are programs typically used to cre-
ate attractive, visually interesting presen-
B. 100 tations
C. 500 A. Illustration programs
D. 700 B. Presentation graphics
474. Protect computers and users C. Image Editor
A. File Compression Programs D. Adobe Photoshop

B. Backup and recovery utilities 480. The purpose of memory is to optimize


C. Clean Up Utilities the use of random access memory (RAM).

D. Security programs A. performance


B. management
475. and are examples of Utility Soft-
C. throttling
ware.
D. integration
A. File Manager & Operating System
B. File Manager & IOS 481. Type of scheduling algorithm where the
queue is sorted by expected execution
C. File Manager and Backup Software time. New jobs are added accordingly to
D. none of above the queue.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 433

A. Shortest job first 487. Files can be grouped together into


B. shortest remaining time these.Lesson 7-2

PRACTICE BOOK» NOT FOR SALE


C. First come first served A. folders

D. Multi-level feedback queues B. utilities


C. programs
482. Halim wants to play interactive 3D
D. operating systems
games using desktop computer. What
adapter that Halim should install? 488. A type of software that lets you calculate
A. Sound card and organize numeric information.
B. Network card A. Database
C. Video card B. Spreadsheet
D. Joystick card C. Presentation Software
D. Graphics and Multimedia Software
483. Which is NOT considered an operating
system? 489. What is the function of antivirus?
A. Windows A. Protect computer against virus.
B. Mac OS B. Protect computer from bacteria.
C. Linux C. Damaging the computer program.
D. Microsoft Excel D. Remove computer form viruses.

484. What are the storage locations inside a 490. Which of the following is NOT a function
CPU called? of Operating System?
A. Registers A. Booting the computer
B. RAM slots B. Managing resources and jobs
C. Control Memory C. Interfacing with users (typically via a
GUI)
D. Open Memory
D. Disk management
485. Version (flavor) of UNIX available with-
out charge over the Internet 491. A software repository is ?
A. Windows A. Software already available for pur-
chase
B. MAC OS
B. An online collection of software
C. UNIX
C. combination of hardware and systems
D. LINUX
software that supports the running of ap-
486. What software would be used to make plications
calculations D. none of above
A. Image editing software 492. looks at your current system re-
B. Spreadsheet sources
C. Desktop Publishing (DTP) software A. Disk defragmenter
D. Web authoring software B. Virus Scanner

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 434

C. System monitor 498. It refers to the manipulation of docu-


D. none of above ments and data in files on a computer.
A. File Management
493. Choose the correct THREE reasons why
we need to make Backup. B. Data Management

A. files can be purposely overwritten or C. Information Management


deleted D. Disk Management
B. hardware failures-disk drive crashes

NARAYAN CHANGDER
499. With a command-line interface,
C. devices can be stolen (with data and
A. user can give command by lining up the
files stored on them)
instructions.
D. disasters-fires, earthquakes and
B. a user can command anyone to help
floods can destroy hardware
them.
494. Windows XP, Windows 7, and iOS 12 C. user can interfere with any command.
are examples of:
D. a user uses the keyboard to enter data
A. Operating systems and instructions.
B. Application software
500. Why we need computer software?
C. Utility software
A. *Software is required for the function-
D. General Purpose software ing of computer.
495. Which of the following is NOT a definition B. Instruct computer about the actions to
of System Software? be performed
A. Enables boot process C. To get perform a task or set of tasks
B. Transfers files D. Non of these
C. Controls software configuration 501. John received computer hardware from
D. Launches applications a friend who lives in the United States
of America, but the some of the software
496. Which of the following is not type of Ap- was missing. He therefore, decided to pur-
plication Software chase the necessary software. Since John
A. Spreadsheet intended to use the computer in his family
business, he had a choice of acquiring soft-
B. Word Processing ware designed especially for his business.
C. Presentation What kind of software is this?
D. Database A. General Purpose
B. Custom written
497. An assembler translates assembly code
language into C. Integrated
A. High Level Language D. Specialized
B. Machine Code 502. What does an incremental backup en-
C. Processor Code tail?
D. Mnemonics A. Makes copies only of the new files

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 435

B. Saves your backup to secondary stor- 507. The BIOS allows you to:
age A. Change the computer’s time/date set-

PRACTICE BOOK» NOT FOR SALE


C. Makes copies of all files tings
D. Makes a copy of the entire drive B. Change the order in which drives are
booted from
503. This is used in creating layout for a mag-
C. Change the computer’s operating sys-
azine.
tem
A. Word Processor
D. Change the user’s login details
B. Spreadsheet
508. A fragmented hard drive is one in which
C. Desktop Publishing Program ?
D. None of the above A. Program instructions and data are
504. State three (3) examples of Desktop OS. spread across tracks and sectors on the
hard disk drive
A. Disk Operating System (DOS)
B. Programs and instructions are
B. Android OS grouped together to occupy a continuous
C. Mac OS section of the harddisk drive
D. Windows C. A hard disk drive that has been
dropped and broken into lots of pieces
E. NetWare
D. The hard disk drive is split into por-
505. Amin buys a new computer with an op- tions each representing a different logical
erating system and some utilities.Some of drive.
the software in Amin’s computer is open
source.Describe what is meant by open 509. Which is the fastest type of cache mem-
source software.Answers:3 ory?

A. The source code is distributed with the A. Level 1


software B. Level 2
B. The customer can modify the source C. Level 3
code D. Level 4
C. The customer can redistribute the 510. , , and are types of Application
source code (with the same licence / re- Software
strictions)
A. PowerPoint
D. The program comes pre-compiled with
no source code B. Video editing software

E. The customer must not modify the C. Word processing software


source code D. Spreadsheet software

506. How would I open the Task Manager? 511. Which one of the following best describes
utility software?
A. Shift+Alt+Del
A. A series of gaming apps.
B. Ctrl+Alt+Del
B. Software that allows you to do specific
C. Ctrl+Enter+Del tasks e.g. Make slideshows and type let-
D. Ctrl+Alt+Enter ters.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 436

C. Software that keeps your computer C. Linux


system healthy.
D. System software
D. none of above
517. During the execution phase in the CPU,
512. The instructions in a form that the proces- calculations may need to be performed.
sor can execute is called Which part of the CPU does this?
A. Machine Code
A. Arithmetic Logic Unit (ALU)
B. Assembly Language

NARAYAN CHANGDER
B. Control Unit (CU)
C. High Level Language
C. Accumulator (ACC)
D. Complier
D. Memory Address Register (MAR)
513. Which one is true about Open source soft-
ware from the following? 518. These are programs that reduce the size
A. It is very expensive. of computer files
B. It is made to make profit. A. Antivirus
C. It made for the betterment of other B. File compression programs
people. C. Backup programs
D. Well tested and reliable and updates
D. None of the above
will be regularly be issued.

514. Disk Cleanup, Task Manager and File Re- 519. Which of these are false
covery are considered to be A. the cloud is easy to use
A. root directories B. the cloud can be accessed on any de-
B. file management systems vice
C. Windows utility programs C. you need internet to use the cloud
D. Accessibility Utilities D. data can be added to the cloud on any
device
515. A set of programs containing instructions
that work together to coordinate all the E. you need a wired connection to use the
activities among computer hardware re- cloud
sources.
520. Why would it be ill advised to run a disk
A. System Software
defragmenter application on an SSD
B. Utility Software
A. SSDs have more moving parts so they
C. Operating System wear more easily
D. Translator
B. The location a file is stored on an SSD
516. What type of software works with users, does not affect how quickly it can be ac-
application software, and computer hard- cessed
ware to handle the majority of technical C. SSDs are fast enough it doesn’t matter
details
D. Moving files physically on the SSD can
A. Application contribute to wear and can reduce their
B. Operating System lifespan

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 437

521. Enables users to interact with a computer B. Stopping unauthorised access in the
system through windows, icons, menus computer system.
and pointers.

PRACTICE BOOK» NOT FOR SALE


C. Scans the computer for viruses.
A. application software D. none of above
B. system software
526. Utility Programs that:Detect and correct
C. Graphical user interface logical errors on hard disk
D. Operating system A. Program Uninstaller
522. Importing is when: B. Disk Scanning Program
A. Refers to the process of converting C. Disk Defragmenter
(extracting) a compressed file back to the D. Data Recovery Utility
original size
B. File Explorer allows you to search for a 527. Windows is a scaled-down Windows
file based on certain criteria:file size, type operating system designed for use on com-
of file, partial file name, date accessed munications, entertainment, and comput-
and even text in file ing devices with limited functionality.
C. Saving data om a format that can be A. UNIX
read by different version of same applica- B. NetWare
tion or new application. Menu option ‘Ex-
C. Server 2008
port’ or ‘Save As’.
D. Embedded CE
D. Opening or ‘reading’ data created in
different version of the same application 528. It is an interconnection of multiple de-
or new application. vices, also known as hosts?
523. in SIC One byte equals to how many A. Computer Network
bits? B. Open System
A. 4 bits C. Close Sytem
B. 8 bits D. Protocol
C. 12 bits
529. Can computers operate without a operat-
D. 16 bits ing system?
524. Which of the following is not an example A. Yes
of system software? B. No
A. Language Translator C. Sometimes
B. Utility Software D. WOAH
C. Antivirus Software
530. System software is
D. Word Processors
A. software that manages the operation
525. What is the function of a firewall? of the computer
A. Putting fragmented data back to- B. software that users install to perform
gether. tasks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 438

C. software that keeps the computer per- 536. What is the definition of a “Process” in
forming at it’s best computing?
D. none of above A. A written code of a program stored on
secondary storage
531. Memory in the CPU used to store used
data and data that will be used frequently B. A program that is currently being exe-
is called cuted (running)
A. Cache Memory C. A piece of software that manages the

NARAYAN CHANGDER
execution of programs on a computer
B. Random Access Memory
D. A piece of software that manages user
C. Read Only Memory
accounts on a computer
D. Virtual Memory
537. Metadata is:
532. The basic input/output system (BIOS) is
A. Additional data stored about a file
stored on a chip.
A. ROM B. Property of file that can be set

B. CPU C. Basic information about files, name,


size and date modified
C. RAM
D. Process of reducing the size of a file
D. CMOS
538. How does the user interact with the Op-
533. Which one of the following is a compres- erating System?
sion software?
A. GUI
A. OptimFROG
B. Command Line Interface
B. MacOS
C. Voice Input
C. Steam
D. Monitor
D. none of above

534. Evaluate your system and make recom- 539. The ability of an operating system
mendations for fixing any errors found to switch between different applications
stored in memory
A. Search Tools
A. Diversion
B. Diagnostic Programs
B. Multitasking
C. Disk Management Programs
C. Operation
D. Uninstall utilities
D. Programming
535. A hierarchy;
540. Booting is the process of starting or
A. is the means of carrying out opera-
restarting a computer. What the process
tions or instructions
involve?
B. are users of a system
A. Scheduling jobs
C. is software not fully understood by
B. Configuring devices
most users
D. is a diagram where the most important C. Starting a computer
level of a system is at the top D. Providing file management utilities

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 439

541. Windows is an example of software.{Use C. allows the os to manage the hardware


appropriate answer} devices

PRACTICE BOOK» NOT FOR SALE


A. System D. Allows users to have different ac-
B. Computer counts

C. Application 546. Most desktop and laptop computers to-


D. All of these day use this type of operating sys-
tem.Lesson 7-1
542. Exporting is when: A. real-time
A. Refers to the process of converting B. single-user/single-task
(extracting) a compressed file back to the
C. single-user/multi-task
original size
D. multi-user
B. File Explorer allows you to search for a
file based on certain criteria:file size, type 547. Which of the following is an example of
of file, partial file name, date accessed specialized programs combined in a unified
and even text in file package
C. Saving data om a format that can be A. Windows 10
read by different version of same applica-
B. Microsoft Word
tion or new application. Menu option ‘Ex-
port’ or ‘Save As’. C. Internet Explorer
D. Opening or ‘reading’ data created in D. Microsoft Office
different version of the same application 548. What type of software interact with the
or new application. hardware
543. Designed for Palm devices. A. application software
A. iPhone OS B. Norton by Semantic
B. BlackBerry Operating System C. System Software
C. Palm OS and Palm webOS D. none of above
D. Symbian OS 549. Ahmad use this utility program so that
the OS accesses data more quickly and pro-
544. Two types of system software are
grams run faster.
A. application software and utility pro-
A. Power source utility
grams
B. Disk defragmenter utility
B. Web browsers and application soft-
ware C. Disk cleanup utility
C. operating systems and utility pro- D. Run away and never come again.
grams
550. There are two types of computer soft-
D. operating systems and Web browsers ware, and
545. Peripheral Management A. System Software
A. Provides a method to communicate B. Spreadsheet software
with the system C. Ms Word
B. Manages your programs D. Application software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.4 System Software 440

551. Programs that control or maintain the op- 556. Fill in the blank. translate the whole
erations of the computer and its devices. program as an object code at once.
A. Operating System A. Compilers
B. Utility Software B. Interpreters
C. System Software C. Translator
D. Compression Software D. none of above

NARAYAN CHANGDER
552. What type of software am I? I am the 557. Smaller files take up less
communicator between applications soft-
ware and hardware. A. Storage place

A. Operating System B. Load more quickly

B. Application software C. Streaming and downloading

C. Utility software D. none of above


D. none of above 558. You can improve processor performance
by (select all that apply)
553. A collection of programs that manage
and coordinate the activities taking place A. increasing the clock speed
within a computer system B. using more cores
A. Payroll System C. using a bigger cache
B. Library System D. installing more RAM
C. POS System
559. A complete operating system that works
D. Operating System on a personal computer (such as desktop
554. The program that combines the output of and notebook computers)This description
compiler with various library functions to refers to
produce an executable code is called- A. Mobile OS
A. a. Loader B. Desktop OS
B. . b. Linker C. Server OS
C. c. Assembler D. none of above
D. d. Debugger
560. What is not a purpose of system soft-
555. Which of the below is a definition of ‘Ap- ware?
plication’ A. A set of programs that are written for
A. General term for computer programs a specific purpose
B. Software designed to carry out a use- B. control computer hardware
ful real-world task C. provide basic functionality to com-
C. A set of commands that a processor puter
can recognise and act upon D. act as an interface between user, ap-
D. A combination of hardware and operat- plication software and computer hard-
ing system ware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 441

561. An example of multitasking is restoring first and then every incremental


A. doing a background save while typing back-up since the last full back up

PRACTICE BOOK» NOT FOR SALE


a document E. Take a long time to complete (usually
B. allowing many users to use the same overnight)
program 565. Which are embedded operating systems
C. allowing one user to use one program A. Desktop OS
D. opening one program by many users B. Virtualization
562. These coordinate computer resources and C. Mobile OS
provides an interface between users and D. Network OS
the computer and run applications
A. Operating systems 566. A user interface
A. Provides a method to communicate
B. Utilities
with the system
C. Device Drivers
B. Is a graphical layout
D. Translators
C. Is user management
563. Use the Windows to check on a non- D. Allows users to have different ac-
responsive program. counts
A. System Restore
567. Which best describes a full backup? An-
B. Backup utility swers:2
C. Error-checking A. A copy of all data and software on the
D. Task Manager hard disk drive / server is copied to a
backup medium (e.g. an external hard
564. Which best describes an incremental disk drive / DVD-R) and the medium is
backup? Answers:4 kept at a different location
A. A full backup is made initially B. Take a long time to complete (usually
B. Each night only the files which have overnight)
been changed since the last incremental C. A full backup is made initially before
back-up are copied the smaller daily backups
C. Much faster to complete that full back- D. Each night only the files which have
ups been changed since the last incremental
D. Takes much longer at restoring than a back-up are copied
Full Back up as the full back up would need E. Fast to backup.

5.5 Application Software


1. What does AntiVirus Software do? ticular file from your entire computer or a
CD or flash drive at any time.
A. Scan random files or directories for
any malware or known malicious patterns C. Remove any malicious code detected.
B. Allow you to initiate a deletion of a par- D. Conceals the ‘health’ of your com-

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 442

puter. C. custom

2. Which of the following is NOT a type of a D. upgrade


productivity software application? 8. How many years of prior experience in
A. Image editing tech support do most MSP positions re-
quire?
B. Word processing
A. 1
C. Personal information management
B. 5

NARAYAN CHANGDER
D. Spreadsheet
C. 2
3. Images in an image gallery consist of
D. 3
A. Bitmap images
9. The use of Personal Information Manager
B. Vector images (PIM) software is to enable you to
C. Clip art A. create and edit written documents
D. Stock photograph B. to do calculations and numeral analy-
4. Softwares used to create and edit sound sis
clips and video clips are known as C. take notes and easily organized the
A. Web Authoring software notes.
D. sychronize your calendar, tasks, email
B. Video Game Design software
to keep our organised
C. Graphics Program
10. Email is commonly used in business and at
D. Audio and Video editor Program
home for communication. Which of the fol-
5. What type of software enables you to pur- lowing is a feature of email software?
chase, collect, and play video games on a A. Bookmark
computer?
B. Message Log
A. Entertainment Software C. Call Blocking
B. CAD Software D. Address Book
C. Gaming software
11. Examples of games made in Stencyl are
D. Productivity Software

6. Google chrome is an example of A. Handheld Video Game


A. the Internet Explorer B. Afterward
B. a web browser C. The Brim
C. a search engine D. Spelunky
D. the World Wide Web 12. The following are the features of DBMS
except
7. A(n) software installation enables you
to decide which features you want to in- A. Graph and Charts
stall on the hard drive. B. Forms
A. full C. Query
B. partial D. Report

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 443

13. With , you can view, organize, sort, D. Thorough, regular and well-tested up-
catalog, print and share digital photos dates

PRACTICE BOOK» NOT FOR SALE


A. spreadsheet software E. High levels of security as it is devel-
oped in a professional, controlled environ-
B. photo management software
ment
C. clip art
19. Which of the following entity does not be-
D. desktop publishing software
long to word processing?
14. An example of systems software is A. paragraphs
B. cells
A. operating system C. words
B. Microsoft office D. characters
C. Antivirus protection.
20. Select the 2 advantages of Inkjet Printers
D. Developer tookit
A. lower quality documents
15. If I wanted to find the nearest supermar- B. high quality documents
ket I would use
C. less expensive
A. Google Chrome
D. more expensive
B. Yahoo Mail
21. Podcasts enable you to
C. Microsoft PowerPoint
A. deliver audio/video files via RSS
D. Spreadsheet
B. post journal entries on the web
16. Which type of task is Microsoft Excel used C. communicate with friends in real time
for?
D. edit video files over the web
A. Presentations
22. The following are uses of database
B. Word Processing
except
C. Spreadsheets
A. Organise and manipulate data
D. Email
B. Translation into other languages
17. To organize large amounts of data in a C. Carry out queries on database data
database.This is the function of and produce report
A. Spreadsheet D. Add, delete and modify data in a table
B. Presentation graphics 23. Your teacher wants to calculate the grades
C. DBMS for all of the students in the class, which
of the following software would you rec-
D. Word processor
ommend to her.
18. State features of open source code A. word processing
A. Does not require a license to be used B. presentation
B. Distributed with the source code C. reference
C. Can be modified and sold on D. spreadsheet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 444

24. What kind of documents can a Desktop 29. An example of application software is
Publishing Software (DTP) create? A. file management
A. Posters, newsletters, magazines
B. operating system
B. Comics, magazines, novels
C. disk operating system
C. Brochures, leaflets, mail
D. Microsoft office.
D. Catalogues, newsletters, posters
30. When using spreadsheet software, a func-

NARAYAN CHANGDER
25. What type of software uses columns, tion
rows and cells to represent data that
A. depicts data in graphical form
can be manipulated by formulas in other
cells? B. changes certain values to reveal the ef-
fects of the changes
A. Database
C. is a predefined formula that performs
B. Word Processing
common calculations
C. Spreadsheet
D. contains the formatting necessary for
D. Graphics a specific worksheet type
26. The smallest unit of a digital image or 31. A grammar checker, thesaurus or spelling
graphic that can be displayed and repre- checker are features of what type of soft-
sented on a digital display device. ware?
A. pixel A. Graphics Software
B. dot B. Word processing software
C. bit C. Entertainment software
D. none of above D. Communication software
27. Spreadsheet 32. Your sister is living in Italy. What type of
A. AppleNumbers Software would you need to keep in touch
B. Calculator with her?

C. Google Slides A. Reference

D. Lotus 123 B. Multimedia


C. Spreadsheet
28. The following are the functions of a proto-
type except D. Communication

A. Forms the foundation to make a full 33. Which type of application software is Mi-
game crosoft Word?
B. Allows business companies to pro- A. Spreadsheet
mote their products and services
B. Word Processor
C. Allows developers to improve the de-
C. Database
sign
D. Lets developers see how the game D. Presentation
plays E. Email

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 445

34. Every software package will have this C. Spreadsheet


number.
D. DBMS

PRACTICE BOOK» NOT FOR SALE


A. Organisation
B. Licence 40. The operating system manages computer
resources.
C. Location
A. software
D. Access
B. hardware
35. How would you minimise work disrup-
tion? C. firmware
A. Install software during holidays D. courseware
B. Install software at off peak times
41. The function of a spreadsheet is
C. Install early in the morning
A. To create a visually interesting presen-
D. Install software in the evening tation
36. It is a utility software used to divide B. To organise, analyse, and graph nu-
the hard disk into multiple logical storage merical data
units.
C. To organise large amounts of data in a
A. Disk Partitioning database
B. Registry Cleaner D. To create a text based document
C. Defragmentation
D. File Manager 42. What are the benefits of Antivirus Soft-
ware?
37. What are programs that allow you to mix
A. Detecting, blocking, and keeping
text and graphics to create publications of
viruses, malware, and ransomware.
professional quality.
A. database B. It is preventing identity theft and allow-
ing phishing and fraud.
B. desktop publishing
C. Warning about dangerous websites
C. presentation and links before you click.
D. productivity
D. Scanning the Clear Web to find if an
38. A type of software that allows you to per- email address has been compromised
form specific tasks
43. Which of the following is an advantage of
A. Specialized software
open-source software?
B. Collaboration software
A. It may need specialist knowledge to
C. Utility software develop the software.
D. application/productivity software B. It may not be as thoroughly tested as
39. Microsoft Access is the most commonly other types of software.
used program of C. The producers will provide regular up-
A. Word Processor dates.
B. Graphic Presentation D. It is free to use.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 446

44. Microsoft Excel, OpenOffice Calc, and 49. PCIe is a high speed computer expan-
Google Sheets sion bus standard.
A. Word Processors A. serial
B. Spreadsheets B. parallel
C. Presentation Graphics C. internal
D. DBMS D. external
50. A collection of separate application pro-

NARAYAN CHANGDER
45. Adobe Photoshop, Canva and GIMP are ex-
grams bundled together and available as
amples of software.
a group is a:
A. Drawing or illustration program
A. integrated package
B. Desktop publishing or page layout
B. software suite
C. Image or photo editing C. app suite
D. none of above D. office apps
46. If your teacher asked you to find the 51. What is the function of page layout or
location of the continent of Asia using desktop publishing?
computer software, which one would you
A. Mix text and graphics to create pub-
use?
lications of professional quality, such as
A. Entertainment brochures, newsletters or textbooks.
B. Communication B. Bitmap images become jagged when
C. Reference expanded.
C. Used for graphic design, page layout,
D. Spreadsheet
create sharp artistic image.
47. Graphics that typically appear as black and D. Edit or modify digital photos called
white boxes that automatically link mobile bitmap or raster images which consist of
devices to a variety of different content. pixels.
A. Flash 52. What is an example of a Graphics Manip-
B. Animation ulation software
C. vector A. Microsoft Excel
D. QR codes B. Adobe Photoshop
C. Microsoft Powerpoint
48. This is designed and written to perform
specific personal, business, or scientific D. Adobe Illustrator
processing tasks, such as payroll, process- 53. Programs that combine a variety of visual
ing, human resource management, or in- objects to create attractive, visually inter-
ventory management. esting presentations.
A. Programming Language A. DBMS
B. Application Software B. presentation graphics
C. Operating System C. spreadsheet
D. Device Drivers D. word processor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 447

54. What is the file extension for a Microsoft 59. Ciara is looking at purchasing new spread-
Word document? sheet software for her business. Which of
the following are compatibility issues that

PRACTICE BOOK» NOT FOR SALE


A. .mdb
might affect her choice?
B. .pptx
A. It may not work with the operating sys-
C. .xlsx tems used by employees computers.
D. .docx B. Employees may not have the experi-
55. used for creating presentations ence with the new software.

A. microsoft excel C. It may not work with and communicate


with other software applications employ-
B. paint ees are using.
C. microsoft powerpoint D. It may not have the features & func-
D. none of above tionality her employees need.

56. Allows user to manipulate digital photos 60. Apple Pages, Google Docs, and Corel
is the main function of WordPerfect
A. Control / Measuring software A. Word Processors
B. Video editing software B. Spreadsheets
C. Word Processor software C. Presentation Graphics
D. Photo editing software D. DBMS

57. Each application software of Hannah has a 61. what is the name of the large background
feature that automatically starts a setup area of the large background area of the
screen for the software. What do we call windows environment that holds ions for
this feature? files, folders and applications?
A. Autoplay feature A. desktop
B. Extra Utility feature B. windows
C. Auto-setup feature C. background
D. Add-ons D. home screen

58. Define the term ‘open source software’. 62. which of the following application soft-
A. Software that is supplied with its ware can be used to create contracts
source code. Source code can be modified A. presentation
and the software redistributed (as long as B. database system
this too is open source)
C. spread sheet
B. Software that can be purchased from
a high street or online store. D. word processor

C. Software that can be copyrighted and 63. One downside of using a is that you
the license sold under a patented or trade- are dependent on the server providing the
marked name. application to be available whenever you
D. Software that is written for one cus- need it.
tomer’s specific requirements. A. cloud suite

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 448

B. office suite 69. What of the following is not a Single-user


C. utility program OS?

D. windows program A. Android


B. Linux
64. I can use which applications to create web-
C. iOS
pages?
D. MS Windows 10
A. MS Word
70. The definition of Software suite is

NARAYAN CHANGDER
B. Dreamweaver
C. Google Chrome A. it is used for project planning, schedul-
ing, resource allocation and change man-
D. Internet Explorer
agement
65. A collection of related data equivalent to B. to create and edit sound clips
an electronic file cabinet: C. A collection of individual software,
A. database grouped and sold together as a bundle
B. spreadsheet D. to make a website interactive and in-
C. word processor teresting to viewers

D. presentation 71. Select all that apply for → Project Man-


agement software:-
66. Allow users to choose among a selection
A. Used for planning the project
of design templates.This is the function of
B. Used for scheduling the project
A. Multimedia C. Used for staffing
B. Links D. Used for paying salary
C. Slide design 72. Which of the following antivirus is free?
D. Voice narration A. McAfee

67. A computer utility that helps user to work B. Norton


with file systems in a particular user inter- C. Avast
face. D. Windows Defender
A. Disk Partitioning
73. Another technology used to create web-
B. Registry Cleaner sites is
C. Defragmentation A. Cascading Style Sheets (CSS)
D. File Manager B. Adobe Flash
68. Below are some of the data compression C. Stencyl
utility software EXCEPT. D. Microsoft Publisher
A. Winzip
74. Which of the following is NOT an example
B. 7-zip of a web browser?
C. WinRAR A. mozilla firefox
D. uTorrent B. google chrome

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 449

C. microsoft edge C. To embed photos, music, and even


D. microsoft word other flash games

PRACTICE BOOK» NOT FOR SALE


D. To prepare a prototype
75. Skype is an example of software.
81. The user decides what to do with soft-
A. Communication
ware
B. Reference A. General-purpose
C. Presentation B. Specialized
D. Multimedia C. Customized
76. The type of online suite is D. Custom-written
A. Microsoft Office 365 82. is mass-produced, copyrighted retail
B. Apple iWork software that meets the needs of a wide
variety of users, not just a single user or
C. Libre Office company.
D. Zoho Office A. Custom software
77. which option is NOT an example of a web B. Open source software
browser? C. A Web application
A. google chrome D. Packaged software is mass-
B. google produced, copyrighted retail software
that meets the needs of a wide variety of
C. fire fox users, not just a single user or company.
D. none of above
83. Laura needs to use her personal computer
78. Computer software is a set of telling to analyze tables of numbers. Which appli-
computer what to do. cation software would you recommend?
A. data A. word processing
B. address B. database

C. settings C. spreadsheet
D. Web browsing
D. instructions
84. Which is not a type of installation?
79. The programs and other operating informa-
tion used by a computer A. Custom Installation
A. software B. Full Installation

B. data C. Online Installation

C. hardware D. Typical Installation

D. upgrade 85. Which one of the following software is


not considered an example of productivity
80. Graphical site map is used to Software?
A. To create flash animation A. word processing software
B. Plan the overall design of a website B. desktop publishing software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 450

C. Multimedia Software C. Presentation software


D. presentation software D. Web authoring software
86. Date of is important in order to know 92. Daniel needs to display a series of images
when the software was bought. and text in a meeting with the sales reps.
A. Installation Which application software would you rec-
B. Ordered ommend?
A. word processing

NARAYAN CHANGDER
C. Purchase
D. Delivery B. database

87. A allows users to add, remove, or edit C. spreadsheet


its content. D. Presentation
A. wiki
93. These programs allow you to mix text and
B. podcast
graphics to create publications of profes-
C. blog sional quality focusing on page design and
D. chat layout.

88. Which type of application software is A. image editors


Gmail? B. presentation graphics
A. Internet Browser C. workbooks
B. Presentation D. desktop publishing
C. Email
D. Word Processor 94. was the first secure payment interme-
diary allowing anyone to pay with credit
89. Twine uses . cards and bank accounts without sharing
A. a Lego-like approach to coding his or her financial information for online
purchases.
B. a visual editor with easy-to-grasp
codes and syntax A. PayPal
C. a similar drag-and-drop interface B. Google
D. none of above C. Etsy
90. Mobile app for listening to music. D. NFC
A. Instagram
95. Which of the following software applica-
B. Telegram tions allows you to watch videos and lis-
C. Pandora ten to music that is stored on your com-
puter or streamed from an online source?
D. Spotify
A. Desktop Publishing
91. What software would be used to create an
information sheet e.g. a flyer B. Email
A. Image editing software C. Media Player
B. Word processor D. Word Processor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 451

96. A general-purpose software that has been D. Create a presentation about your sis-
modified to perform specific tasks for the ter.
user.

PRACTICE BOOK» NOT FOR SALE


E. Keep a record of how much money a
A. General-purpose shop has made in a month.
B. Specialized 101. A program that processes information in
C. Customized the form of tables with calculation and for-
D. Custom-written mula is:-
A. Powerpoint
97. Applications for desktop or laptop comput-
ers B. Excel
A. mobile apps C. Word
B. desktop apps D. Graphic
C. help file 102. Microsoft Word is an example of Soft-
D. file extension ware.

98. Alfie is a graphic designer working A. Spreadsheet


for a magazine publication. What B. Word Processing
graphic/multimedia software will he C. Presentation
likely use in his job?
D. Reference
A. Graphics Editing Software
B. Desktop Publishing Software 103. Used for typing and editing
C. Presentation Software A. paint
D. Computer-Aided Design Software B. microsoft excel
Alfie is a graphic designer working C. microsoft word
for a magazine publication. What D. none of above
graphic/multimedia software will he likely
use in his job? 104. What does a Firewall do?
99. What is an online diary or commentary. A. Creates a wall around the computer
A. bitmap B. Blocks everything entering the com-
puter/network
B. blog
C. Creates a barrier to outside software
C. HTML
threats
D. vector
D. Blocks potentially harmful sources to
100. Which of these tasks would you complete the network/computer
using Word Processing software? There is
more than 1 answer. 105. Microsoft is a cloud storage and file
sharing service.
A. Writing a CV.
A. iCloud
B. Creating a poster to advertise a charity
event. B. Dropbox

C. Create graphs and charts to show fi- C. OneDrive


nancial data. D. Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 452

106. When using a spreadsheet, the expres- 112. The appropriate software to use for cre-
sion =D8-D17 is called a ating research papers is software.
A. function A. spreadsheet
B. range B. presentation
C. formula C. word processing
D. cell
D. database

NARAYAN CHANGDER
107. What name is given to the person requir-
ing the software? 113. Which of the following is an example of
a Word Processor?
A. Organisation
A. Google Chrome
B. Company
C. Client B. Microsoft Word

D. User C. MS Publisher

108. All of the following are examples of D. VLC Media Player


database software EXCEPT
114. Software whose source code is not made
A. Oracle available to the general public by its cre-
B. OneNote ators
C. MySQL A. shareware
D. Microsoft Access B. openware
109. The following file extension is not for an C. open source software
image. D. closed source software
A. .ext
B. .jpg 115. When a vendor hosts software on a web-
site and you don’t need to install the soft-
C. .bmp ware on your device, this is known as
D. .png A. Software as a Service (SaaS)
110. is a professional, business-oriented B. open source software
social networking site.
C. beta software
A. Flickr
D. freeware
B. Pinterest
C. Twitter 116. Give 3 examples of productivity soft-
D. LinkedIn ware
A. Database
111. how is data organized in a spreadsheet?
A. lines and spaces B. Disk defragmentation

B. layers and places C. Antivirus


C. height and width D. Word Processor
D. rows and columns E. Presentation Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 453

117. This feature automatically moves the cur- electronics, mechanical objects, animation
sor to the next line when the margin of the and other products?
page has been reached and will readjust

PRACTICE BOOK» NOT FOR SALE


A. Entertainment Software
the text if the margins are changed.This
refers to which feature of a word proces- B. CAD Software
sor? C. Utility Software
A. Headers, figures and page numbering D. Graphic Design Software
B. Annotation
123. Twine and Stencyl are examples of
C. Footnotes and cross-references
A. Web Authoring Software
D. Word wrap
B. Graphics Program
118. Programs that create text-based docu- C. Audio and Video editor
ments.
D. Video Game Design software
A. DBMS
124. Why would you create a poster on Desk-
B. suites
top Publishing rather than Word Process-
C. spreadsheets ing?
D. word processors A. Better page layout options

119. Select the 2 advantages of Laser printers B. It makes pictures look cool

A. high quality documents C. It does spell checking and word pro-


cessing doesn’t
B. low quality documents
D. none of above
C. difficult to maintain
D. less expensive 125. What types of data do businesses rely on
in order to operate?
120. The two main types of computer soft- A. Customer, product, and sales
ware are and
B. Advisor, sales, technological
A. system ; application
C. Product, continuous, discrete
B. video editing ; web design
D. Customer, nominal, sales
C. system ; operating system
D. application ; web design 126. Which of the following statements high-
lights the importance of updating Operat-
121. What is a rectangular area that can con- ing Systems?
tain a document, program, or message. A. Make sure your operating system is
A. dialog box running the older version.
B. form B. Updating your software and operating
systems helps hackers.
C. frame
C. Updates help patch security flaws to
D. window keep hackers out.
122. What type of specialized software is D. A trusted security program can help
used to create design specifications for keep viruses in your devices.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 454

127. Which is true about web-based applica- B. Performing Calculations


tion software? C. Creating data tables
A. It is always free. D. Displaying information to users
B. It is installed by the computer manu-
132. The following types of software are con-
facturer.
sidered what type of software? Online
C. It is stored completely on a web server workspace, document storage/sharing, In-
instead of your hard drive. stant messaging, E-mail and Video confer-

NARAYAN CHANGDER
D. It does not need an Internet connec- encing
tion. A. Collaboration Software
128. Applications are software in which the B. Productivity Software
vendor hosts the software online over the C. Utility Software
Internet and you do not to install the soft- D. Specialized Software
ware on your computer
133. applications are software in which
A. Open Source as a Service
the vendor hosts the software online over
B. Platform as a Service the Internet and you do not to install the
C. Software as a Service software on your computer.
D. Infrastructure as a Service Applica- A. Open Source as a Service
tions are software in which the vendor B. Platform as a Service
hosts the software online over the Inter- C. Software as a Service
net and you do not to install the software
D. Infrastructure as a Service
on your computer
134. One of the PCIe features is it has hot
129. Control and measuring software is de-
functionality,
signed to .
A. plug
A. control and measure a computer’s per-
formance B. play
B. measure a computer’s performance C. pause
D. patch
C. control a computer
D. allow a computer or microprocessor to 135. Microsoft PowerPoint is an example of
interface with sensors. software
A. Presentation
130. Which Control Panel category do you click
if you want to uninstall an application? B. Word Processing
A. Appearance and Personalization C. Spreadsheet
D. Reference
B. Programs and Applications
C. Hardware and Sound 136. Give advantages of using closed source
code
D. Programs and Features
A. Thorough, regular and well-tested up-
131. What is the main purpose of database dates
software? B. Expert support and user manuals from
A. Managing Records company

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 455

C. High levels of security as it is devel- A. Productivity Software


oped in a professional, controlled environ- B. Utility Software
ment

PRACTICE BOOK» NOT FOR SALE


C. Collaboration Software
D. Distributed with the source code
D. Specialized Software
E. Can be modified and sold on
142. which of the following is NOT an applica-
137. The following are uses of photo editing tion software?
softwares except A. spreadsheet
A. Create transitions between clips in the B. word processor
video footage
C. database system
B. Manipulate digital photographs
D. windows vista
C. Change brightness, change contrast of
an image 143. What type of software provides a repos-
itory to store and share files between
D. Remove unwanted items and touch up
users in various locations?
a photo
A. E-mail Software
138. It is a package that performs a specific B. Online Work-space software
function directly for an end user or, in
some cases, for another application. C. Screen Sharing Software

A. Application Software D. Document storage/sharing software

B. Peopleware 144. Select ALL that apply →Examples of


Communication software are
C. Hardware
A. Instant messaging
D. Windows Application Store
B. Video conferencing
139. Google Doxs, Zoho, and Microsoft Office C. Utility Software
365
D. Email
A. Office Suites
145. Computer tasks such as sorting, filtering,
B. Cloud Computing
and organizing datasets are handled by
C. Specialized Suites
D. Utility Suites A. a presentation software
140. An application software that is used in B. a database software
surfing the internet. C. a PIM software
A. Avira Anti-virus D. a multimedia software
B. Yahoo Yahoo 146. Which of the following is considered the
C. Browsers most common way to get an application
software for PC’s nowadays?
D. Software
A. Grab it on tiktok
141. The following types of software are con- B. Download online
sidered examples of what software? Anti-
Malware, Diagnostic, and File Compres- C. Use share-it or Bluetooth
sion Software D. Check for it on messenger

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 456

147. Which of the following are the features B. Audio


of Word Processor? C. Images
A. Worksheet D. Videos
B. Thesaurus
153. Emily wants to type class notes. Which
C. Annotation application software would be BEST for
D. Multimedia her to use?
A. word processing

NARAYAN CHANGDER
148. combines application software such
as word processing, spreadsheet, presen- B. database
tation graphics, ande-mail. C. spreadsheet
A. Shareware D. operating system
B. software suite 154. The characters used to calculate numbers
C. Packaged software within the formula?
D. Custom software A. Arithmetic operators
B. Formula Bar
149. What is the name of the narrow strip
along the bottom of the windows environ- C. Formula
ment? D. none of above
A. taskbar 155. A(n) is an online area where users
B. toolbar have written discussions
C. navigation bar A. FTP program
D. shortcuts B. text message
C. newsgroup/message board
150. What type of software is installed and
used, then purchased if you decide to con- D. Web browser
tinue using it?
156. A subset of e-commerce that uses so-
A. Freeware cial networks to assist in marketing and
B. Purchase ware purchasing products is known as com-
merce.
C. Custom made
A. crowd
D. Shareware
B. source
151. To remove red eye from a digital image, C. friend
you would use software such as
D. social
A. Adobe Photoshop
157. The recommended memory cache of CPU
B. Adobe Acrobat
in installing a Microsoft Office 2010 in a
C. Microsoft PowerPoint 64-bit Windows operating system is
D. Apple Keynote A. 1 GHz
152. The following are file extensions for B. 5 GHz
what type of files:.doc, .ppt, .txt, .rtf? C. 1.4 GHz
A. Documents D. 1.5 GHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 457

158. used for creating spreadsheets and 163. What is the file extension for Microsoft
graphs Excel?

PRACTICE BOOK» NOT FOR SALE


A. microsoft word A. .mdb
B. windows media player B. .xlsx

C. microsoft excel C. .pptx


D. .docx
D. none of above
164. What is the type of image consisting of
159. Computer-aided design software is used geometric shapes.
by
A. bitmap
A. architects and engineers to create vir-
B. raster
tual models
C. ribbon
B. web designers to create websites
D. vector
C. project managers to track tasks
D. game makers to create games 165. What is the file extension for a Power-
Point presentation?
160. A feature, called , allows users of A. .xlsx
word processing software to type words B. .docx
continually without pressing the enter key
at the end of each line. C. .pptx

A. AutoFormat D. .

B. clipboard 166. Used for project planning, scheduling,


resource allocation and change manage-
C. AutoCorrect ment.This refers to
D. wordwrap A. Web Authoring Software
161. The most popular way of installing com- B. Mobile Applications
puter software is from C. Audio and Video Editor
A. web D. Project Management Software
B. diskette 167. Disk cleaner is a category of
C. CD-ROM A. Application Software
D. DVD-ROM B. System Software
C. Utility Software
162. is installed on your computer, and
when the program is opened, your e-mail D. None of these.
downloads to your computer.
168. Sarah turned on her computer and noticed
A. Web-based e-mail program that some important documents that were
stored in her User folder are now missing.
B. E-mail client software
Which of the following would be the MOST
C. E-mail host package LIKELY cause?
D. E-mail server A. System slowdown

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 458

B. Software crash 174. The required available hard disk space for
C. System crash installing a Microsoft Office 2010 in a 64-
bit Windows operating system is
D. Malware infection
A. 32 GB
169. software provides a means for shar-
ing, distributing, and searching through B. 20 GB
documents byconverting them into a for- C. 40 BG
mat that can be viewed byany user
D. 30 GB

NARAYAN CHANGDER
A. Portable Document Format (PDF)
B. Document management 175. The functions of Project Management
Software are
C. Database
A. Calendar and contact sharing
D. Word processing
B. Document sharing and collaboration
170. Apple FileMaker, Microsoft Access, and
OpenOffice Base C. Social networking
A. Word Processor D. Create and edit vector images
B. Spreadsheet 176. Which statement best describes Spread-
C. Presentation Graphics sheet software?
D. DBMS A. Used to create and edit text-based doc-
uments such as letters and posters.
171. The following are the features of spread-
sheet except B. Used to create interactive presenta-
A. Formula tions about specific subjects.
B. Dynamic File Links C. Used to store and perform calcula-
tions on numerical data.
C. What-If analysis
D. Tables D. Used to send and receive electronic
messages.
172. The portion of the application that allows
you to control and to interact with the pro- 177. Task manager is used to .& . ap-
gram. plication software
A. dialog box A. Open
B. gallery B. Control
C. user interface C. Decipher
D. window D. Close
173. Your teacher needs to calculate grades for
178. This application software organizes, ana-
your class. What type of application soft-
lyzes, and graphs numeric data.
ware would he/she MOST LIKELY use?
A. Spreadsheet A. spreadsheet
B. Word processing B. word processor
C. Database C. database
D. Internet D. presentation graphic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 459

179. Software built by companies and sold to C. LinkedIn


users is called . D. iTunes

PRACTICE BOOK» NOT FOR SALE


A. proprietary software
185. There are main types of computer
B. beta software software.
C. freeware A. one
D. open source software
B. two
180. is the electronic equivalent of a user C. three
manual.
D. four
A. Distance learning
186. Which of the following are the types of
B. Online Help
suite?
C. Web-based training
A. Utility
D. E-learning
B. Specialized
181. Application software is categorised into C. Microsoft Publisher
3, which are .
D. Adobe InDesign
A. Software Suite
187. Allows developers to embed photos, mu-
B. General-Purpose Applications
sic, and even other flash games.This is the
C. Specialised Applications function of
D. Mobile Applications A. Stencyl
182. What do you do if you have issues after B. GameMaker
installation? C. Twine
A. Report issues D. none of above
B. Uninstall software and reinstall
188. Prezi, Google Slides, and OpenOffice Im-
C. Delete software from system press
D. Say nothing A. Word Processor
183. It is also known as anti-malware, a com- B. Spreadsheets
puter program used to prevent, detect, C. Presentation Graphics
and remove malware.
D. DBMS
A. Antivirus
B. Anti-bacteria 189. At home Alfie wants to use some applica-
tion software to plan his budget and track
C. Antidote his personal income & expenditure. What
D. Vaccine personal software will he use for this?

184. Which of the following is NOT a social A. Spreadsheet Software


networking site? B. Database Software
A. Facebook C. Home Finance Software
B. YouTube D. Educational Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 460

190. The following are Graphics Program ex- 196. Making sure your software works with
cept your system is called this type of compat-
A. Drawing or Illustration program ibility

B. Twine A. Computer

C. Image or photo editing B. System

D. Desktop publishing or page layout C. Hardware


D. Software

NARAYAN CHANGDER
191. Other examples of Presentation Graphics
are 197. What are the examples of specialized ap-
A. FireBird plication?

B. Apple Keynote A. Audio and Video editor

C. MySQL B. Project Management Software

D. Corel Presentation C. Software Suite


D. Presentation Graphics
192. Which of the folllowing are not applica-
tion software? 198. Find suitable software for the following
A. Microsoft Word terms:A real-time exchange of messages,
files, audio or video with another online
B. Gmail user
C. SPSS A. Gtalk
D. Android B. Whatspp
193. A computer connected to the Internet that C. Safari
asks for data is a(n) D. Line
A. server
199. If you need to explain your duties and
B. client processes to management, then you’ll
C. surrogate have a well-documented account of all
D. aggregator your key processes. What manual does
this?
194. What do you call the intersection of a row A. Logbook
and a column in MS Excel
B. Procedures
A. Cell
C. Report
B. Text Box
D. Standards
C. Label
D. none of above 200. Which of the following is the first step in
verifying that a problem has been fixed?
195. Image editing software allows you to A. Opening the program
A. compute complex formula B. Running the computer for an extended
B. create drafting blueprints time period
C. remove red eye C. Running a virus scan
D. conduct product simulation D. Rebooting the system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 461

201. Graphic software used for creating a pro- C. Rotate


fessional quality brochure.
D. Layering

PRACTICE BOOK» NOT FOR SALE


A. Illustration program
B. Drawing program 206. The 3 common types of computer hard-
ware interfacing can be USB. SATA and
C. Image editor
A. PCI
D. Desktop publisher
B. ATA
202. Why is user experience important when
Ciara chooses the new spreadsheet soft- C. PCIe
ware? D. PATA
A. It may lead to the software not being
interoperable with other software on the 207. The box formed by the intersection of a
system. row and column in a spreadsheet program
B. Users may struggle to use new soft- is known as a
ware, leading to reduced performance A. label
and requiring training.
B. formula
C. The software may not actually have
the features they need to do their jobs. C. function

D. It isn’t important, all spreadsheet soft- D. cell


ware is similar enough that it doesn’t mat-
ter. 208. Which of these is an not an App
A. Youtube
203. Which of the following CANNOT be done
in video editing software? B. Instagram
A. Change the sounds of the video. C. Adobe Photoshop
B. Rearrange the different recordings. D. Facebook
C. Film the video.
D. Add cuts and transitions. 209. What is NOT the purpose of database
software?
204. An application that can be used by the A. To structure and organize data
user to create a slideshow or presentation.
B. Searching for data using queries
A. Microsoft Excel
B. Microsoft PowerPoint C. Produce printed reports
C. Microsoft Word D. Download additional data
D. Skype
210. All of the following are types of e-
205. CAD software is commonly used in the commerce business EXCEPT
architecture industry to design buildings. A. B2C
Which of the following are common fea-
tures of CAD software? (2 answers) B. B2B
A. Simulation Modelling C. C2C
B. Walkthrough D. C2B

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 462

211. The unique address for a particular web- 216. software helps run the computer and
site is the coordinates instructions between other
software and the hardware devices.
A. protocol
A. Application
B. domain section
B. Utility
C. client
C. System
D. URL
D. Recovery

NARAYAN CHANGDER
212. the file extension for MS-Word document
in Office 2007 is 217. Which type of application software
would you use to attach and send your as-
A. .doc signments to your lecturer?
B. .docx A. Presentation
C. .pdf B. Email
D. .xls C. Database

213. To promote products or services, business D. Spreadsheet


companies use
218. What is computer software?
A. Audio and video editor
A. Intergrated peripherals that we use on
B. Graphics Program computers
C. Web Authoring Software B. A function that allows computers to
D. Video Game Design Software calculate
C. A set of instructions grouped into pro-
214. Software that enables you to display and grams that make the computer function in
interact with text and other media on the a desired way.
web is a web
D. none of above
A. client
219. The following file extension is for a video
B. server
file.
C. agent
A. .bat
D. browser . B. .gif
215. Carlo wanted to be notified of the manu- C. .avi
facturer’s latest news and updates of his D. .app
newly installed software app. Which of
the following step he must accomplish to 220. Applications for mobile smartphones and
attain this? tablets
A. Add shortcuts A. desktop apps
B. Check for updates B. mobile apps
C. Install extras C. file extensions
D. Register your product D. system software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 463

221. Microsoft Word, Microsoft PowerPoint, C. Search Queries


and Internet Explorer are examples of: D. Creating Charts

PRACTICE BOOK» NOT FOR SALE


A. Application software
227. Which of the following commands makes
B. System software an application shortcut appear on the
C. Hardware taskbar?
D. Input devices A. Pin to taskbar
B. stick to taskbar
222. Web authoring program used to create a
website without knowing HTML. C. show on taskbar
A. CSS D. keep on taskbar
B. WYSIWYG 228. Jay wanted to install a new game soft-
C. Flash ware to his PC. Which of the following he
must consider first before doing this?
D. Browser
A. Directory File
223. Which of the following are personal video
B. Total amount of payment
journal entries posted on the web?
C. System requirements
A. Podcasts
D. Availability of installer
B. Newsgroups
C. Vlogs 229. Software that helps run the computer’s
hardware devices and coordinates instruc-
D. Blogs tions between application is called .
224. It is an electronic spreadsheet that lest A. a web server
you enter, analyze, and calculate data? B. application software
A. Worksheet C. system software
B. Workbook D. beta software
C. Form
230. These readers allow mobile devices to
D. none of above use their digital cameras to scan quick re-
sponse codes.
225. Liza is about to open her newly installed
program for the first time. What must she A. mobile readers
do to familiarize herself with the different B. camera scanners
functionalities of the program?
C. RC scanners
A. Check for updates online
D. QR code readers
B. Ask your parents or friends
231. What was the most common way to
C. Ask your parents or friends
get new software during the mid-1990s
D. Watch tutorial through the late 2000s?
226. Which of these is NOT a feature of A. Install it from CDs/DVDs.
database software? B. Share it via Bluetooth.
A. Table Creation C. Download it from the Internet.
B. Table Sorting D. Send it through email.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 464

232. Which of the following is the website B. to include email addresses of newly
that provides mobile apps for Android de- hired employees
vices? C. to clarify the overall purpose of the
A. Apple App Store message
B. Android Store D. to copy the email confidentially
C. Google Play Store 238. which of the following applications can be
D. Windows Phone Store used for strong, modifying, extracting and

NARAYAN CHANGDER
searching data
233. InShot is an example of a software.
A. word processing software
A. Word Processing
B. database software
B. Photo Editing
C. presentation software
C. Video Editing
D. conferencing software
D. Graphics Manipulation
239. Windows, IOS, and Linux are all types of
234. microsoft word, microsoft powerpoint, what?
and internet explorer are examples of A. Software systems
A. application software B. Hardware systems
B. hardware C. Operating systems
C. system software D. All of the above
D. input devices
240. What is the term used to put software on
235. Which of the following is NOT a precau- a computer?
tion to take when shopping online? A. Download
A. Pay with a debit card, not a credit card. B. Upload
B. Shop at well-known, reputable sites. C. Install
C. Avoid making online transactions on a D. Uninstall
public computer.
241. Beta software is made available because
D. When placing an order, make sure you
receive a confirmation number.
A. new programmers have been hired
236. What is the most common way to get
B. a company is making an early release
new software?
to test a bugs
A. Install it from CDs/DVDs.
C. wireless networking must be added
B. Share it via Bluetooth.
D. the company needs more profit
C. Download it from the Internet.
242. Fill in the blank.We store all these infor-
D. Send it through email.
mation into something call which has
237. when composing an email message why Tables that includes rows and columns.
might you want to use the Bcc field? A. page
A. to include extra-long email addresses B. database

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 465

C. client C. path
D. slide D. top-level domain

PRACTICE BOOK» NOT FOR SALE


243. What are programs that organize, ana-
249. Google Docs and Zoho Writer are exam-
lyze, and graph numeric data such as bud-
ples of
gets and financial reports.
A. Presentation graphics
A. suites
B. DBMS B. DBMS
C. spreadsheets C. Word processor
D. word processors D. Spreadsheet

244. The type of gui that uses tabs to organize 250. The recommended memory in installing
groups of related items. a Microsoft Office 2010 in a 64-bit Win-
A. character dows operating system is
B. gallery A. 512 MB
C. ribbon B. 1 GB
D. traditional C. 2 GB
245. Also known as an online suite. D. 256 MB
A. cloud
251. software includes programs that are
B. office
not specific to any organization or busi-
C. integrated ness and can be used by anyone
D. utility A. General-purpose
246. A Web site that provides access to spe- B. Specialized
cific mobile apps is called a(n):
C. Customized
A. mobile store
D. Custom-written
B. app store
C. iPhone apps 252. What category of software is a Compiler
D. smartphone store A. Productivity software
247. Software is also known as B. Development tools
A. Application C. Business software
B. Hardware D. none of above
C. Input
253. E-mail is from category of
D. Output
A. Utility Software
248. In the URL http://www.microsoft.com/surface,
the portion labeled “http” is the B. Application Software
A. protocol C. System Software
B. domain name D. None of these.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 466

254. It is a digital distribution platform cre- 260. Google Docs, Zoho, and Microsoft Office
ated for Windows Operating System. Web Apps are examples of:
A. App Store A. basic applications
B. Play Store
B. cloud suites
C. Galaxy Store
C. utility suites
D. Microsoft Store
D. specialized applications
255. What is the program that is used to set

NARAYAN CHANGDER
up an electronic database? 261. What is NOT a reason for why backups
A. Spreadsheet are necessary?
B. Word Processor A. Data corruption
C. Software Suite
B. Hardware failure
D. DBMS
C. Leaked Information
256. What does application software NOT al-
D. Malicious software
low a user to do?
A. Create Documents 262. What should a level 1 technician do when
B. Enhance Internet Connection they are unable to solve an issue?
C. Manage Finances A. Close the ticket and let someone else
D. Edit Images handle it.

257. What is the function of a word proces- B. Escalate to a higher level of support.
sor? C. Keep working at it until they resolve it.
A. create presentations
D. Contact Microsoft support.
B. manipulate textual data
C. manipulate numeric data 263. A driver is used to .& . with hard-
D. create spreadsheets ware devices

258. Give 3 examples of utilities A. Collect

A. Compression B. Control
B. Disk defragmentation C. Collaborate
C. Antivirus D. Communicate
D. Word Processor
E. Presentation Software 264. Which of these tasks would you complete
using an internet browser? There is more
259. When the software is installed, what do than 1 answer.
you do next?
A. Write an email to a friend.
A. Test the software
B. Search for a new laptop.
B. Uninstall old version
C. Upgrade to new version C. Find a local florist’s telephone number.
D. Update the logbook D. Watch Youtube videos.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.5 Application Software 467

265. Amie is on her last step in software ap- 270. The following file extension is for a file
plication installation. What is this last that includes limited amount of formatting
step that allows her to easily access the such as bold and italic.

PRACTICE BOOK» NOT FOR SALE


app and view its icon instantly in her com- A. .doc/.docx
puter?
B. .txt
A. Add shortcuts
C. .rtf
B. Check for updates
D. .ppt
C. Install extras
271. Define the term ‘custom software’.
D. Register your product
A. Software that can be purchased from
266. What are other examples of most com- a high street or online store.
monly used spreadsheet programs other B. Software that is supplied with its
than Microsoft Excel? source code. Source code can be modified
A. KCells and the software redistributed (as long as
this too is open source)
B. Zoho Sheet
C. Software that is written for one cus-
C. Apple Numbers tomer’s specific requirements and also
D. Lotus 1-2-3 called as ‘tailor-made software’.
D. Software that can be copyrighted and
267. Which of the following keys is used to en- the license sold under a patented or trade-
ter Safe Mode on a Windows computer? marked name.
A. F8
272. programs designed to perform tasks is
B. Shift known as
C. F5 A. system software
D. CTRL B. application software
C. utility programs
268. word Processor
D. operating system
A. OpenOffice Writer
B. Notepad 273. Programs that you can use to create let-
ters and reports.
C. Notepad++
A. presentation graphics
D. Microsoft Word
B. DBMS
269. Which type of application software is C. word processor
used to view web pages and other online D. spreadsheet
content?
A. Word Processor 274. Which type of application software
would you use to write an essay for col-
B. Spreadsheet lege or university?
C. Presentation A. Spreadsheet
D. Internet Browser B. Email

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 468

C. Internet Browser A. Spreadsheet


D. Word Processor B. Reference

275. Windows Media Player is an example of C. Presentation


software. D. Multimedia

5.6 Programming Languages

NARAYAN CHANGDER
1. converts assembly language in to ma- C. Guido Lee
chine code.
D. none of above
A. Compiler
B. Interpreter 6. Which of these is not a high-level lan-
guage.
C. Assembler
A. Machine languages
D. none of above
B. Fortran
2. What is the only thing that it is “native”
language of a computer? C. c

A. Machine Languages D. java


B. High Level Languages 7. Which language translator produces Ob-
C. Low Level Languages ject Code and an Error Report?
D. Algorithms A. Code Translation
3. Please select the Functional Paradigm(s). B. Compiler
A. ALGOL, FORTRAN, Pascal, C, Ada C. Interpreter
B. C++, Java, Smalltalk D. none of above
C. Lisp, Scheme, ML, Haskell
8. A language that is translated all at once
D. Prolog into a form the machine can understand,
E. Python, Perl, Ruby and then executed by the machine.

4. Software that is restricted on its use or A. compiled


modification. B. reduced
A. Freeware C. interpreted
B. Shareware D. translated
C. Open source
9. The second generation is also called:
D. Closed source
A. Machine
5. Python was developed by a programmer
named in 1991. B. Assembly
A. Guido Van Rossum C. Low level
B. Guido Robert D. High level

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 469

10. The command STOP is used in a software D. Adds new features to the delivered
language as a debugging tool to halt a pro- program
gram. The program cannot resume until

PRACTICE BOOK» NOT FOR SALE


the debugging command RUN is issued. 15. proposed that computers should be
A. Program trace permanently hardwired with a small set
of general-purpose operations.
B. Breakpoint
C. Stub A. John von Neumann
D. Value watching B. Alan Turing

11. Which IDE tool converts each line of source C. Linus Torvalds
code into machine code, and executes it as D. Bjarne Stroustrup
each line of code is run?
A. Compiler 16. Consider the sentence:A book has one or
B. Variable Watch more pages. Which of the following best
characterizes the relationship between the
C. Memory Inspector
Book class and the Page class?
D. Interpreter
A. Inheritance
12. Which Data Type is used to store whole
numbers? B. Specialization

A. String C. Association
B. Double D. Composition
C. Integer
17. Software can be described as Fit for Pur-
D. Boolean
pose if it:
13. which two statements are true of a com-
A. Fulfils the requirements set out during
piler?
the Analysis stage
A. the translation is done once only and
as a separate process B. Fulfils the requirements set out during
the Design stage
B. when an error is found this is reported
and it stops. It pinpoints the error so the C. Fulfils the requirements set out during
programmer knows where it has occurred the Implementation stage
C. the program can be easily edited as it D. Fulfils the requirements set out during
always exists as source code the Testing stage
D. the program that is run is already
translated into machine code so it can be 18. Please select the Logic Paradigm(s).
executed more rapidly
A. ALGOL, FORTRAN, Pascal, C, Ada
14. The operations and maintenance phase B. C++, Java, Smalltalk
A. Determines what the program will do
C. Lisp, Scheme, ML, Haskell
B. Determines how the program will work
D. Prolog
C. Determines whether or not the pro-
gram works E. Python, Perl, Ruby

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 470

19. What is a Debugger? 24. Program subroutines are?


A. A program that scans software. A. fixed variable
B. it is used when a program fails to com- B. default variables
pile or to run. Error messages are dis-
played to help the programmer diagnose C. called by other programs
what has gone wrong. D. none of above
C. A program which removes viruses.
25. Which of the following is a logic program-

NARAYAN CHANGDER
D. A program which helps locate, identify ming language?
and rectify errors in a program.
A. C
20. One kilobyte is equal to approximately B. Prolog
memory locations.
C. FORTRAN
A. 1, 000
D. Lisp
B. 10, 000
C. 100, 000 26. Assembly langauge is written using
D. 1, 000, 000 A. Binary
21. What is an advantage of a Game Library B. English-like key words
over a Graphics Library? C. Abbreviated mnemonic keywords
A. Game Library is faster
D. none of above
B. Graphics Library always have better
graphics 27. FOXPRO is a -generation language.
C. Game Library is more complete, such A. Second
as having audio support
B. First
D. Game Library takes up more space and
C. Third
takes longer to load
D. Fourth
22. A language that allows the user to add fea-
tures to it is: 28. Visual Basic is an example of
A. Irregular A. Machine Code
B. Semantically safe B. High Level Language
C. an Extensible language
C. Assembly Language
D. Syntactically safe
D. Low Level Langauge
23. What are the 2 ways to classify program-
ming languages? (SELECT 2 options) 29. Programming Language with letter A

A. Language generation A. Assembly


B. language level B. ARM
C. high level C. A
D. low level D. Actor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 471

30. Which code displays Hello World on the 35. What is the Brain of Computer?
Phone Simulator screen? A. UPS

PRACTICE BOOK» NOT FOR SALE


A. display.newText(”Hello World”, 100, B. CPU
100)
C. SMPS
B. print(”Hello World”, 100, 100)
D. RAM
C. new.text(”Hello World”, 100, 100)
36. A language that is run by the machine, one
D. display.new(”Hello World”, 100, 100) line at a time.

31. Else A. interpreted


B. compiled
A. To provide a response if a statement is
not met C. read
B. To provide a response if a statement is D. translated
met 37. Assembly language is better than machine
C. A loop with a condition set at the start code because (3 answers)
D. Used in a question as part of the deci- A. it is easier for humans to read
sion process B. it is easier to remember the instruc-
tions
32. If I find flaws in my solution I should .
C. a person is less likely to make mis-
A. Create a technical drawing instead takes in assembly language
B. Be formal and perfect D. it is written using English-like words
C. go back and make modifications be- 38. A program that loads the machine code
fore moving forward into computer memory.
D. none of above A. Assembler
B. Loader
33. The variable points stores data that the
user has input. What is the data type of C. Compiler
this variable? D. Operating System
A. The variable points is integer data type 39. Please select the Object Oriented
B. The variable points is string data type Paradigm(s).
C. The variable points is float data type A. ALGOL, FORTRAN, Pascal, C, Ada
D. none of above B. C++, Java, Smalltalk
C. Lisp, Scheme, ML, Haskell
34. A programming language where the type
D. Prolog
of variable is known at compile time.
E. Python, Perl, Ruby
A. Statically Typed
40. This is binary code which is designed to be
B. Dynamically Typed
understood by computer systems. A low
C. Compiled Language level programming language.
D. Interpreted Language A. Debugger

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 472

B. Operand 46. Which one would I be using if I had syntax


C. Opcode highlighting?
A. Text Editor
D. Machine Code
B. Debugger
41. Which of the following programming lan-
C. Compiler
guage types was created first?
D. none of above
A. Procedural
47. Which of these is another name for a web

NARAYAN CHANGDER
B. Machine
page address?
C. Object oriented
A. CSS
D. Assembler
B. JAVA
42. Focus is on the result of a calculation given C. URL
certain data D. CNN
A. procedural paradigm
48. “Contain both data and the procedures
B. functional paradigm that read or manipulate that data”. This
C. object-oriented paradigm statement describe which programming
paradigm?
D. none of above
A. Logic
43. was developed at a university called B. Object Oriented
MIT in2003.
C. Procedural
A. Scratch
D. none of above
B. Python
49. What is “black box” testing?
C. Java
A. System testing
D. none of above
B. Integration testing
44. What will the output be from the following C. Testing with knowledge of the system
code? print(”Hello” + “world!”) internals
A. Hello world! D. Testing without knowledge of the soft-
B. Helloworld! ware internals
C. SyntaxError 50. Translates entire source code in one go
D. “Hello” “world!” A. Language Translator
B. Compiler
45. Modern IDEs assist programmers by:
C. Interpreter
A. Automatically completing code
D. none of above
B. Writing programs for the user
C. Stopping any errors from being pro- 51. Which language translator is used during
duced the development of a program?

D. Removing the need to write any code A. Code Translation


at all B. Compiler

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 473

C. Interpreter 57. What would I use to set a breakpoint?


D. none of above A. Text Editor

PRACTICE BOOK» NOT FOR SALE


52. Shortened command words which are used B. Debugger
in assembly language. For example, “Lit-
tle Man Computer” used mnemonics such C. Compiler
as “LDA”, “DAT”, “ADD” and “OUT”. D. none of above
A. Operand
B. Editor 58. The reason for software bugs and failures
is due to
C. Mnemonics
D. Debuugger A. Software companies
B. Software Developers
53. What is Assembly code?
A. Another name for Pseudocode C. Both Software companies and Devel-
opers
B. A programming language that uses
mnemonic codes D. Software
C. A program that joins pieces of code to-
gether 59. A low level programming language is
D. Another name for machine code A. very efficient on the processor
54. The following are programming B. easy for humans to read
paradigms:
C. interpreted or compiled
A. Imperative, object-imperative, script-
ing, declaring, functional, aspect-oriented D. multiple instructions per statement

B. Procedural, object-oriented, scripting, E. assembled


declaring, functional, aspect-oriented
C. Procedural, object-procedural, script- 60. Which type of translator creates an exe-
ing, declaring, functional, aspect-oriented cutable file of machine code from a pro-
gram written in a high level language?
D. Imperative, object-oriented, procedu-
ral, declarative, functional A. Compiler

55. Which of these are high-level languages? B. Assembler


A. Java C. Interpreter
B. Assembly D. Executor
C. Machine code
D. Pascal 61. Which of the following is NOT the name of
a primitive data type?
56. LOAD r1, LOAD r2, ADD r1, DIV r1, #2
A. Integer
A. Machine Code
B. Float
B. High Level
C. Assembly Language C. Decimal
D. none of above D. String

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 474

62. What is “white box” testing? C. 0


A. Unit testing D. Blank space
B. Integration testing
68. In the 1980s and 1990s, what program-
C. Testing with knowledge of the system ming language design criterion was most
internals emphasized?
D. Testing without knowledge of the soft- A. Efficiency of execution
ware internals

NARAYAN CHANGDER
B. Simplicity and abstraction
63. A programming language that automati-
C. Logical or mathematical precision
cally turns lots of information into web
pages D. Object-Oriented approach to abstrac-
A. C tion

B. MATLAB 69. Program is translated line by line as the


C. Ada program is running
D. Ruby A. Assembler
E. Java B. Compiler

64. A phase in the Program Development Cycle C. Interpreter


that involves the creation of Source Codes D. none of above
A. Understanding the Problem
70. human language that has flexible rules and
B. Planning the Logic is sometimes ambiguous in meaning
C. Coding the Program A. Programming language
D. none of above
B. Formal language
65. How many Programming Languages ex- C. Natural language
ist?
D. none of above
A. 7
B. 114 71. An example of a LOW level language
would be:
C. 426
A. C#
D. Thousands
B. Python
66. Expand SRS
C. Assembler
A. System Requirement Specification
D. Scratch
B. System Requirement Software
C. Software Requirement Specification 72. Uses mnemonics
D. Software Requesting Service A. Interpreter
67. No is allowed in variable B. Translate
A. + sign C. Compiler
B. -sign D. Assembly Langauge

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 475

73. Python is a clear and powerful - 78. characters are stored as string data
oriented programming language. type

PRACTICE BOOK» NOT FOR SALE


A. software A. ASCII
B. object B. special
C. snake C. alphabet

D. source D. none of above

79. Orthogonality was a major design goal of


74. Translate Assembly Language code into
which of the following languages? This
Machine Code
language is still the best example of a lan-
A. Assembler guage in which constructs can be combined
B. Compiler in all meaningful ways.
A. Python
C. Translator
B. COBOL
D. Interpreter
C. Java
75. Which of these are language semantics no- D. Algol68
tation systems?
A. Operational semantics 80. Which of the following are the main crite-
ria of Efficiency?
B. Denotational semantics
A. Programmer efficiency
C. Axiomatic semantics
B. Expressiveness
D. Informational semantics
C. Conciseness of syntax
E. Idiomatic semantics
D. Maintainability
76. Another name for the first generation lan- E. All of the above
guage is?
81. A python function called converts any
A. Assembly variable to integer data type.
B. Machine A. float
C. Binary B. string
D. High level C. int
D. none of above
77. Which IDE facility displays the order in
which the lines of a program are executed, 82. Which of the following commands would
and possibly the values of variables as the transfer a variable to the accumulator reg-
program is being run? ister?
A. A Trace A. LDA
B. A Copier B. STR
C. A Line Numberer C. STO
D. A Variable Counter D. LOD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 476

83. Which languages are dynamically typed? 88. What is coding?


A. C A. something used to develop computer
B. Python programs

C. Javascript B. a form of “language” used to commu-


nicate computer actions
D. Java
C. an essential part to everything we do
E. Ruby online

NARAYAN CHANGDER
84. What is a software design strategy? D. All of these
A. A graphical or textual description of 89. What does IDE stand for?
the software
A. Integrated Debugging Equipment
B. A fundamental idea that can be applied
to designing a system. B. Integrated Debugging Environment

C. A systematic approach for producing a C. Integrated Development Equipment


design. D. Integrated Development Environment
D. An overall plan and direction for devel- 90. Binary uses how many digit(s)?
oping a design.
A. 1
85. What is often used to represent binary ma- B. 2
chine code to make it easier for humans to
understand? C. 8

A. Hexadecimal D. 10

B. Denary 91. Which generation of languages started in


C. Octal the 1950s?

D. Duodecimal A. First
B. Second
86. What is the smallest unit of measurement
used to quantify computer data. C. Third

A. a bridle D. Fourth

B. a bit 92. A computer program is best described as a


C. marble series of

D. a tablespoon A. Instructions
B. Questions
87. What is a MNEMONIC?
C. Answers
A. A single action that can be performed
by a computer. D. Numbers

B. A symbol that represents an instruc- 93. What is a Break Point?


tion in assembly code. A. A facility which breaks a while loop or
C. A high level language keyword. an ‘if’ statement.
D. A register used inside a CPU A register B. A Facility which displays the current
used inside a CPU. value of any variable. The value can be

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 477

‘watched’ as the program code is single- C. Set of food items


stepped to see the effects of the code on D. Set of programs
the variable.

PRACTICE BOOK» NOT FOR SALE


99. HTML tags are always surrounded by
C. A facility which interrupts a program
on a specific line of code, allowing the pro- A. ( )
grammer to compare the values of vari- B. { }
ables against expected values. C. < >
D. A film staring Keanu Reeves. D. ‘’ “
94. What is the first step in a compiler? 100. SDLC means
A. Syntax analyzer A. Software Development life cycle
B. Lexical analyzer B. System development life cycle
C. Code generator C. Simple development learning cycle
D. Optimizer D. Non of the above

95. Languages that relate to the architecture 101. Case label in switch() should not be
and hardware of a specific computer are A. floating point
known as
B. integer
A. High Level Languages C. long integer
B. Low Level Languages D. all above
C. Simplex Languages
102. Binary numbers are usually expressed in
D. Complex Languages groups of bit(s).
96. A phase in the Program Development Cy- A. 1
cle that involves the consideration of what B. 2
the end users want or need.
C. 8
A. Understanding the Problem D. 10
B. Planning the Logic
103. HTML coding involves using to create
C. Coding the Program webpages.
D. none of above A. Tabs
97. Select the LOW LEVEL languages B. Tags
A. Machine language C. Labels
B. Assembly language D. Quotes

C. C++ 104. To write a program for a specific device


such as an air conditioning unit, which type
D. Python
of language would be used?
E. Pascal
A. Low Level
98. What do you understand by software? B. High Level
A. New Movie C. Java
B. Set of sports items D. Binary

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 478

105. An example of a high-level programming C. Internet


language is: D. Network
A. Python
110. When writing a computer programmers
B. Assembly most program use
C. Machine code A. A High Level Language
D. Cloud B. A Low Level Language

NARAYAN CHANGDER
106. Which of the following is false: C. A Machine Code
A. INTERPRETED programs run slower D. An Algorithm
than COMPILED programs
111. What is the name for the software used
B. ASSEMBLY LANGUAGE is easier to to convert an assembly language program
read then MACHINE CODE into machine code?
C. COMPILED programs are easier to de-
A. Assembler
bug
B. Interpreter
D. MACHINE CODE programs are usually
HARDWARE SPECIFIC C. Compiler
D. Translator
107. The first stored programs were written
in binary. How many bits did each line of 112. Computer Works on which cycle?
code contain?
A. Process, Output, Input
A. 4
B. Output, Process Input
B. 8
C. Input, Process, Output
C. 16
D. None of the Above.
D. 32
113. Which one of the following is the cor-
108. Select all that are true about Python. rect ordering of the coupling of modules
A. Python was not intended to replace from strongest (least desirable) to weak-
C or C++ for large or time-critical sys- est (most desirable)?
tems. A. content, common, control, stamp, data
B. Runtime type-checking is perfectly B. common, content, control, stamp, data
suitable for time-critical applications.
C. content, data, common, stamp, com-
C. The absence of static type-checking mon
can be a liability in testing and verification
of a large software system. D. data, control, common, stamp, content

D. The design goal of ease of use for a 114. Select two advantages of high level lan-
novice has not been achieved. guages

109. Second-generation languages are - A. Easier to learn


friendly languages. B. Executes very fast
A. Machine C. The code will occupy less memory
B. Programmer D. Programs can be written faster

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 479

115. Which programming language is consid- C. Source file


ered to be the first step toward sophisti- D. Temp file
cation in programming languages?

PRACTICE BOOK» NOT FOR SALE


A. Smalltalk 121. What is programming?
B. Prolog A. Creating a calendar of events.
C. ALGOL60 B. Writing instructions for a digital tool
D. C# C. A list of activities like clubs and special
events at a school.
116. High level languages feature D. none of above
A. English-like keywords
122. Which digits make up binary language?
B. short commands
A. 1 and 2
C. zeros and ones
B. 1 and 0
D. none of above
C. 1 and 9
117. Java is D. 2 and 3
A. A Functional Programming Language
123. Please select the Imperative/Procedural
B. An Object Oriented Programming Lan- Paradigm(s).
guage
A. ALGOL, FORTRAN, Pascal, C, Ada
C. A Procedural Programming Language
B. C++, Java, Smalltalk
D. A Weakly Typed Programming Lan-
guage C. Lisp, Scheme, ML, Haskell
D. Prolog
118. The letter E in binary is?
E. Python, Perl, Ruby
A. 01000001
B. 01000010 124. an instruction for the computer
C. 01010101 A. algorithm
D. 01000101 B. command
C. workaround
119. What describes the requirement that a
program be described as a sequence of in- D. query
structions?
125. Which programming paradigm describes
A. von Neumann bottleneck a language with these three proper-
B. Linus Torvalds bottleneck ties:Sequential execution of instructions,
Use of variables representing memory lo-
C. Bjarne Stroustrup bottleneck cations, and use of assignment to change
D. Alan Turing bottleneck the values of variables?

120. A program translated into machine code A. Imperative


is Executed by an B. Functional
A. Compiler C. Object-Oriented
B. Interpreter D. Logic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 480

126. Which of these converts a computer pro- 132. Why was C++ a success?
gram from one language to another? A. Introduced just as interest in object-
A. Compiler oriented techniques was exploding
B. Interpreter B. Straightforward syntax, not tied to any
C. No Translator operating environment

D. Language Translator C. The semantics incurred no perfor-


mance penalty
127. Which paradigm dictates WHAT should be

NARAYAN CHANGDER
D. Its flexibility, hybrid nature, and will-
done but not HOW it should be done? ingness to extend its features were pop-
A. Declarative ular
B. Imperative E. All of the above
C. Functional 133. This programming language is one of the
D. OOP three core technologies of the world wide
web.
128. The program can be divided into two
A. Javascript
forms such as and
B. Java
A. Syntax
C. Python
B. Semantics
D. HTML
C. Algorithm
D. Pseudocode 134. Binary represents
A. 1
129. A single sentence that tells the computer
to do something is: B. 0, 1
A. Code C. 2
B. Computer Program D. none of above

C. Function 135. High level languages


D. Object A. Can be run directly from the code
B. Need to be translated before execu-
130. Data types are differed on basis of
tion
A. way of storage
C. Are targeted at a specific CPU
B. both (a) and (b)
D. none of above
C. type of operations
136. There are 5 steps in implementing a pro-
D. none of above
gram. CHOOSE THEM from the grouped
131. Data is exposed to whole program, so no list.
security for data. This statement refer to A. Design Algorithm & Draw flowchart
which paradigm? B. Create Source Code & Translate
A. Object-oriented Source code to Object code
B. Logic C. Define and Analyze the problem
C. Procedural D. Execute & Maintain the Program
D. none of above E. Link object code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 481

137. Resolving errors in a program is known C. Debugger


as D. Linker

PRACTICE BOOK» NOT FOR SALE


A. Debugging
143. A powerful language for building com-
B. Refixing puter operating systems
C. Error Checking A. C
D. Problem Solving B. MATLAB
138. Which of these would work as a piece of C. Ada
code? D. Ruby
A. IF answer == “Yes”: E. Java
B. if answer == “Yes” 144. Which is the first programming language
C. if answer == “Yes”: that fully supported object-oriented pro-
D. if answer = “yes”: gramming?
A. Smalltalk
139. Choose all answers that are text-based
programming languages. B. C++

A. Scratch C. Ruby
D. Java
B. Java
C. HTML 145. Which type of translator is used to to cre-
ate a machine code version of a HLL pro-
D. Python
gram prior to distribution to the public?
140. What is syntax? A. Compiler
A. Syntax is the word used to describe an B. Interpreter
error C. Converter
B. Syntax is the rules of the programming D. Assembler
language
C. It is used to read information 146. A decision tree uses to calculate likely
outcomes.
D. It is used to output information
A. stakeholder information
141. Translate and execute high level code- B. facts and statistics
Line by Line, Statement by Statement.
C. estimates and probabilities
A. Interpretor
D. shareholder data
B. Translator
147. Low level programming languages are
C. Compiler
[2 answers]
D. Assembler
A. Easy to read, understand and modify
142. Which IDE tool converts all source code B. Difficult to read, understand and mod-
into executable machine code before send- ify
ing it to the CPU? C. Very simple to understand
A. Loader D. More memory efficient than high-level
B. Compiler languages

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 482

148. The implementation phase 153. Which statement below is NOT correct?
A. Determines whether or not the pro- A. Decision trees are only useful if the
gram is feasible choices at each decision point are binary
B. Determines which classes are needed B. Both decision trees and tables can
and what they will do have redundancy, if not carefully designed
C. Determines whether or not the pro- C. Both decision trees and tables are
gram works good for modelling complex logic

NARAYAN CHANGDER
D. Implements the program code D. none of above
149. Which type of translator is used to test 154. What is a high-level programming lan-
if a HLL program works and contains no guage that was developed in the mid-
syntax errors? 1970s. It is now used to write applica-
A. Interpreter tions for nearly every available platform.
B. Converter A. Scratch
C. Assembler B. Bark-Bark
D. Compiler C. tynker
150. Why is a translator not required for a D. C++
programme written in machine level lan-
155. What form of documentation/diagram
guage?
is the most appropriate for showing the
A. Because it is a high level language schedule and timelines for activity in a
B. Because it is the computers native lan- project?
guage A. Gantt chart
C. Because it is a third generation lan- B. Storyboard
guage
C. Data flow diagram
D. because it has already been translated
D. System flowchart
151. In software design three levels of design
exist, which are- 156. PASCAL, Qbasic and Pseudocode are ex-
amples of which generation language?
A. External Design
B. Architectural Design A. First

C. Detailed Design B. Second


D. Program Design C. Third
D. Fourth
152. Which best describes Lua?
A. Scripting → C → Binary → Hardware 157. What is Programming Language Agnosti-
cism?
B. Interpreted → Binary → Virtual Ma-
chine → Hardware A. Learning programming skills that apply
C. Compiled → Executable Binary → to all languages
Hardware B. Not believing in a programming god
D. Compiled → Executable Binary → Vir- C. Programming languages with the
tual Machine → Hardware same syntax, such as Python and Java

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 483

D. Ignoring outdated software engineer- 162. Which programming paradigm focuses on


ing paradigms in favor of more modern reusable code that operates in a way to
ones mimic behaviors of real-world objects?

PRACTICE BOOK» NOT FOR SALE


158. Are closer to human language. Like ora- A. Imperative
cle, VB, VC++, SQL etc. Most of them are B. Functional
used to access database, they allow the C. Object-Oriented
programmer to define “what” is required
without telling the computer and “How” D. Logic
to implement it. 163. Structured control abstraction examples
A. Machine include, but are not limited to:
B. Assembly A. Branch instructions, Iterators, Proce-
dures/Subroutines
C. High Level
B. Runtime Environments, Functions, Re-
D. 4GL
cursion
159. Which feature translates the source code C. Syntactic Sugar and Threads
in the code editor?
D. Processes and Tasks
A. Text Editor
164. A teacher is to a student as a program-
B. Debugger
mer is to:
C. Compiler
A. a student
D. none of above
B. a computer
160. A programming paradigm includes: C. a library
A. Problem solving and program lan- D. a principal
guage design
165. What is machine code?
B. Problem solving
A. Instructions converted by a translator
C. Program language design
B. Instructions in an HLL used by the CPU
D. None of the above
C. Instructions in binary used by the CPU
161. How did Python accomplish their design
D. Instructions in assembly used by the
goal of portability?
CPU
A. They made the application extremely
light-weight so it could run on any device. 166. Psuedocode is defined as
B. The Python compiler translates source A. a device that detects important physi-
code to machine-independent byte code, cal quality or quantity about surrounding
which is run on a Python virtual machine. environment.
C. Application-specific libraries support B. a group of interacting, interrelated el-
programs that must access databases, ements that work together.
networks, the Web, GUI, and other re- C. shorthand notation for programming
sources/technologies. which uses a combinatino of informal pro-
D. Python was based on C code and there- gramming structures and verbal descrip-
fore can be run on a large amount of ma- tions of code.
chines with ease. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 484

167. Finding and fixing errors in programs C. Increasing algorithm performance


A. Tech support D. Elimination of redundancy
B. Decompose
173. An advantage of programming in low-
C. Debugging level programming is
D. Fixing A. Easier to understand
168. Translates source code from high level B. Takes up less code
languages into object code and then into

NARAYAN CHANGDER
C. Produce programs that require small
machine code
file sizes
A. Assembler
D. Easier to de-bug
B. Compiler
C. Interpreter 174. The analysis phase

D. none of above A. Determines what the program will do


B. Determines how the program will work
169. Which of these is an early from of a Com-
puter program? C. Determines whether or not the pro-
gram works
A. Punched cards
B. abacus D. Adds new features to the delivered
program
C. Napier’s bones
D. percaline 175. What type of language is a programming
language?
170. The programmers may use them in other
A. Natural Language
parts of the programs knowing that only
their abstract properties without concern B. Formal Language
for the details of their implementation C. Ewok Language
A. Simplicity, Clarity and Unity
D. none of above
B. Orthogonality
176. Which is the first widely-used functional
C. Naturalness for Application
programming language?
D. Support for Abstraction
A. Lisp
171. A person who writes code and communi- B. Haskell
cates instructions to a computer.
C. Clojure
A. Code
D. F#
B. Programmer
C. Command 177. A set of instructions that tells the com-
D. Program puter what to do is a:
A. Code
172. Which one is not the benefit from using
modularization? B. Computer Program
A. Ease of Understanding C. Function
B. Reusable of code D. Object

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 485

178. The first significant high level language. 183. Which generation of computer languages
Developed by John Backus in the mid 50s used the LOAD, ADD and STORE codes,

PRACTICE BOOK» NOT FOR SALE


A. Fortran A. First
B. C B. Second
C. Cobol C. Third
D. Python D. Fourth
179. Define the relationship between low and
184. A general-purpose computer program-
high level languages.
ming language that can run on any plat-
A. One to One (One high level instruction form because of its virtual machine layer.
= one low level)
A. Java
B. One to Two (Each high level instruction
B. C
has two low level instructions)
C. One to Many (Each high level instruc- C. C++
tion has many low level instructions) D. Python
D. Many to One (Many high level instruc-
185. What sort of relationship are low-level
tion has only one low level instruction)
languages said to have with high-level lan-
180. How do you keep track of different ver- guages?
sions of your code? A. One to One (One high level instruction
A. Version control is equivalent to one low level)
B. python B. One to Two (For every high level
C. essential coding instruction-two low level instructions)

D. 3% C. One to many (For every high level


instruction-many low level instructions)
181. ERD means
D. Many to One (Many high level instruc-
A. Entity relationships diagrams tions translate into one low level one)
B. Every real dialog
186. In Scratch, the operators are blocks.
C. Engineering requirements diagrams
A. purple
D. Non of the above
B. green
182. If the execution speed and direct commu-
C. blue
nication with devices such as controllers
and processors are essential to the success D. none of above
of a project, which of the following pro-
gramming languages would be most appro- 187. Which of these is NOT a disadvantage of
priate to use? an interpreter?
A. C A. Executes slowly
B. Java B. Occupies more space
C. PHP C. Source code can be modified
D. Visual Basic D. Initial compilation is slow

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 486

188. Someone who solves complex problems 193. What is an Algorithm?


with mathematical and scientific applica- A. A picture that you use to make a pro-
tion is Called gram
A. BCA students B. A precise set of instructions
B. Donald Trump C. Shapes and symbols connected to-
C. Engineer gether
D. Breaking a problem down into smaller
D. Sportsmen

NARAYAN CHANGDER
tasks
189. Before a computer can understand a pro- 194. To focus on the logic and make refine-
gram it must be ments to a program before translating it
A. Translated into its machine code. into a programming language, a program-
mer often creates an outline of the pro-
B. Translated into a high level language.
gram’s algorithm. What is the term for
C. Translated into a low level language. this type of outline?
D. none of above A. Pseudocode
B. Sketch
190. An Assembler is a program that
C. Compiler
A. Translates assembly language code to
binary machine code. D. Interpreter

B. Translates binary machine code to as- 195. The 3 main types of translators are
sembly language code. A. Assemblers, Compilers & Interpreters
C. Assembles IKEA furniture. B. Assemblers, Compilers & Converters
D. none of above C. Assemblers, Scripters & Interpreters
D. Converters, Scripters & Interpreters
191. What is Top Down Design?
A. start function at the top, break down 196. An advantage of programming in High
into parts, definitions at the bottom Level is
A. Easier for us to understand
B. Put the steps at the top and put the ex-
planation in layers at the bottom B. Useful for device drivers
C. Write a 10 page story about how to run C. Programs execute faster than other
the code and break it into chapters to help generations
you organize. D. none of above
D. none of above 197. The design phase
192. Which language translator is needed for A. Determines whether or not the pro-
the first generation? gram is feasible

A. Compiler B. Determines which classes are needed


and what they will do
B. Interpret
C. Determines whether or not the pro-
C. No Translator gram works
D. Language Translator D. Implements the program code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 487

198. Abstraction is: 203. What would you use to convert high-
A. adding to a problem level source code to machine code?

PRACTICE BOOK» NOT FOR SALE


A. Linker
B. filtering out all irrelevant characteris-
tics and unnecessary details B. Assembler
C. finding characteristics C. Compiler

D. looking for similarities D. IDE


204. An interpreter
199. Which of the following is not a criteria
for evaluating a programming language? A. is a high level language that can run on
different kinds of computers.
A. Readability
B. translates the program.
B. Writeability
C. converts a program written in a higher
C. Reliability level language line by line into a lower
D. Cost level language and executes it.
E. The person who created it D. none of above
205. Which translator is used at the end of de-
200. What is the first name of the famous com-
velopment? ?
puter scientist, mathematician, Von Neu-
mann? A. Language Translator
A. Jack B. Compiler
B. William C. Interpreter
D. none of above
C. John
D. Michael 206. Which Data Type is used to store charac-
ters?
201. What are error diagnostics used for? A. Integer
A. To debug lines of code. B. Boolean
B. Used to interrupt the program flow if C. Double
the watched variable reaches a specified
D. String
value.
C. To spot mistakes. 207. Computers can understand only

D. Used when a program fails to compile A. assembly language


or to run to help the programmer under- B. operator language
stand what has gone wrong. C. binary language
202. A flow chart should be drawn from the D. source language
to the of the page 208. Focus is on the process that is given data
A. top to the bottom A. procedural paradigm
B. left to the right B. functional paradigm
C. right to the left C. object-oriented paradigm
D. bottom to the top D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 488

209. An is used to indicate the flow of logic 215. A disadvantage of programming in Low
A. symbols Level is

B. arrow A. No technical skill is required


C. shape B. Needs to be translated before it can be
D. assignment executed
C. Difficult for humans to debug
210. HTML stands for
D. none of above

NARAYAN CHANGDER
A. Hyper Text Markup Language
B. High Tech MachineLanguage 216. For
C. High Tech Modem Language A. Used to create a counting loop
D. Hyper Tech Markup Lexicon
B. To display a response on screen to the
211. Which languages are statically typed? user
A. C C. A loop with a condition set at the start
B. Python D. Requires an entry from the user in re-
C. Javascript sponse to a question
D. Java 217. Examples of Structured data abstraction
E. Ruby include:

212. Binary code is a computer language that A. Arrays


uses only 2 options: to carry out tasks B. Text Files
A. letters and numbers C. Declarations
B. zeros and ones
D. Classes
C. x and y
E. Variables
D. none of above

213. This is a software program that is de- 218. The widely used abstraction mechanisms
signed to help programmers and develop- in software design are-
ers build software. A. Functional Abstraction
A. Integrated Development Environment B. Data Abstraction
B. Operating System C. Control Abstraction
C. Application System
D. Procedure Abstraction
D. Object-Oriented Programing
219. Which register within the CPU contains
214. Security is closely related to which other
the intermediate value of a calculation?
design concept?
A. Accumulator
A. Generality
B. Orthogonality B. Instruction Register
C. Reliability C. Program Counter
D. Uniformity D. ALU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 489

220. Which of the following is unique to D. Assembly language is not very good
the object-oriented paradigm of program- for hand-optimization
ming?

PRACTICE BOOK» NOT FOR SALE


225. A language that is close to human lan-
A. Support for abstract data types (ADTs)
guage and which is easy to write, debug
B. Support for the concepts of encapsula- and maintain is known as
tion and inheritance
A. A High Level Language
C. Support for control structures
B. A Low Level Language
D. Support for the practice of code reuse
C. An Algorithm
221. Which language translator is used with
D. Machine Code
the third generation?
A. Compiler 226. Prolog is an example of what type of pro-
B. Interpreter gramming paradigm?
C. Translator A. Logic
D. Language Translator B. Imperative

222. In the early days of programming, what C. Object oriented


was the most important language design D. Procedural
criteria?
A. Writability 227. A low level programming language which
uses mnemonics. These instructions are
B. Efficiency of execution translated into machine code.
C. Simplicity
A. Machine Code
D. Logical or mathematical precision
B. Assembly Language
223. What is the only thing that computers un- C. Source Code
derstand?
D. none of above
A. Machine Code
B. Low Level Languages 228. How many bits make up one letter in bi-
C. High Level Languages nary code?

D. Algorithms A. 4
B. 6
224. Assembly language is an improvement
over binary machine code, but still has C. 8
what shortcomings? D. 10
A. Lacks abstraction of conventional
mathematical notation 229. First step in Requirement Engineering
B. Each type of computer hardware ar- A. Gathering Requirement
chitecture has its own instruction set and
B. Feasibility Study
therefore its own dialect of assembly lan-
guage C. Elicitation
C. Assembly language is high level D. requirement analysis

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 490

230. What is an interpreter? 235. Which translator stops when it encoun-


A. Converts source code one instruction ters an error?
at a time A. Language Translator
B. Converts source code between 2 HLLs B. Compiler
C. Converts source code between HLL C. Interpreter
and Assembly
D. none of above
D. Converts keyboard presses to an

NARAYAN CHANGDER
ASCII code 236. Which level would create the fastest code
to execute?
231. Who is considered by many to be the “Fa-
ther of the World Wide Web” and the cre- A. Low
ator of HTML? ” B. Assembly
A. Tim Berners-Lee
C. High
B. Tim Cook
D. none of above
C. Tim Sweeney
D. none of above 237. This programming language was devel-
oped in the 1970s to construct Unix
232. State the advantages of procedural pro- utilities. Most operating system pro-
gramming(more than one) gramming, embedded programming, and
A. Can be applied to a wide range of prob- firmware programming is this language.
lems. A. C
B. Relatively easy to write and interpret. B. Fortran
C. Reuse of code through inheritance C. Assembly
D. Flexibility through polymorphism
D. C++
233. Then E. Python
A. To provide a response if a statement is
not met 238. A visual programming language that’s
ideal for learning programming
B. To provide a response if a statement is
met A. Ruby
C. A loop with a condition set at the start B. Java
D. Used in a question as part of the deci- C. Scratch
sion process D. Javascript
234. Why did Stroustrup choose to base C++ E. Python
on C?
A. Flexibility 239. Computers are really good at

B. Efficiency A. turning themselves off


C. Availability B. repeating commands
D. Portability C. not working
E. All of the Above D. doing jobs for humans

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 491

240. What is open source? C. Assembly


A. Open source is a reference book. D. ALGOL

PRACTICE BOOK» NOT FOR SALE


B. Open source means that you have to 246. What are the main design goals of
pay for a video game’s cheat sheet. Python?
C. Software that is created forfree use by A. A simple regular syntax
everyone
B. A set of powerful data types and li-
D. none of above braries
241. High-level languages are -friendly. C. Should maintain and strengthen its
type-checking
A. Computer
D. Easy to use by novices
B. Users
247. A text-based programming language
C. Microprocessor
that’s ideal for learning programming
D. Market
A. Ruby
242. The software that is available but has B. Java
limitations. C. Scratch
A. Freeware D. Javascript
B. Shareware E. Python
C. Open source
248. This programming paradigm is largely uti-
D. Closed source lized in the construction of artificial intelli-
gence (AI).
243. A graphical representation of the modu-
lar structure of a solution is a A. Object-oriented
A. Structure chart B. Procedural
B. Modular diagram C. Logic

C. Top down design D. none of above

D. Identfier table 249. How many bytes are needed for an array
of 1, 000 integers if each integer requires
244. A set of instructions executed directly by 32 bits of storage?
a computer’s central processing unit (CPU).
A. 1, 000 bytes
A. machine language B. 4, 000 bytes
B. instruction set C. 16, 000 bytes
C. programming language D. 32, 000 bytes
D. motherboard
250. Which translator converts from different
E. RAM languages?
245. What was the first programming lan- A. Language Translator
guage? B. Compiler
A. FORTRAN C. Interpreter
B. COBOL D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 492

251. Focus is on the data, and processes asso- C. A loop with a condition set at the start
ciated with the data, all encapsulated into D. Used in a question as part of the deci-
an object, using abstraction, inheritance, sion process
and polymorphism as the main key ingre-
dients of the class design. 256. The characters of the string are shown in-
A. procedural paradigm side

B. functional paradigm A. paranthesis


B. brackets

NARAYAN CHANGDER
C. object-oriented paradigm
D. none of above C. quote marks
D. none of above
252. Languages that prevent a programmer
from compiling or executing any state- 257. Which of the following is not an advan-
ments or expressions that violate the lan- tage of using a low level language?
guage definition are said to be: A. Makes more efficient use of primary
A. Syntactically safe memory.
B. an Extensible language B. Tailor a program to a specific piece of
hardware.
C. Irregular
C. To perform a task very quickly.
D. Semantically safe
D. To enable the program to be run on
253. DRAWBACKS OF USING DECISION TREES multiple platforms.
include:
258. Which is NOT a programming paradigm
A. Probabilities are just estimates-
always prone to error A. Imperative
B. Choices are set out in a logical way B. Declarative
C. Potential options & choices are consid- C. Functional
ered at the same time D. Java
D. Use of probabilities enables the “risk”
259. This language was developed in the
of the options to be addressed
1970s to encourage good programming
254. Which IDE tool allows a programmer to practices using structured programming
enter, format and edit source code. and data structuring.
A. Linker A. Fortran
B. Compiler B. Pascal
C. Interpreter C. C
D. Editor D. C++
E. Python
255. While
A. To provide a response if a statement is 260. people = [”John”, “Rob”, “Bob”]print
not met (people[1]) what would this result be?

B. To provide a response if a statement is A. John


met B. Rob

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 493

C. Bob 266. Which utility software can protect our


D. none of above personal information or identity?
A. Anti-virus

PRACTICE BOOK» NOT FOR SALE


261. This language was developed by Mi-
B. Spyware protection
crosoft for programming applications on
windows. It is similar to Java. C. Firewall

A. C# D. Defragmentation

B. Javascript 267. The process of developing a sequence of


instructions to enable a computer to accom-
C. Visual Basic plish a particular task.
D. Python A. Iterative Algorithm
262. Advantages of low-level languages B. Assembly Languages
include ( 2 answers) C. Computer Programming
A. Direct access to the CPU D. none of above
B. Programs written will often be more 268. Translates source code from a high-level
efficient than high-level programs language to a lower level language
C. Easier to remember programming A. Text Editor
commands B. Debugger
D. Can use subroutines and advanced C. Compiler
data structures
D. none of above
263. Named subroutines are present in 269. Select the HIGH LEVEL languages
A. Machine A. Machine Language
B. Assembly B. Assembly language
C. Java C. Python
D. none of above D. C++
E. C
264. Which programming paradigm is based
on symbolic logic? 270. Which of the following is not a high level
A. Imperative programming language?
A. Assembly
B. Functional
B. C++
C. Object-Oriented
C. Java
D. Logic
D. Python
265. This programming paradigm uses bottom- 271. Java, Python, Assembly and C++ are ex-
up approach amples of
A. Procedural A. high level languages
B. Object-oriented paradigm B. Graphic arts languages
C. Logic C. medium level languages
D. none of above D. programming languages

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 494

272. Which of the following is the oldest pro- 277. Software that translates and executes a
gramming language still commonly used to- high level language program one line at a
day? time is known as a?
A. C A. Compiler
B. COBOL B. Interpreter
C. Java C. Assembler

D. Binary D. Executor

NARAYAN CHANGDER
278. ALGOL:
273. What is a primitive data types?
A. Included structured control state-
A. A crude form of representing numbers ments for sequencing, loops, and selec-
B. Those not defined in terms of other tion statements.
data types B. Introduced the array structure.
C. The part of languages that is the same C. Supported recursion.
as in older languages
D. Is a low-level programming language.
D. A data type that cannot be used as part E. Uses an Assembler to translate pro-
of an object. gramming language statements into ma-
chine code.
274. The output of the Python command
print(”Ahmed” + “Ali”) is 279. Examples of Unit data abstraction in-
A. AhmedAli clude:
B. Ahmed Ali A. Modules
B. Packages
C. Ali Ahmed
C. Arrays
D. none of above
D. Classes
275. Translates source code into machine code E. Variables
one line at a time.
280. Syntax errors
A. Compiler
A. read the program and begin execution.
B. Interpreter
B. function imperfectly to express compu-
C. Editor tations.
D. Assembler C. occur when the programmer does not
follow the rules of the language
276. For a program in NetBeans to work, it
comprises at least 4 things, which are: D. none of above

A. Project name, Classes, Objects, Code. 281. How many types of computer genera-
tion?
B. Package Name, Attributes, Pseu-
docode. A. 3
C. Compilation, Execution, Creation of B. 5
the .Jar file and Save the project. C. 6
D. JDK, IDE, Clases y Objetos D. 4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 495

282. Greater regularity implies: B. High-level languages


A. Fewer restrictions on the use of partic- C. Structured programming

PRACTICE BOOK» NOT FOR SALE


ular constructs D. Object-Oriented Programing
B. Fewer strange interactions between
constructs 287. Machine code can be represented in as-
sembly language using:
C. Fewer surprises in general in the way
the language features behave A. Mnemonics
D. Fewer hours spent debugging B. Pneumatics
E. Fewer lines of code needed to accom- C. Nomanics
plish a task D. Psychotics
283. A programming language used to control 288. What are the three main concepts of Reg-
spacecraft, satellites, and airplanes ularity?
A. C A. Generality
B. MATLAB B. Orthogonal Design
C. Ada C. Uniformity
D. Ruby D. Ease of Access
E. Java E. Efficiency
284. Which system modelling tool best de- 289. formula which gives instructions for the
scribes the hierarchy of subroutines and computer to perform a specific task
the sequence in which they are executed?
A. Bit Depth
A. Dataflow diagram
B. Vector Graphic
B. System flowcharts
C. Bit-Mapped Graphic
C. IPO diagrams
D. Algorithm
D. Structure charts
290. Which of the following are examples of
285. Which programming paradigm is based Syntactic Sugar?
on the abstract notion of a function in
lambda calculus? A. x = 10;
A. Imperative B. x++;
B. Functional C. x += 5;
C. Object-Oriented D. x = y;
D. Logic 291. These languages are Object Oriented.
286. This is a subset of procedural program- A. Python
ming that enforces a logical structure on B. C++
the program being written to make it
more efficient and easier to understand C. C
and modify. D. Java
A. Programming language E. Pascal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 496

292. Which evaluation criteria are Type Check- 297. Which utility program frees up space on
ing and Exception Handling especially the disk by reorganising it?
about? A. Anti-virus
A. Readability
B. Firewall
B. Writeability
C. Defragmentation
C. Reliability
D. System clean up
D. Cost

NARAYAN CHANGDER
298. Select all that applies in Abstraction?
293. a green flag or play button that must be
clicked to run the program A. is a problem solving tool
A. null B. removes unimportant information
B. output C. adds important information
C. go D. simplifies a situation
D. loop E. focuses on what is important

294. In 1985, Stroustrup replaced his prepro- 299. In Python input data is stored as a
cessor with a more sophisticated compiler. A. float
What was this compiler called?
B. string
A. C
C. integer
B. C++
D. none of above
C. Cpre
D. Cfront 300. The two categories of low level language
are
295. Which of the following lists the evolution
of programming languages in the correct A. Machine Code & Assembly
order? B. Machine Code & Algorithms
A. Procedural, non-procedural, object ori- C. Assembly & Algorithms
ented, machine, assembler
D. Algorithms & Binary
B. machine, assembler, procedural, non-
procedural, object oriented 301. HTML is the code used to create
C. machine, procedural, assembler, non- A. games
procedural, object oriented B. UI
D. machine, assembler, object oriented, C. webpages
procedural, non-procedural
D. none of above
296. Which paradigm makes use of meth-
ods and attributes to encapsulate data in 302. Processors only understand instructions
classes. written in 1s and 0s.
A. OOP A. Machine language
B. Imperative B. Assembly language
C. Declarative C. High Level language
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 497

303. A computer understands instruction in C. 3rd


code. D. 4th

PRACTICE BOOK» NOT FOR SALE


A. Hexadecimal
309. FORTRAN:
B. Binary
A. Was developed by John Backus in the
C. Octal early 1950s
D. Decimal B. Lacked structured control statements
and data structures
304. . In COMAL language programs, parame-
ters after name of procedure must be put C. Was popular with scientists and engi-
in? neers for its support of algebraic notation
and floating-point numbers
A. brackets
D. Introduced the Array structure
B. back-slash
C. insecure data 310. Nearly all IDEs will have this to manipu-
late source code
D. punctuation marks
A. Text Editor
305. While loop is
B. Debugger
A. a control flow statement that allows C. Compiler
code to be executed repeatedly.
D. none of above
B. occurs when the programmer does not
follow the rules of the language. 311. A language that requires no knowledge
C. functioning improperly or badly. of the hardware or the instruction set of
the computer is called
D. none of above
A. A High Level Language
306. Machine code is written using B. A Low Level Language
A. Binary C. Machine Code
B. English-like key words D. An Algorithm
C. Plain English
312. graphic representation of the step-by-
D. Abbreviated mnemonic keywords step instructions of how the computer pro-
cesses data
307. Which of the following PLs is specifically
designed for business, and even empha- A. Linear Algorithm
sizes this with its name? B. flow chart
A. COBOL C. Iterative Algorithm
B. FORTRAN D. Software Development
C. Lisp
313. The fifth generation language is mainly
D. C used where?
308. Machine Code is used in which generation A. Artificial Intelligence (AI)
of a programming langauge? B. Websites
A. 1st C. PASCAL Programming
B. 2nd D. ALL

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 498

314. What is shown on context diagrams? E. SQL & PHP


A. The movement of data between pro- 319. BENEFITS OF USING DECISION TREES in-
cesses. clude:
B. The movement of data into and infor- A. Uses quantitative data only-ignores
mation out of a system. qualitative aspects of decisions
C. The order in which processes occur in B. It is based on assumptions and esti-
a system. mates

NARAYAN CHANGDER
D. The nature of data structures used by C. Choices are set out in a logical way
processes within the system. D. Assignment of probabilities and ex-
315. A programming language where the type pected values prone to bias
of variable is known only at run time. 320. Are IDEs open source?
A. Statically Typed A. Yes
B. Dynamically Typed B. No
C. Compiled Language C. Some are open source some are not
D. Interpreted Language D. none of above
316. All programs are finally converted into 321. This programming language extends the
A. Primary code that uses only prime C programming language with a large stan-
numbers dard library and object-oriented mecha-
nisms.
B. Binary code that uses only a and b
A. C++
C. Binary code that uses only ones and ze-
roes B. Objective-C
C. C#
D. Tertiary code that uses ones, twos and
threes D. Java
E. Tertiary code that uses zeroes, ones 322. a language with a specific set of symbols,
and twos rules, and syntax that can only be inter-
preted in one way
317. One advantage of programming in a high
level language is. A. Programming language
A. Eliminates bugs B. Formal language
B. Easier to understand C. Natural language

C. Executes faster than other levels D. none of above

D. Useful for programming device drivers 323. SELECT ToursFROM ToursGROUP BY


ToursHAVING(Tours = ‘Russia’);The code
318. Which are the famous programming lan- above represents which generation lan-
guages from down? guage?
A. Python A. First
B. Javascript B. Second
C. Java C. Third
D. C# D. 4GL

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 499

324. Which of these is NOT an example of a 329. In the past 25 years, what programming
High Level Language? language design criterion was most em-
phasized?

PRACTICE BOOK» NOT FOR SALE


A. Python
A. Efficiency of execution
B. Java
B. Simplicity and abstraction
C. C++
C. Logical or mathematical precision
D. Avalon
D. Object-Oriented approach to abstrac-
325. Which best describes C++? tion

A. Scripting → C → Binary → Hardware 330. An error in a program that prevents the


program from running as expected.
B. Interpreted → Binary → Virtual Ma-
chine → Hardware A. Error report
C. Compiled → Executable Binary → B. Bug
Hardware C. Mistake
D. Compiled → Executable Binary → Vir- D. Algorithm
tual Machine → Hardware
331. CPU is of a computer.
326. Why study programming language? A. Heart
A. To improve your understanding of the B. Brain
language you are using C. BOth A & B
B. To increase your vocabulary of useful D. None of the Above
programming constructs
332. a programming language for creating
C. To make is easier to learn a new lan- web applications
guage
A. java
D. To make it easier to design a new lan-
guage B. HTML
C. keystroke
327. In which one of the following types D. modifier
of coupling, complete data structures are
passed from one module to another? 333. Programmers write programs to satisfy
A. Control Coupling the needs of others called
A. Coders
B. Stamp Coupling
B. End Users
C. External Coupling
C. Program Developers
D. Content Coupling
D. none of above
328. What is Solar 2D? 334. The Intelligence quotient of a computer is
A. Game Engine A. 100
B. Programming Language B. 0
C. Game Editor C. 10
D. Map Editor D. 50

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 500

335. What is used to translate assembly code. D. Java converts to binary in real-time,
A. Assembler which is slower
B. Compiler 341. Breaking a complex problem down into
C. Interpreter smaller problems and solving each one in-
D. Router dividually.
A. Decomposition
336. This language, developed in the 1990s,
is primarily used for backend web devel- B. Abstraction

NARAYAN CHANGDER
opment and web applications. C. Programming
A. Ruby
D. Algorithmic Thinking
B. Python
C. C 342. A syntax error is caused by:
D. Javascript A. A large font size in your code

337. This paradigm is difficult to search for er- B. A typing error in your code
rors: C. Using internal commentary in your
A. object-oriented code
B. procedural D. Using indentation in your code
C. scripting
343. Which generation of computer languages
D. aspect-oriented includes the SQL (Database Search)?
338. Python is sensitive which means you A. First
must use the same indentation every time
B. Second
A. space
C. Third
B. color
D. Fourth
C. code
D. word 344. Why is binary code used?
339. Which of these are high-level languages? A. it makes it harder to hack into
(2 answers) B. it makes computers run faster
A. Java C. it was the first code ever invented
B. Assembly
D. because why not
C. Machine code
D. Ada 345. There are three levels of abstractions,
categorized by the amount of information
340. Which is the main reason why Lua runs hidden in the abstraction. What are they?
faster than Java for games?
A. Basic, Structured, Unit
A. Lua does not rely on a Virtual Machine
B. Small, Medium, Large
B. Java code is longer than Lua
C. Basic, Intermediate, Advanced
C. Lua converts to C++, which is very
fast D. Private, Public, Protected

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 501

346. please lisyen audio for question 352. Python is an example of


A. printer A. A Visual programming language

PRACTICE BOOK» NOT FOR SALE


B. plotter B. A Low level programming language
C. monitor
C. A High level programming language
D. keyboard
D. Machine language
347. The first implementation of C++ took
form as a preprocessor called: 353. Which best describes Python?
A. C A. Scripting → C → Binary → Hardware
B. C++ B. Interpreted → Binary → Virtual Ma-
C. Cpre chine → Hardware
D. Cfront C. Compiled → Executable Binary →
Hardware
348. Compilers, assemblers and interpreters
are examples of this. D. Compiled → Executable Binary → Vir-
A. Translator tual Machine → Hardware

B. Run time environment 354. If


C. Editor
A. To provide a response if a statement is
D. Error diagnostics not met
349. What is a programming paradigm? B. To provide a response if a statement is
A. Steps to a programming language met

B. A method of problem solving and an ap- C. A loop with a condition set at the start
proach to programming language design. D. Used in a question as part of the deci-
C. Set of programming language sion process
D. none of above
355. Which level would create the easiest code
350. Print for humans to understand?
A. Used to create a counting loop A. Low
B. To display a response on screen to the B. Assembly
user
C. High
C. A loop with a condition set at the start
D. none of above
D. Requires an entry from the user in re-
sponse to a question
356. A high level programming language is
351. The wrapping up of data and functions A. very efficient on the processor
into a single unit is called
B. easy for humans to read
A. overloading
B. class C. interpreted or compiled
C. object D. multiple instructions per statement
D. encapsulation E. assembled

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 502

357. A programming language Ideal for pro- 363. What is Assembly language?
grams that need to carry out lots of cal-
A. Another name for Pseudocode
culations
A. C B. A programming language that uses
mnemonic codes
B. MATLAB
C. Ada C. A program that joins pieces of code to-
gether
D. Ruby

NARAYAN CHANGDER
D. Another name for machine code
E. Java
358. What is a variable? 364. Who created C++ at Bell Labs in 1979-
A. A box(memory location) where you 1980?
store values A. Linus Torvalds
B. a type of graphics
B. John von Neumann
C. Data type
C. Bjarne Stroustrup
D. a type of memory
D. Alan Turing
359. Translation software needed at run-time
A. Language Translator 365. Statement “130 num(subs) = 2*subs-1”
B. Compiler is an example of?
C. Interpreter A. array in BASIC
D. none of above B. array in PASCAL
360. A list of instructions that enable a com- C. array in COBOL
puter to perform a specific task is a
D. none of above
A. Computer Program
B. Algorithm 366. What is a translator?
C. Machine Code A. A program that converts commands
D. Binary Code into machine code

361. tells you what the program must do. B. A program that converts High Level
Level Language to assembly code
A. algorithm
B. Program requirement C. A program that converts the inputs
from a keyboard
C. event
D. none of above D. A program for writing code

362. Which of the following command would 367. An IDE checks programming code using a:
not be found in an assembly language?
A. Debugger
A. LOAD
B. Fault finder
B. STORE
C. ADD C. Breakpoint
D. SORT D. Compiler

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 503

368. What will the output be from the follow- 374. There are storage classes in C
ing code? print(”3*4+5”) A. 2

PRACTICE BOOK» NOT FOR SALE


A. SyntaxErrror B. 4
B. 17 C. 6
C. 3*4+5 D. 8
D. 12 375. In line “110 DIM num(10)” in BASIC lan-
guage, ‘Line 110’ declares?
369. What do you use to write source code?
A. one-dimensional array
A. Text Editor
B. two-dimensional array
B. Debugger C. three-dimension array
C. Compiler D. none of above
D. none of above 376. Difficult to write in (but easier than Ma-
370. What does FORTRAN stand for? chine code)
A. Interpreter
A. Formula transfer
B. Translator
B. formula Transport
C. Compiler
C. formula Translation
D. Assembly Langauge
D. formula Transformation
377. Which of these is an example of a low-
371. What is software quality? level language?
A. Satisfying client needs A. Delphi
B. Proving Best Lunch B. LMC
C. Basic
C. Conducting Semester Exam
D. C#
D. Reopening university And Colleges
378. Which of the following types of computer
372. Which programming paradigms corre- languages uses binary code to communi-
spond to mathematical foundations? cate with the computer?
A. Imperative A. High-level languages
B. Functional B. Assembly languages
C. Object-Oriented C. Machine language
D. Logic D. Database languages
379. It is a computer program that links and
373. This is a graphical representation of an
merges various object files together in or-
algorithm
der to make an executable file.
A. Computer Program A. Assembler
B. Binary Diagram B. Compiler
C. Decomposition C. Linker
D. Flowchart D. Loader

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 504

380. what is 8%2 385. Which best describes Java?


A. 0 A. Scripting → C → Binary → Hardware
B. 16 B. Interpreted → Binary → Virtual Ma-
chine → Hardware
C. 24
C. Compiled → Executable Binary →
D. 86 Hardware

381. Which of these is not a reason for break- D. Compiled → Executable Binary → Vir-
tual Machine → Hardware

NARAYAN CHANGDER
ing problems down into modules
A. Reusability 386. Helps identify and fix errors in code

B. Easier to test and debug A. Text Editor


B. Debugger
C. Allows only one programmer to work
on a solution C. Compiler

D. Individual modules are easier to main- D. none of above


tain. 387. Regular expressions and SQL belong to
which paradigm?
382. Which of the following is NOT reason for
studying programming languages? A. Declarative
B. Imperative
A. Improving ability to express ideas
C. Machice
B. Finding out which is the best program-
D. Object Oriented
ming language ever
C. Being able to learn new PLs much 388. Please select the Mixed Paradigm(s).
more easily A. ALGOL, FORTRAN, Pascal, C, Ada
D. Being able to choose the best PL for B. C++, Java, Smalltalk
our needs in a project C. Lisp, Scheme, ML, Haskell
D. Prolog
383. What is meant by source code?
E. Python, Perl, Ruby
A. The final executable program
389. Which language translator does not con-
B. The code written by the programmer
vert source code into machine code?
C. The additional information about er-
A. Code Translation
rors
B. Compiler
D. Code relating to sources of informa-
C. Interpreter
tion on the Internet
D. none of above
384. Translates the entire source code into ma-
390. There are two types of languages used
chine code.
within computer systems:
A. Compiler
A. High Level
B. Interpreter B. Low Level
C. IDE C. Mid Level
D. Operand D. Level 42

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 505

391. A language that is one step higher than 396. Function which is used in stepwise refine-
machine language, easier to work with ment of program is classified
than machine language, but still very te-

PRACTICE BOOK» NOT FOR SALE


A. subroutine format
dious compared to working with current
high level languages. B. library format
C. procedure
A. assembly language
D. none of above
B. C
397. process of computer programming, doc-
C. machine language
umenting, testing and big fixing through
D. computer language successive phases in an orderly way

392. Which of the following commands would A. Linear Algorithm


be used to end a program written in as- B. flow chart
sembly language? C. Iterative Algorithm
A. STOP D. Software Development
B. HALT 398. Which register within the CPU contains
C. END the command currently being executed?
D. FINISH A. Instruction Register
B. Accumulator
393. When programs were written in binary,
C. Program Counter
the first bits of a line of code was
called what? D. ALU
A. 4, Infocode 399. which two statements are true of an in-
terpreter?
B. 4, Opcode
A. the translation is done once only and
C. 8, Infocode
as a separate process
D. 8, Opcode B. when an error is found this is reported
and it stops. It pinpoints the error so the
394. Which generation would create the
programmer knows where it has occurred
fastest code to execute?
C. the program can be easily edited as it
A. 1st Generation (Low) always exists as source code
B. 2nd Generation (Low) D. the program that is run is already
C. 3rd Generation (High) translated into machine code so it can be
executed more rapidly
D. none of above
400. Examples of Basic data abstraction in-
395. Programmers use Programming Lan- clude:
guages to
A. Variables
A. Communicate with other humans. B. Data Types
B. Instruct computers to do things. C. Declarations
C. Create UML. D. Mathematical Operations
D. none of above E. Arrays

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 506

401. What are the two major types of lan- B. C


guage translators? C. Cobol
A. Assembler D. Python
B. Interpreter E. C++
C. Compiler
407. Which of these would you NOT find in an
D. Definitional IDE?

NARAYAN CHANGDER
402. Translates low level assembly language A. Debugger
mnemonic into machine code B. Picture Editor
A. Assembler
C. Auto Documentation
B. Compiler
D. Source Code Editor
C. Interpreter
408. Which generation would be easier to pro-
D. none of above
gram for a programmer?
403. Programming language COBOL works A. 1st
best if used for?
B. 2nd
A. beginners
C. 3rd
B. student applications
D. 4th
C. commercial applications
409. Which group of languages is based on ar-
D. household user interface
tificial intelligence.
404. Which of the following techniques is used A. Second-generation
by most programming languages to inter-
B. fifth-generation
cept events that disrupt the normal flow
of a program’s execution? C. first generation
A. Code security D. forth-generation
B. Flow control 410. What part of an experiment contains the
C. Exception handling data tables and graphs?
D. Error detection A. Analysis
B. Conclusion
405. This paradigm tells how to do something
rather than what to do: C. Hypothesis
A. Declarative D. Materials
B. Procedural 411. In the 1970s and 1980s, what program-
C. Scripting ming language design criterion was most
D. Functional emphasized?
A. Efficiency of execution
406. Developed in the 1950s based off of
Grace Hoppers designs, this language was B. Writability
meant for business applications. C. Simplicity and abstraction
A. Fortran D. Logical or mathematical precision

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 507

412. Software licensing that allows for modi- 417. a formal language created for people to
fications in all cases is called communicate with computers

PRACTICE BOOK» NOT FOR SALE


A. freeware A. Programming Language
B. shareware B. Natural Language
C. open source C. Formal Language

D. closed source D. none of above

418. Which of these does not use an IDE?


413. A disadvantage of programming in High
Level is A. Machine code
A. A lot of code must be translated before B. Visual Basic
it can be executed C. C#
B. Difficult to debug D. Java
C. High level of technical skill is required 419. Which of these is NOT a disadvantage of
a machine language?
D. none of above A. Executes quickly

414. An tells the programmer that there is B. Difficult to understand


a mistake in the program. C. Modification is difficult
A. sprite D. Compilation is needed.
B. script 420. This paradigm is relatively simple:
C. error message A. object-oriented
D. none of above B. Procedural
C. Functional
415. Why is it called ‘Python’?
D. none of above
A. The guy who created it loves snakes
B. The guy who created it loves Monty 421. A programming language that works on
Python films computers, cell phones, and tablets

C. You can create a game on python A. C


called snake B. MATLAB
D. It was created by someone called Mr C. Ada
Python D. Ruby
416. Risk Assessment is part of software en- E. Java
gineering
422. A program may be tested by executing
A. True it with text input data and checking the
output results against the specifications.
B. False
For verification and troubleshoot the pro-
C. Can’t say grams.
D. Non of the above A. Ease of Program Verification

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 508

B. Programming Environment 428. A programming language that is used to


build interactive websites
C. Portability of Program
A. Ruby
D. Cost
B. Java
423. Translates all of the source code into ma- C. Scratch
chine code in one go
D. Javascript
A. Assembler E. Python

NARAYAN CHANGDER
B. Compiler
429. Select two advantages of low level lan-
C. Interpreter guages
D. none of above A. Easier to learn
B. Executes very fast
424. Which of the following is NOT a transla-
tor? C. The code will occupy less memory
D. Programs can be written faster
A. Assembler
B. Compiler 430. Process of giving instruction to a com-
puter to perform specified task is
C. Interpreter
A. Performance
D. Executable B. Programming
425. These languages are Procedural. C. language
A. Pascal D. object program

B. Python 431. Code is optimised


C. Fortran A. Language Translator
B. Compiler
D. C
C. Interpreter
E. Javascript
D. none of above
426. High level languages feature (2 an- 432. Software engineering involves
swers)
A. Using engineering tools and tech-
A. English-like words niques in software development
B. Named subroutines B. Using scientific way to software devel-
C. No variables names opment
C. Both A and B
D. Abbreviated command names
D. Non of the above
427. Which of the following are two currently
433. An advantage of programming in Low
used dialects of Lisp?
Level is
A. Common Lisp
A. Easier for us to understand
B. ML B. Easier to debug
C. Scheme C. Programs require less file space
D. Racket D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.6 Programming Languages 509

434. They use key words such as print, If, 439. Who created Python?
while and program, in logic rather than A. Bjarne Stroustrup
dealing with hardware

PRACTICE BOOK» NOT FOR SALE


B. Guido van Rossum
A. Assembly Language
C. Alan Turing
B. Machine Code
C. High level lanaguage D. Linus Torvalds

D. none of above 440. Highlights errors in the code, Suggests


possible solutions.
435. When a sub-node splits into further sub-
nodes, then it is called A. Debugger
A. Decision Node B. Colour coding keywords
B. Splitting C. Editor
C. Pruning D. Interpreter
D. Terminal Node
441. What will the output be from the follow-
436. Which one of cohesion level that has the ing code? print(9/3)
strongest internal strength of a module? A. 3
A. Logical cohesion B. 3.0
B. Temporal cohesion C. 9/3
C. Sequential cohesion
D. SyntaxError
D. Functional cohesion
442. Assembly language is better than ma-
437. An advantage of programming in a high- chine code because
level programming language is
A. it is easier for humans to read
A. Easier to understand
B. it is easier to remember the instruc-
B. Useful for device drivers
tions
C. Programs require smaller file sizes
C. a person is less likely to make mis-
D. Programs execute faster than other takes in assembly language
generations
D. it is written using English-like key-
438. This language’s design philosophy empha- words
sizes code readability and uses meaningful
whitespace, rather than braces, to mark 443. Which of the following is a common pro-
blocks in the code. gramming domain?
A. Python A. Business Applications
B. C++ B. Scientific Applications
C. Java C. Web Applications
D. Javascript D. All

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6. Computer Networks and

NARAYAN CHANGDER
Communications

6.1 Network Topologies and Protocols


1. An IPv6 address is bits long. C. FTP (file transfer protocol)
A. 32 D. Ethernet protocol
B. 64
C. 128 5. Which of these is not a Protocol? (5-6)
D. None of the above A. TCP/IP

2. “To share hardware, software and data” B. DCHP


is the answer to the question C. HTTP
A. Why do we network computers and
other devices? D. HTTPS

B. Why do we use wi-fi all the time? 6. Which of these protocols are NOT in the
C. Why is a network complicated? application layer?
D. none of above A. IMAP
3. If a computer in a star network fails, the B. HTTP
network will:
C. SMTP
A. Still work UN effected
B. Work with limited capabilities D. TCP

C. Case to function
7. IMAP is used for
D. none of the above
A. accessing websites
4. The protocol that controls the addressing
B. retrieving emails
of packets is called
A. IP (Internet protocol C. moving and editing files
B. TCP (transmission control protocol) D. sending emails

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 511

8. The shopping centre connects computers 13. Which of these protocols deals with
and other devices using Ethernet connec- email?
tions. The computers and devices are

PRACTICE BOOK» NOT FOR SALE


A. FTP
within a small office.Describe what Ether-
net is and how it supports the transmis- B. POP
sion of data in the office.Answers:4
C. SMTP
A. Ethernet is a protocol
D. IMAP
B. Ethernet is just a type of cable
C. It is within the TCP/IP stack 14. Choose all that are true about MAC ad-
D. It governs the connection of devices dresses
within the office that governs the trans- A. Every MAC address is 100% unique
mission of data between devices inthe of-
B. All network devices have a MAC ad-
fice
dress
E. Uses cables to transmit data between
devices in a LAN C. Routers and switches don’t need MAC
addresses
9. Which of these if not A real IP address?
D. MAC addresses can tell you where a
(7-9)
device is on the Internet
A. 192.168.2.156
B. 192.168.2.1 15. The OSI model has layers.
C. 192.168.2.200 A. 4
D. 192.168.2.328 B. 5
10. Main advantage of a Mesh Topology C. 6
A. Cheap D. 7
B. No single point of failure
16. Which is a disadvantage of WiFi?
C. Struggles to find different routes
D. More practical A. You can use it in a range of ‘hard to
reach’ locations making users more mo-
11. Which topology requires a central con- bile
troller or hub?
B. It is simple to join a WiFi network
A. Mesh
C. It reduces Health & Safety issues by
B. Star removing wires
C. Bus D. None of them
D. Ring
17. DHCP is used for
12. What are the two types of Topology
A. IPV6
A. Netwok
B. Logical B. IPV4
C. Protocol C. both a & b
D. Physical D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 512

18. Which of these isn’t an advantage of 23. Choose all that are true about WiFi
TCP/IP? A. WiFi is a wireless protocol
A. Packets contain information allowing B. WiFi is just a catchy name for the pro-
them to be reassembled correctly tocol IEEE 802.11
B. Packets can avoid congestion individu- C. WiFi needs Ethernet cables to connect
ally you to it
C. More efficient squatting of slav D. WiFi is just another name for Internet

NARAYAN CHANGDER
D. More efficient delivery of memes 24. What does FTP stand for?
19. Which of these is not an advantage of a A. Flat Transfer Procedure
network? B. File Transfer Protocol
A. Shared files and resources C. Flat Transfer Protocol
B. Less vulnerable to hackers D. File Transferring Protocol
C. Data can be shared across a range of 25. Which of these is not a protocol?
users A. TCP/IP
D. User accounts can be created B. DCHP
20. A selects a route and forwards a data C. HTTP
packet from one network to another D. HTTPS
A. Switch 26. device works on network layer of OSI
B. Rooter model
C. Route A. Hub

D. Router B. Switch
C. Router
21. Which Is A Disadvantage Of WiFi? D. Repeater
A. You can use it in a range of ‘hard to
reach’ locations making users more mo- 27. The Encryption method used on Secure In-
bile ternet transition is called?
A. Public Key Encryption
B. It is simple to join a WiFi network
B. Public Code Encrypting
C. It reduces Health & Safety issues by
removing wires C. Public Key Encrypting

D. None of them D. Private Key Encryption


28. Used by web browsers to access websites
22. Which protocol would you use to create a and communicate with web servers.
copy of the email from your email server?
A. TCP
A. FTP
B. HTTP
B. SMTP
C. IP
C. POP3
D. An instruction to communicate across
D. HTTP a network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 513

29. IP assigned for a client by DHCP server is 34. Choose all the MAC addresses
A. for a limited period A. 00-06:5B-BC-7A-C7

PRACTICE BOOK» NOT FOR SALE


B. for unlimited period B. 135.58.24.17
C. not time dependent C. 239.255.255.255
D. none of the above D. 192.168.0.0

30. A protocol is 35. Data packets are usually - bytes in


size.
A. A set of rules for transmitting data
across a cable A. 50-1, 500

B. A set of rules for transmitting electric- B. 300-1000


ity across a network C. 500-1, 500
C. A set of rules for a blind who cares. D. 2000-15, 000
D. A set of rules for transmitting data 36. DHCP Server provides to the client.
across a network
A. Protocol
31. Which best describes 2.4 GHz Wifi Fre- B. IP Address
quency vs 5Ghz? Answers:3
C. MAC Address
A. More widely used.
D. Network Address
B. Not as good at travelling through
walls. 37. What does FTP stand for? (1-4)
C. Better range A. Flat Transfer Procedure
D. More crowded. B. File Transfer Protocol
E. 24 channels which do not overlap so C. Flat Transfer Protocol
avoids interference. D. File Transferring Protocol

32. The protocol used for normal web requests 38. Choose all that are true
(such as to see a webpage) is called
A. The Internet works with packet switch-
A. HTTP (hyper-text transfer protocol ing
B. FTP (file transfer protocol) B. The Internet works with circuit switch-
ing
C. POP (Post Office protocol)
C. Packet switched networks use band-
D. IP (Internet protocol)
width more efficiently than circuit switch-
ing
33. Bus, ring and star topologies mostly used
in the? D. Packet switched networks rely on
routers
A. LAN
B. MAN 39. Another email protocol that us used to re-
trieve email from mail servers. This is a
C. WAN
more recent protocol. The emails are not
D. Internet deleted from the server after downloading

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 514

them.Used when retrieving an email from 44. What is a protocol


a mail server to read/download. A. A set of rules Blin
A. POP (Post Office Protocol)
B. A set of rules governing the exchange
B. IMAP (Internet Message Access Pro- of data between packets
tocol)
C. A set of rules governing the exchange
C. SMTP (Simple Mail Transfer Protocol) or transmission of data between devices
D. none of above D. none of above

NARAYAN CHANGDER
40. What are the most common network us-
45. What is packet switching?
age models?
A. When packets that carry the same in-
A. Peer-to-peer and Client-Server
formation is copied
B. LAN and WAN
B. When packets switch change routes as
C. Star and Bus they are need to go to a different destina-
D. none of above tion. As the previous packet has been de-
stroyed
41. Which are true about WiFi frequency
bands and channels? C. When individual data packets follow
different routes to get to a destination
A. Each channel is divided into several
bands D. When packets that aren’t needed get
destroyed and another data packet takes
B. Each band is divided into several chan-
its place
nels
C. Using different channels helps stop in- 46. What word will you remember associated
terference with Protocols?
D. Each channel has a slightly different A. Rule
frequency B. Instruction
42. This is one of two protocols that let a C. Order
network administrator supervise and dis-
D. Choice
tribute IP addresses from a central point.
It automatically sends a new IP address 47. What type of network does the Ethernet
when a computer is plugged into a differ- system work in?
ent place in the network.
A. WAN
A. DHCP
B. CAN
B. TCPMAN
C. LAN
C. TCP
D. BAN
D. UDP
43. Sends Emails 48. A LAN works in a
A. IMAP A. Small area
B. POP B. Large area
C. FTP C. Wide area
D. SMTP D. Long area

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 515

49. Which topology most likely uses coaxial 54. Passing data over the physical layer
cabling? A. Application Layer (4)

PRACTICE BOOK» NOT FOR SALE


A. Physical star
B. Data Link Layer (1)
B. Logical ring
C. Transport layer (3)
C. Physical bus
D. Network Layer (2)
D. Logical switching
55. Which of these Protocols deals with Email?
50. Choose all that are true about star net- (1-4)
works
A. FTP
A. All devices have a connection to a cen-
B. @POP
tral switch or server
C. SMTP
B. They are the most fault tolerant type of
network D. none of above
C. If one connection fails, only that one 56. Which technology is likely to be imple-
device is affected mented as a point-to-point physical topol-
D. They can be expensive because of the ogy?
large amount of cabling needed
A. Wi-Fi infrastructure mode
51. Which of the following is an advantage of B. FDDI
a star topology? (Choose all that apply.)
C. Ethernet
A. Allows faster technologies than a bus
D. Wireless bridge
does.
B. Requires less cabling than a bus. 57. Which is a feature of a Mesh Network?
C. Centralized monitoring of network traf- A. Data can be transmitted from different
fic devices simultaneously.
D. No single point of failure B. Devices are dependent on a central
sever.
52. Which of these components is used to con-
nect a computer to a wired network? C. The network uses terminators

A. Wireless access point D. The Server is usually based in the mid-


dle of the network
B. Network interface card
C. Switch 58. What is an advantage of Wifi over Ether-
net? Answers:3
D. Router
A. Cheap set up costs
53. In charge of Packet Switching B. More exensive
A. TCP C. Can connect multiple devices without
B. HTTP the need for extra hardware
C. IP D. Less disruption to building due to no
D. An instruction to communicate across wires being installed
a network E. Faster transfer speeds

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 516

59. Network protocols are (choose all that C. Topology


are true) D. Data
A. Controlled by the government
65. Which Term Describes The Physical Layout
B. Only used for WiFi Of A Network?
C. Sets of rules that set out how devices A. Topology
will communicate
B. Topping
D. Things like Bluetooth and Ethernet

NARAYAN CHANGDER
C. Topiology
60. Which of these is NOT a factor that would D. Toppology
affect connection speed?
66. A more secure version of HTTP (encrypts
A. Type of ethernet cable
all information)
B. Physical interference (walls, floors
A. TCP
etc.)
B. HTTP
C. Distance from router
C. IP
D. Amount of RAM available
D. HTTPS
61. The protocol for SENDING an email is
67. Which TWO of these protocols are for re-
A. SMTP (Simple Mail Transfer Protocol) ceiving email?
B. POP (Post Office Protocol) A. SMTP (Simple Mail Transfer Protocol)
C. FTP (File Transfer Protocol) B. IMAP (Internet Message Access Pro-
D. HTTP (Hyper Text Transfer Protocol) tocol)

62. Which network layer does the SMTP pro- C. POP (Post Office Protocol)
tocol operate at? D. FTP (File Transfer Protocol)
A. Transport Layer 68. Which protocol is used to receive mail
B. Data Link Layer A. SMTP
C. Application Layer B. POP3
D. Network Layer C. FTP
63. What is data transported using in a LAN? D. HTTP
A. Frames 69. Which of these is not a real IP address?
B. Pixels A. 192.168.2.156
C. Packets B. 192.168.2.1
D. Routes C. 192.168.2.200
64. What is the term used to describe how D. 192.168.2.328
devices are connected and how messages 70. Which layer Provides services to appli-
flow from device to device cations such as web browsers and email
A. Protocol clients?
B. Network A. Application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 517

B. Transport 76. What is a benefit of a mesh network over


C. Internet a star network? (7-9)
A. Cabling is often easier to follow

PRACTICE BOOK» NOT FOR SALE


D. Data link
B. Increased redundancy
71. allow many devices to share limited C. You only need one server
address space on a network.
D. It costs less to set up
A. Multiple addressing
77. What is a LAN?
B. Port addressing
A. Local Area Network
C. Dynamic addressing
B. Local Access Network
D. None of the above
C. Localized Area Network
72. The number of addresses in a class C block D. none of above
is
78. Retrieves emails from a server, holds it on
A. 65, 534 the server
B. 16, 777, 216 A. IMAP
C. 254 B. POP
D. NONE OF THE ABOVE C. FTP
D. HTTPS
73. The protocol used to upload a new web-
page to a server is called 79. Which protocol helps to upload file from
A. FTP (File Transfer Protocol) computer to network
B. SMTP (Simple Mail Transfer Protocol A. SMTP

C. HTTP (Hyper Text Transfer Protocol) B. FTP


C. POP3
D. HTTPS (Hyper Text Transfer Protocol
Secure) D. HTTP

74. What is a benefit of a wired network over 80. What is the maximum header size of an IP
a wireless network? (7-9) packet?
A. 32 bits
A. Increased costs
B. 64 Bits
B. Technical Knowledge needed
C. 16 Bits
C. Faster Data Transfer Speeds
D. 48 Bits
D. Easier to hack
81. Which best describes 5 GHz Wifi Fre-
75. What is a characteristic of a WAN? quency vs 2.4 Ghz? Answers:3
A. Uses 3rd Party Hardware, cables or A. Less widely used.
satellites. B. Better at travelling through walls.
B. All computers are really close to each C. Worse range
other.
D. Less crowded.
C. Play games in your house on it. E. 14 channels which overlap causing in-
D. none of above terference.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 518

82. What is the function of protocol POP? 87. What network has the server placed in the
centre and the devices around it? (1-4)
A. used to send emails and forward them
between mail servers A. Ring
B. manages emails on a server so multi- B. Bus
ple clients can access the same email ac- C. Star
count together
D. Mesh
C. used to download emails stored on a

NARAYAN CHANGDER
remote server to a mail server 88. What do you mean by broadcasting in Net-
working?
D. used to download emails stored on a
remote server to a local client A. It means addressing a packet to all ma-
chine
83. The topology with highest reliability is B. It means addressing a packet to some
what? machine
A. Bus Topology C. It means addressing a packet to a par-
ticular machine
B. Star Topology
D. It means addressing a packet to ex-
C. Ring Topology cept a particular machine
D. Mesh Topology
89. ‘’ A central backing store is available to
84. “The represents the layout of network all computers” is a feature of which usage
nodes and links.” model?

A. Network Node A. Client server


B. Peer-to-peer
B. Network Domain
C. LAN
C. Network Topology
D. none of above
D. Network Architecture
90. SMTP stands for
85. What Is A Benefit Of A Mesh Network A. Send Mail Transfer Protocol
Over A Star Network?
B. Simple Mail Transfer Protocol
A. Cabling is often easier to follow
C. Synchronous mail transfer Protocol
B. Increased redundancy
D. none of above
C. You only need one server
91. What are the 3 main network topologies?
D. It costs less to set up
A. BUS, RING & STAR
86. A MAC Address is usually recorded in (5- B. BUS, STAR & LAN
6)
C. WAN, STAR & LAN
A. Binary D. none of above
B. Denary
92. What are the two main frequencies used
C. Floats for Wifi?
D. Hexadecimal A. 1.2 GHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 519

B. 2.4 GHz 98. Advantage of a Star Network


C. 5 GHz A. When a device fails, the rest of the net-

PRACTICE BOOK» NOT FOR SALE


D. 10 GHz work is unaffected
B. When a device failed, the rest of the
93. Where is a MAC address stored? network fails
A. In the computer C. Complicated to add more devices.
B. On the NIC
D. none of above
C. As a list in the router
99. What is a benefit of a mesh network over
D. In the modem
a star network?
94. Advantages of using layers A. Cabling is often easier to follow
A. breaks network down into manageable B. Increased redundancy
pieces
C. You only need one server
B. developers only have to concentrate
on one area without affecting anything D. It costs less to set up
else
100. Which protocol is used to send data pack-
C. self-contained ets across the Internet?
D. forces companies to be compatible A. TCP/IP
95. Encryption is? B. SMTP
A. A secret code used to keep data safe C. POP3
B. A key which is applied to data to scram- D. FTP
ble it
C. A set of numbers used to replace let- 101. What is IMAP used for?
ters in data that is transmitted A. To download emails stored on a re-
D. A message that is kept secret mote server to a local client
B. To manage emails on a server so mul-
96. The Encryption method used on Secure In- tiple clients can access the same email ac-
ternet transitions is called? (5-6) count together
A. Public Key Encryption C. To send emails and forward them be-
B. Public Code Encrypting tween mail servers
C. Public Key Encrypting D. To move files across the internet from
D. Private Key Encryption a server to a client computer

97. What does HTTPS stand for? 102. OSI stands for
A. Hypertext Transfer Protocol Secure A. open system interconnection
B. Hyper Text Protocol Secure B. operating system interface
C. Hidden Text Transfer Protocol Station C. optical service implementation
D. Hypertext Transfer Protocol Station D. none of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 520

103. Which of the following network topolo- C. As a list in the router


gies contains a backbone which runs the D. In the modem
length of the network?
A. Star 109. Defines how data is sent and transmitted
and received over the internet. Defines
B. Tree four ‘layers’ for the transmission of data.
C. Bus Used whenever you send data to another
D. Ring computer.

NARAYAN CHANGDER
A. TCP/IP (Transmission Control Proto-
104. Which Type Of Network Needs A col/Internet Protocol)
Server?
B. HTTP (Hyper Text Transfer Protocol)
A. Bus
C. HTTPS (Hyper Text Transfer Protocol
B. Ring Secure)
C. Star D. FTP (File Transfer Protocol)
D. Gran’s Sleeping-bag
110. What does HTTPS stand for? (1-4)
105. Which of the following is a characteristic
A. Hypertext Transfer Protocol Secure
of a logical ring topology? (Choose all that
apply.) B. Hyper Text Protocol Secure
A. It’s used by Ethernet. C. Hidden Text Transfer Protocol Station
B. One technology uses an MAU. D. Hypertext Transfer Protocol Station
C. It’s used by FDDI. 111. Choose all that are WiFi encryption meth-
D. Some technologies use a token. ods?
A. WPA2
106. Which email protocol deletes the email
from the mail server once you have down- B. WEP
loaded it? C. WAP
A. SMTP D. WYSIWYG
B. POP3
112. Which network layer does Ethernet oper-
C. TCP ate at?
D. IMAP A. Transport Layer
107. In mesh topology, every device has a ded- B. Data Link Layer
icated topology of what? C. Network Layer
A. Multipoint linking D. Application Layer
B. Point to point linking
113. Which topology requires a multipoint con-
C. None of Above nection?
D. Both a and b A. Mesh
108. Where is a MAC address stored? (5-6) B. Star
A. In the computer C. Bus
B. On the NIC D. Ring

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 521

114. Retrieves emails from a server, down- C. Border Gateway Protocol


loads it to computer D. DHCP

PRACTICE BOOK» NOT FOR SALE


A. IMAP
120. Defines how multimedia webpages are
B. POP identified, requested and transferred.
C. FTP Webpages are generally constructed
in HTML.Used when accessing a web-
D. HTTPS
page/website where security isn’t an is-
115. Which protocol would you use to transfer sue.
files? A. TCP/IP (Transmission Control Proto-
A. FTP col/Internet Protocol)

B. SMTP B. HTTP (Hyper Text Transfer Protocol)


C. HTTPS (Hyper Text Transfer Protocol
C. POP3
Secure)
D. HTTP
D. FTP (File Transfer Protocol)
116. What is used to DDOS? 121. In which layer does TCP happen?
A. Shoer A. Transport Layer
B. Kicker B. Internet Layer
C. Dosser C. Application Layer
D. Booter D. Network Layer
117. What is a network protocol? 122. The owners of a large bakery have a Lo-
A. A set of rules that define how network cal Area Network (LAN) with a star topol-
communication happens. ogy. They order their supplies over the
Internet. When data is transmitted from
B. A rule that tells us how to connect to a the bakery to the supplier, network pro-
network tocols are used.Define what is meant by a
C. How to protect a network ‘network protocol’.
D. none of above A. A network protocol defines rules for
data transmission
118. Which network layer does the POP3 net- B. A network protocol is the radio waves
work protocol operate at? used for data transmission.
A. Data Link Layer C. A network protocol is the physical ca-
B. Network Layer bles used for data transmission
C. Transport Layer D. none of above
D. Application Layer 123. The wifi connection can be set up on one
of five different frequency bands.(i) Iden-
119. This is the telecommunication protocol
tify what is meant by the frequency of a
that all computers must use to be part of
wifi signal.Answers:2
the Internet.
A. The rate at which the signal changes
A. Internet Protocol // number of times it repeats per unit of
B. FTP time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 522

B. Measured in GHz 129. Turning data into websites and other ap-
C. Measured in KHz plications
A. Application Layer (4)
D. The frequency of connection from a de-
vice to a router/hub/switch B. Data Link Layer (1)
C. Transport layer (3)
124. Why have Mesh networks become more
popular? D. Network Layer (2)
A. Wireless Technology 130. In which protocol layer does POP hap-

NARAYAN CHANGDER
B. More wires available pen?

C. The most up to date network A. Transport Layer

D. Update in CPU B. Internet Layer


C. Application Layer
125. Which one is an advantage to networking
D. Network layer
computers.
A. Data is easy to back up from a central 131. Which protocols are used for receiving
server. email?
B. Expensive to set up a network A. SMTP (Simple Mail Transfer Protocol)

C. Complicated to maintain a network. B. POP (Post Office Protocol) & IMP

D. none of above C. FTP (File Transfer Protocol)


D. none of above
126. What Does HTTPS Stand For?
132. NAT stands for
A. Hypertext Transfer Protocol Secure
A. network address transformer
B. Hyper Text Protocol Secure
B. network address translator
C. Hidden Text Transfer Protocol Station
C. network address translation
D. Hypertext Transfer Protocol Station
D. Both b and c
127. “Storage facilities are distributed across
133. Which term describes the physical layout
all computers” is a feature of which usage
of a Network? (1-4)
model?
A. Topology
A. Peer-to-Peer
B. Topping
B. Client-Server
C. Topiology
C. WAN
D. Toppology
D. none of above
134. Which layer Adds the source and
128. A computer network is computers destination IP addresses to the data and
connected together routes it to the correct places
A. 2 A. Application
B. 2 or more B. Transport
C. A large number C. Internet
D. none of above D. Data Link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 523

135. The protocol that manages the creation of D. FTP (File Transfer Protocol)
packets is called
140. Which are true about WiFi?

PRACTICE BOOK» NOT FOR SALE


A. TCP (transmission control protocol)
B. IP (Internet protocol) A. There are 2 main frequency bands for
WiFi
C. POP (Post Office protocol)
B. WiFi frequencies are measured in gi-
D. SMTP (simple mail transfer protocol)
gaHertz
136. Which network topology uses a backbone C. You can use any frequency for WiFi sig-
to connect all of the computers? nals
A. Bus
D. You can only use WiFi with a smart-
B. Ring phone
C. Star
141. Which device used to connect network of
D. none of above
different protocols
137. What does S mean in HTTPS? A. Router
A. Safe B. Gateway
B. Secure
C. Switch
C. Soft
D. Bridge
D. Stanford
138. Choose all that are true. ‘IP addresses 142. A protocol is
are hierarchical’ means that A. A rule to communicate across a net-
A. IP addresses can tell routers which work
country or zone they point to B. A layout of a network
B. Some IP addresses are more powerful C. A piece of network hardware
than others
D. An instruction to communicate across
C. IP addresses can breed like viruses
a network
D. IP addresses are basically random
numbers 143. Controlling data flow
139. Defines how multimedia webpages are A. Application Layer (4)
identified, requested and transferred. B. Data Link Layer (1)
Webpages are generally constructed
in HTML, but adds a layer of secu- C. Transport layer (3)
rity/authentication.Used when accessing D. Network Layer (2)
a webpage/website where you may want
to encrypt data-e.g. a Bank website. 144. What does SMTP stand for?
A. TCP/IP (Transmission Control Proto- A. Server Mail Transfer Protocol
col/Internet Protocol)
B. Simple Mail Transition Protocol
B. HTTP (Hyper Text Transfer Protocol)
C. Simple Mail Transfer Protocol
C. HTTPS (Hyper Text Transfer Protocol
Secure) D. Server Mail Transfer Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 524

145. What is bandwidth? C. POP


A. The amount of data that can be carried D. FTP
at any one time.
151. What is the purpose of the HTTP proto-
B. The overall amount of data I use in a col? (1-4)
month.
A. When transferring large les, it is used
C. The speed of my data per second to a to organise them and process the HTML
friend and back. code on the webs page

NARAYAN CHANGDER
D. none of above B. It is used for email communication and
146. Where is a MAC address located? sending emails

A. In the computer C. It makes the transfer of a webpages


from the servers to the user’s device
B. On the NIC of every device
D. It allows data to be communicated
C. As a list in the router through a 4 Layer model
D. In the modem
152. TCP/IP is a set of protocols based on lay-
147. A multicast message is sent from to ers.With regards to network protocols, de-
fine what is meant by a ‘layer’.
A. one source; one destination A. A division of network functionality
B. one source; multiple destinations B. The hierarchy of network cables and
their associated speeds
C. multiple sources; one destination
C. Packets being sent in layers.
D. none of the above
D. none of above
148. Rules for how devices connect
A. TCP 153. Choose all that are true about Ethernet

B. HTTP A. It’s just a catchy name for a protocol

C. IP B. Ethernet involves signals moving


through wires
D. FTP
C. It can be used in LANs
149. Which is the maximum area covered by D. It’s not an Internet protocol
LAN
A. 1-5KM 154. A terminator

B. 100-500 m A. Makes the network quicker

C. 1-10KM B. Sends Data Packets

D. 20-30KM C. Stops data collisions


D. Connects devices to the internet
150. Which of these protocols would be used
to upload a large number of files to a 155. Choose all that are true about frequency
server? A. Its unit of measurement is the hertz.
A. HTTP B. It’s a measure of how many times
B. IMAP something changes per second

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 525

C. The unit of measurement is the freq C. If one computer fails, the network
D. Radio waves can have a variety of fre- keeps working

PRACTICE BOOK» NOT FOR SALE


quencies D. Every node, server, client or device is
inter connected
156. Which protocol is used for sending mail
161. How can we examine the current routing
A. FTP
tables in command prompt?
B. SMTP
A. using routestart
C. POP
B. using netstart
D. HTTP
C. using netstat
157. What are two factors that affect net- D. either a or b
work performance?
162. In a star network
A. Traffic and bandwidth
A. Each device is connected to a switch or
B. Lag and ping hub
C. Banter and bants B. Each device connects to each other
D. none of above C. Each device is connected in a line
158. Which Of These If Not A Real IP Ad- D. Each device is connected to a terminal
dress?
163. A problem with a wired full-mesh net-
A. 192.168.2.156 work is
B. 192.168.2.1 A. the whole network is affected if a sin-
C. 192.168.2.200 gle device has an issue
D. 192.168.2.328 B. the whole network is unaffected if a
single device has an issue
159. Part of the TCP/IP Protocol and used to C. there are lots of data collisions
send email between systems.Used when
sending an email to a friend from a web D. the more devices you add, the more ex-
browser or email client. Is used when pensive it gets to connect
email is delivered from an email client, 164. Which is the domain name feed-
such as Outlook Express, to an email [email protected]
server or when email is delivered from one
A. feedback
email server to another.
B. mykvs
A. POP (Post Office Protocol)
C. gmail
B. IMAP (Internet Message Access Pro-
tocol) D. .com
C. SMTP (Simple Mail Transfer Protocol) 165. Explain why different wifi channels are
D. none of above available.Answers:3
A. A channel is the range of frequencies
160. What Advantage Does A Bus Have Over that will transmit data
A Ring?
B. Two devices using the same / overlap-
A. It uses less cabling ping channels will be subject to interfer-
B. It’s cheaper to operate ence

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 526

C. Choice of channel allows users to re- C. The network uses terminators


duce / minimise interference from other D. The Server is usually based in the mid-
devices dle of the network
D. Two devices using the same / overlap-
ping channels will amplify transfer speeds 171. What is a WAN?
A. Wide Area Network
166. Which network topology is the most com-
mon way of setting up a network? B. Wide Access Network

NARAYAN CHANGDER
A. Star C. Wider Allowance Networking
B. Ring D. none of above
C. Bus
172. Which of these is not an advantage of a
D. none of above Network? (1-4)
167. Which protocol use handshaking process A. Shared les and resources
to establish connection B. Less vulnerable to hackers
A. TCP/IP C. Data can be shared across a range of
B. HTTP users
C. FTP D. User accounts can be created
D. SMTP 173. The protocol used with financial sites
168. A MAC Address is usually recorded in such as banks or PayPal is called

A. Binary A. HTTPS (Hyper Text Transfer Protocol


Secure)
B. Denary
B. POP (Post Office Protocol)
C. Floats
C. HTTP (Hyper Text Transfer Protocol)
D. Hexadecimal
D. IMAP (Internet Message Access Proto-
169. Which is a feature of a mesh network? col)
A. Data can be transmitted from different
174. An IPv6 address consists of bytes
devices simultaneously
(octets).
B. Devices are dependent on a central
A. 4
server
B. 8
C. The network uses terminators
D. The server is usually based in the mid- C. 16
dle of the network D. None of the above

170. Which is a feature of a Mesh Network? 175. Making connections between networks
(5-6)
A. Application Layer (4)
A. Data can be transmitted from different
B. Data Link Layer (1)
devices simultaneously.
B. Devices are dependent on a central C. Transport layer (3)
sever. D. Network Layer (2)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 527

176. Allows an email client to download an C. grants a IP address when receives a


email from an email server. It is sim- request from a client
ple and does not offer many features ex-

PRACTICE BOOK» NOT FOR SALE


D. all of the above
cept for download. Its design assumes
that the email client downloads all avail- 181. VPN stands for what?
able email from the server, deletes them
from the server and then disconnects.Used A. Virtual private network
when sending an email to a friend from a B. Visual protocol network
web browser or email client
C. Virtual protocol network
A. POP (Post Office Protocol)
D. Virtual packet network
B. IMAP (Internet Message Access Pro-
tocol) 182. What Is A Benefit Of A Wired Network
C. SMTP (Simple Mail Transfer Protocol) Over A Wireless Network?
D. none of above A. Increased costs
B. Technical Knowledge
177. Encryption is? (1-4)
C. Faster Data Transfer Speeds
A. A secret code used to keep data safe
B. A key which is applied to data to scram- D. Easier to hack
ble it (a)
183. Which is a disadvantage of WiFi? (1-4)
C. A set of numbers used to replace let-
A. You can use it in a range of ‘hard to
ters in data that is transmitted
reach’ locations making users more mo-
D. A message that is kept secret bile
178. Used to move files between devices on a B. It is simple to join a WiFi network
network C. It reduces Health & Safety issues by
A. TCP removing wires
B. HTTP D. None of them
C. FTP
184. Which device is used to direct data pack-
D. HTTPS ets to their destination?
179. Hospitals, banks and supermarkets are A. Hub
all linked using which network type? B. Switch
A. WAN
C. Modem
B. LAN
D. Router
C. BUS
D. none of above 185. Which layer Divides data sent from
application layer into packets.
180. The DHCP server
A. Application
A. maintains a database of available IP
B. Transport
addresses
B. maintains the information about client C. Internet
configuration parameters D. Data Link

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Network Topologies and Protocols 528

186. Allows the transfer of files between com- D. It allows data to be communicated
putersUsed when uploading web pages to through a 4 Layer model
a web server; When downloading a file
from a website 191. Switch works on which layer of OSI
A. TCP/IP (Transmission Control Proto- model?
col/Internet Protocol) A. Data Layer
B. HTTP (Hyper Text Transfer Protocol) B. Session Layer
C. HTTPS (Hyper Text Transfer Protocol

NARAYAN CHANGDER
C. Network Layer
Secure)
D. Application Layer
D. FTP (File Transfer Protocol)
187. Which protocol is used to compress voice 192. The DHCP server can provide the of
data into packets the IP addresses.
A. SLIP A. dynamic allocation
B. VoIP B. automatic allocation
C. HTTP C. static allocation
D. POP3 D. all of the above
188. Mbps is known as
193. Disadvantage of a Star Network
A. Megabits per second
A. Complicated to add more devices
B. Megabytes per second
B. Problem with the server-the network
C. Gigabits per second
is badly affected
D. none of above
C. Worse performance than other set ups
189. Which layer Passes data over the
physical network. Responsible for how
D. none of above
bits are sent as electrical signals over ca-
bles or wireless 194. What size are data packets?
A. Application
A. 500-1500 megabytes
B. Transport
B. 150-500 bytes
C. Internet
C. 500-1500 bytes
D. Data Link
D. 1500-2500 nibbles
190. What is the purpose of the HTTP proto-
col? 195. Raj is working as admin and wants to use
A. When transferring large files, it is clients system, which protocol will help
used to organise them and process the him
HTML code on the web page A. TCP/IP
B. It is used for email communication and B. Telnet
sending emails
C. FTP
C. It makes the transfer of a webpage
from the servers to the users’ device D. SMTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 529

196. Protocols in each layer do their job with- B. Caeser Cipher


out needing to know the others C. Plaintext

PRACTICE BOOK» NOT FOR SALE


A. Self-Grouped D. SMTP
B. Self-Involved
201. Which term describes the physical layout
C. Self-ish
of a network?
D. Self-Contained
A. Topology
197. Controlling access to a network by ana- B. Topping
lyzing the incoming and outgoing packets
C. Topiology
is called
D. Toppology
A. IP Filtering
B. Data Filtering 202. WiFi encryption is especially important
C. Packet Filtering because (choose all true answers)

D. Firewall Filtering A. People sometimes need to log on to pri-


vate accounts using WiFi
198. The protocol is the transmission mech- B. Places that use WiFi often have
anism used by the TCP/IP suite. strangers looking over your shoulder
A. ARP (shoulder surfing)
B. IP C. WiFi signals can be picked up by any-
C. RARP one in range

D. None of the above D. It is not (this is a trick question)

199. Choose all that are true about IP ad- 203. Protocols are set of rules to govern
dresses A. Communication
A. They are used to let routers decide B. Standards
where packets should go
C. Metropolitan communication
B. You can use IP addresses to send post-
D. Bandwidth
cards and letters
C. IP addresses are only put on the FIRST 204. In IPv4, class has the greatest num-
packet in a transmission ber of addresses in each block.
D. Devices add the destination AND their A. A
own IP addresses to requests B. B
200. Which of these is a type of encryption C. C
A. Distributed denial of service D. D

6.2 LAN, WAN, and the Internet


1. Which BEST describes a LAN? B. Networked computers in a small geo-
A. Networked computers in a wide geo- graphical area
graphical area C. Computers linked together in a build-

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 530

ing 7. Select all the true statements:


D. Computers together in a local area A. There needs to be a server for each
client to save and manage each worksta-
2. LANS are better than WANS tion’s data.
A. True because they are faster. B. Peer-to-peer networks are easier to
B. True because LANS are more secure set up than client-server networks
C. Untrue they are simply different types C. Peer-to-peer networks allow individ-

NARAYAN CHANGDER
of network ual devices to share files between each
D. Untrue since the internet is obviously other.
the best invention ever D. Peer-to-peer networks are commonly
E. Untrue because they WANS are bigger used in large organisations
E. It is easier to implement security pro-
3. Compared to wired networks, how do cedures throughout a client-server net-
wireless networks perform? work than a peer-to-peer network.
A. Much better-they are cheaper
8. Networks allow
B. Much quicker-radio waves travel
A. Storage and software to be shared
faster
B. Software to be shared only
C. Slower-radio waves can be interfered
with C. cannot share software
D. Bigger-they have a larger range D. No internet access on a network

4. A computer that is connected to a network 9. Clients:


is called a A. Are more specialised than servers
A. Stand alone B. Can be a single point of failure
B. Mainframe computer C. Use servers to get services
C. Workstation D. Provide services to clients
D. Personal computer E. Are more difficult to backup
5. Which one of these items is true of a peer- 10. In computer networks, MAN stands for
to-peer network? Area Network.
A. No network wide security in place A. Master
B. Central control of security B. Maximum
C. Has a central point of failure C. Metropolitan
D. Easier to perform network wide back- D. Mini
ups
11. A firewall does NOT protect the network
6. Which one is true of a WAN? from?
A. Can span two countries A. Spam emails
B. Is completely secure B. Denial of service
C. Has over 500 devices connected to it C. slow internet
D. Is very fast D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 531

12. Which best describes the function of a 16. Advantages of the network?
router?
A. Expensive Hardware

PRACTICE BOOK» NOT FOR SALE


A. Receives Internet signal-shares signal
B. Specialist staff required
with network
C. Communication
B. Connects the computers to the printer
D. Hacking
C. Connects the clients to the server
D. Protects the server from hackers and 17. Which of these statements is TRUE about
viruses a LAN?

13. Define the term ‘wireless access point’ or A. A LAN connects computers in a small
WAP. geographical area such as an office

A. Devices that decide where data pack- B. A modem is needed to connect a com-
ets go. They are used all over the world. puter to a LAN

B. Built into a pc usually on the mother- C. A LAN consists of only one computer
board. It allows you to plug an ethernet D. none of above
cable into the computer and helps create
a wired network. 18. Peer-to-peer may be better because
C. A device that connects two local area A. It is simple to set up
networks (LANs), or two segments of the
same LAN together. B. It requires specialised equipment

D. Allows wireless devices to connect to C. It is more secure


a wired network using radio waves. They D. It is cost effective for small networks
convert data received through cables into
a wireless signal and vice versa. E. Easier to backup and maintain

14. Which of these is an example of a LAN? 19. Fibre optic cables are often used for WANs
because .
A. A School
A. they provide very high bandwidth
B. The Internet
B. they need less technical skill to set up
C. A Town than Wi-Fi
D. A City C. they can transmit images, video and
music
15. Which of the following statements about
a network is FALSE? D. none of above
A. Resources such as printers can be
20. A computer network is device(s) con-
shared
nected together.
B. Viruses can spread to other computers
A. One computer
throughout a computer network
B. Two or more
C. Files cannot be shared between users
C. Three or more
D. none of above D. Four or more

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 532

21. Is the maximum amount of data that can C. Networks are less secure as can let in
pass through the medium (e.g. wire) per malware
second
D. Only Grey hats can gain access
A. Latency
26. What is Ethernet cable used for?
B. Bit Rate
C. Bandwidth A. Connecting computers wirelessly

D. Durability B. Connecting computers in WANs

NARAYAN CHANGDER
C. Connecting computers in one room
22. Which of the following shows the cor-
rect arrangemment of networks from the D. Connecting computers in LANs
smallest to the largest network?
27. A computer network that help enterprise
A. LAN, WAN, MAN companies with a number of disparate of-
B. LAN, MAN, WAN fices connect those offices to each in se-
cure way over a network. This explana-
C. WAN, LAN, MAN
tion means for
D. WAN, MAN, LAN
A. LAN
23. SERVERS are better than WORKSTATIONS B. WAN
A. True because they are faster. C. EPN
B. True because SERVERS are more ex- D. VPN
pensive
C. Untrue-they have equal value but pro- 28. Which one of these items is true of a client-
vide different functions server network?
D. Untrue since P2P is more cost effec- A. Needs a network manager to run the
tive network
E. Untrue since workstations can be B. No centralised management
more versatile than servers C. All computers have equal status
24. Which of these is a characteristic of a D. No dependency on a server
LAN?
29. Which of these are functions that servers
A. It covers a wide geographical area
can perform?
B. Computers are connected together us-
A. Controls the level of user access to
ing a leased line or a satellite
files and software
C. Users can share files and peripherals
B. Controls installation of software on the
D. Data can only be transmitted at a very client computers
slow rate
C. Controls access to network printers
25. Networks are less secure as they can let and managing print queues
in malware ( worms, Virus) D. Controls client computer access to the
A. Networks are totally secure Internet
B. Networks have a firewall so are secure E. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 533

30. What do computer networks allow you to 35. Which affects network performance ?
do? (tick all that apply) A. The package you choose with your ISP

PRACTICE BOOK» NOT FOR SALE


A. Sharing folders and files (e.g. FastFibre or Standard)
B. Sharing an internet connection B. High Network Traffic
C. Sharing peripheral devices such as C. No. of Users
printers and scanners
D. Bandwidth-i.e. data transfer rate
D. Using email to communicate with oth-
ers 36. What is a disadvantage of a LAN?
E. Transferring files between computers A. Site (software) licences are likely to be
cheaper than buying several standalone li-
31. Which of the following is a disadvantage cences.
of computer networks?
B. Security is good-users cannot see
A. Networks have a limited storage ca- other users’ files unlike on stand-alone
pacity machines.
B. Viruses can spread quickly across a C. if the main cable fails or gets damaged
network the whole network will fail
C. Sharing devices such as printers saves D. Purchasing the network cabling and
money file servers can be expensive.
D. Increased security
37. What is meant by latency in the perfor-
32. Which network hardware is said to be in- mance of a network? (6-9)
telligent as it can send data to the intended
A. The amount of time data takes to travel
computer and not every computer
from the source to the destination
A. Hub
B. The maximum rate that data can be
B. Switch transferred at
C. Bridge C. The number of errors that are found in
D. Repeater a data packet after transmission

33. To log onto a network, what do you usu- D. The route a packet takes when it is be-
ally need? ing transmitted

A. A user ID and password 38. This is the name of the school’s


B. A fast connection network
C. Specialist software A. LAN
D. none of above B. WAN
C. MAN
34. There are types of networks based on
area/size and they are D. PAN
A. 2, LAN, WAN 39. Computer network over a large area such
B. 3, LAN WAN and MAN as a city.
C. 4, LAN, WAN, MAN and Internet. A. LAN
D. none of above B. WLAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 534

C. PAN 45. Which of these is a benefit of a peer-to-


D. MAN peer network?
A. Antivirus scans can be run across all
40. MAN’s are used for networks spanning computers from one computer
any of the following:(select all that apply).
B. All software updates can be run across
A. Sky Scrapper
all computers from one computer
B. City
C. All computers can be maintained from

NARAYAN CHANGDER
C. County one computer
D. State D. Files and peripherals can be shared
41. Which of the following is an advantage of
46. What is the difference between the inter-
a peer to peer network?
net and the world wide web?
A. Files and folders cannot be centrally
A. The internet connects computers
backed up.
around the world
B. Does not need an expensive server
as individual workstations are used to ac- B. The world wide web connects comput-
cess files. ers around the world

C. The server is expensive to purchase C. The internet is only used for websites

D. Network security can be carried out D. There is no difference


centrally.
47. I am usually built into the motherboard and
42. Client-Server may be better because have a cat cable plugged into me-what am
A. It is simple to set up I?

B. It requires specialised equipment A. Graphics card

C. It is more secure B. Network interface card (NIC)


D. It is cost effective for large networks C. Audio card
E. Easier to backup and maintain D. Router

43. WAN stands for 48. What are most NICs built into nowadays?
A. Wired Area Network A. The CPU
B. Wise Area Network B. The ROM
C. Wireless Area Network C. The RAM
D. Wide Area Network
D. A PC’s motherboard
44. The (ISP) like Singtel and StarHub sup-
ply the Internet data to users. 49. LAN stands for

A. Internet Search Provider A. Local Area Network


B. Internet Safety Provider B. Large Area Network
C. Internet Security Provider C. Little Area Network
D. Internet Service Provider D. Local Analogue Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 535

50. What is a server in a computer network? 55. Example for LAN except
A. Someone who manages the network A. home network

PRACTICE BOOK» NOT FOR SALE


B. The name for a large number of com- B. school network
puter cables C. continent
C. A powerful computer that provides a D. computer lab network
service, such as centralized file storage
56. A computer laboratory is an example of a
D. none of above

51. What’s the problem with Ethernet cable? A. LAN (Local Area Network)
A. Ethernet cable is expensive compared B. MAN (Metropolitan Area Network)
to other cable
C. WAN (Wide Area Network)
B. Signal gains strength over longer dis- D. none of above
tances
C. Ethernet cable is slow 57. Benefits of a network

D. Signal loses strength over longer dis- A. Allows you to share Peripherals
tances B. Allows you to share people

52. What is not a benefit of networking? C. Only works with data


D. Durability
A. Share hardware
B. Share software 58. What is the difference between LAN and
WAN
C. Share viruses
A. LANs cover a large area
D. Share workstations
B. WANs cover a small area, like a school
53. The most common cabling used in network- C. LANs cover a small area, like a school
ing
D. There is no difference
A. 3G
B. 4G 59. What factor could affect the performance
of a network?
C. hotspots
A. Too little users using the same net-
D. Ethernet work at the same time
54. Tick all the advantages of computer net- B. Too many people using other networks
works. at the same time
A. Share data with other users C. Too many users using the same net-
work at the same time
B. Larger networks can be expensive to
setup and staff D. People using two computers on the
same network
C. Printers can be shared
D. Communications e.g. email and text, 60. Which of these is NOT an example of a
can be sent from one computer to another WAN?

E. Viruses can be spread if not properly A. A School


protected B. The Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 536

C. A Town B. Latency
D. A City C. Literacy
D. Lag
61. What is the purpose of a modem?
A. To connect you to a Local Area Net- 66. Which one of these items is not an advan-
work (LAN) using WiFi and Ethernet con- tage of a client-server network?
nections. A. No central point of failure
B. To connect you to a Wide Area Network B. Central control of security

NARAYAN CHANGDER
(WAN) using a telephone line or satellite C. Easier to supervise network perfor-
link. mance
C. To connect you to a Wide Area Net- D. Easier to perform software upgrades
work (WAN) using Bluetooth.
67. Where are you most likely to find a peer-
D. none of above
to-per network?
62. What does DNS stand for? A. In a large organisation
A. Domain Name System B. In a home
B. Decent Name System C. In a large office
C. Domain Network Server D. Across several offices in a company
D. Decent Network Speeds 68. What is the disadvantage of a LAN
63. What would we have to do if we didn’t A. if all computers running at once, can
have DNS? reduce speed for each.
A. Remember the website address for ev- B. Setting up a network can be an expen-
ery website we wanted to visit sive
B. Nothing, the DNS doesn’t do anything C. Setting up a network needs a compli-
cated experience
C. Ring up a company to ask for direc-
tions to the website D. Maintenance problem
D. Remember the IP address for every 69. Which device is not intelligent as it sends
website we wanted to visit data to all computers on a network which
causes a reduction in network speed?
64. Defining properties of a LAN?
A. Switch
A. Local geographical Area
B. Router
B. Wi-Fi
C. Hub
C. Wide geographical Area
D. Network Interface Card (NIC)
D. Host organisation owns all the tele-
coms equipment 70. Question 4:Which of these statements is
true?
E. Some telecoms equipment is owned by
a 3rd party A. A client-server network has a central
computer that provides services to the
65. describes how much time it takes for a rest of the network
data packet to travel across the network. B. A client-server network is cheap and
A. Larceny easy to set up

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 537

C. A client-server network cannot be D. Google


used to share files E. A gaming party where everyone trav-

PRACTICE BOOK» NOT FOR SALE


D. Each computer on a client-server net- els to one location
work is maintain separately
75. Which of the following is a disadvantage
71. Which of the following scenarios would of a client-server network?
need a LAN only? (PICK MORE THAN 1!) A. Files and folders cannot be centrally
A. A school backed up.
B. A chain of supermarkets B. Does not need an expensive server
as individual workstations are used to ac-
C. Your home
cess files.
D. A gaming party where everyone trav-
C. The server is expensive to purchase
els to one location
D. Files are stored in a centralised loca-
E. Google
tion, meaning it is easier to backup.
72. Which is the best definition of LAN 76. Which of the following networks is LEAST
A. Network that connects computers and likely to be a WAN?
devices in a limited geographical area, A. The Internet
B. Network that covers large geographi- B. A school network
cal area,
C. A network of bank cash dispensers
C. Connects computers and devices in a
limited geographical area such as home D. A small shop
network and school network. 77. What is an advantage of a WAN
D. Network that covers large geograph- A. Easy to share devices such a printer
ical area such as a city, country or the
world using a variety of wired and wire- B. Message can be sent very quickly to
less transmission media. anyone else on the network.
C. Easy to share data such as homework
73. Select all of the devices that can be consid-
ered a node on a network. D. Cost setup is low

A. Office 78. How is wifi transmitted between de-


vices?
B. Lap top
A. gamma wave
C. Router
B. infrared wave
D. PC
C. radio wave
E. Printer
D. x-ray
74. Which of the following scenarios would
need a WAN? (PICK MORE THAN ONE!) 79. We create networks to share
A. A company with offices around the A. Data
world B. Knowledge
B. Your home C. Snaps
C. A chain of supermarkets D. Texts

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 LAN, WAN, and the Internet 538

80. Which network covers the smallest geo- B. Can be a single point of failure
graphic area? C. Use clients to get services
A. Personal Area Network D. Provide services to clients
B. Wide Area Network E. Are more difficult to backup
C. Local Area Network
86. Disadvantages of networks?
D. none of above
A. Share files

NARAYAN CHANGDER
81. How does a DNS allow you to access a
B. Viruses
website?
C. Share Internet
A. DNS doesn’t help access websites
D. Roaming
B. DNS looks up the IP address for a web-
site 87. What is the ‘client’ part of a network?
C. DNS is a way of speeding up the inter- A. A device such as a switch or a router
net that works for the network.
D. IP looks up the DNS for a website B. A server providing a service to work-
stations on a network.
82. Wireless technology used for short dis-
tance or personal area networks C. A workstation, network node or node.
A. protocol D. The ISP-Internet Service Provider.
B. WiFi 88. What is the purpose of a repeater in a com-
C. Bluetooth puter network?
D. MODEM A. Stores user files, enabling access of
files on any computer on a network.
83. This term describes how much data can be Shares files between network users.
transferred over a connection in a given
time. B. A device that connects two local area
networks (LANs), or two segments of the
A. Transmission media same LAN together.
B. Contention ratio C. Is used to extend transmissions so
C. Bandwidth that the signal can cover longer distances.
D. none of above D. Used to link all computers on a net-
work as cables from each one feed into
84. The average speed of data transmission on a port on the hub.
a WAN is
A. 150 Kbps (approx) 89. A technology that creates a safe and en-
crypted connection over less secure net-
B. 150 Mbps (approx) work, such as the internet. This explana-
C. 150 Gbps (approx) tion means for
D. none of above A. LAN

85. Servers: B. WAN

A. Are usually more expensive than work- C. EPN


stations D. VPN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 539

90. Which BEST describes the function of a C. Twin and earth cable
switch?
D. Fibre optic cable

PRACTICE BOOK» NOT FOR SALE


A. Connects printers together in a LAN
B. Connects devices together in a WAN 93. Which if these terms refers to the max-
imum rate at which data can be trans-
C. Connects devices together in a LAN ferred? (1-4)
D. Shares Internet connection on a LAN A. Error detection
91. A computer that is not connected to a net- B. Packet switching
work is called a computer. All data is
store on its hard disk locally. C. Bandwidth

A. Standalone D. Transmission media


B. Workstation 94. Who might want to penetrate a com-
C. Network Node puter network? Remember this is morally
D. LAN wrong and illegal!
A. Web designer
92. I am the fastest type of transmission me-
dia used in a wired network-what am I? B. Stock controller
A. Twisted pair C. Hacker
B. Cat or ethernet cable D. Computer technician

6.3 Network Security and Cybersecurity


1. Why do we use functions in Karel pro- B. “Inside” the company
grams?
C. Both “Outside” and “Inside”
A. Break down our program into smaller
parts D. None of the above
B. Avoid repeating code
4. What is a rootkit?
C. Make our program more readable
A. type of malware that are designed so
D. All of the above
that they can remain hidden on your com-
2. What is a sandbox? puter.
A. Open source virtualization platform B. type of malicious software, or mal-
from Oracle. ware, designed to deny access to a com-
B. A box with sand in it. puter system or data until a ransom is
paid.
C. Virtualization platform developed by
Microsoft for its servers and desktops. C. Click fraud is the act of illegally clicking
on pay-per-click (PPC) ads to increase site
D. An isolated place to test and deploy ap-
revenue or to exhaust advertisers’ bud-
plications and configurations.
gets.
3. Cyber Security threats can originate from: D. Malicious software which creates lots
A. “Outside” the company of pop up windows

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 540

5. A scam by which an email user is duped B. Key-logging


into revealing personal information.
C. Use of insecure Wi-Fi networks
A. Phishing
D. Phishing attacks
B. Farming
C. Fishing 11. The responsible rules and behaviors de-
signed to keep individuals safe whenever
D. Pharming
connected to the Internet is the definition
of

NARAYAN CHANGDER
6. Temporary memory on your computer that
is sometimes used to store local copies of A. Cyber Security
files opened when you browse the Inter-
net. B. Cyber Ethics
A. backup C. Cyber Safety
B. firewall D. Cyber Space
C. cache memory
12. What should people do if they are cyber-
D. encryption
bullied?
7. Which of the following is the most likely A. Delete any messages received from
source of a virus the cyberbully.
A. A memory stick B. Respond to the cyberbully right away.
B. A government website
C. Talk to a trusted adult about what hap-
C. Computer games pened.
D. Someone sneezing on your keyboard D. All of the choices are correct.
8. Which of the following would be consid-
ered a strong password? 13. The Act which specifies the rules about col-
lecting and holding personal data is called:
A. 123abc456def
A. the Criminal Misuse Act
B. p3MberLY%Av
B. the Data Protection Act
C. p@sswOrd1
D. w3st! C. the Personal Data Act
D. the Health and Safety Act
9. Hacking is illegal under:
A. The Data Protection Act 14. A computer security expert, who special-
B. The Computer Misuse Act izes in penetration testing and in other
testing methodologies to ensure the secu-
C. Copyright Law
rity of an organization’s information sys-
D. Health and Safety Law tems.
10. What kind of cybersecurity risks can be A. Ethical hacker
minimized by using a Virtual Private Net- B. Programer
work (VPN)?
C. Social Engineer
A. De-anonymization by network opera-
tors D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 541

15. Proactive monitoring of unwanted intrud- 19. Someone who carries out an attack with
ers e.g. firewall. intent regardless of any political views.

PRACTICE BOOK» NOT FOR SALE


A. Intrusion prevention system A. Hacker
B. Fuzzing B. Hacktivist
C. Signature based C. Vulnerability Broker
D. Network intrusion detection system D. Phisher
(NIDS)
20. When a new router is bought-there is a
16. A device designed to inspect traffic, and, ‘default password’ set on the router at
basedon its configuration or security pol- the factory which you SHOULD change.
icy, it can remove, detain, or redirect mali- What is an example of a LIKELY DEFAULT
cious traffic in addition to simply detecting PASSWORD set by the manufacturer of
it. the router (which someone could easily
guess)?
A. packet filtering
A. admin
B. network intrusion prevention system
(NIPS) B. p@$4wrd2019
C. network intrusion detection system C. b7*traMQ$
(NIDS) D. waliays2018
D. Layer 2 Tunneling Protocol (L2TP)
21. You find a document at the printer with
17. For $8, 000:By entering your email ad- ITAR markings in the Header and Footer.
dress in the “free coupon” pop-up ad after You should:
placing an order with Orbitz, Priceline.com, A. Leave it in the printer. The person will
Buy.com, 1-800 Flowers, Continental Air- be by shortly
lines, Fandango you get
B. Read the document while yours prints
A. A $10 off coupon on your next order out
sent to your email
C. Bring the document to Corporate Secu-
B. A $10 off coupon on your next order rity and explain the situation to them
sent with your order
D. none of above
C. A repeating charge from a “web loy-
alty” company on your credit charge 22. Which of the following refers to the vio-
lation of the principle if a computer is no
D. None of these more accessible?
18. What’s the name given to the cyber-attack A. Access control
where the perpetrator seeks to make a B. Confidentiality
website unavailable to its intended users
by overloading it with requests? C. Availability

A. Denial of Service D. All of the above

B. Pharming 23. Which of these passwords is encrypted?


C. Trojan Horse A. Cloud
D. Flooder B. Cupcake12

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 542

C. Pass wor d 34(89) 28. What type of malware locks up your com-
puter until you pay a fee?
D. Bunnies
A. Ransomware
24. Select all correct answers:Which of the B. Phishing
following is true about the Internet of
Things? C. Spyware
D. A worm
A. The Internet of Things is the network
of devices with the ability to connect and

NARAYAN CHANGDER
29. When did T-Mobile began resetting the
exchange data. PINs for Prepaid customers as safety mea-
B. The Internet of Things increases our sures and account security?
vulnerability to cyber attacks. A. August 13, 2021
C. The Internet of Things is purely B. August 14, 2021
positive-there are no negative conse- C. August 18, 2021
quences to increased connectivity
D. August 17, 2021
D. None of these is correct.
30. Which of the following actions compromise
25. Security needs of a networked system, ei- cyber security?
ther specified by the client or implied by A. Vulnerability
the scenario.
B. Threat
A. Security requirements
C. Attack
B. Service provider agreement D. Exploit
C. Risk assessment
31. The collection of tools, policies, security
D. Cyber security plan concepts, etc. to protect the cyber envi-
ronment.
26. Correctly paraphrasing is
A. information security
A. Using the author’s exact words but in-
B. data security
cluding a citation.
C. cybersecurity
B. Rewriting the author’s words in your
own words and including a citation. D. cyber hygiene

C. Rewriting the author’s words in your 32. What is the most important thing to ask
own words but not including a citation. yourself before posting on social media?
D. None of the answers are correct. A. Will this make me more popular?
B. Will my friends think this is funny?
27. “Malware” is:
C. Am I ok with everybody I know seeing
A. a type of virus this?
B. unwanted software installed without D. Did I check my spelling
consent that might monitor key presses
33. Identifies network weaknesses to see
C. security software to detect viruses what is possible .
D. a software bug A. Penetration testing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 543

B. Vulnerability testing B. A part of a system or network that is


C. Sandboxing used to block unauthorized outward com-
munications

PRACTICE BOOK» NOT FOR SALE


D. Network intrusion detection system
(NIDS) C. A part of a system that allows un-
wanted access.
34. The Senate viewed the Legion of Doom D. Something hackers use.
Hackers as
A. White Hat Hackers 39. For $300:Can you get an email scam from
someone even if you never gave your
B. Black Hat Hackers email to that person?
C. Grey Hat Hackers A. No, you can only receive an email scam
D. None of these from someone you know.
B. Yes, phishing scams use software to
35. Which 2 of the following are potential ef-
take other sources.
fects of the growth of cyber warfare?
C. No, you can only receive an email scam
A. The differences between countries will
if you give out your email to too many
become more pronounced.
friends.
B. National militaries will become
D. No, only friends and family know your
stronger and more unified.
email.
C. The sources of cyber attacks will be dif-
ficult to identify, allowing for many more 40. Special types of viruses that can travel
attacks in the future. from computer to computer without human
action; self-replicating and can multiply un-
D. Countries with less resources will
til it uses up the computer’s resources
make a larger impact than they have in the
past. A. spyware
B. worms
36. When we look at the layers a get request
packet will go through, which layer breaks C. trojans
larger messages into multiple packets? D. phishing
A. DNS
41. A or MFA could be used on the devices?
B. TCP
A. TRUE
C. IP
B. FALSE
D. Physical Internet
C. TRUE if the device and software sup-
37. What is 60 in binary? port it.
A. 0011 1100 D. Only if the OS is Windows
B. 0010 0010 42. A method of protecting the rights of an
C. 0001 0010 originator of a creative work, such as text,
piece of music, painting, or computer pro-
D. 0010 0100 gram, through law.
38. What is firewall? A. copyright
A. A wall made of fire. B. encryption

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 544

C. computer privacy B. Higher total cost of ownership (TCO)


D. decryption with a consolidated and fully integrated
security operating platform.
43. What are the risks associated with using C. Improved ability to securely enable
public Wi-Fi? transformative IT initiatives.
A. cyber attacks that deploy data-stealing D. Clearly improved effectiveness in miti-
malware in your system gating data loss with visibility and safe en-
B. they could hack your information ablement of applications.

NARAYAN CHANGDER
C. . Once a cyber criminals gains access 48. The National Institute of Standards and
to your system, he can do pretty much Technology (NIST) recommends that pass-
whatever he wants. words:
D. Take a few minutes to tweak your se- A. Contain a mixture of upper and lower
curity settings, case letters
B. Contain a minimum of eight characters
44. A connection between two or more com-
puters or devices thatare not on the same C. Contain a mixture of letters and num-
private network. bers
A. demilitarized zone (DMZ) D. All of these
B. virtual private network (VPN) E. None of these

C. circuit-level gateway 49. How do you make a login secure? (Multi-


ple choice)
D. extranet
A. A combination capital letter, number
45. One of the following isn’t a cyber crime and symbols/special charatcters
A. Cracking down the computer security B. Using a phrase like “iloveManU”
in order to improve the weaknesses C. Enabling 2 factor authentication
B. Stealing PINS at the ATM D. using password as a password
C. Spoofing and stealing information
50. Someone who tries to cheat you by offer-
D. Buying credit card information and ex- ing goods or opportunities to potentially
tracting the money make some quick money.
46. Malware is A. Scammer
A. Money Software B. Vulnerability Broker

B. Maltronic Software C. Phisher

C. Malicious Software D. Insider

D. Malteasers Software 51. which of the following are consider physi-


cal security risks?
47. Which of the following is not a benefit of
A. Hardware theft
implementing a Zero-Trust network?
B. password cracking
A. Greater efficiency for achieving and
maintaining compliance with security and C. phishing
privacy mandates. D. cooking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 545

52. Which of the following refers to the type D. Attempting to penetrate a network to
of websites that provides a virtual com- locate vulnerabilities.
munity for people with similar interests to

PRACTICE BOOK» NOT FOR SALE


communicate and share their opinions and 57. A cipher is
knowledge? A. a person who makes up secret codes
A. Social Video Sites B. an algorithm that is used to scramble
B. E-learning sites text so that it can be passed in secret
C. E-business sites C. a lock that can be used to lock a mes-
sage in a lock box
D. Social Networking Sites
D. any puzzle, such as a crossword or Su-
53. Criminals access someone’s computer and doku puzzle
encrypt the user’s personal files and data.
The user is unable to access this data un- 58. What is 1000 0011
less they pay the criminals to decrypt the A. 136
files. This practice is called
B. 145
A. Botnet
C. 131
B. Spam
D. 161
C. Ransomware
D. Social Engineering 59. Creating a test environment where code
can be testing without risk of affecting
E. War Driving
other computers.
54. Who should know your passwords? A. Sandboxing
A. Only you! B. Honey pot
B. Your best friends C. Intrusion detection system (IDS)
C. Anyone D. Fuzzing
D. none of above
60. Which vocabulary word fits this defini-
55. Data bench costs companies tion? A small text file that is stored on
A. time the users computer that allows websites
to recognize and track your data
B. money
A. Digital footprint
C. time and money
B. Encryption
D. none of above
C. Cookies
56. What is hacktivism?
D. Public key cryptology
A. The act of spreading malicious soft-
ware through computer networks. 61. The process of converting data into an un-
B. The act of aiming to target and harm readable and unusable form. Encryption
companies or individuals with whom they is done to prevent unauthorized access of
have a fundamental disagreement. data, especially during data transmission
over the Internet.
C. An attack that is used against a per-
son or company the hacker believes have A. encryption
wronged him in some way or manner. B. decryption

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 546

C. cookie 67. What is a Trojan Horse?


D. backup A. Malfunction of the software that
makes it difficult to navigate the Inter-
62. These hackers will frequently seek out sys- net.Bottom of Form
tem vulnerabilities without authorisation
from the system owners but not always B. Malicious software that allows other
with criminal intent programs to control your computer by mis-
leading users of its true intent
A. black hat hackers

NARAYAN CHANGDER
C. A web browser with advanced capabil-
B. white hat hackers
ity
C. grey hat hackers
D. Next generation antivirus
D. none of above
68. Which of the following explains why open
63. A computer virus can standards make encryption more secure
A. Corrupt your files A. They allow everyone to develop their
B. Damage your hardware own standards and practices for encryp-
tion
C. Give you the flu
D. Delete the computers memory B. They are developed and reviewed by
committees of experts and adopted by all
64. Personal data stored on SIM cards, USB Internet users
sticks, SD cards are exempt from the Data C. They make it easy for people to create
Protection Act principles as it is on remov- and implement new encryption methods
able media.
D. They do not make encryption more se-
A. True cure; open standards make it easier for
B. False third parties to intercept and decode mes-
C. Only sometimes true sages

D. Only sometimes false 69. Code Red is a type of


65. The rights possessed by the author of a A. An Antivirus Program
work B. A photo editing software
A. Copyright C. A computer virus
B. Intellectual Property D. A video editing software
C. Software License
70. A malware program that, when executed,
D. Piracy
replicates by inserting copies of itself (pos-
66. Which one is not a type of firewall dis- sibly modified) into other computer pro-
cussed in the lecture? grams, data files, or filmware.
A. application-level A. Malware
B. Slateful inspection B. Virus
C. Proxy-based C. Spoofing
D. Email gateway D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 547

71. also referred to as information tech- 76. Unauthorized copying of copyrighted soft-
nology security, focuses on protecting com- ware without obtaining the license or per-
puters, networks, programs and data from mission of its copyright owner.

PRACTICE BOOK» NOT FOR SALE


unintended or unauthorized access, change A. secure sockets layer (SSL)
or destruction.
B. software piracy
A. Cyber Security
C. slander
B. Cyber Etiquette
D. libel
C. Cyber Warfare
D. none of above 77. Which of the following is an example of
an appropriate place to answering a phone
72. Which of the following software gathers call?
information from a users computer with- A. Mosques
out their consent?
B. Hospitals
A. A zombie
C. Museums
B. A trojan
D. Your home
C. A worm
D. Spyware 78. Why is it important to protect your online
identity?
73. What is a server? A. Because everyone does it.
A. A computer or computer program that B. Because you will make more friends.
accesses a certain network.
C. Because being onliBecause someone
B. A tennis player. might steal your personal information.ne
C. It works with a firewall to protect a is a safe environment.
computer. D. Because someone might steal your
D. It helps remove spam and phishing. personal information.

74. A well-designed workstation: 79. Which security principles are covered by


A. has an adjustable chair which supports the CIA triad?
the lower back A. certified, integrated, accessible
B. has the screen above eye level B. continuity, integrity, accessibility
C. has at least 10m of space per person C. confidentiality, integrity, availability
D. all of the above D. confidentiality, installation, assembly

75. What is blagging? 80. technical skills


A. Observing a person’s private info over A. skills necessary to work and talk to
their shoulder other people
B. Cyber attack to redirect a website’s B. the ability to work in and understand
traffic to another, fake site areas such as operating systems, coding,
C. Inventing a scenario to target some- spreadsheets, HTML
one into divulging information C. Skills in math and language arts
D. A virus that registers key strokes D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 548

81. How do we tighten our security? B. Blocker


A. Use strong password C. Server
B. Use firewall D. Client
C. Log-off personal account when not in
use 87. When you post something on the Internet
D. Do not skip update and anti-virus how long does it stay there for?

E. All of the above A. 6 months

NARAYAN CHANGDER
82. what is the name of an application that ap- B. Forever
pears to look like a helpful application but C. 30 years
instead does harm to your computer?
D. 5 years
A. virus
B. worm 88. Aside from the many benefits of new dig-
C. malware ital technology, which of the following is
considered an issue?
D. Trojan horse
A. Safety and Health Issues
83. What type of server would you install that
B. High internet subscription price
would be used to trap a hacker?
A. honeypot C. Increase of technology users
B. NAT D. New credit card system
C. IPS
89. Which of the following deals with network
D. IDS intrusion detection and real-time traffic
analysis?
84. firewalls are a combination of other
three types of firewalls. A. Snort
A. Packet Filtering B. LoptCrack
B. Circuit Level Gateway C. John The Ripper
C. Application-level Gateway
D. Nessus
D. Stateful Multilayer Inspection
90. what are the 4 types of cyber security in-
85. What is the most common type of biomet-
cidents
rics password used on devices?
A. Lie detectors that measure pulse rate A. authorized access, inspection, modifi-
cation, disclosure
B. Fingerprint scanners and readers
B. adware, spyware, virus, Trojan
C. Iris and retinal scanners
C. unauthorized access, inspection, mod-
D. Voice and face recognition scanners
ification, disclosure
86. Which of the following can be used to pro- D. not following protocols, physical se-
tect a network? curity breaches, firewall breaches, pres-
A. Firewall ident trump

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 549

91. Health and Safety regulations require an B. email security


employer to: C. UTM

PRACTICE BOOK» NOT FOR SALE


A. plan work at a computer so there are D. MDM
frequent breaks to be taken
B. provide wrist rests for keyboard use 96. What special area serves as a buffer area
between the Internet and the internal net-
C. pay for glasses for employees who work and can be used to hold web servers
need them, if they spend a lot of time us- that are accessed from the Internet?
ing a computer
A. DMZ
D. all of the above
B. NAT
92. Which of the following statements about C. VLAN
security on the Internet is FALSE
D. PLC
A. Many methods of cybersecurity rely on
cryptography 97. Aside from PNP Anti-Cybercrime Group,
what is the other law enforcement agency
B. The trust model of the Internet en-
mandated to handle cybercrime cases?
sures total security
A. CICC
C. There are hardware and software com-
ponents of cybersecurity in addition to hu- B. DICT
man components C. DOJ Office of Cybercrime
D. The Internet is designed to scale so D. NBI Cybercrime Division
that more systems and networks can join
at any time. 98. Using computer systems, including commu-
nication systems, to cause fear or intimi-
93. Which of the following security technique dation in society through destruction of or
provides the highest “confidentiality ser- damage to people, property and systems.
vice”?
A. Cyber Terrorist
A. Hashing
B. Cyber Criminal
B. Encryption
C. Insider
C. Key exchange
D. Hacktivist
D. Firewall
99. If the customer is reporting any fraud re-
94. Encrypt “attack” with “fall” using Play- lated activity, we should:
fair Cipher
A. Offer credit.
A. BRRBER
B. Tell customer to tweet Mike.
B. BERBFP C. Follow standard fraud process.
C. BRFFFP D. Close the chat onset!
D. BRRBFP
100. Which of the following best describes a
95. Secures against spear-phishing email at- Trojan Horse
tacks that bypassbroad anti-spam and A. Malicious software that misleads
reputation-based technologies. users of its intent, which is to allow unau-
A. Fire eye thorised access to your system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 550

B. Malicious software that replicates it- B. Digital


self and spreads through your network to C. Environmental
steal data
D. Software
C. Malicious software that it usually at-
tached to an email and sends itself around 105. The attempt to acquire sensitive informa-
a network to allow unauthorised access to tion such as usernames, passwords, and
your system credit card details (and sometimes, indi-
D. Malicious software that sets your com- rectly, money) by masquerading as a trust-

NARAYAN CHANGDER
puter on fire worthy entity in an electronic communica-
tion.
101. are malicious instructions that appear A. Converting
as legitimate programmes, mostly arriving
via email or infected websites. B. Hacking

A. Ransomware C. Phishing

B. Worms D. none of above

C. Trojans 106. in the CIA triad, what does cyber security


D. Spyware protect in integrity
A. the level of assurance, which can be
102. What is a Business Impact Analysis given as to the accuracy and trustworthi-
(BIA)? ness of the data
A. A tool for document all activities B. the level of assurance, that the data
across the business for better under- will be available to those who need it when
standing they want it
B. A method of challenging preconcep- C. rules which restrict access only to
tions about service delivery those who need to know
C. An analysis tool for a building loss D. the financial position of personal data
D. A process of analyzing activities and and any confidential information
the effect that a business disruption might
107. IT security recently found a program on
have upon them
your co-worker’s computer that appar-
103. Sending Company Proprietary informa- ently tracked all of the words that they
tion to a Personal Email address is ok if typed into the computer. what kind of mal-
(hint, check IT-POL-4): ware is this?
A. I get approval from my manager A. Keylogger
B. I don’t get caught B. keyblogger

C. It is something that I created C. trojan horse

D. It is approved by IT and Corporate Se- D. keystroke virus


curity 108. It is any software designed to damage or
104. A threat to the system or computer in- to disrupt a system.
cluding theft or loss of equipment. A. Malicious software (malware)
A. Physical B. Adware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 551

C. Spyware 114. A document that a service provider uses


D. Phishing to define a variety of aspects of an IT ser-
vice provided, including security require-

PRACTICE BOOK» NOT FOR SALE


109. The AI starts at ments.
A. 1940s A. Service provider agreement
B. 1950s B. Security incident management policy
C. 1970s C. Risk assessment
D. 2000 D. Cyber security plan
110. Programs that look useful, but cause
115. Which one of these storage media is eas-
damage to your computer
ily removable and has the greatest cyber
A. phishing security risk?
B. spyware A. Internal hard disk
C. worms B. RAM
D. trojans
C. USB flash drive
111. What damage can be caused by mal- D. Cloud storage
ware?
A. Computer crashes 116. What type of program can you install to
prevent malware?
B. The compromising personal informa-
tion, which may lead to identity theft A. Antivirus software
C. Permanent deletion B. Office software
D. All of the above C. A new operating system
112. What are access rights assigned to spe- D. A disk defragmenter
cific users and groups of users to control
the ability of the users to view or make 117. Cybersecurity encompass the full range
changes to system objects? of?
A. Phishing A. vulnerability reduction
B. Permissions B. incident response
C. Encryption C. recovery policies
D. none of above D. All of the above
113. A computer program that is designed
118. What is the name given to describe
to cause malfunctioning of a computer or
viruses, trojans and worms?
damage the data stored on the computer.
A. worm A. Adware

B. virus B. Malware
C. Trojan horse C. Software
D. online predator D. Firmware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 552

119. A computer program that is installed on 124. Which of the following statements best
your computer without your knowledge. describes Cyber Interaction?
Spyware can secretly send out informa- A. an online communication between one
tion about your Web browsing habits or person to another via digital technology
other personal details to another computer such as email, forum or blog
through the network.
B. an act of working together and sharing
A. phishing ideas and info using online technology
B. slander C. a privilege to use technology

NARAYAN CHANGDER
C. spyware D. None of the above
D. software piracy 125. A device that can detect malicious net-
workactivities (e.g., port scans and DoS
120. A faulty can cause data to become attacks) by constantly monitoring network
corrupt? traffic.
A. Scanner A. virtual private network (VPN)
B. Hard disk B. World Wide Web (WWW)
C. Copier C. network intrusion detection system
(NIDS)
D. Printer
D. Point-to-Point
121. What are types of malware
126. A name used to gain access to a computer
A. Worm system.
B. Dangerware A. User Name
C. Trojan Horse B. Password
C. Your Name
D. Scaryware
D. Identification Name
122. Why do you need security on a com-
puter? 127. Cecilia has been told that anything she
posts online is traceable. Her teacher ex-
A. So no personal data can’t be stolen plains that the information about herself
and hacked also private information that she posts for anyone to obtain could
B. To share everything with everyone be damaging to her:

C. To make it difficult for hackers A. digital footprint.


B. cyberbullies.
D. none of above
C. log-in information.
123. Which of the following can be considered D. social media.
as the elements of cyber security?
128. To create a strong password use:
A. Application Security
A. at least 8 characters
B. Operational Security
B. use both upper and lower case
C. Network Security
C. use a special symbol and a numeric
D. All of the above character

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 553

D. use at least 1 number D. He violated the Student Athlete Code


of Conduct, and he stole from his team-
129. What does the General Data Protection mates.

PRACTICE BOOK» NOT FOR SALE


Regulation (GDPR) protect?
A. How organisations like schools handle 133. Which of the following describes the con-
personal data cept of RPO?

B. How organisations upload their con- A. Recovery Point Occurrence describes


tent the the data that is logged when a failure
occurs
C. Home users from being hacked
B. Recovery Point Operation describes
D. How organisations advertise their the work required to recovery from a fail-
products online ure
130. Which of the following circumstances C. Recovery Point Objective describes
should you treat as suspicious? the acceptable amount of data loss over
a given time
A. Flight information attachment from air-
line when no travel is planned D. Recovery Point Objective describes a
point in time at which a disaster occurs
B. Request from Bank with a link to up-
date information 134. Robert is taking an online exam when the
C. Email from unknown sender with an ur- site crashes and he loses all of the answers
gent message requiring action he has not saved. Which part of the CIA
triad was broken?
D. All of the above
A. Confidentiality
131. When studying ethical hacking the motto
B. Integrity
is, “ everything but harm ”
C. Availability
A. Search, No one
B. Hack, none D. All of the above

C. Charm, some 135. A cyber attack prevents access to bank-


D. Look at, some ing websites, this impacts
A. Equipment
132. Based on the video, “Two Kinds of Stupid,
“ why does Eduardo say he was two kinds B. Individual Safety
of stupid? C. Financial Safety
A. He violated the Student Athlete Code D. Business Data
of Conduct, and he posted the party pic-
tures online where he lost control of them. 136. What server can be used to install Win-
B. He didn’t practice hard enough to get a dows updates for your organization?
scholarship, and he did poorly on his final A. SCOM
exams.
B. WSUS
C. He was mean to his friends, causing
C. IIS
him to lose friends; and he was unkind to
his parents who then grounded him. D. WDS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 554

137. This attack is designed to hinder the nor- 142. A document that defines how an organi-
mal operation of a website or other net- sation will respond to an IT security inci-
work resources. dent.
A. DDoS Attack A. Security incident management policy
B. Phishing B. Security requirements
C. PoS Attack C. Service provider agreement
D. Ransomware D. Cloud computing

NARAYAN CHANGDER
143. What is the host operating system?
138. Which of the following is not effective in
preventing malware infections? A. An external system to handle the pro-
cesses and hardware, such as memory,
A. Opening email attachments disk, and CPU, from other containers.
B. Turning on Windows Automatic Up- B. The operating system that is located
dates on the physical machine.
C. Installing anti-virus software C. Operating system that is included in-
D. Setting Internet Explorer’s security ternally on the machine.
setting to medium-high D. Virtualization platform developed by
Microsoft for its servers and desktops.
139. Which one of the following systems can-
not be considered as an example of the op- 144. What program reproduces itself?
erating systems? A. worm
A. Windows 8 B. malware
B. Red Hat Linux C. virus
C. BSD Linux D. none of the above
D. Microsoft Office 145. What should be accountable when chang-
ing your password?
140. Which of these is the best way to mon-
itor your online presence and how other A. Make it simple
people see your information? B. Put a random password
A. Ask everyone you know to tell you what C. Something that’s hard to guess and not
they see. hard to remember.
B. Make sure you have all your informa- D. Put your name as a password.
tion visible.
146. Joyce has confided in Mark, explaining
C. Google yourself. that Tim posted hurtful messages online
D. Use a password manager. that make fun of her weight. Joyce
feels depressed and embarrassed to at-
141. What port does Telnet use? tend their club. What should Mark do?
A. 80 A. Mark should confront Tim and demand
that he delete the messages.
B. 20
B. Mark should tell Joyce to get even
C. 23 by spreading rumors about Tim around
D. 22 school.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 555

C. Mark should go with Joyce and speak B. out of date firewall


with someone in authority. C. Distributed denial of service

PRACTICE BOOK» NOT FOR SALE


D. Mark should ignore the situation be- D. bookmarking a page
cause Tim is also his friend
E. variable computer synchroniser
147. Jonathan is surfing the Internet when a
window pops up advertising “Free vaca- 151. DNS translates a Domain name into
tions if you click here now!” There is a A. Hex
button labeled “Act now!” What should
B. Binary
Jonathan do now?
C. IP
A. He should copy the Web site name and
share it with his friends. D. URL
B. He should click on the link because the 152. Gaining the trust of individuals or organi-
link may disappear soon. sations to influence them to give confiden-
C. He should close the pop-up window be- tial information.
cause the link can take him to a malicious A. Cryptolock
site.
B. Botnet
D. He should run an anti-virus program.
C. DDOS
148. If a website is using HTTPS it means D. Social Engineering
that
A. Data sent and received is encrypted 153. What is one way hackers use to acquire
your password?
B. Data sent and received can be viewed
by others A. Two Factor Authentication (2FA)

C. Data received is encrypted B. Thesaurus

D. Data sent is encrypted C. Brute force


D. key blogger
149. An insider is
A. a student learning how to hack. 154. What is a Ransomware?

B. a threat to an organization’s security A. type of malicious software, or mal-


or data that comes from within such as an ware, designed to deny access to a com-
employee. puter system or data until a ransom is
paid.
C. anyone who exploits weaknesses in a
computer system or network. B. type of malware that are designed so
that they can remain hidden on your com-
D. someone who lacks programming puter.
knowledge and uses scripts or programs
developed by others to attack computer C. malicious software that tricks com-
systems. puter users into visiting malware-infested
websites. Also known as deception soft-
150. Which of these are common methods that ware.
could be used to infect a computer with D. the act of illegally clicking on pay-per-
malware? click (PPC) ads to increase site revenue or
A. spam email to exhaust advertisers’ budgets.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 556

155. Which type of malware can self- 160. When using public networks this soft-
replicate? ware tool can be helpful in protecting data.
A. Trojan A. VPN
B. Worm
B. Hashing
C. Spyware
C. NAS
D. Virus
D. Backups

NARAYAN CHANGDER
156. Encrypting data storage is an example
of? 161. Which of the following is the most accu-
A. Malware rate definition of a Trojan?
B. Effective password management A. A stand-alone program that replicates,
C. Device Hardening doing damage to a system
D. none of above B. Malicious code that spreads from de-
vice to device but does not need to attach
157. Which of the following is NOT recom-
itself to a program in order to do so
mended when creating a strong pass-
word? C. A program that pretends to be safe,
A. longer than six characters while actually containing malicious code
B. generator to create more random D. software that installs itself onto de-
passwords vices and then steals personal informa-
tion about the user, like passwords,
C. same password for multiple accounts
D. numbers, symbols, and special charac- 162. What is the standard or basic collection
ters of NTFS permissions?
158. Used to identify flaws in mechanisms A. Read and execute, read, write, full con-
that are meant to protect data and func- trol, modify, list folder contents
tionality.
B. Change permissions, read permis-
A. Security functionality
sions, write permissions
B. Intrusion detection system (IDS)
C. Read attributes, list folder/read data,
C. Honey pot traverse folder/execute file
D. Signature based
D. Create files/write data, create fold-
159. Who has little or no skill, often using ex- ers/append data, take ownership
isting tools or instructions found on the In-
ternet to launch attacks. Some of them 163. These are two methods used to keep data
are just curious, while others are trying to confidential.(Pick 2)
demonstrate their skills and cause harm?
A. Accounting
A. State Sponsored Hackers
B. Authorization
B. Script Kiddies
C. Terrorists C. Authentication
D. Hacktivists D. Encryption

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 557

164. You can protect your files from unautho- C. Morse code
rised access by D. Encryption

PRACTICE BOOK» NOT FOR SALE


A. only allowing your friends and family
169. Which of the following process is used
to know your passwords making frequent
in IPSEC to negotiate symmetric keys se-
backups
curely between endpoints over an unse-
B. choosing a strong password and cure intermediate media?
changing it regularly
A. Diffie-Hellman Key Exchange
C. never using computers in a public
B. Advanced Encryption Standard (AES)
place such as a library
C. Secure Hashing Algorithm (SHA)
D. none of above
D. RSA
165. What is a attack vector?
170. Mario has purchased a new computer. He
A. Targeting companies into which they wants to be sure that it remains in good
had fundamental disagreement. condition. He also does not want the com-
B. Obtaining vulnerabilities in networks. puter to become infected with any mal-
ware. What would be the most common
C. An attempt to steal, damage, or de-
activity to cause Mario’s computer to be-
stroy data on a computer system.
come infected with malware?
D. Avenue or path the hacker uses to com-
A. Downloading software
mit the attack.
B. Playing online games
166. Which of the following is a type of cyber C. Using online chat rooms
security?
D. Downloading images
A. Cloud Security
171. What is a click fraud?
B. All of these
A. Click fraud is the act of illegally clicking
C. Application Security
on pay-per-click (PPC) ads to increase site
D. Network Security revenue or to exhaust advertisers’ bud-
gets.
167. Refers to creations of the mind, such as
inventions; literary and artistic works; de- B. type of malicious software, or mal-
signs; and symbols, names, and images ware, designed to deny access to a com-
used in commerce puter

A. Copyright C. a type of malware that are designed so


that they can remain hidden on your com-
B. Intellectual Property puter.
C. Software License D. malicious software that tricks com-
D. Piracy puter users into visiting malware-infested
websites
168. Which vocabulary word fits this defini-
tion? An alphabetical code using dits and 172. It is a form of cyber attack that attempts
dahs to transmit messages to make the user give up their sensitive
information by disguising as a legitimate
A. Public key cryptology person or entity thru e-mail, messaging
B. Pigpen cipher app, or telephone.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 558

A. Man-in-the-Middle Attack 178. Verbal defamation. This is a punishable


B. brute force offense.
C. malware attack A. firewall
D. phishing B. encrypt
C. slander
173. Which vocabulary word fits this defini-
tion? Using technology and the Internet D. libel
to bully, harass, threaten, or demean an-

NARAYAN CHANGDER
other person 179. What is Spam?
A. Encryption A. Canned meat.
B. AUP B. Unsolicited emails sent to many email
addresses that try to get you buy some-
C. Morse code
thing or share private information.
D. Cyberbullying
C. A computer virus that will hack your ac-
174. How does Mia manage the web server? count.
A. Phone App D. none of above
B. Laptop App 180. software/license theft, shoulder surfing,
C. Another PC and dumpster diving are all examples of
D. none of above ?
A. Malware
175. What do hackers do?
B. Security best practices
A. THEY PLAY MINECRAFT
C. Physical security threats
B. They steal cars
C. They steal computer software D. Device hardening

D. They steal your information 181. What is a snapshot?


176. A biometric scan of your eyes to obtain A. A saved version of the system in its cur-
entrance is an example of rent state.
A. Security through something you have B. A snipped photo of the system in its
current state.
B. Security through something you are
C. Security through something you do C. A past version of a system.

D. Security through something you see D. The ability to quickly deploy resources
when needed.
177. A plan that describes threats, protection
measures (actions), reasons for the mea- 182. Which of these is an indicator that the
sures, constraints, legal responsibilities, website is secure.
usability, cost/benefit and a test plan. A. Bruce Lee photo
A. Cyber security plan B. The http://
B. Anti-malware software C. The https://
C. Risk assessment D. The https:
D. Security requirements

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 559

183. Which vocabulary word fits this defini- B. So no one can guess your password in
tion? A method to hide a message by re- order for your account to not get hacked
placing each letter with a sequence of let-

PRACTICE BOOK» NOT FOR SALE


C. Just for fun
ters
D. To make it easier
A. Pigpen cipher
B. Baconian cipher 189. What is a policy that requires users to
change passwords periodically?
C. Morse code
A. password expiration
D. Encryption
B. password encryption
184. When should you get antivirus soft- C. password complexity
ware?
D. none of above
A. After having your device for years
190. In order to restrict access to secure data,
B. When you are getting a new device
a system of should be used?
C. When you sell a devices
A. Passwords
D. When you wake up
B. Anti-virus software
185. can a hacker hack into a webcam? C. Multi-user operating system
A. No D. Single-user operating system
B. No, because the cameras are wireless
191. Which type of hacker has permission to
C. maybe hack?
D. yes they can A. Black Hat
186. CompTIA CyberSecurity Analyst ( CySa+) B. Blue Hat
A. A certification in managerial skills C. White Hat
B. A certification in risk management for D. Grey Hat
businesses
192. Consequences of an information security
C. Certification assessing, combating breach
and responding to security threats
A. vandalism
D. none of above
B. Revenue lost
187. Certified Information Systems Security C. Damage Intellectual Property
Professional (CISSP) D. All of the above
A. A college degree in computer science
193. Below are the tips for good password
B. certification for those with managerial management except:
and technical skills
A. Use the same password over and over
C. certification in coding again
D. none of above B. Change password often
188. Why is it important to change your pass- C. Avoid using simple adjacent keyboard
word more often than you think? combination as your password
A. Because you forget it every time D. Make difficult to guess password

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 560

194. What is not an example of security best C. Phishing and Password attacks
practices? D. All of the above
A. disabling guest accounts
199. Unsolicited electronic messages, espe-
B. being alert for suspicious emails, at- cially advertising is know as?
tachments, and hyperlinks
A. Spim
C. Not responding to security software
B. Spam
alerts

NARAYAN CHANGDER
C. Ransomware
D. none of above
D. none of above
195. What is a type 1 hypervisor?
200. One of the most popular online activities-
A. One that does not interface with the and one that poses the greatest risk to
host operating system. your privacy-is:
B. One that runs on the host operating A. online gaming
system.
B. watching movies
C. Virtualization platform developed by
Microsoft for its servers and desktops. C. social networking

D. The ability to quickly deploy resources D. checking email messages


when needed in virtual computing. 201. What are benefits of a firewall?
196. What is the purpose of a firewall? A. Blocks access to a network from unau-
thorised sources
A. To remove viruses from a system
B. Helps to prevent CPU overheating
B. To provide a secure password access
system C. Helps to protect confidential informa-
tion on your computer
C. To intercept and possibly block pack-
ets of data D. Avoids all viruses entering a system
D. To prevent programs being installed E. Can give you reports on any threats to
on a network the system

197. Which of the following is a “strong” 202. masks your IP address.


password for someone named Justin A. Firewall
Smith? B. Antivirus
A. JustinSmith C. VPN
B. Justin123456 D. Incognito mode
C. softcatsears
203. Which of the following would be the BEST
D. ASDFGHpoiuy option for a few individuals who to collab-
orate remotely?
198. Which of the following are famous and
common cyber-attacks used by hackers to A. cloud based software
infiltrate the user’s system? B. Workgoup
A. DDos and Derive-by Downloads C. Homegroup
B. Malware & Malvertising D. Ad hoc networke

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 561

204. Which one is a safe email 209. Under the Computer Misuse Act, it is ille-
A. [email protected] gal to:

PRACTICE BOOK» NOT FOR SALE


B. [email protected] A. look at someone else’s computer files
without permission
C. [email protected]
B. look at someone else’s computer files
D. littledoll@kahoot, it.com without permission with intent to commit
E. [email protected] further criminal offences
C. change data on someone else’s com-
205. IT security recently found a keylogger
puter files without permission
on your co-worker’s computer that appar-
ently tracked all of the words that they D. all of the above
typed into the computer. what type of
malware is this? 210. Abigail’s friend shows her a Web site
where she can download any music she can
A. spyware think of for free. Abigail suspects this is
B. keyblogger not only unethical but also illegal. She de-
cides not to use the site herself. Why?
C. trojan horse
A. Downloading music without paying for
D. rootkit
it is like stealing it from the copyright
206. The type of malware, that covertly owner.
collects personal information and sends it B. The site does not use secure encryp-
to a third party. tion for downloads.
A. Worm C. She trusts the sites her friends visit,
B. Toolbar but does not want to violate netiquette.
C. Homepage hijacker D. Downloads from the Internet always
contain viruses.
D. Spyware
211. What is a script kiddie?
207. Keeping a user’s data, including personal
files and e-mail messages, such that the A. A hacker that is looking to only do
data is not accessible by anyone without good.
appropriate permission B. Slang term used to describe an individ-
A. encryption ual who uses premade tools to perform
their attacks.
B. copyright
C. Does not cause harm, does not do
C. computer privacy
good.
D. hacker
D. People that manipulate people to get
208. When you get a friend or follow request information that can be used to hack com-
what should you consider? puter systems.
A. Let them add me, who care’s? 212. Maintaining equipment, performing hard-
B. Request, what’s a request? ware repairs, keeping operating systems
and software up to date, and creating
C. Do I know who it is? backups ensure the availability of the net-
D. none of above work and data to the authorised users.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 562

A. Confidentiality C. Deep learning


B. Integrity D. none of above
C. Availability 218. Which of the following would best indi-
D. none of above cate that a website is credible?

213. The security of computers and users infor- A. A lot of social media links are attached
mation to the website.
B. The author of the website is consid-

NARAYAN CHANGDER
A. Cybersecurity
ered an expert on the content.
B. Computer virus
C. The website was the first link to ap-
C. Phishing pear in a search engine’s list of related
D. Spam websites.

214. Logic/Time Bombs malware D. None of the answers are correct.

A. were designed to lie dormant until a 219. What is your best defense against virus
specific logical condition is met infection?
B. tracks users’ keystrokes, obtains pass- A. Don’t download files from the Internet
words, and other personal information B. Don’t open e-mail attachments you’re
C. is an entry point into a program with- not expecting
out it knowing C. Don’t surf the Internet
D. go KABOOM D. Don’t use disks to transfer data
215. Security measures are adopted to in- 220. Strategic and tactical capability of the or-
crease the level of protection against what ganization to plan for and respond to inci-
kind of threats? dents and business disruptions in order to
A. Internal continue business operations at an accept-
B. External able predefined level

C. Supplemental A. Live Drill

D. Neutral B. Business Continuity


C. Risk Management
216. Software that reaches protected parts of
an operating system and can often remain D. Strategic Planning
hidden, allowing remote administrator ac- 221. An encryption algorithm transforms plain
cess, are called text into:
A. Phishing software A. Cipher text
B. Viruses B. Simple Text
C. Backdoors C. Empty Text
D. Rootkits D. Plain Text
217. Deals with Big data 222. With whom should you share your pass-
A. Expert system words?
B. ML A. Extended family

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 563

B. Co-workers C. Spam
C. Friends D. Denial of Service (DoS)

PRACTICE BOOK» NOT FOR SALE


D. None of these
228. Robert is on an online auction site trying
223. For $500, 000:Cyber tricks and scams to make a bid on a new computer. As he
come from tries to make a bid, the site crashes and
A. Criminals he loses the auction.Which part of the CIA
triad was broken?
B. Friends
A. Confidentiality
C. Companies
B. Integrity
D. All of these
C. Availability
224. What is Ransomware
D. All of the above
A. A Disease you get from playing to
much Fortnite 229. A technique of hiding a secret message
B. A type of malware that wants Money within an ordinary message and extract-
ing it at the destination to maintain confi-
C. An Anti Virus Software
dentiality of data.
D. Software that protects you from Phish-
ing A. Steganography
B. Coding
225. When do you need to use AntiVirus soft-
ware? C. Transform Domain
A. When you first get your computer. D. Substitution
B. All the time, on your laptop only-and
make sure it is updated! 230. When choosing a password you should:

C. All the time, on ALL digital devices-and A. use something easy to remember like
make sure it is updated! your pet’s name
D. As soon as you start to feel sick. B. use a combination of letters and num-
bers that mean something to you but no
226. Which of the following refers to stealing one else
one’s idea or invention of others and use
C. save all your passwords in a file on
it for their own benefits?
your computer in case you forget one
A. Piracy
D. use a foreign word that will not be in
B. Plagiarism an English dictionary
C. Intellectual property rights
231. Which law makes it illegal to share com-
D. All of the above
puter viruses
227. What’s the name given to the use of elec- A. The Virus Act
tronic messaging systems to send an unso-
licited message, usually repeatedly? B. The Internet Act
A. Ransomware C. The Computer Misuse Act
B. CyberBullying D. The Data Protection Act

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 564

232. A malware program that, when executed, A. It is attached to a program and runs
replicates by inserting copies of itself (pos- each time the program is opened.
sibly modified) into other computer pro- B. It is disguised as an accounting pro-
grams, data files, or firmware is known gram and runs when the program is
as? opened.
A. Malware C. It is sent as an email that asks recipi-
B. Virus ents for their credit card numbers.
D. It is a piece of software that looks for

NARAYAN CHANGDER
C. Spoofing
security holes in a network and uses those
D. none of above holes to infect other computers.
233. What is the biggest DDOS attack? 237. What’s wrong with this code? function
A. Best Buy start() { move(); go(); go();}function go()
{ move(); move();}function go() { move();
B. MySpace move();}
C. GitHub A. The go function is called twice
D. Mr.You B. The go function has a syntax error
234. What is the definition of RTO? C. The go function has been defined twice

A. Recovery Time Objective is the time it D. go is not a command that Karel under-
takes to restore a business process after stands
a failure 238. The other day you were watching the
B. Recovery Time Objective is the amount news and you heard a journalist talking
of time that has transpired since a previ- about a of cyber-threat. Essentially crimi-
ous failure nals seem to be able to use malicious soft-
ware to restrict users from accessing their
C. Recovery Time Occurrences are the
computer system or personal files. Later
number of systems failures within a given
criminals demand a payment in order for
reporting period
the restriction to be removed. What is the
D. Recovery Time Operations are the name of this threat?
times associated with each recovery op- A. Ransomware
eration needed to recover from a failure
B. Virus
235. How do you prevent cyber attacks? C. Botnet
A. Don’t use the computer D. Trojan
B. Use a secure password that only you 239. Chris is planning on using a copyrighted
would know song for a school project. He wants to
C. Use a software that protects your com- make sure he is following the rules of fair
puter use. Which of the following is an appropri-
ate use of the song following the rules of
D. none of above
fair use?
236. Computer viruses come in many forms. A. Chris must sell his project online and
Which of the following descriptions is most send a portion of the profits to the copy-
UNlikely to be describing a virus? right owner.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 565

B. Chris can use 20 seconds of the copy- C. Gives privacy to users


righted song for the school project. D. Protects system against viruses

PRACTICE BOOK» NOT FOR SALE


C. Chris can not use copyrighted songs
without written permission. 244. What is the security risk of connecting
my laptop or device to an unsecured public
D. Chris must re-record the song using wireless network?
his own instruments and voice.
A. The information that is sent from my
240. When visiting a website, you notice a device across the wireless network might
lock icon in the lower-right corner of the be stolen by hackers.
browser window. What does the lock rep- B. My device operating system’s license
resent? key may be stolen.
A. A link to open another site C. Hackers might infect the emails that
B. A webpage that has a secure connec- i received through the wireless nerwork
tion with virus.
C. A program that prevents you from leav- D. none of above
ing the page
245. Before you deploy Network Access Pro-
D. A warning that you are not allowed to tection (NAP), you must install:
view this webpage
A. Internet Information Server (IIS)
241. What is pharming B. Network Policy Server (NPS)
A. A cyber attack intended to redirect a C. Active Directory Federation Services
website’s traffic to a fake site. D. Windows Update Service
B. Getting a computer to ‘offload’ its in-
formation to a hacker 246. The service that translates URLs to IP ad-
dresses.
C. Pretending to be a friend on social me-
dia to gain personal information A. DNS

D. Watching someone network traffic to B. HTTP


be able to access their passwords C. TCP
D. IP
242. Delivers on-premise, in-line, DDoS pro-
tection powered byautomated DDoS detec- 247. If someone hacks into your email, which
tion and mitigation capabilities law have they broken?
A. ZIA A. The Data Protection Act
B. ZPA B. Regulation of Investigatory Powers
C. Anti-DDOS Act
D. None of the above C. Computer Misuse Act
D. Freedom of information Act
243. Which of the following is not an advan-
tage of cyber security? 248. Packet filtering firewalls are also called
A. Minimizes computer freezing and
crashes A. first generation firewalls
B. Makes the system slower B. second generation firewalls

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 566

C. third generation firewalls 254. A computer virus is a small program


D. fourth generation firewalls which:

249. Which of the following is/are (an) appro- A. will destroy your computer hardware
priate communication(s) when online? B. you may unintentionally transmit to
A. Never say anything nice online other computers and infect them
B. Always use the right language C. can only be transmitted via email
C. Always encourage a fight

NARAYAN CHANGDER
D. cannot be removed from your com-
D. Always use the right language and puter
never say anything nice online
250. Which vocabulary word fits this defini- 255. Why should you update your anti-virus
tion? Technology, processes, and practices software regularly?
that are used in order to protect against
A. To make sure no one is tracking you on-
unauthorized or criminal use of or attack
line.
on electronic data
A. Intellectual property B. To help out the software companies
B. Cypersecurity C. To gain access to new websites
C. E-commerce
D. To protect your computer against new
D. Encryption viruses and malware
251. What type of malware can record the
keys you press? 256. Tricking people into revealing private in-
formation, by using emails or fake web-
A. Adware
sites.
B. Spyware
A. Tracking
C. Ransomware
D. Catphishing B. Phishing

252. Rules that state how a computer should C. Formatting


be used. D. Spoiling
A. Computer ABC’s
B. Computer Ethics 257. Why is malware dangerous?
C. Technology Values A. It can keep you from accessing web
D. The Internet Guide sites you want to see.
253. To keep viruses and malware from harm- B. It can install hidden applications that
ing your computer and files, it is important share your personal information without
to your permission.
A. Keep your browser up-to-date. C. It can track your personal preferences
B. Increase your internet speed. and passwords.
C. Download free software. D. It can lock you out of your computer,
D. Never download anything online. until you pay a ransom fee.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 567

258. A cyber attack in which the data on a vic- 263. When you use the word it means you
tim’s computer is locked, typically by en- are protecting your data from getting dis-
cryption, and payment is demanded before closed.

PRACTICE BOOK» NOT FOR SALE


the data is decrypted and access returned A. Confidentiality
to the victim.
B. Integrity
A. DDoS Attack
C. Authentication
B. kidnap for ransom
D. Availability
C. ransomware
264. What should you do when you turn off
D. data hack
your work computer?
259. Who you are allowed to give your pass- A. Take the computer with you.
word to? B. Try to stay on the same account so you
A. “Anybody you trust” won’t have to log in.
B. “Only supervisors and authorised IT C. Log off the account that was already
staff if requested” associated with the computer so the other
user won’t get access to your account.
C. “Only IT staff”
D. Nothing.
D. “Nobody”
265. You can protect yourself against spam or
260. An asymmetric-key (or public-key) cipher fraudulent emails by:
uses A. using a spam filter
A. 1 Key B. never clicking on links that you are sus-
B. 2 Key picious of
C. 3 Key C. being aware of different types of fraud-
ulent email
D. 4 Key
D. all of the above
261. What port number is RDP (Remote Desk-
266. Which of the following may be an indica-
top Protocol)?
tion that a computer has been infected by
A. tcp 80 a virus or other malware?
B. tcp 3389 A. Computer runs very slowly
C. tcp 445 B. Excessive number of spam e-mails
D. tcp 389 C. Overabundance of cat videos on
YouTube
262. Process of using codes to make readable D. A poor score on this quiz
information unreadable.
A. Phishing 267. It’s OK for organisations to pass your
data on to other organisations if they ask
B. Cybersecurity your permission first.
C. Encryption A. True
D. Decryption B. False

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 568

C. Under certain conditions A. worm


D. none of above B. snake
C. Trojan horse
268. Which of the following factor of the net-
work gets hugely impacted when the num- D. virus
ber of users exceeds the network’s limit?
273. Looks for specific network patterns gen-
A. Reliability erate by known malware.
B. Performance A. Signature based

NARAYAN CHANGDER
C. Security B. Host intrusion detection system
D. Longevity (HIDS)
C. Anomaly based
269. How do you create a secure password?
D. Security functionality
A. A combination of capital letter, number
and special characters 274. Three methods used to identify people for
the purpose of authentication.(Pick 3)
B. Using a phrase like “iloveManU” with
some numbers added A. Something you are
C. Including numbers instead of charac- B. Something you know
ters e.g. K3llySm1th C. Something you have
D. Use the default password issued to D. Something you like
you, as others would presume you have E. Something you ate
updated it
275. This is the process of keeping track of
270. Program to keep track of your internet what all the users do within your systems.
activities without your knowledge.
A. Accounting
A. Phishing
B. Authorization
B. Digital Footprint
C. Authentication
C. Spyware
D. Availability
D. Firewall
276. Malicious code that secretly watches
271. Black, white, and gray all refer to the your computer activity
type of a hacker can be identified by. A. Spyware
A. Socks B. Trojan Horse
B. Hat C. Worms
C. Underwear D. Phishing
D. Attack
277. Software used to protect a computer sys-
272. A computer program that propagates it- tem from viruses.
self across computers, usually by creating A. Anti-virus software
copies of itself in each computer’s memory. B. Spyware software
A worm might duplicate itself in one com-
puter so often that it causes the computer C. Google hardware
to crash. D. Anti-virus hardware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 569

278. Which of these isn’t a cyber crime C. E-commerce


A. Accessing unauthorised data/ using D. AUP

PRACTICE BOOK» NOT FOR SALE


someones computer without permission
283. Which is Bio metric measure to prevent
B. Tricking people into downloading mal- cyber security threats?
ware
A. Fingerprint
C. Accessing the DarkWeb
B. password
D. Creating an account on something C. retinal scanner
you’re not old enough for
D. Voice
279. Why is it important to always keep your
284. Which one of the following is a type of
software up to date?
antivirus program?
A. So you have the best software that is
A. Quick heal
faster when using your device
B. Mcafee
B. To ensure all bugs or glitches are fixed
C. Kaspersky
C. To make sure you are protected
against Malware D. All of the above

D. To get rid of all the viruses your device 285. In cybersecurity, what does CIA stand
may have currently installed for?
A. Confidentiality, Integrity, Availability
280. In the acronym WIPS what does the W
stand for? B. Central Intelligence Agency
A. Wireless C. Cybersecurity Investigation Agency
B. Wired D. Cybersecurity, Internet, Accessibility
C. WiFi 286. To protect the computer system against
D. Wire Free the hacker and different kind of viruses,
one must always keep on in the com-
281. Which term describes bad people who puter system.
watch and read your personal informa- A. Antivirus
tion online for the purpose of harassing or
B. Firewall
harming you?
C. Vlc player
A. Online teachers
D. Script
B. Digital footprints
C. Online predators 287. Which of the following data is considered
to be “personal data” when held by a
D. Social networkers school:
282. Which vocabulary word fits this defini- A. the school’s email address
tion? Using the internet to buy, sell, or B. the number of pupils in the school
trade foods and services as well as trans-
C. the year that a particular pupil joined
ferring money
the school
A. Public key cryptology D. the average percentage a*-c grades
B. Pigpen cipher at gcse gained by pupils last year

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 570

288. Hackers: D. An internet service provider


A. will destroy your computer hardware E. All of the above
B. are rarely able to steal personal data 294. Modern networks primarily use three
C. sometimes steal passwords so they types of media to interconnect devices and
can access your online account to provide the pathway over which data
D. can only steal one password at a time can be transmitted. Which of these en-
codes data using pulses of light?

NARAYAN CHANGDER
289. Software that collects information about A. metallic wires within cable
the users in order to advertise.
B. glass or plastic fibers
A. Batman’s Batcomputer
C. wireless transmission
B. Spyware
D. none of above
C. Google Docs
D. GTA 4 295. what is RAM?
A. random acces memory
290. For $500:Which of the following is not a
tip to avoid falling for scams? B. random analogue memory
A. Thinking before you click. C. random ankle mass
B. Doing a web search for a company’s D. random any memory
name before you give them any informa-
296. Laws that protect an author’s work.
tion about yourself.
A. CopyLeft Legal Spies
C. Read the fine print.
D. All of these. B. Copyright Rules
C. Copyleft Laws
291. How can we teach Karel new com-
mands? D. Copyright Laws

A. For loop 297. Converting data into a secret code so that


B. While loop it cannot be read by an unauthorised per-
son is called ?
C. Define a new function
A. Encryption
D. The start function
B. De-encryption
292. hackers with purely criminal intent are C. Incription
A. black hat hackers D. Prescription
B. white hat hackers
298. Firewalls, antivirus and anti spyware in-
C. grey hat hackers stalled on every machine that monitors
D. none of above all incoming and outgoing traffic for sus-
picious activities
293. What is a netowrk?
A. Host intrusion detection system
A. Interconnected computers (HIDS)
B. A super computer B. Distributed intrusion detection system
C. A computer vulnerability (DIDS)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 571

C. Intrusion detection system (IDS) 303. is a deliberate exploitation of com-


D. Network intrusion detection system puter systems, technology-dependent en-
terprises, and networks.

PRACTICE BOOK» NOT FOR SALE


(NIDS)
A. cyber attack
299. Where is the running club website
stored? B. cybercrime
A. On the laptop C. cyber threat
B. On a secure PC D. cyber incidence
C. In the cloud
304. refers to criminal activities or of-
D. With a web host fences carried out in a digital world.
300. What types of protocols are used in A. Cybercrime
VPNs? B. CyberSecurity
A. Application level protocols C. Cyberstalking
B. Tunnelling protocols
D. None
C. Network protocols
D. Mailing protocols 305. Secret or disguised way of writing; a
code.
301. Within our company, IT Security is the re- A. Cipher
sponsibility of:
B. Cursive
A. The Cyber Security Team
C. Curling
B. Corporate Security
D. Cooing
C. Cafeteria Staff
D. Everyone 306. Encrypt “day” with a = 5 and b = 8 using
Affine Cipher
302. Many hardware, software, and human
components contribute to the security of A. xiy
the Internet. Which of the following is B. jiu
**NOT** one of the ways that cybersecu-
rity is implemented? C. opj
A. Through hardware components, such D. gtr
as protections built into the processing
chip. 307. Which are ways that an operating sys-
tem can increase system security?
B. Through software components, such
as antivirus programs that detect and pre- A. Offering the use of password protec-
vent viruses. tion
C. Through hardware components, such B. Different levels of user access
as passwords for secure websites.
C. Keeping software updated
D. Through human components, such as
D. Disk Defragmentation
security questions to answer when a pass-
word is forgotten. E. The use of virtual memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 572

308. Which of these identifies and exploits vul- B. Randsomware


nerabilities in a system. C. Spyware
A. Vulnerability testing D. Password
B. Intrusion prevention system
314. A standalone malware computer program
C. Host intrusion detection system that replicates itself in order to spread to
(HIDS) other computers
D. Penetration testing A. Trojan Horse

NARAYAN CHANGDER
309. Which of these is not a form of phishing B. Adware
A. fake email C. Spyware
B. fake website link D. Worm
C. spam 315. A secret series of numbers or letters that
D. key logger authorizes you to use a computer system

310. What should a strong password include? A. Passport

A. At least one upper case letter B. Password

B. Short, easy to guess words C. Username

C. Date of birth D. Equation

D. At least one number 316. For $200:Phishing means


E. At least 8 characters A. Using a phishing pole in the water and
catching phish
311. What is a worm?
B. Someone should have been more care-
A. A worm you see outside in the dirt. ful with the spell check
B. A software used to worm into your C. Websites and emails created just to
computer. trick you so cybercriminals can steal your
C. Malware that can infect and spread information
without human assistance. D. All of these
D. none of above
317. Which of the following is NOT a form
312. What can be done to disks to prevent ac- of digital communication and collaboration
cidental deletion of data? tools?
A. Store them in their original packaging A. Email
B. Write protect them B. Blog
C. Only allow access with a user ID and C. Online Forum
password D. Book
D. Tell your friend not to delete your data
318. What makes the following command an
313. Which one of the following is NOT a type invalid Karel command? turnleft();
of CyberSecurity Attack? A. It should end in a colon rather than a
A. Worms semicolon

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 573

B. The l should be a capital L 322. Name a piece of personal information


that would be most valuable to a malware
C. It should start with a capital T
developer.

PRACTICE BOOK» NOT FOR SALE


D. This command is correct
A. Your name
319. Which of the following is true about the B. Your school name
Internet of Things? I. The Internet of
C. Your friends personal email
Things is the network of devices with the
ability to connect and exchange data.II. D. Your favorite school subject
The Internet of Things increases our vulner-
ability to cyber attacks.III. The Internet of 323. The law states that:
Things is purely positive-there are no neg- A. only government organisations can
ative consequences to increased connectiv- hold personal data about you
ity
B. personal data held by an organisation
A. I only must be protected from hackers
B. I and II C. personal data must be updated at
C. I and III least once a year

D. None of the above D. all personal data must be encrypted

320. What is an SQL Injection? 324. What is the biggest vulnerability to com-
puter information security?
A. Insert code into a data-driven applica-
A. Instant messaging
tion for malicious reasons (like dumping
all data to an attacker) B. Spam and phishing attacks
B. An injection given to hackers when C. Malware-virus, worms, spyware
they are caught so they can no longer use
D. End users
computers
C. Addings SQL statements to an existing 325. What is the term for computer programs
system to allow it to run more efficiently that attack your computer?
and securely A. Malware
D. Adding SQL code to a program that usu- B. DangerDroids
ally wouldn’t use SQL (such as a computer
game) to steal user details C. RudeBots
D. Dangerware
321. A person who uses computer expertise
to gain unauthorized access to a computer, 326. What technology can you use to isolate
and then misuses or tampers the programs a network of servers so that they cannot
and data stored on the computer. interact with other servers?
A. hacker A. bridge
B. encrypt B. switch
C. firewall C. router
D. programmer D. VLAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 574

327. Which type of malware is focused on find- 332. A document that identifies the security
ing personal information? risks to a system and determines the like-
A. Virus lihood of each risk occurring and the sever-
ity of the loss that may occur as a result
B. Worm of an incident.
C. Trojan A. Risk assessment
D. Spyware B. Security incident management policy
C. Service provider agreement

NARAYAN CHANGDER
328. How many bits is the effective length of
the key used in the Message Digest five D. Cyber security plan
(MD5) algorithm?
333. Which of the following are secure ways
A. 168 to store passwords?
B. 128 A. Encrypted Word document or Excel
spreadsheet
C. 56
B. Notebook hidden in drawer
D. 64
C. Secure password manager app
329. Who’s the contact person in your D. All of these
Team/Cluster that you need to share the
Chat ID if you received chat regarding Cy- 334. Data is translated into a code which can
bersecurity Incident? only be understood by a key
A. Teammate A. Anti Malware
B. CRE B. Network Forensics

C. OM C. Encryption
D. User Access Levels
D. Office crush
335. RSI (Repetitive Strain Injury) can be
330. Software updates are important because caused by:
A. They fix vulnerabilities and bugs A. moving heavy computers about fre-
B. They stop the computer accessing the quently
internet B. using a computer in almost all of your
C. They identify any virus that are on the lessons
computer C. using a keyboard for several hours a
D. They allow the software company to day over and over again
check your computer for malicious code D. sitting in the same position for too long

331. Which are common types of malware? 336. How can a large company protect cus-
tomer’s personal details?
A. Adware
A. Keep their data separate from a hard
B. Ransomware drive
C. Key Logger B. Encryption
D. Mouse Hacker C. Keep the data on a floppy disk
E. Windows Breaker D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 575

337. For $100:Is it safe to use your real per- 342. Which type of system detects unautho-
sonal information for an online character? rized intruders and then takes action to
stop them from proceeding?

PRACTICE BOOK» NOT FOR SALE


A. Yes, it doesn’t matter.
B. Yes, but only your real name, address, A. IDS
and age. B. IPS
C. Yes, but only once in a while. C. VLAN
D. It’s better not to reveal personal in- D. NAT
formation, even when creating an online
character. 343. The strongest password would include
338. Which vocabulary word fits this defini- A. A long sequence of numbers
tion? The process of encoding a message B. An important date
or information in a way that only those
C. The user’s last name
who are authorized can access the data. It
does not prevent interference though. D. Upper-and lower-case letters, num-
A. Baconian cipher bers, and symbols

B. Public key cryptology 344. An attempt to make a computer or net-


C. Encryption work unavailable to its users by flooding
a network is known as a
D. AUP
A. Denial of Sending Attack
339. When disposing of an old computer:
B. Don’t open Services Attack
A. It should be incinerated to ensure that
sensitive data is destroyed C. Denial of Service Attack
B. It should be taken to a recycling center D. Disruption of Service Attack
C. It should be taken to a landfill site 345. Which of these is a sign of malware on
D. It should be taken apart and the outer your computer?
casing recycled, the rest put in the bin A. You receive a fraudulent email
340. is a text message given to a web B. Your browser alerts you it has blocked
browser by a web serverm a pop-up window
A. Cookie C. Your homepage has changed unexpect-
B. Biscuit edly
C. Protocol D. Your browser alerts you to update to a
newer version
D. none of above
341. The act or instance of making a duplicate 346. Individuals and groups which use comput-
copy of a program, a disk, or data. The ers and computer systems to promote their
duplicate copy is called a backup. own views on a particular issue.
A. cache memory A. Cyber Criminal
B. backup B. Hacktivist
C. copyright C. Scammer
D. encryption D. Insider

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 576

347. How long can your “digital footprint” 352. A is a malware that will self replicate
last online? and spread without the end-user action.
A. Forever A. virus
B. Minutes B. worm
C. Months C. trojan
D. Hours D. adware

NARAYAN CHANGDER
348. The art of writing or solving codes. 353. What’s the name given to the attempt to
obtain sensitive information such as user-
A. Programming names and passwords, by disguising as a
B. Cyberslacking trustworthy entity in an electronic commu-
nication (e.g. creating a fake website)?
C. Caligraphy
A. Trojan
D. Cryptography
B. Virus
349. Cybersecurity also be referred to as? C. Ransomware
A. incident security D. Phishing
B. information technology security
354. Uses the hacking techniques of others to
C. internet security carry out hacking but does not know how
D. threat security Cybersecurity also be to create scripts by themselves.
referred to as? incident security infor- A. Hacktivist
mation technology securi internet security B. Script Kiddie
threat security
C. Scammer
350. A program that is loaded on your com- D. Phisher
puter without your knowledge.
355. Why is important that you should not in-
A. Virus
clude any of your personal information on
B. Worm any social media site/app?
C. Chocolate Chip Cookie A. So no one can use your information to
D. Both A and C expose you to any one else but you.

E. Both A and B B. It wont consume any of your time to


not add your information.
351. Which of these is an example of a phish- C. So the people you hate won’t know any-
ing email? thing about you.
A. You have won the lottery! Follow this D. So you could be anonymous.
link to claim.
356. ethical hackers
B. Your bank account has been hacked.
Login in here to protect yourself. A. black hat hackers
C. Help! I am stuck in Europe and I need B. white hat hackers
money to travel home. C. grey hat hackers
D. All of the above! D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 577

357. Which vocabulary word fits this defini- 363. Which of the following best defines cy-
tion? Information about someone result- berbullying?
ing from their use of the Internet

PRACTICE BOOK» NOT FOR SALE


A. Following a set of rules for acceptable
A. Digital footprint online behavior
B. AUP B. Sending pictures of yourself naked to
another person via text messaging
C. Encryption
C. Doing something online to embarrass,
D. Cookies
threaten, or hurt someone
358. Which of these are forms of malware? D. Doing something to stop a situation
A. Virus that is threatening someone else

B. Trojan Horse 364. What percentage of cybersecurity


breaches are due to human error?
C. Worm
A. 50%
D. All of the above
B. 30%
359. A computer virus can C. 75%
A. Overheat D. 95%
B. Kill your computer
365. A destructive computer program dis-
C. Infect your television guised as a game, utility, or software.
D. Replicate itself When run, a Trojan horse does something
harmful to the computer system while ap-
360. Software designed to update or improve pearing to do something useful.
data.
A. Trojan horse
A. Software B. spyware
B. Software Patch C. software piracy
C. Firewall D. spam
D. Malware
366. Which of these is NOT a good pass-
361. Where should backups idealy be kept? word?
A. On the computer’s hard disk A. #LooneyToons23
B. Near the computer B. Ilovecats!95

C. In a separate room or off site C. password

D. In a folder on the computer’s hard disk D. #Iasw, aA!

367. Software that encrypts your files then


362. Where are cookies stored?
demands money to decrypt them is
A. On your own computer called
B. On the website’s servers. A. Annoyingware
C. On Wikipedia B. Threatware
D. In hacker’s computers C. Ransomware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 578

D. Trojan 373. For $16, 000:Everyone knows about the


E. Worm Nigerian scam, but which of the following
is also a scam?
368. When using a public computer at school A. Become a laptop tester
or a library you should
B. Free sports equipment for filling out a
A. Always save passwords survey
B. Save all personal and financial infor- C. Bank of America security asking you to
mation to the computer

NARAYAN CHANGDER
change your password
C. Make sure to log out of all accounts D. All of these
D. Show passwords and personal infor-
mation to everyone around 374. What is defense in depth?
A. All of the locations and methods that
369. Programs that secretly record what you could constitute a security risk.
do on your computer. E.g. what you type
B. Breaks down the aspects of a busi-
A. pharming ness and security domains into manage-
B. computer Virus able tasks areas and tasks.
C. malware C. Multiple layers of protection.
D. spyware D. A system that includes the services
and software that is used to provide ac-
370. AUP is? ? ? cess to data and other resources.
A. A nollywood film
375. How often should you update anti virus
B. An acceptable use policy software
C. An unacceptable legal policy A. Once a year
D. none of above B. Twice a day
371. When is it okay to share personal infor- C. Once a week
mation, like your full name and address, D. Once a month
online?
376. GDMS Cyber Security Policies can be
A. Only when buying something
found:
B. Only when you are setting up your so-
A. On the IT Cyber Security CrossPoint
cial networking profile
Site
C. Only when you are on a site you trust B. Nowhere, they do not exist
D. Only when a friend you met online is C. On HUB
asking for it
D. In your New Hire Passport
372. What should you use top prevent viruses
to attack your computer? 377. Which of the following best describes a
social network?
A. An antivirus
A. A place where books are stored, such
B. Nothing as the library
C. Not use the computer B. Membership in a face-to-face book
D. Use a malware club

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 579

C. Sending junk e-mail to many people at B. IP Hiding


once C. IP Ghost

PRACTICE BOOK» NOT FOR SALE


D. A group of people using a Web site to D. IP Attack
connect
383. Which of the following are the types of
378. You receive a link that is going to give
scanning?
you a free gift. What could this be?
A. Network, vulnerability, and port scan-
A. Phishing
ning
B. Malware
B. Port, network, and services
C. Trojan
C. Client, Server, and network
D. Worm
D. None of the above
379. Time bombs .
384. There are types of VPN protocols.
A. Can infect and spread but need human
A. 3
assistance
B. 4
B. Can infect and spread without human
assistance C. 5
C. Track users’ keystrokes, obtains pass- D. 6
words and other personal information
385. preventative techniques used to protect
D. Are designed to lie dormant until a spe- the integrity ofnetworks, programs and
cific logical condition is met data from attack, damage, or unautho-
380. Junk email usually sent out to mailing rized access.
groups or mailing list is called A. Firewall
A. cookies B. Cybersecurity
B. spam C. SIEM
C. email virus D. Anti-DDos
D. crackers
386. type of VPNs are used for home pri-
381. This is the processes, practices and tech- vate and secure connectivity.
nologies designed to protect networks, A. Remote access VPNs
computers, programs and data from at-
B. Site-to-site VPNs
tack, damage or unauthorised access
C. Peer-to-Peer VPNs
A. Firewall
D. Router-to-router VPNs
B. Cyber Security
C. Anti-Virus software 387. What is a botnet
D. Encryption A. Many computers

382. Refers to a procedure of an attacker B. Few computers


changing his or her IP address so that C. An interlinked connection of comput-
he/she appears to be someone else. ers
A. IP Spoofing D. Computers trying to ATTACK you

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 580

388. To provide integrity of data, hashing is D. Fix the indentation of this program
often used. Which of the following is a
commonly used 128-bit hash digest? 392. Which one is the best option for secu-
rity?
A. SHA-1
B. MD-5 A. DNS

C. CRAMMD5 B. Antivirus
D. SHA-256 C. Antimalware

NARAYAN CHANGDER
389. Alice is checking her grades on a school D. End-Point Security
computer in the library, and she forgets to
393. According to the CIA Triad, which of the
log out before she leaves. Bob gets on the
below-mentioned element is not consid-
computer after her, and he sees her grades
ered in the triad?
for all of her classes.Which part of the CIA
triad was broken? A. Confidentiality
A. Confidentiality B. Integrity
B. Integrity C. Authenticity
C. Availability D. Availability
D. All of the above
394. You can tell whether a link in email will
390. What is the difference between a white take you to a genuine website, for exam-
hat hacker and a black hat hacker? ple belonging to a bank, without risk, by:
A. Their hats are different colors. A. pointing to the link or hovering over it
B. There’s no difference between a white without clicking
hat hacker and a black hat hacker. B. deleting the email
C. A white hacker hacks for a company C. replying to the email
to see their vulnerabilities, meanwhile a
black hat hacker hacks for malicious rea- D. clicking on the link
sons.
395. A legal statement of the terms of how
D. A white hat hacker hacks for a com- software can be used.
pany to see their vulnerabilities, mean-
while a black hat hacker hacks by violating A. Internet Agreement
laws, but has no malicious intentions. B. Driver”s License
391. How can we improve the following pro- C. Lease Agreement
gram? function start() { move(); move(); D. License Agreement
move(); move(); move(); move(); move();
move(); move();} 396. Select all correct answers:Which of the
A. Break down this program into more following statements are true?
functions A. There has been a decrease in the num-
B. Use a for loop to repeat the move com- ber of cyber attacks in the past decade.
mand B. Cybersecurity is the protection of com-
C. Use a while loop to repeat the move puter systems, networks, and data from
command digital attacks.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 581

C. Cyber attacks in the past few years B. Protecting your games


have impacted individuals, governments, C. Studying for several compuuter tests
and organizations.

PRACTICE BOOK» NOT FOR SALE


next week.
D. None of the above D. Protecting your home.
397. Identifies and exploits vulnerabilities in a
402. the verification ofidentity based on a
system.
person’s unique characteristicssuch as fa-
A. Vulnerability testing cial features, fingerprints, voice, orretinal
B. Intrusion prevention system scans
C. Host intrusion detection system A. biometric authentication
(HIDS) B. breach
D. Penetration testing C. compromised
398. For $64, 000:If you receive a phishing D. none of above
email you should
403. The development of a more secure http
A. Report it to antiphishing.com or (hyper text transfer protocol) is?
spam.uce.gov
A. http
B. Nothing, it is not going to hurt anyone
if nothing is done B. https
C. Reply back to the email with rude C. https
words D. httpd
D. None of these
404. Which one is most vulnerable from the
399. What percentage of employers check a list below?
potential employees social media presence A. SSH
before employing them?
B. SecureVPN
A. 46%
C. HTTPS
B. 25%
D. Telnet
C. 70%
D. 50% 405. What is a digital footprint?
A. A print of a digital photograph showing
400. Which of these is not a hack?
a footprint
A. Using a bike to power a computer
B. Information about yourself that you
B. Stealing an unlocked bike post online for anyone to obtain
C. Building a working bike out of dis- C. Your assigned page in an online social
carded umbrellas networking site
D. creating a kinetic bike sculpture D. A drawing of your own footprint using
E. All of the above digital graphics software

401. What is Cyber Security? 406. Tricking people into giving up their pass-
A. Protecting your device from hardware words and information.
or software damage and theft. A. Phishing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 582

B. Digital Footprint A. Obtain permission from the authors of


C. Spyware the music.

D. Firewall B. Only use 10% of the music because it


is copyrighted content.
407. Application layer firewalls are also called
C. Give credit to the source of the music
she downloaded.
A. first generation firewalls
D. Pay a fee to the site from which she is

NARAYAN CHANGDER
B. second generation firewalls downloading the music.
C. third generation firewalls
D. fourth generation firewalls 412. What can you trust to be secure 100%
of the time?
408. When visiting a website, you notice a
A. Text messages
lock icon before the url in the address bar.
What does the lock represent? B. Emails
A. A link to open another site C. Browser history
B. A webpage that has a secure connec- D. Apps
tion
E. None of the above
C. A program that prevents you from leav-
ing the page 413. For $1, 000:Chain emails are
D. A warning that you are not allowed to
A. A way to ensure you have good luck
view this webpage
B. A way to stay in touch with your friends
409. Special program which can detect and re-
move viruses from computer is called C. A way for you to help cybercriminals to
spread scams and tricks
A. Virus
D. None of these
B. Anti virus
C. Group ware 414. What is 1010 0000 in decimal?
D. Custom A. 160
410. Which of the following four passwords is B. 192
the most secure?
C. 144
A. Boat123
D. 200
B. WTh!5Z
E. 92
C. into*48
D. 123456 415. HTTPS can be based on which types of
E. P@ssword Encryption Protocol?
A. Secure Sockets Layer (SSL)
411. Aurora is downloading some music off a
public domain Web site, and then posting B. Transport Layer Security (TLS)
the music on her own site. Which of the
C. Network Address Translation (NAT)
following should Aurora do when posting
the content? D. System Transport Security (STS)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 583

416. A filter that blocks unreliable and unau- 420. Why are computer viruses dangerous?
thorized information from the Internet be-
A. They can run programs that may harm
fore it reaches your computer or a private

PRACTICE BOOK» NOT FOR SALE


your computer or allow hackers to access
network. It provides additional protec-
your computer.
tion against threats such as hackers and
viruses. A firewall also helps to ensure B. They will try to sell you things you do
computer privacy by restricting external not want.
access by any unauthorized user.
C. They will cause your browser to popup
A. cookie advertisements
B. active content
D. They can invalidate your other soft-
C. firewall ware licences.
D. encryption
421. Which of the following is defined as an
417. Which encryption method is most widely attempt to steal, spy, damage or destroy
used and why? computer systems, networks, or their as-
A. Symmetric Encryption:this method is sociated information?
much faster to send and receive mes-
sages A. Computer security

B. Symmetric Encryption:this method is B. Cyber attack


easier to use with SSL and HTTPS C. Digital hacking
C. Public Key Encryption:this method
D. Cryptography
does not require a secure channel for ex-
changing keys
422. John figured out his teacher’s password
D. Public Key Encryption:this method is to her email account. What is the ethically
more widely available correct thing for him to do?
418. What port is used to connect to the Active A. Tell the teacher so she may change it.
Directory in Windows 2000?
B. Give the password to all the other stu-
A. 80
dents.
B. 445
C. Use the password to change his
C. 389 grades.
D. 139
D. Keep it to himself, if someone else fig-
419. If the user sets up an account with a web- ures out the password it is not his problem
site that uses cookies, it will
A. remember their details, such as their 423. This cybersecurity goal or principle refers
name or login details, each time they visit to the accuracy, consistency, and trustwor-
thiness of data.
B. hack their private documents stored
on a computer A. Integrity
C. delete their browsing history of their B. Confidentiality
website
C. Availability
D. remember every website visited so
that the company can sell the data D. Accountability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 584

424. If testers have little to no information re- B. If the holder of the private key forgot
garding the system they are trying to hack or destroyed the private key
they are: C. If a third party accessed the private
A. White box testing key
B. Yellow box testing D. If the public key was made known
C. Black box testing 429. The primary purpose of Network Access
D. Blue box testing Protection (NAP) is to prevent:

NARAYAN CHANGDER
A. Loss of data from client computers on
425. If your best friend is being cyberbullied,
a network.
what should you do?
B. Non-compliant systems from connect-
A. Gossip about the bully at school or
ing to a network.
work.
C. Users on a network from installing
B. Tell your friend to ignore the situation.
software.
C. Tell someone in authority.
D. Unauthorized users from accessing a
D. Stand up for your friend and bully network.
those who are responsible.
430. What’s the name given to the cyber-
426. How does a zero-day vulnerability differ attack where the perpetrator seeks to
from malware? make a machine unavailable to its intended
A. they are the same type of threat users by temporarily disrupting its ser-
vices, typically accomplished by flooding
B. it is a flaw in software when it was re- the targeted machine in an attempt to
leased, not an infection overload it?
C. it can be passed from one computer to A. Spam
another, where malware cannot
B. Cyberbullying
D. it is not a security concern, where mal-
ware is a concern C. Denial of Service (DoS)
D. Ransomware
427. Which one of the following is a piece of
software that captures every keystroke 431. An attack carried out within an organi-
on a computer and sends it to a third sation, for example by a disgruntled em-
party? ployee over personal reasons.
A. Keylogging software A. Hacktivist
B. Screen recording software B. Cyber Terrorist
C. Winzip C. Scammer
D. Streaming software D. Insider

428. Which of the following scenarios would 432. Which vocabulary word fits this defini-
breach the security of a message en- tion? Code using images and geometric
crypted with a public key? shapes to represent the alphabet to trans-
A. If the encrypted message was inter- mit messages
cepted by a third party A. Morse code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 585

B. Pigpen cipher 437. How much was the total loss due to
C. Public key cryptology covert attacks in 2003?

PRACTICE BOOK» NOT FOR SALE


A. $45 billion
D. Encryption
B. $150 billion
433. The use of deception and manipulation to C. $14 billion
obtain confidential information. It may be
a non-technical or technical intrusion that D. $226 billion
relies heavily on human interaction and of-
438. How does malware get onto your com-
ten involves tricking people into breaking
puter?
normal security procedures.
A. Email attachments or links
A. Social Engineering
B. By visiting dodgy websites
B. Shoulder Surfing
C. On USB sticks
C. Spyware
D. All of the above
D. Backdoor
439. What is the definition of a brute force at-
434. A flaw in a computer program that hack- tack?
ers or malware can exploit to gain access A. Repeatedly trying usernames/passwords
to a system. to access a system
A. Bug Bounty B. Physically threatening someone to
B. Loop Array give up personal information
C. Remote Desktop C. Physically breaking into a device to
hack it
D. Software Vulnerability
D. Being a very strong hacker
435. type of malicious software program (mal-
ware) that, when executed, replicates by 440. What is the name of the case study or-
reproducing itself (copying its own source ganisation?
code) or infecting other computer pro- A. The Triangle Harriers Running Club
grams by modifying them. B. The Square Harriers Running Club
A. Computer Virus C. The Circle Harriers Running Club
B. Computer Worm D. The Star Harriers Running Club
C. MyDoom
441. For secure connection, Remote access
D. Malicious Code VPNs rely on and
A. IPSec, SSL
436. Seeking vulnerabilities within a system
to make it more secure, pertains to what B. L2TP, SSL
type of hacker? C. IPSec, SSH
A. Ethical D. SSH, SSL
B. Script Kiddie
442. The permission to use the software ac-
C. Virtual cording the agreement
D. Black Hat A. Copyright

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 586

B. Intellectual Property 448. Multiple detection systems across a net-


C. Software License work communicating together to give a
better picture of network activity.
D. Piracy
A. Distributed intrusion detection system
443. What does ‘integrity of data’ mean? (DIDS)
A. “Accuracy and completeness of the B. Host intrusion detection system
data” (HIDS)

NARAYAN CHANGDER
B. “Data should be viewable at all times” C. Intrusion detection system (IDS)
C. “Data should be access by only the D. Network intrusion detection system
right people” (NIDS)
D. “None of the above”
449. Which one of the following is actually con-
444. Under which law can law enforcement sidered as the first computer virus?
agencies intercept personal communica- A. Sasser
tions?
B. Blaster
A. Freedom of Information Act
C. Creeper
B. Data Protection Act
D. Both A and C
C. Regulation of Investigatory Powers
Act (RIPA) 450. Which of the following is/are considered
D. Computer Misuse Act as (a) shared resource(s)?
A. Printers
445. Time it takes for a bit to travel from its
sender to its receiver. B. Books
A. Latency C. Ipads
B. Redundancy D. Files and Printers
C. Packet
451. HTTPS is a type of protocol. What does
D. Protocol “S” stands for
446. what does the CIA triad stand for A. Safe
A. central intelligence agency B. Secure
B. conformity, intellect, availability C. Standup
C. confidentiality, integrity, availability D. Safety
D. conformity, integrity, assurance
452. The type of malware collects personal
447. There are types of VPNs. information and sends it to a third party.
A. 3 A. Worm
B. 2 B. Toolbar
C. 5 C. Homepage hijacker
D. 4 D. Spyware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 587

453. For $250, 000:Identity theft only occurs 458. An irrelevant and unsolicited e-mail mes-
to sage sent by an unknown sender. A spam
is sent to distribute a message to many re-

PRACTICE BOOK» NOT FOR SALE


A. Adults
cipients at one time
B. Youth who share personal information
A. spam
C. People with firewalls installed on their
computers B. software piracy
D. All of these C. slander
454. provides an isolated tunnel across a D. secure sockets layer (SSL)
public network for sending and receiving
data privately as if the computing devices 459. Which of the following is not true about
were directly connected to the private net- cyber security?
work. A. Recent data breaches have released
A. Visual Private Network personal information of hundreds of mil-
B. Virtual Protocol Network lions of people.
C. Virtual Protocol Networking B. Cyber security is the protection of com-
puter systems, networks, and data from
D. Virtual Private Network
digital attacks.
455. What should you do to remember your C. As we rely more on computing devices
password? to store and send data, we increase our
A. Write your name as your password vulnerability to cyber attacks.
B. Use your birth date D. Cyber attacks can devastate large or-
C. Use the same password for all the ganizations, but individuals are largely un-
sites you are using now affected.
D. None of the above
460. Which type of the following malware
456. Which approach is used to implements se- does not replicate or clone them self’s
curity with no particulars aspects or crite- through infection?
ria. A. Rootkits
A. Compliance based security
B. Trojans
B. Risk-based security
C. Worms
C. Adhoc approach
D. Viruses
D. Risk-Free approach

457. Which one of the following is a security 461. The informal code of positive conduct
threat? (select all that apply) used whenever someone is connected to
the Internet is the definition of
A. Worm
A. Cyber Security
B. Phishing
C. Black Hat Hacking B. Cyber Ethics
D. Antivirus C. Cyber Safety
E. White Hat Hacking D. Cyber Space

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 588

462. Which of the following is a sign of a pos- 467. The art and science of breaking the cipher
sible malware attack? text is known as
A. A new toolbar appears on your A. Cryptanalysis
browser B. Cryptography
B. You see a lot of pop-up adverts even C. Staganography
when you’re offline
D. Watermarking
C. Your hard disk is working overtime but
468. The main reason black-hat hackers com-

NARAYAN CHANGDER
you’re not doing anything
mit their acts is for what?
D. Any of the above
A. Challenge and thrills
463. Using VPN, we can access
B. Revenge
A. Access sites that are blocked geo-
C. Hacktivism
graphically
D. Criminal intent
B. Compromise other’s system remotely
C. Hide our personal data in the cloud 469. A type of attack that sends enough re-
quests to overload a resource or even stop-
D. Encrypts our local drive files while ping its operation.
transferring
A. Denialof Service (DoS)
464. Which of the following are forms of social B. DistributedDoS(DDoS)
engineering:
C. SYNFlood
A. Phishing
D. Spoofing
B. Farming
470. What is the proper format for a single
C. Fishing
line comment in Karel?
D. Blagging
A. # This is a comment
E. Shouldering
B. // This is a comment
465. This cybersecurity goal or principle in- C. /* This is a comment
volves preventing the disclosure of infor- D. This is a comment
mation to unauthorized people, resources,
or processes. 471. These days in the media it is not uncom-
A. Integrity mon to hear that organisations and com-
panies have suffered from cyber-attacks.
B. Confidentiality The popular image is that these attacks are
C. Availability carried out by so-called malicious hackers
that are external to an organisation. How-
D. Accountability
ever several observations show that many
466. What is the default router password? of these attacks are carried out by organ-
isation employees/officers or former em-
A. Password
ployees. What is the common name which
B. Admin is given to this latter type of threat?
C. 123 A. Ethical hacking
D. Yummy Toes B. Trolling

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 589

C. Insider Threat 477. Based on the video, “Two Kinds of Stupid,


D. Honeypot “ what could Eduardo have done to pre-
vent the pictures from getting out once he

PRACTICE BOOK» NOT FOR SALE


472. Which of these is regularly used for se- posted them online?
cure online communication?
A. Set up better privacy filters on his so-
A. Caesar cipher cial media sites.
B. Public-key cryptology B. Delete them from his social media ac-
C. Morse code count right after he posted them.
D. Enigma code C. Nothing. Once he posted them online,
he lost control of them.
473. What is the strongest password
D. All of the choices are correct.
A. password
B. Password 478. If you think your computer has a virus,
a good first step in solving the problem
C. Password1
would be to:
D. Pa33w0rd!
A. Run a virus scan
474. what is it called when a co-worker sitting B. Reformat the hard drive
next to you always seems to look your
way when you try to enter your user ID C. Destroy the computer
and password to log onto the network? D. Do nothing
A. phishing
479. VPN is abbreviated as
B. social engineering
A. Visual Private Network
C. shoulder surfing
B. Virtual Protocol Network
D. coincidence
C. Virtual Private Network
E. dumpster diving
D. Virtual Protocol Networking
475. What is an unsolicited electronic message
targeting users of instant messaging (IM) 480. How can you tell if a website encrypts its
services? traffic?
A. Spoofing A. Google it
B. Spam B. Look for the lock symbol in a URL
C. Spim
C. All websites encrypt their traffic
D. none of above
D. Encrypted sites take longer to load
476. Which type of hacker want to steal data
and then exploit what they find for their 481. A Zero Trust network security model is
own interests? based on which security principle?

A. White hat A. non-repudiation


B. Grey hat B. Due diligence
C. Black hat C. Least privilege
D. none of above D. negative control

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 590

482. The act of extracting personal informa- 487. Which of the following is unlikely to dam-
tion, such as passwords and credit card age or delete data?
details, from computer users and then use
A. Virus
the information for malicious purposes.
B. Archiving
A. phishing
B. intellectual property C. System crash

C. computer security D. Malware

NARAYAN CHANGDER
D. online predator 488. What’s the best way of protecting your
483. Intentional and repeated harm inflicted computer against viruses
through the use of computers, cell phones, A. Using a firewall
and other electronic devices.
B. Make sure it doesn’t overheat
A. Cyberbullicide
C. Installing anti virus software
B. Cyberbullying
D. Not letting anyone else use it
C. Flaming
D. None of the answers are correct. 489. What process is described below? Two
keys are used. One is yours and the other
484. Working at your desk, you’ve received is the receiver’s. You send a message is
an email from Microsoft explaining that your key. Then, that person sends it back
your password it out of date, and you in their key along with yours. You undo
must set a new one. The link within the your key so that only their’s is left and re-
email will guide you through it. Your next send the message.
step is?
A. Public key cryptology
A. Follow the link and reset password.
B. Baconian Cipher
B. Ignore the email and delete it.
C. Reset your password manually. C. AUP

D. none of above D. Pigpen Cipher

485. Which of these groups exploits cyber vul- 490. Which is not a type of anti-malware?
nerabilities? A. Anti-Virus
A. Criminals
B. Anti-Spyware
B. Governments
C. Malware Scanner
C. Hackivists
D. Defragmenter
D. All of the above
491. Which creative commons license is the
486. What is “crash” as it relates to comput-
least restrictive?
ers?
A. To destroy the monitor A. CC BY (Attribution)
B. Smashing the hard drive into the mon- B. CC BY-SA (Attribution-ShareAlike)
itor C. CC BY-NC-ND (Attribution-NonCommercial-
C. The system stops functioning properly NoDerivs)
D. To bang the mouse on the keyboard D. CC BY-NC (Attribution-NonCommercial)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 591

492. This is the psychological manipulation of or file in a victim computer; spread by hu-
people into performing actions or divulging man action, such as sharing infected files
confidential information.

PRACTICE BOOK» NOT FOR SALE


A. viruses
A. social engineering B. worms
B. man-in-the-middle attack
C. phishing
C. social disclosure
D. trojan horse
D. eavesdropping attack
497. What does social engineering mean in a
493. White hat hackers security context?
A. are criminals who break into computer A. Building secure systems that are easy
networks with malicious intent. to use for society
B. are vigilantes who find system vulnera- B. It is a form of social deception fo-
bilities and inform the organisation, or the cussed on information gathering, fraud,
public, rather than exploit the vulnerabil- or system access.
ity.
C. It is a Honeypot
C. are employed by an organisation to
D. All of the above
test the security of their computer net-
work. Also known as penetration testers. 498. Who is responsible for Cyber Security?
D. like to wear hats that are white. A. Technology Information Security Of-
494. Bart is new to social networking and fice
wants to stay safe. He asks his cousin B. Developers
what information he should post and what C. Government
he should not. His cousin, who has taken a
cybersecurity class, recommends that Bart D. Everyone
never post:
499. What does malicious code include
A. his address or phone number.
A. viruses, Trojans; spyware and adware
B. a list of his top ten favorite movies.
B. phishing, pharming, harming and
C. pictures of himself with friends. viruses
D. information about his last vacation. C. worms; passwords; biometrics and
phishing
495. An online shopping website want to track
user purchase. The website commonly D. viruses; passwords; worms and phish-
user data file to store purchasing history. ing
These files are commonly know as:
500. Using software and/or hardware re-
A. Cookie sources that are operated by a third party
B. Widgets remotely.
C. script A. Cloud computing
D. logs B. Domain

496. Malicious programs or code that damage C. Service provider agreement


or destroy data by attaching to a program D. Cyber security plan

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 592

501. What is netiquette? 506. White hat hackers help businesses and
A. A term used to describe network at- corporations with which of the following?
tacks. (choose all that apply)
A. Software Compliance
B. A malware that pretends to have eth-
ical standards but attacks you when you B. Network Security
least suspect it. C. Transferring money
C. The term for commonly accepted rules D. Computer Security

NARAYAN CHANGDER
of how to behave online. E. Flaws and Loopholes
D. none of above
507. This is the practice of deliberately trying
502. What does a gray-hat hacker do? to find security holes in your own systems
A. Does harm, usually outside of the law. A. Penetration testing
B. Ethical and law-abiding and actions B. Access testing
and does hacking for the good. C. Rights testing
C. Do not harm, do not ask permission ei- D. none of above
ther.
508. Which one of the following is NOT a de-
D. Engages in hacking but does it for the fense strategy against security threats?
fun only.
A. Assess Trustworthiness
503. Open source software can be used to set B. Firewall
up a web server. Which of these are not C. Private Browsing
an issue?
D. Spam
A. No free support from the vendor
509. Which is Not a type of Cybercrime?
B. It can be difficult to set up correctly
A. Phishing
C. It is not secure out of the box
B. DDOS
D. It does not cost anything
C. Computer virus
504. is a popular tool used for discovering D. IOS
networks as well as in security auditing.
510. What is our main problem?
A. Ettercap
A. No one can defeat cyber criminals
B. Metasploit
B. Hackers will keep your information
C. Nmap
C. Hackers can’t be defeated
D. Burp Suit
D. Hackers keep on hacking
505. If you upload an image to a social me- 511. You can be confident your passwords are
dia website, and link it to a friends profile, completely secure if:
this is called
A. they are at least 8 characters long
A. Tagging
B. you change them regularly
B. Vishing
C. you use different passwords for all
C. Trolling your online accounts
D. Linking D. All of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 593

512. What is the main source of data collection 517. A “data harvesting tool” is:
for advertising companies? A. illegal software used to steal pass-

PRACTICE BOOK» NOT FOR SALE


A. Search engine searches words
B. Social network privacy settings B. software used to gather information
about individuals
C. Contact lists
C. a type of input device
D. Shopping websites
D. a type of virus
513. An update to fix software which has an
518. cyber patriot is that hard?
identified security risk is known as a soft-
ware A. its going to hurt your brain
A. patch B. not at all
B. glitch C. yes
C. heart D. maybe

D. fault 519. Which of these are an example of spam?


A. When a friend emails you about a
514. How can you spot a fake Email? Pick 2
party.
from below
B. When you get annoying messages
A. They use your name
from an online store asking you to join
B. Spelling mistakes, bad grammar their website.
C. Email isn’t signed C. When someone you don’t like emails
you.
D. There’s a request for personal details
D. Your grandma emails you asking for
515. Which vocabulary word fits this defini- your phone number.
tion? An encryption technique that uses
paired public and private key algorithms 520. Backups/backing up files
for secure data communication A. Referring to the copying of data on a
A. Baconian cipher computer
B. The updating of files
B. Public key cryptology
C. A computer hacker whose activity is
C. Morse code
aimed to a social cause
D. Pigpen cipher
D. None of the above
516. Helps you protect your valuable web ap- 521. You receive a desperate plea for help
plications anddata by continuously moni- from a friend who says they are stuck
toring traffic and enforcingpolicies to iden- overseas and all their money has been
tify and block threats. stolen. You should:
A. Web Application Firewall A. reply to the email
B. email gateway B. delete the email
C. endpoint security C. send some money
D. SEG D. forward the email to a mutual friend

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 594

522. Finger print and iris scanners are exam- 527. When might an activity be considered cy-
ples of berbullying?
A. medical security A. If the activity could potentially hurt
someone’s feelings
B. biometric security
B. If it makes a person feel embarrassed
C. biology security or unsafe
D. body security C. If adults would generally disapprove

NARAYAN CHANGDER
of the activity
523. What type of file recognizes your com-
puter when you visit a website? D. All of the answers are correct

A. Cookies 528. Fake e-mail message appearing to be


B. FTP from a trusted business, social network or
other contact Asks for personal informa-
C. HTTP tion or requests a user to click on a link or
D. none of above download a file to verify personal informa-
tion Hackers can secretly collect personal
524. What is a USB port? information and passwords
A. A serial port that connect parts of a A. spyware
computer in a system. B. worms
B. Something you use to charge your com- C. pharming
puter.
D. phishing
C. Software that is used to connect
games. 529. Working at your desk, you’ve received
an email from Paypal or Apple explaining
D. Something that shuts down your com- that your password it out of date, and you
puter when a virus is on it. must set a new one. The link within the
email will guide you through it. Your next
525. What should you do if you think you have step is?
been hacked?
A. Follow the link and reset your pass-
A. Report the problem to the company. word.
B. Change your password. B. Ignore the email and delete it.
C. Tell your parents or a trusted adult. C. Reset your password manually.
D. All of the above. D. none of above

526. What type of attack tries to guess pass- 530. Which kind of personal information do
words by every combination of charac- people send over the Internet?
ters? A. Credit Card Numbers
A. dictionary attack B. Contact Information
B. brute-force attack C. Medical Information
C. man-in-the-middle attack D. All of these
D. smurf attack E. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 595

531. framework made cracking of vulner- 536. What shows that a website has a secu-
abilities easy like point and click. rity certificate? Choose 2.

PRACTICE BOOK» NOT FOR SALE


A. Net A. HTTP
B. Metasploit B. FTP
C. ZEUS C. HTTPS
D. Ettercap D. Padlock

532. When you enter personal details on social 537. function start() { move(); for (var i = 0; i
networking sites you should never: < 5; i++) { move(); putBall(); }}
A. enter personal details of your friends A. 1

B. upload photographs of yourself that B. 5


you would not want everyone to see C. 6
C. enter your address D. There is an error in the code so it will
D. enter any of the above not move at all.

538. What kinds of information or images are


533. Which apply to phishing?
inappropriate to post online? (Select all
A. The art of catching aquatic animals the correct answers.)
with a rod
A. Your class picture without your name
B. Using a malicious medium, disguised on it
as a trustworthy source, to get users to
B. Pictures of your pets
reveal personal information
C. Pictures of anything showing illegal be-
C. Physically threatening someone until
havior
they give up personal data
D. Pictures of drugs or drug use
D. Personally hacking someone to get
personal information E. Videos of other teens fighting
E. Usually an attack made via email 539. Which type of hacker wants to keep com-
puter systems as safe as possible?
534. What is DDoS?
A. White hat
A. Digital Domain of Service
B. Grey hat
B. Digital Denial of Service
C. Black hat
C. Distributed Denial of Service
D. none of above
D. Distributed Domain of Service
540. Which type of hacker doesn’t have per-
535. Data travels across networks in. mission to hack?
A. Parcels A. Blue Hat
B. Envelopes B. White Hat
C. Boxes C. Grey Hat
D. Packets D. Black hat

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 596

541. Which one of the following is NOT a se- B. yomvdyq


curity threat? C. yotvyyth
A. Worms D. yrmvhyh
B. Hacking
547. This is the process of deciding what re-
C. Anti-Virus sources and data a user can access along
D. Pharming with the operations that a user is allowed
to perform.

NARAYAN CHANGDER
542. are messages that try to trick you
A. Accounting
into providing sensitive information.
B. Authorization
A. Phishing scams
C. Authentication
B. HTTPS
D. Availability
C. Cookie scams
D. Plug-ins 548. Which apply to a DDOS attack?
A. an attempt to make an online service
543. What does the term BYOD represent in unavailable by overwhelming it with traf-
technology? fic from multiple sources
A. Bring Your Own Disaster B. a way to hack into a network so you
B. Bring Your Own Drinks can run SQL code
C. Bring Your Own Device C. A method used by hackers to track
D. Bring it on Man what users enter on their keyboard to
steal personal information and passwords
544. The term “TCP/IP” stands for D. Will often create a botnet to increase
A. Transmission Contribution protocol/ the amount of traffic being created
internet protocol E. Will allow you to steal someone’s web-
B. Transmission Control Protocol/ inter- site and use it for yourself
net protocol
549. What was(is) the ‘wanna cry’ virus
C. Transaction Control protocol/ internet
A. WannaCry is a ransomware cryp-
protocol
toworm,
D. Transmission Control Protocol/ inter-
B. wanna cry is a kelivin type virus
net protocol
C. wanna cry is a ransome domestic cryp-
545. Which of the following is not the role in toworm
cyber security?
D. none of above
A. Security Management
550. What is AntiVirus software?
B. Standing Committee
A. Software that blocks all unwanted ads.
C. Executive Committee
B. Software that keeps you from getting
D. Cybersecurity Practitioners sick.
546. Encrypt “goodday” with “say” using Vi- C. Software that protects your device
genere cipher from viruses and malware.
A. yomtyyq D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 597

551. how long can it take for your computer 556. Site-to-site VPNs are also known as
to get hacked?
A. Switch-to-switch VPNs

PRACTICE BOOK» NOT FOR SALE


A. 2 days
B. Peer-to-Peer VPNs
B. 6 years
C. matter of seconds C. Point-to-point VPNs

D. 1 week D. Router-to-router VPNs

552. Someone posing as an IT tech requests 557. Which of the following is about under-
information about your computer configu- standing the privilege of using electronic
ration. What kind of attack is this? information as well as the right to having
A. Insider Threat equal, secure, and reliable way to connect
B. Phishing to the Internet?
C. Social Engineering A. Cyber Access
D. Whaling B. Digital Divide
553. What is a type of attach where people C. Global Information
receive an email pretending to be from a
D. Infrastructure
bank asking them to reset a password?
A. Phishing 558. Which will deploy when conditions exist
B. Trojan that the malware is seeking?
C. Brute Force A. Armored virus
D. none of above B. Time bomb
554. You can protect your files from unautho- C. Trojan horse
rised access by?
D. Logic bomb
A. Only allowing your friends and family
to know your passwords
559. What port number is DNS (Domain Name
B. Never using computers in a public System)?
place such as a library
A. udp/tcp 53
C. Choosing a strong password and
changing it regularly B. tcp 21
D. none of above C. udp 21
555. Provides you a capability to grant or D. udp/tcp 427
reject networkaccess to traffic flows be-
tween an untrusted zone (e.g., the Inter- 560. A set of computers connected together
net) and a trusted zone (e.g., a private for the purpose of sharing resources
orcorporate network).
A. Network
A. VPN
B. Antivirus
B. End point security
C. firewall/UTM C. Update
D. All of the above D. Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 598

561. What port number is Telnet (Telecommu- C. Mobile Device


nications Network)? D. Printer
A. tcp 21
567. Alice is buying books from an online re-
B. tcp 22 tail site, and she finds that she is able to
C. tcp 23 change the price of a book from $19.99
to $1.99.Which part of the CIA triad has
D. tcp 445
been broken?

NARAYAN CHANGDER
562. What is Cybersecurity? A. Confidentiality
A. a game that has a cool character- B. Integrity
B. a program to edit pictures C. Availability
C. a movie with a bad story D. none of above
D. the state of being protected against
568. The shift cipher is sometimes referred to
the criminal or unauthorized use of elec-
as the
tronic data, or the measures taken to
achieve this A. Caesar cipher
B. Shift cipher
563. What are types of personal information
C. cipher
A. Favorite ice cream
D. cipher text
B. Password
C. Email 569. What is a type of attack that locks you
out of your computer until a sum of money
D. None of the above has been paid?
E. School A. Ransomware
564. What is NOT an example of computer B. Hostageware
software? C. Spyware
A. Gmail D. Malware
B. Internet Explorer
570. Malicious code that secretly watches
C. Mouse your computer activity and sends the in-
D. Google Chrome formation over the Internet; can secretly
capture your keystrokes (including pass-
565. Which one of the following is also re- words) and compromise your identity
ferred to as malicious software?
A. spyware
A. Maliciousware
B. virus
B. Badware
C. worms
C. Ilegalware
D. phishing
D. Malware
571. Which type of malware disguises itself as
566. Give at least 3 types of attack vectors something good, like a game?
A. Social Network A. Virus
B. USB B. Worm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 599

C. Trojan 577. The full form of OSI is OSI model is


D. Spyware A. Open Systems Interconnection

PRACTICE BOOK» NOT FOR SALE


572. A device or server that is primarily used B. Open Software Interconnection
to protect one network from another. C. Open Systems Internet
A. IP proxy
D. Open Software Internet
B. perimeter network
C. Firewalls 578. is a type of software designed to
help the user’s computer detect viruses
D. Internet Engineering Task Force (IETF)
and avoid them.
573. A person who attempts to gain unautho- A. Malware
rised access to a system using methods re-
ferred to as ‘hacking’. B. Adware
A. Hacker C. Antivirus
B. Risk assessment D. Both B and C
C. Firewall
579. When using a computer in an internet
D. Anti-malware software cafe, you should
574. Which types of VPNs are used for corpo- A. Delete your internet browsing history
rate connectivity across companies resid- before you log off
ing in different geographical location?
B. Change your social media passwords
A. Remote access VPNs
C. Avoid logging onto your emails
B. Site-to-site VPNs
D. Use google chrome to browse the in-
C. Peer-to-Peer VPNs ternet
D. Country-to-country VPNs
580. Testing a system by providing invalid, un-
575. For $2, 000:If you suspect you have be- expected and random data.
come a victim of a cybercriminal you should
A. Security functionality
A. Stop all online activity which requires a
username, password, or privacy informa- B. Fuzzing
tion C. Penetration testing
B. Run updated anti-spyware and anti-
D. Honey pot
virus programs
C. Tell a trusted adult 581. A group of computers that is networked
D. All of the above together and used by hackers to steal in-
formation is called a
576. This is the generic name for the outcome
A. Botnet
of a hash function or algorithm.
A. Checksum B. Rootkit

B. Secure Hash Algorithm-SHA C. DDoS


C. Message-Digest Algorithm-MD D. Operating System
D. Encryption Key E. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 600

582. Health information is collected on the C. wireless transmission


form. What Law covers this kind of sen- D. none of above
sitive information?
A. GDPR 587. Which of the following statements best
describes Cyber Collaboration?
B. FOI
A. an act of working together and sharing
C. CMA ideas and info using online technology
D. ICO B. an online communication between one

NARAYAN CHANGDER
person to another via digital technology
583. means the protection of data from
such as email, forum or blog
modification by unknown users.
C. Knowing when and when not to use the
A. Confidentiality
internet
B. Integrity
D. None of the above
C. Authentication
588. Modern networks primarily use three
D. Non-repudiation
types of media to interconnect devices and
584. A property of access control systems that to provide the pathway over which data
allows a user to log in once and gain access can be transmitted. Which of these en-
to all interrelated systems without being codes data using electrical pulses?
prompted to log in again is known as? A. metallic wires within cable
A. Single sign-on B. glass or plastic fibers
B. Malware C. wireless transmission
C. Encrypting D. none of above
D. none of above 589. What is an IP Address?
585. A person’s digital footprint consists of A. a unique string of numbers separated
the following:I. Emails you sendII. Pictures by periods that identifies each computer
you postIII. Topics you searchIV. Apps you using the Internet Protocol to communi-
useV. Other people’s comments cate over a network.
A. I and II B. A web of connected computers or de-
vices
B. II-IV
C. a person or thing that provides a ser-
C. I-IV
vice or commodity.
D. All of the above
D. a method employing encryption to pro-
586. Modern networks primarily use three vide secure access to a remote computer
types of media to interconnect devices and over the Internet.
to provide the pathway over which data 590. A small file on a computer that is created
can be transmitted. Which of these en- when a user visits a Web site. A Web site
codes data using wavelengths from the uses cookies to identify users who visit
electromagnetic spectrum? the site, and also track the preferences of
A. metallic wires within cable the users.
B. glass or plastic fibers A. cache memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 601

B. active content C. To corrupt the user’s data stored in the


C. firewall computer system

PRACTICE BOOK» NOT FOR SALE


D. cookie D. All of the above

591. You were browsing the web on a ques- 595. What is the youngest age you can be
tionable website, and now you get a pop- charged of a Computer Misuse act of-
up window stating that if you do not pay fence?
$100 within one hour, all files on your A. 12
computer will be destroyed.what is this an
B. 14
example of?
C. 16
A. heistware
D. 18
B. theftware
C. extortionware 596. It help prevent attackers from monitoring
or recording traffic between resources and
D. Ransomware
computers, by making data more difficult
592. A phishing email is one which: to read.
A. requests a payment for goods you A. Data Encryption
have not received B. Firewall
B. offers you products in which you may C. Antivirus
have no interest
D. none of above
C. encourages you to click on a link to a
fraudulent website 597. A method of evaluating the security of an
D. contains abusive and threatening lan- information system or network by simulat-
guage ing an attack from a malicious source.
A. Penetration Testing
593. What is an Identity Theft?
B. Black Box Testing
A. One who tracks digital footprints by
browsing his/her actions on the internet C. Access Testing
B. Stealing someone’s identity to use D. Security Skills Testing
stuff in their name such as credit cards
598. Which method of computer security soft-
C. Person who looks for flaw or poten- ware searches all files to see if they look
tials to harm as to go about hacking some- suspicious?
one
A. Anti-virus
D. Identity that is obtained by malware
B. Firewall
hidden in other files that looks innocent
and harmless C. Network policy

594. Hackers usually used the computer virus D. Malware


for purpose. 599. Which of these is an example of phish-
A. To log, monitor each and every user’s ing?
stroke A. Congratulations you just won a free
B. To gain access the sensitive informa- car! Please enter your credit card number
tion like user’s Id and Passwords and email below to qualify.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 602

B. You have just won a free trip to Disney- 605. What does Gramm-Leach-Bliley Act
world! Here are the details below: (GLBA) do?
C. Click this link and you will win a million A. cover responsibilities of a public corpo-
dollars. ration’s board of directors, adds criminal
D. Click this link to prevent viruses. penalties for certain misconduct
B. provides data privacy and security pro-
600. When did T-Mobile begin sending SMS visions for safeguarding medical informa-
messages to postpaid customers impacted tion

NARAYAN CHANGDER
by the August 2021 Cyber Security
C. control the ways that financial institu-
Event?
tions deal with the private information of
A. August 13, 2021 individuals
B. August 14, 2021 D. an information security standard for
C. August 18, 2021 organizations that handle branded credit
cards from the major card schemes
D. August 17, 2021
606. In relation to computers, what is a
601. The state of being protected against crim- virus?
inal or unauthorized use of electronic data.
A. A program that secretly watches your
A. Cybersecurity computer activity and sends the informa-
B. Cyber-slacking tion over the Internet
C. Cryptography B. A self-replicating program that dam-
ages the hard drive and affects the com-
D. Technographics
puter’s operation
602. Wireshark is a tool. C. A URL that may lead the user to down-
A. network protocol analysis load a video file
B. network connection security D. A program that is useful to download
from the Internet
C. connection analysis
D. defending malicious packet-filtering 607. A method of computer access control
which a user can pass by successfully
603. Cipher based on substitution, using multi- presenting authentication factors from at
ple substitution alphabets is called: least two of the three categories of knowl-
A. Polyalphabetic cipher edge, possession, and inherence and a part
of password management
B. Monoalphabetic cipher
A. multi-factor authentication
C. Polycipher
B. password complexity
D. Monocipher
C. permissions
604. What’s pharming? D. none of above
A. scam through bogus websites
608. The is a number or a set of numbers
B. scams through emails on which the cipher operates.
C. scams through phone calls A. secret
D. scams through text messages B. cipher

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 603

C. key 613. Which type of firewall allows for inspec-


D. none of the mentioned tion of all characteristics of a packet?

PRACTICE BOOK» NOT FOR SALE


A. Stateful Firewall
609. Malware is a combination of two words.
Choose the two words below. (choose 2) B. Stateless Firewall

A. Malicious C. WPA2 PSK

B. Software D. Dictionary attack

C. Malfunction 614. What is a biometric measure?


D. Hardware A. Using something unique to you as a
E. Maleficent person like a thumb/finger print or iris
scanner
610. How can you get rid of a virus? B. Checking someone weight and height
A. Take it to a computer specialist so that they can get cheaper life insurance
B. Throw it out C. using a persons password setting to
access computer records
C. Scan for the virus in the computer’s
settings D. Finding out which systems as old fash-
ioned and can be easily hacked
D. Smash the hard drive
615. What is a zombie bot?
611. Rose just installed a new search engine
on her laptop.now whenever she searches A. Compromised computers under the
the internet, she gets several pop-up win- control of a hacker.
dows directing her to buy products.what B. A bot that pretends it is dead but once
does rose have? it reaches your computer it takes over.
A. ransomware C. This does not exist.
B. spyware D. none of above
C. Adware
616. Which of the following is considered as
D. trojan horse the unsolicited commercial email?
612. You receive an email from a vendor that A. Virus
you have been in contact with previously B. Malware
who replied to a conversation that you had
closed the loop on weeks ago. The email C. Spam
had an attachment that you opened but D. All of the above
the contents of the document did not make
sense. You should: 617. Malware is
A. Reply to the vendor asking for more A. A type of spyware program that moni-
clarification tors keystrokes with the intent of stealing
passwords, login IDs or credit card infor-
B. Ignore the email, it was just a mistake mation.
C. Send the email to your co-worker to B. Software that’s intended to render a
see if they can make sense of it system temporarily or permanently use-
D. Report the email via PhishMe less.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 604

C. The process of hacking a smartphone, A. Public key cryptology


tablet, etc., to run unauthorized software
B. Intellectual property
and to make other tweaks to the operating
system. C. Cookies
D. none of above D. AUP

618. People that try to make people angry 623. Your computer has just been infected
or emotional on the internet by harass- with Ransomware and the hacker is de-

NARAYAN CHANGDER
ing them and constantly contacting them manding £1, 000 before releasing it.
or commenting about them on social media What do you do?
A. trolls A. Try your best to get rid of it before any-
B. hacker one finds out.
C. pharmer B. Pay the ransom. You need your files
D. admin back!
C. Disconnect your computer from the
619. You have found a copyrighted image on network.
the Internet you wish to use in your Com-
puter Science project. What is the most D. none of above
ethical way to use it?
624. Sifting through garbage cans for credit
A. Do not use it card information, social security numbers
B. Get permission or other personal information.
C. Give credit A. Virus
D. Just use it B. Trojan Horse
620. If you have more than one device, what C. Botnet
should you do?
D. Smishing
A. Use the same password
E. Dumpster Diving
B. Don’t use a password
C. Use your friends password 625. Asymmetric encryption uses only 1 key.

D. Use a different password A. True


B. False
621. What are the different ways to classify
an IDS? C. Maybe
A. Zone based D. God Knows
B. Host & Network based
626. Which file type is most likely to contain
C. Network & Zone based a virus
D. Level based A. .jpeg
622. Which vocabulary word fits this defini- B. .doc
tion? A document that states the rules
C. .png
that a user must agree to before access-
ing a network or the Internet D. .exe

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 605

627. Vrais au faux(true or false) Nhs was af- 632. What does a messaging system on a so-
fected by the wanna cry virus cial networking site do?

PRACTICE BOOK» NOT FOR SALE


A. Vrai(true) A. Let’s you talk to someone when they
are online
B. Faux(false)
B. What is that?
C. maybe
C. Let’s you send a message to someone
D. none of above
even when they are offline?
628. Which of the following are activities that D. none of above
a hacker might attempt?
633. A program or hardware device that fil-
A. Stealing usernames and passwords ters the data coming through the internet
B. Modifying website content connection
C. Disrupting network communications A. Anti-virus software
D. All of the above B. Anti-spyware
C. Firewall
629. A non-self-replicating type of malware
program containing malicious code that, D. Biometrics
when executed typically causes loss or
634. Network administrators can create their
theft of data, and possible system harm
own ACL rules based on and
is a
A. Address, Protocols and Packet at-
A. Trojan
tributes
B. Virus B. Address, Protocols and security poli-
C. Malware cies
D. none of above C. Address, policies and Packet at-
tributes
630. is a main, reliable method of keep-
D. Network topology, Protocols and data
ing your data secure-this scrambles data
packets
so anyone intercepting it cannot interpret
it 635. Unsolicited junk email sent sometimes in
A. Verification bulk, often for commercial purposes
B. Authentication A. Spam

C. Phishing B. Spies

D. Encryption C. Spyware
D. Spider
631. Which of the following is not a sign of a
phishing email? 636. Any software used to disrupt computer
operation, gather sensitive information, or
A. Spelling mistakes
gain access to private computer systems is
B. Persuasive & threatening language known as?
C. Prize offers A. Malware
D. Email program crashes when loaded B. Operating System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 606

C. Device Driver 641. Which of the following pieces of informa-


tion would be safe to include in an online
D. Software
username?
637. you receive an email from your bank, A. School mascot
telling you that your account has been com-
B. Favorite sport
promised and you need to validate your ac-
count details or else your account will be C. Year of birth
closed. you are supposed to click a link to D. City of residence

NARAYAN CHANGDER
validate your information. what is this an
example of? 642. The law regarding holding personal data
states that if a company holds personal
A. a security breach at your bank that
data it must:
needs to be resolved
A. keep the data secure
B. spam
B. keep the data accurate and up to date
C. ransomware
C. allow people to see what data is held
D. Phishing
about them
638. The process of recovering passwords D. all of the above
from data that have been stored in or
transmitted by a computer system, most 643. A technician is configure a SOHO router.
often through brute-force or dictionary at- Which of t following would be the purpose
tacks. for updating the router’s firmware?

A. password encryption A. Enabling new functionality

B. password complexity B. Creating the SSID

C. password cracking C. Establishing a connection to the ISP


D. Applying wireless encryption
D. none of above
644. Why would an identity thief most likely
639. Sarah puts a lock on her diary so only she
want to steal your information?
can read it. Her little brother breaks the
lock and reads her diary.Which part of the A. To be your friend on social media
CIA triad was broken? B. To help with financial problems
A. Confidentiality C. To help you with your homework
B. Integrity D. To access your bank accounts, credit
C. Availability cards, and other financial resources.

D. All of the above 645. Acts as a guard between your device and
any other device trying to access it on the
640. What one is a type of verification? web.
A. Phishing A. Phishing
B. Trojan Horse B. Digital Footprint
C. CAPTCHA C. Spyware
D. VERY D. Firewall

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 607

646. Which of the following Computer Science B. must delete the data when you leave
Fields are covered by Cyber Security? C. must register with the Data Protection

PRACTICE BOOK» NOT FOR SALE


A. Machine Learning Registrar
B. Computer Networking D. must register with the Local Authority
C. Cryptography 651. Which of the following is a malware?
D. Data Science A. Virus
E. Web Development B. Horse
647. Which of the following do you think is C. Mouse
the best reason for having updated Cyber D. None of the above
Crime laws?
A. Evolution of new generation computer 652. What are the two types of penetration
testing?
B. Emergence of new cyber activities
A. Red
C. Growing number of Internet users
B. Black
D. Increased quality of digital media
C. a lighter shade of black
648. Which of the following is true? D. White
A. It is easy to spot when your computer
has a virus 653. In ethical hacking and cyber security,
there are types of scanning:
B. Viruses cannot be spread via email
A. 1
C. Viruses can completely destroy all the
data on your computer B. 2

D. Anti-virus software will always pre- C. 3


vent a virus from attacking your computer D. 4

649. Which of the following devices is not a 654. What’s the name given to the malicious
part of the Internet of Things? software that threatens to publish the vic-
A. A watch that allows you to measure tim’s data or perpetually block access to it
and track your activity through a mobile unless a ransom is paid?
app A. Spam
B. A security system that lets you re- B. Ransomware
motely monitor your home C. Denial of Service (DoS)
C. A physical combination padlock for D. CyberBullying
your bike.
D. A refrigerator that shows you what you 655. Which technique uses emails or texts con-
need to buy. taining a link to a fake website to then
steal your security or login details?
650. An organisation such as a school holds A. Phishing
personal data about you. The organisa-
tion: B. Pharming

A. has to ask your permission to keep C. Baiting


your data on their computer D. Pretexting

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 608

656. What is a risk that users may face while 661. Viruses
playing games online? A. Can infect and spread but need human
A. They can be exposed to online preda- assistance Can in
tors. B. Compromise computers under the con-
B. They can increase their gaming trol of an attacker
scores. C. cannot be cured with antibiotics
C. They can play with family members. D. are safe!

NARAYAN CHANGDER
D. They can communicate with friends 662. Which username tells too much about the
from school. person?
657. Which type of malware needs to be A. JoeBrown2008
opened to become active? B. Goldfish23
A. Virus C. paperbag2222
B. Worm D. HappyZebra8
C. Trojan 663. Someone who wants to gain personal in-
D. Spyware formation from you via a fake email to ob-
tain your details for fraudulent and theft
658. Data must be unaltered during tran- activities.
sit (being sent between people) and not A. Scammer
changed by unauthorised entities. B. Phisher
A. Confidentiality C. Insider
B. Integrity D. Cyber Criminal
C. Availability
664. What a good way to have faster internet
D. none of above speed
A. WI-FI
659. The act of gaining unauthorized access to
a computer system B. Ethernet

A. pharming C. Router
D. USB Cable
B. smishing
C. hacking 665. Any information available on the Internet
is an intellectual property, which is legally
D. cracking owned by the person who created it. The
owner of an intellectual property has the
660. A program that appears to be harmless,
exclusive rights to control the use of this
but harmful in destroying data.
information.
A. Roman Horse A. hacker
B. War Machine B. firewall
C. Trojan Horse C. administrator
D. Grasshoppers D. intellectual property

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 609

666. Companies which generate income from D. Letting a colleague know your pass-
sharing their knowledge or information word.
from hackers of cyber vulnerabilities to

PRACTICE BOOK» NOT FOR SALE


671. uses unique biological or physical char-
others.
acteristics to give an authorization rights
A. Script Kiddie to an individual
B. Vulnerability Broker A. Password
C. Cyber Criminal B. Biometric
D. Cyber Terrorist C. encryption
667. Which of the following may result in a D. none of above
malware infection? 672. What is the name given to the malware
A. Opening an email attachment that disguises itself as something useful
B. Downloading a file from a website A. Trojan
C. Connecting an infected external stor- B. Keylogger
age device C. Virus
D. All of the above D. Spyware
668. Employers who ignore Health and Safety 673. Felipe is trying to find information on
rules regarding computer use may: wind power in Germany. Which of the fol-
A. at worst, have to pay a fine lowing would be the most effective search
query for this?
B. at worst, face a prison sentence
A. wind +power
C. have their company closed down
B. “wind” +Germany
D. have their computer equipment confis-
cated C. “wind power”-Spain
D. “wind power” +Germany
669. Managed vulnerability scanning and
pen testing serviceacross databases, net- 674. A technical needs to connect a computer
works and applications. to a network using an ethernet cable. To
A. Security Testing which of th following connector types does
the technician connect the cable?
B. Data Network Assessment
A. Serial
C. Network posture testing
B. Rj45
D. None of the above
C. USB
670. What is shouldering D. Rj11
A. Watching over someone shoulder at
675. Small chunks of information that have
what they are typing in when they are un-
been carefully formed from larger chunks
aware
of information.
B. Using software to copy what is being
A. Latency
typed into a computer to capture pass-
words B. Redundancy
C. Finding where all the confidential files C. Packet
are stored on a computer system D. Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 610

676. Controls which person has access to 680. What type of attack uses a fraudulent
which part of the network server with a relay address?
A. Penetration Testing A. NTLM
B. Network Forensics B. MITM
C. Strong Passwords C. NetBIOS

D. User Access Levels D. SMB

NARAYAN CHANGDER
681. The illegal copying of software
677. You’re just leaving school for the day,
when you stumble upon a USB stick on the A. Copyright
floor. What do you do? B. Intellectual Property
A. Pick it up and plug it in to try and find C. Software License
an indication of whom it belongs to, so you
D. Piracy
can return it.
B. Leave it where it is. It’s not your prob- 682. A computer set up as a decoy for attacks
lem. to detect and deflect cyber attacks.

C. Hand it into reception for them to deal A. Fuzzing


with. B. Sandboxing
D. Take it home and use it. C. Honey pot
D. Signature based
678. A type of malware which restricts access
to the computer system that it infects, and 683. A can hide a user’s browsing activity.
demands a fee be paid to the operators of
A. Firewall
the malware in order for the restriction to
be removed is known as? B. Antivirus
A. Ransomware C. Incognito mode

B. Virus D. VPN

C. Spim 684. For $125, 000:Preventive measures that


can be used include
D. Spam
A. Using anti-virus, anti-spyware soft-
679. The primary difference between ware and a firewall
“Patches” and “Vulnerabilities” (in soft- B. Thinking twice before opening attach-
ware & hardware) is: ments and clicking links even from people
A. Vulnerabilities are weaknesses and and companies I know
Patches are fixes C. Telling everyone who uses a computer
B. Patches are weaknesses and Vulnera- about ways to protect themselves and
bilities are fixes their computer
C. Patches and Vulnerabilities are both D. All of these
fixes
685. For $32, 000:Legitimate compa-
D. Patches and vulnerabilities are the nies rarely send you emails that
same require you to enter your account

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 611

name/username/password immediately 690. On your way home, you’ve noticed


or face really bad consequences. How do you’ve left your mobile on the train?
you check to be sure the email is really What’s the first thing you do?

PRACTICE BOOK» NOT FOR SALE


from a company you know? A. Call the train line to find out if anyone
A. Open your web browser and log-on to has handed it in.
the site the way you normally would. B. Call your phone to make arrangements
B. Click on the link in the email. to meet the person who found it.
C. Nothing C. Remotely disable it as soon as possi-
D. None of these ble.
D. Call the phone network to advise them.
686. Personal data is
A. Information that can be used to iden- 691. If you receive an email from a well-
tify a person known company, but its name is misspelt
in the sender’s address, you should:
B. Information gathered from anony-
mous surveys A. click on the link in the email to check if
it’s genuine
C. Information gathered from a weather
website B. reply, pointing out the error
D. Encrypted company data held on a C. report it as a possible phishing scam
company computer D. forward the email to a friend to check
687. What is the best thing for a person to do 692. Concealing the identity of the sender by
if they receive a threatening e-mail from a impersonating another computing system
cyberbully? is known as?
A. Save it as evidence A. Hacking
B. Delete it B. Spoofing
C. Ignore it C. Phishing
D. Respond to it D. none of above
688. A data recovery program can: 693. This helps in identifying the origin of in-
A. recover files that you have deleted formation and authentic user. This re-
from your hard drive ferred to here as
B. recover files even if you have reformat- A. Confidentiality
ted your hard drive B. Integrity
C. recover emails that you have sent C. Authenticity
D. all of the above D. Availability
689. Which term describes a set of rules for ap- 694. Circuit-level gateway firewalls are in-
propriate behavior while on the Internet? stalled in layer of OSI model.
A. Identity A. Application layer
B. Netiquette B. Session layer
C. Cybersecurity C. Presentation layer
D. Social Network D. Network layer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 612

695. What is the purpose of using a for loop 700. Tick all examples of Monoaplhabetic Ci-
in code? phers:
A. To do something if a condition is true A. Caesar Cipher
B. To do something while a condition is B. Vigenere Cipher
true C. Keypad Cipher
C. To repeat something a fixed number of D. Morse Code Cipher
times

NARAYAN CHANGDER
701. Phishing is?
D. To make programs run faster
A. Sending a virus via Email
696. What is a type of attach where a pro- B. Trying to extract personal information
gram tries different combinations of pass-
words until a match is found? C. A virus acting as something else
D. An infected Email
A. Phishing
B. Trojan 702. Standalone malware computer program
that replicates itself in order to spread to
C. Brute Force other computers. Often, it uses a com-
D. none of above puter network to spread itself, relying on
security failures on the target computer to
697. What is a common way in which compa- access it.
nies gain access to your data?
A. Malicious Code
A. You agree to the terms and conditions
B. Computer Worm
without reading them
C. Anti Virus Software
B. Hacking into your accounts illegally
D. Computer Virus
C. They review your computer cookies
703. An Internet security protocol that en-
D. Monitor your web searches on Google
sures secure data communication by en-
Chrome
crypting the information transmitted. The
698. stays on your computer until an expi- SSL protocol certifies that a Web site is
ration date is met. genuine and ensures that the data pro-
vided to the site is not misused.
A. Session cookie
A. decrypt
B. Secure cookie
B. encryption
C. Persistent cookie
C. Secure Sockets Layer (SSL)
D. Third-party cookie
D. hacker
699. The feeling of protection arises once 704. An accumulation of all the digital tracks
someone has enough . you leave behind.
A. Harm A. Phishing
B. Danger B. Digital Footprint
C. Assurance C. Spyware
D. Confidence D. Firewall

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 613

705. What is included in McAfee’s ID Theft Pro- 711. Which of these will not put you at risk of
tection Service? (Select all that applies) malware attacks?

PRACTICE BOOK» NOT FOR SALE


A. Credit Monitoring A. Opening email attachments from un-
B. Full-Service ID Resolution known sources.
C. $1 Million Identity Insurance B. Downloading pirate movies from tor-
rent services
D. Dark Web Monitoring
E. Lost Wallet Recovery C. Not installing updates for your operat-
ing system
706. How be more safe off a Ddos attack?
D. Using a free operating system like
A. Put passwords Linux, as opposed to using Windows
B. Identify the DDoS attack early
712. Which of the following port and IP ad-
C. Use public wifi so they dont track you dress scanner famous among the users?
D. Call your ISP or hosting provider A. Cain and Abel
707. Gaining unauthorised access to someone B. Angry IP Scanner
else’s computer files is known as:
C. Snort
A. copyright infringement
D. Ettercap
B. hacking
C. virus attack 713. Potential circumstance, entity or event
capable of exploiting a vulnerability and
D. data theft
causing harm
708. Which two of the following would not be A. Threat
wise to share online?
B. File
A. Date of Birth
C. Option
B. School you attend
D. Loop
C. Favourite sports team
D. The colour of your eyes 714. In Wi-Fi Security, which of the following
E. Photo of you on holiday protocol is more used?
A. WPA
709. Which one is an example of ‘physical se-
curity’? B. WPA2
A. firewall C. WPS
B. spam filter D. Both A and C
C. locked door
715. Which malware looks like something you
D. Anti-virus software want, but does something you don’t want
710. What do we use a SPAM filter for? it to do?
A. To arrange emails in order by name A. Time-bomb
B. To prevent common scams B. Zombie
C. To attach a file to an email C. Virus
D. To scan an email for viruses D. Trojan Horse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 614

716. What is a Steganography C. Security engineer


A. A Dinosaur D. Network specialist
B. A Software that draws Graphs 721. Essential when sending data over a net-
C. A way of concealing text work
D. A type of malware A. Anti Malware
B. Network Forensics
717. A network is made up of 3 categories of

NARAYAN CHANGDER
network components:devices, media and C. Encryption
services. Which of these is considered D. User Access Levels
to contain the physical parts of the net-
work? 722. With whom can you share your password
A. Devices with?

B. Media A. Your friends


B. Your boss
C. Devices and Media
C. No one
D. Services
D. Neighbors
E. Devices and Services
723. What is encryption?
718. Your TL is handsome!!!
A. When you put data / text into code
A. YES!
making it difficult to read or understand.
B. YES AND YES!
B. A secret or disguised way of writing; a
C. YES! YES! YES! code.
D. All of the above. C. A formal language designed to commu-
nicate instructions to a machine
719. Igor has found a copyrighted video on the
Internet that he wants to use as part of D. What is put in, taken in, or operated on
his school project. Under the Fair Use law, by any process or system.
which of the following could he do with the
724. What is the best way to ensure effective-
video?
ness of antivirus software?
A. Pay a fee to the site from which he is
A. Run the antivirus software at least ev-
downloading the video.
ery hour
B. Use only 10% or 3 minutes of the video,
B. Test the software by infecting your ma-
whichever is less.
chine with a virus
C. Use only 10% or 30 seconds of the C. Install the latest version and update
video, whichever is less. security patches
D. Whatever he wants, because copyright D. Use the outdated antivirus software
laws do not apply to education.
725. What is a trojan horse?
720. Which of the following are cybersecurity
careers? A. Form of malware that allows the
hacker to use an embedded backdoor to
A. Security auditor gain administrative control of the victim’s
B. Security specialist computer.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 615

B. Malware hidden inside other software 730. Small files that Websites put on your
that appears to be harmful. computer hard disk drive when you first
visit

PRACTICE BOOK» NOT FOR SALE


C. Malware hidden inside other software
that appears to be harmless. A. Hardware
D. Malicious code that is acted upon a B. Cookies
computer to cause harm. C. Chips
726. Organisations holding personal data are D. Instant Files
allowed to:
731. Which of the following accurately de-
A. sell the data to other organisations scribes the trust model of certificate au-
B. keep the data for ever thorities?
C. sell the data for research purposes af- A. An Internet user must trust that the
ter removing bits of data from which indi- public key they use is accurate
viduals can be identified B. A list of trusted certificate authorities
D. none of the above is created by a browser over time.
C. A certificate authority trusts a public
727. Helps to prevent unauthorised access to
key if it has been approved by a different
the network
party.
A. Penetration Testing
D. A certificate authority is trusted by the
B. Network Forensics owner of the certificate and the party re-
C. Strong Passwords lying on the certificate.
D. User Access Levels 732. What malware tracks users’ keystrokes,
obtains passwords, and other personal in-
728. Which of the following is true of the Wan- formation
naCry ransomware attack?
A. Keyloggers
A. Hackers locked down computers and
demanded payment to unlock B. Time-Bomb

B. Medical services were disrupted as a C. Bad Malware


result of the attack D. Zombies
C. The attack may have been possible be- 733. is a password recovery and auditing
cause people had not updated their oper- tool.
ating systems
A. LC4
D. All of these are true
B. Network Stumbler
729. If you are leaving traces of personal in- C. LC3
formation about yourself online, available
D. Maltego
for anyone to obtain, then you are damag-
ing your: 734. What is the most common cyber crime?
A. grades A. Infecting a computer with a virus
B. friendships B. Hacking computer systems
C. gaming record C. DDoS attacks
D. digital footprint D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 616

735. A set of rules governing the exchange or 740. To keep your browser private, you can
transmission of data between devices. use the mode.
A. Latency A. incognito
B. Redundancy B. confidential
C. Packet C. encrypted
D. Protocol D. deception

NARAYAN CHANGDER
736. Software file that contains fixes for prob- 741. If someone suspects that a company
lems found by other users or the software holds inaccurate information about them:
developer A. they have a right to see what data the
A. Antivirus company holds about them
B. they can log on any time to find out
B. Malware
what data is held about them
C. Update
C. they can correct the data themselves
D. Spyware
D. they will be unable to get the data cor-
737. Which of the following is not a type of rected
scanning? 742. Fake e-mail message appearing to be
A. Xmas Tree Scan from a trusted business asking for per-
sonal information such as passwords?
B. Cloud scan
A. Farming
C. Null Scan
B. Pharming
D. SYN Stealth
C. Phishing
738. A computer program that can intercept D. Fishing
and log traffic passing over a digital net-
work is known as? 743. What type of symmetric key algorithm
A. Packet Sniffer using a streaming cipher to encrypt infor-
mation?
B. Malware
A. RC4
C. Phishing
B. Blowfish
D. none of above
C. SHA
739. Which of the following is protecting UK’s D. MD5
critical services, wider public sector, indus-
try and SMEs from Cyber attacks and pro- 744. Alice and Bob need to exchange some pri-
vides incident response? vate data online. To do this, Alice creates
an algorithm that will encrypt and decrypt
A. NCA data. They secretly meet to share the algo-
B. Cyber Resilience Centre rithm, then they each use the algorithm to
encrypt their messages and decrypt each
C. ICO
other’s messages.What kind of encryption
D. NCSC process is this?
E. None of the above A. Symmetric

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 617

B. Public Key 749. Which one of the following usually used


C. Vingenere cipher in the process of Wi-Fi-hacking?

PRACTICE BOOK» NOT FOR SALE


A. Aircrack-ng
D. Firewall software
B. Wireshark
745. Tyra is upset with her best friend. She C. Norton
posts images of her falling into the mud
during a track meet. She also posts pic- D. All of the above
tures of her with food all over her face. 750. What should you look out for when read-
What is Tyra doing? ing emails
A. She is cyberbullying. A. Request for personal information
B. She is using poor netiquette. B. Poor spelling and grammar
C. She is not practicing cybersafety. C. Sender’s email
D. She is violating social media security. D. Cool pictures

746. is way of protecting internet- 751. A collection of compromised computers


connected systems, including:hardware, under the control of an attacker. The at-
software and data, from cyberattacks tackers pool the computing power of all of
the zombie machines to launch huge spam
A. Cyber Security
attacks or to bring down websites through
B. Cyber Safe DDoS attacks.
C. SPAM A. Virus
D. DDOS B. Trojan Horse
C. Botnet
747. What is a Trojan malware?
D. Smishing
A. A type of malware that appears to be
a legitimate program, but actually causes E. Dumpster Diving
harm 752. A software or hardware device that mon-
B. A type of malware that deletes pro- itors incoming and outgoing network traf-
grams on the system each time replacing fic, applying rules to allow or disallow cer-
them with itself tain types of traffic.
C. A type of malware that spies on users A. Firewall
without their knowledge B. Domain
D. A type of malware that removes and C. Risk assessment
sends all of your files to a third party, over
D. Security requirements
time so you don’t notice
753. A person’s digital footprint is:
748. Which security system protects your net-
work from unauthorized access? A. Public, but not usually permanent
B. Only public to people whom a person
A. SIEM
shares things with, but what’s there is per-
B. KPS manent
C. DLP C. Public and permanent to anyone
D. NAC D. Not public but permanent

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 618

754. What the name given to a code that C. Access Control Logs
uniquely identifies a device on a network D. Access Control List
A. IP address
760. Viruses, worms, and trojans are com-
B. Email address
mon security threats that are often used
C. URL in spreading. What is the name for them
D. Postcode all?

755. Whats encryption? A. scams

NARAYAN CHANGDER
A. Passing text thorough a maths algo- B. malware
rithm to scramble text C. downloads
B. Changing the letters by a set number D. passwords
(Caesar Cipher)
C. Changing to ASCII code 761. What port number is Internet Message
Access Protocol ver. 4 (IMAP4)?
D. Converting text to hex
A. tcp 143
756. What does malicious mean?
B. tcp 21
A. Something intended to do harm
C. tcp 443
B. Something that makes you ill
D. tcp 389
C. Something good
D. Tasty 762. Antivirus Software
A. Referring to the copying of data on a
757. Monitors inbound and outbound traffic to
computer
identify suspicious traffic.
B. Made to destroy computer viruses
A. Network intrusion detection system
(NIDS) C. How much data can be transferred in
an amount of time
B. Distributed intrusion detection system
(DIDS) D. None of the above
C. Host intrusion detection system
763. Which of the following would not be con-
(HIDS)
sidered a Data Domain?
D. Intrusion prevention system
A. Google
758. What are the most ideal privacy settings B. Facebook
to have on your social networking site?
C. Twitter
A. Default
D. Kahoot
B. Recommended
C. Custom 764. What is provisioning?
D. none of above A. An open-source virtualization platform
from Oracle.
759. ACL stands for
B. Computing in an isolated place to test
A. Access Condition List and deploy applications and configura-
B. Anti-Control List tions.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 619

C. Viruses that are made to infect a com- B. Smurfing


puter before it’s operating system even C. Ransomware
loads.

PRACTICE BOOK» NOT FOR SALE


D. Shareware
D. Ability to quickly deploy resources
when needed 770. While playing an online game, Scott re-
ceives a pop-up message offering him ad-
765. What type of key is not shared and com- ditional points if he clicks on the blue link.
puters cannot decrypt a message without What should Scott do?
it?
A. He should click on the link because he
A. Free key always follows instructions.
B. Private key
B. He should close the pop-up window be-
C. Public key cause the link can take him to a malicious
D. Personal key site.
C. He should click on the link because he
766. Which of the following is NOT a physical needs the extra points to get a new high
precaution to protect data? score.
A. Security guards D. He should ask his friend for advice.
B. Lock the doors
771. Which method of computer security soft-
C. Passwords
ware prevents suspicious data from enter-
D. Security guards ing a computer or network?
767. You have been sent an Email form the A. Firewall
bank. However, the logo doesn’t look B. Anti-virus
right. What could this be
C. Malware
A. Trojan
D. Network Policies
B. Malware
772. Using random guesses and computation
C. Phishing
power to decipher a message is called
D. Worm
A. Brute Force Hacking
768. A person who is able to gain access to B. Dictionary Hacking
equipment or a network by tricking people
C. Trial and Error Hacking
into providing the necessary access infor-
mation. D. Power Hacking
A. A social engineer E. Coasting
B. Man-in-the-Middle 773. For $1 Million:Sending personal informa-
C. A Hacker tion like a social security or credit card
D. IT Technician number by email is ok if
A. It is to a well-known company
769. Malware holding victims’ computer files
hostage by locking access to them and de- B. It is to my school
mands ransom. C. It is to my family
A. Malvertising D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 620

774. Unauthorized access to control over com- D. “Completely Automated Public Tur-
puter network security systems ing test to tell Computers and Humans
A. Security Apart”)

B. Hacking 779. Anyone who commits a cyber crime by


C. Surfing breaking national or international law. For
example, to commit fraud or send spam.
D. Dancing
A. Script Kiddie

NARAYAN CHANGDER
775. What did Charles Babbage invented?
B. Cyber Terrorist
A. ENIAC
C. Cyber Criminal
B. Difference Engine
D. Scammer
C. Electronic Computer
D. Punched card 780. Like “HTTPS, “ Secure Socket Layer, or
SSL helps to
776. Which of these help make a strong pass- A. Keep a computer from getting viruses.
word? (Choose all that apply)
B. Protect users who share personal in-
A. Contains Uppercase letters
formation online.
B. Contains Lowercase letters
C. Prevent a computer from crashing.
C. Is at least 8 characters long
D. None of the answers are correct.
D. Is short
E. Contains special characters 781. What is software that aims to gather in-
formation about a person or organization
777. What is cyberbullying? without their knowledge and that may
A. A person who is ignoring people he send such information to another entity
doesn’t like. without the consumer’s consent, or that
asserts control over a computer without
B. A bully who is embarrassing people the consumer’s knowledge?
during gym class.
A. Spyware
C. Any online behavior that embarrasses
or hurts feelings. B. Spoofing
D. A school website that allows posting of C. Trojan
cruel messages. D. none of above
778. CAPTCHA stands for 782. The process of converting a ciphertext
A. “Confidently Automated Piece of Tur- into plaintext.
ing testing to tell Computers and Humans A. encryption
Apart”
B. decryption
B. “Completely Automated Public Turing
test to tell Criminals and Happy people C. plaintext
Apart” D. cryptography
C. “Completely Assisted Presence Tutor
tests to tell Computers and Humans 783. What are the different ways to intrude?
Apart” A. Buffer overflows

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 621

B. Unexpected combinations and unhan- D. Attempt to address risks by making


dled input them less serious

PRACTICE BOOK» NOT FOR SALE


C. Race conditions
789. Firewalls can be of kinds.
D. All of the mentioned
A. 1
784. Which of the following is true about a B. 2
blog?
C. 3
A. It is a lot like an online journal or diary.
D. 4
B. It is where you go to look for jobs.
C. It is similar to a Phishing email. 790. What is the maximum character Linux
D. It is commonly used in Online banking. supports in its filenames?
A. 8
785. When you friend someone on a social net-
work, what does that allow them to see? B. 128
A. Nothing, the same as everyone else C. 256
B. They can see all of the things you put D. Unlimited
on private to only friends
791. Cybersecurity product that offers Anti-
C. They can see your pictures
virus, Antispyware, host intrusion preven-
D. none of above tion, application control, device control,
and network access control
786. Operational loss includes
A. Endpoint Security
A. reputation loss and financial loss
B. Firewall / UTM
B. loss of manufacturing output, loss of
service availability, loss of service data C. SIEM
C. loss due to legal liability, loss due to D. None of the above
compensation, loss of new customers
792. pick two:theft of data is .
D. loss of keys, wallet and phone
A. stealing data from an individual or or-
787. indicates a secure connection be- ganisation with the intention to .
tween your computer and a trusted web-
site? B. obtaining information without the cor-
rect authorization in order to .
A. https
C. gain an insight to the workings of an-
B. http
other individual or organisation
C. tcp
D. profit from the information
D. html
793. What does AUP stand for?
788. What is Risk Avoidance?
A. Acceptable Use Policy
A. Risk acknowledged, no steps taken
B. Access Unavailable Privacy
B. Attempt to address risks by making
them less serious C. Actual Use Policy
C. Avoiding a dangerous situation D. Accept User Permission

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 622

794. Which vocabulary word fits this defini- A. encrypt


tion? A right that is protected by state B. decrypt
and federal laws for someone’s ideas, in-
ventions, processes, or anything that they C. ISP
thought of and have published D. password
A. Encryption
799. Identify the oldest phone hacking tech-
B. AUP nique used by hackers to make free calls.

NARAYAN CHANGDER
C. Public key cryptology A. Spamming
D. Intellectual property B. Phreaking
795. What is 1111 1101 in decimal? C. Cracking
A. 253 D. Phishing
B. 200
800. If the same key is used to encrypt and
C. 121 decrypt a message, this is known as?
D. 257 A. Symmetric encryption
E. 293 B. Encryption doesn’t exist!
796. Which of the following is/are considered C. Asymmetric encryption
as a digital literacy tool? I. Mobile phones D. Same-key encryption
II. Smart objects III. Wireless Internet
A. I only 801. What’s the name given to harassment us-
ing electronic forms of contact?
B. II only
A. Spam
C. II and III only
B. CyberBullying
D. I, II, and III
C. Denial of Service (DoS)
797. What does the “https://” at the be-
D. Ransomware
ginning of a URL denote, as opposed to
“http://” (without the “s”)? 802. To avoid your computer being infected by
A. That the site has special high definition malware, you should not:
B. That information entered into the site A. Download music or software from ille-
is encrypted gal sites
C. That the site is the newest version B. open emails from people you don’t
available know
D. That the site is not accessible to cer- C. open email attachments
tain computers
D. post personal details on social net-
E. None of the above working sites
798. A unique string of characters that a user 803. Who are Hackers?
types in as an identification code. It is a
security measure used to restrict access to A. They are benign computer experts
computer systems and sensitive files. B. They are malicious computer criminals

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 623

C. Hackers could be both benign com- D. RADIUS


puter experts and malicious computer
E. 802.11ac
criminals

PRACTICE BOOK» NOT FOR SALE


D. Investment Bankers 808. These are the three dimensions of the Cy-
bersecurity Cube.
804. Misconfigured access rights are
A. Transmission, Storage, Processing
A. when something gets infected by Mal-
ware B. Confidentiality, Integrity, Availability

B. out of date software. C. Technology, Policies and Practice, Peo-


ple
C. when user accounts have incorrect
permissions set up by the network man- D. Security Principles, Information
ager. States, Countermeasures
D. none of above 809. What are loT devices?
805. Which of the following statements about A. Anything that is connected to the inter-
cybersecurity is true? net.
A. The DNS is designed to be secure B. Smartphones, smart lightning, and
B. Open standards are part of the reason connected speakers.
why cryptography is not secure C. Devices that need a special key to un-
C. Certificate authorities operate based lock them.
on the trust model D. Devices that require security proce-
D. Public key encryption is symmetric dures in order to keep them as uncompro-
mised as possible, ex:Government com-
806. Cynthia discovers that she has the abil- puters.
ity to modify the lunch menu posted on her
school’s website. She edits the website so 810. Which of the following refers to explor-
for lunch every day, it says “Green Eggs ing the appropriate, ethical behaviors re-
and Ham”.Which part of the CIA triad was lated to the online environment and digital
broken? media platform?
A. Confidentiality A. Cyber low
B. Integrity B. Cyberethics
C. Availability C. Cybersecurity
D. All of the above D. Cybersafety
807. The company that you work for wants 811. The act of copying someone’s work and
to set up a secure network, but they do using it as if it is your own work, without
not have any servers. Which three secu- mentioning the source.
rity methods require the use of a server?
(Choose three.) A. plagiarism
A. 802.1x B. computer safety
B. WPA2 Personal C. phishing
C. WPA2 Enterprise D. hacking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 624

812. A small program that gets installed on 816. soft skills


a computer while browsing the Internet. A. Computer networking skills
The basic function of active content is to
provide an interactive Internet experience B. skills necessary to communicate and
through videos and toolbars. Sometimes, work with others.
active content is used to gain unauthorized C. the ability to use a virtual machine
access to a computer, and then damage the
D. none of above
data stored on it or install malicious soft-
ware on it.

NARAYAN CHANGDER
817. The best way to back-up your files.
A. active content A. cloud
B. cache memory B. external hard drive
C. cookie C. 123 backup plan
D. spam D. 321 backup rule

813. A computer virus is 818. Which of these is a virus that pretends to


be a harmless file?
A. A common cold
A. trojan
B. Software code
B. worm
C. Hardware cold
C. tracking cookie
D. A bug
D. cipher text
814. Sometimes a reaction is exactly what 819. of information means, only autho-
the person who is bullying you is look- rised users are capable of accessing the in-
ing for, because they think it gives them formation.
power over you. If you are being bullied,
you should do all of the following except A. Confidentiality
what? B. Integrity
A. Don’t respond. C. Non-repudiation
B. Don’t retaliate. D. Availability
C. Get back at them. 820. In 2016, online fraud cases in the United
D. Remove yourself from the situation. States resulted in victim losses totaling:
A. Nothing-online fraud doesn’t result in
815. Around the 1990s why did it become nec- victim losses
essary to have interconnected networks
B. $100, 000
(Internet)
C. $2 million
A. Cable companies wanted to make
money off Internet D. Over $1.2 billion
B. ARPANET was too expensive 821. What is malware?
C. Networks of computers became more A. Hackers trying to hack your computer.
common
B. Term for any software that is designed
D. none of above to harm or do illegal activities.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 625

C. Term for cookies trying to invade your C. A complicated password you may for-
computer and implement viruses. get.

PRACTICE BOOK» NOT FOR SALE


D. none of above D. A combination of letters, numbers &
special characters
822. The name by which a user is identified
to a computer system or network. To ac- 827. What is the difference between ran-
cess a computer protected by username somware and computer viruses?
and password, a user needs to enter the
A. There is no difference.
correct combination of username and pass-
word. B. Ransomware is a code that protects
your computer from computer viruses
A. Trojan horse
C. Ransomware is when you have to pay
B. user name
money to gain access to a computer and
C. password a computer virus is a programming code
D. spam that attacks a computer.

823. is a common and reliable method of D. A computer virus is a programming


keeping data secure-it scrambles data so code that attacks a computer and ran-
anyone intercepting it cannot interpret it somware is something that is used to put
the code into the computer.
A. Verification
B. Authentication 828. is the kind of firewall is connected
between the device and the network con-
C. Phishing necting to internet.
D. Encryption A. Hardware Firewall
824. This is an example of bandwidth: B. Software Firewall
A. The letter C key. C. Stateful Inspection Firewall
B. 10 Mbps D. Microsoft Firewall
C. The mouse
829. Lack of awareness and make the per-
D. 10 inches fect set up for a successful cyber attack or
cybercrime.
825. What is a backdoor?
A. Secret or unknown access point into a A. panicking
system B. lack of awareness
B. criminal activity done on a computer C. rushing
C. Publicly wide known access point into D. lack of technology
a system
830. Which passwords are the best
D. The use of the internet where illegal or
harmful information is obtained A. #%( & $#
B. LetsPl@y538!
826. A strong password is better with;
A. A simple password based on interests. C. H@ppyB0y678!

B. A password no one would relate to you D. password


but you can remember. E. hacker

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 626

831. To ensure your device and data remain se- 835. Who was the latest victim of cyber crime
cure and safe, when you install a new app A. British Airways
it is good practice to
B. Foxconn
A. Not use too many apps as the smart-
phone will become less secure C. Google
D. Facebook
B. Block all the app downloads and just
use the standard one already on your E. Snapchat
phone

NARAYAN CHANGDER
836. What is phishing?
C. Scrutinize permission requests when
using or installing smartphone apps A. scams through websites
B. scams through emails
D. none of above
C. scams through phone calls
832. Which of the following most accurately D. scams through text messages
describes the Internet of Things?
A. Malicious hackers intent on stealing 837. A sudden increase in line voltage, which
confidential information like credit card may lead to the damage of electronic de-
numbers or email addresses vices, such as computers.

B. All of the websites that a person can A. online predator


currently access online B. firewall
C. Internet service providers who make C. hacking
it possible to go online D. power surge
D. The network of devices with the ability
838. Who was the first know user of the Cae-
to connect and exchange data
sar Cipher?
833. What type of key can be freely shared A. Caesar Romanus
with anyone so that they can encrypt a B. Julius Caesar
message?
C. Alan Turing
A. Personal key
D. There isn’t one
B. Private key
839. Malware that steals and encrypts data
C. Free key
and demand money for the return of the
D. Public key data is known as what type of malware?
A. Cookie
834. It is ok to install software of my choice
on my PC if: B. Ransomware
A. My manager approves C. Spyware
B. I have an approved eSAC for Green Net D. Adware
use
840. Disabling unused features such as Blue-
C. I have an approved eSAC for Red Net tooth and Near Field Communication is an
use example of?
D. I have admin rights on my PC A. Password Management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 627

B. Device Hardening 845. Information security aims to provide


C. Malware which three key services?

PRACTICE BOOK» NOT FOR SALE


D. none of above A. Data Strategy, Data Integrity, Data
Storage
841. What is not true of white hat hackers? B. Data Integrity, Data Availability, Data
A. They contribute to robust security sys- Confidentiality
tems C. Data Availability, Data Storage, Data
B. They use the same methods as black Mining
hat hackers D. Data mining, Data Confidentiality,
C. They alert companies of security vul- Data Storage
nerabilities 846. What does ‘s’ in https stand for?
D. They are breaking the law and are at A. safety
risk of legal repercussions
B. suspicious
842. Several users have called the help desk C. secure
to complain that they are being redirected
to websites different from the addresses D. standard
they entered. Which type of attack is tak- 847. What type of data gives you information
ing place? about a file such as the file size and date
A. IP spoofing it was created? In an image it might also
contain the GPS location.
B. ARP spoofing
A. Meta Data
C. DNS spoofing
B. Meat Data
D. Man-in-the-middle
C. Middle Data
843. Manage and secure your company over D. Mett Data
threats comingfrom Mobile devices, re-
gardless of device ownershipwhether it is 848. Company policies should restrict access
company-owned or BYOD. to the information to authorized personnel
A. Cybersecurity and ensure that only those authorised in-
dividuals view this data.
B. End point security
A. Confidentiality
C. Mobile Threat Protection
B. Integrity
D. Manage Firewall
C. Availability
844. To reduce the danger of eyestrain from D. none of above
using a computer:
849. CompTIA Advanced Security Practitioner
A. the room should be well-lit, not too
(CASP)
bright and not too dim
A. A certification in critical thinking, inci-
B. the light should not reflect off your dent response, risk management and tech
computer screen integration for business
C. you should take regular breaks B. An AS degree in computer science is-
D. all of the above sued through a college or university

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 628

C. A certification in managerial skills for 855. What type of firewall is also known as a
cyber security proxy server?
D. none of above A. application-level

850. It is a self-replicating program that is B. circuit-filtering


harmful to networks. C. packet-filtering
A. Worm D. stateful
B. Trojan Horse

NARAYAN CHANGDER
856. Which of the following do Cyber attack-
C. Virus ers commonly target for fetching IP ad-
D. none of above dress of a target or victim user?
A. emails
851. The process of scrambling data to make it
unreadable to those without a secret key. B. ip tracker
A. cryptography C. websites
B. cyphertext D. web pages
C. decryption
857. Which of these comes under the advan-
D. encryption tage of Circuit-level gateway firewalls?
852. CP 07-102 is A. They maintain anonymity and also inex-
pensive
A. The GD Corporate Policy for Cyber Se-
curity B. They are light-weight
B. The GDMS Policy on Cyber Security C. They’re expensive yet efficient
C. The GDMS-C Cyber Security Process D. They preserve IP address privacy yet
expensive
D. Just a bunch of letters and numbers

853. Data integrity gets compromised when 858. What is a firewall?


and are taken control off. A. Software that monitors and controls
A. Access control, file deletion what enters and leaves the computer.

B. Network, file permission B. A wall of fire

C. Access control, file permission C. A wall that burns all insects that get
too close to the computer.
D. Network, system
D. Something that tells you when there is
854. How did the reporters gain access to a fire.
peoples voicemail in mobile phone hacking
scandal in 2012? 859. Firewall examines each that are en-
tering or leaving the internal network.
A. They spoke to the victoms
A. emails users
B. They hacked their computers
B. updates
C. They tried using the default PIN num-
ber which was frequently unchanged C. connections
D. They used white box testing D. data packets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 629

860. IT security in any firm or organization is 864. Which of the following hackers was pur-
maintained and handled by sued by US Marshals?

PRACTICE BOOK» NOT FOR SALE


A. Security Manager A. Mark Abene
B. Security Auditor B. Kevin Mitnick
C. IT Security Engineer C. Johan Helsinguis

D. Software Security Specialist D. Linus Torvalds

865. Rudy is using 15 seconds of a copyrighted


861. This is a type of online fraud where false
song for a school project. Which law gives
emails or websites are used to try and get
her the right to do this?
your details
A. Copyright
A. Anti-virus
B. Public domain
B. Virus
C. Copyright infringement
C. Phishing
D. Fair use
D. Fishing
866. What port number is HTTP (Hypertext
862. Which of the following devices is not con- Transfer Protocol)?
nected to the Internet of Things? A. tcp 443
A. An AM/FM radio without any bluetooth B. tcp 80
or Internet connection capabilities
C. tcp 3389
B. A wearable device that measures your
D. tcp 161
physical activity and allows you to track
your activity through a mobile app 867. Which of the following should NOT be in
C. A smart thermostat that allows you a security policy?
to remotely control your home’s temper- A. Authentication policies
ature through a mobile app
B. Acceptable use policies
D. A digital baby monitor that allows you
C. Incident handling policies
to stream video and audio of your nursery
from the Internet D. Admin passwords for equipment

863. Which capability of a Zero-Trust seg- 868. A method for determining a solution to a
mentation platform uses a combination of problem by sequentially testing all possi-
anti-malware, intrusion prevention, and ble solutions.
cyberthreat prevention technologies to A. brute force
provide comprehensive protection against B. relative frequency
both known and unknown threats, includ-
ing threats on mobile devices? C. cipher

A. Inspection of all traffic D. paired keys

B. Secure access 869. A type of malware which restricts access


to the computer system, and demands a
C. Least privilege access control
fee be paid for the restriction to be re-
D. Cyberthreat protection moved?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 630

A. Ransomware 874. An administrative division of a


client/server network.
B. Virus
A. Domain
C. Spim
B. Firewall
D. Spam
C. Cloud computing
870. What does Copyright Infringement D. Service provider agreement
mean?
875. After compliting the first scheduled

NARAYAN CHANGDER
A. restrict unauthorized access to and backup, which of the following should be
use of a creative work done NEXT?
B. Hack to help a company with its own A. Verify the backup
program, find problems
B. ‘Delete the original file to clear space
C. Attempt to break system and publicly for the next backup
disclose info about it C. Duplicate the backup
D. Taking someones work as your own D. Schedule the next backup

871. What is a black hat hacker? 876. Which of the following usually observe
each activity on the internet of the victim,
A. They are authorized hackers
gather all information in the background,
B. They look for vuneralibities without su- and send it to someone else?
pervision A. Malware
C. They hack systems without any author- B. Spyware
ity
C. Adware
D. All of the above
D. All of the above
872. A computer virus may: 877. A Script Kiddie is
A. overwrite your files and corrupt your A. a student learning how to hack.
data B. a threat to an organization’s security
B. steal important information from your or data that comes from within.
computer C. anyone who exploits weaknesses in a
C. use a lot of memory and slow down computer system or network.
your computer D. someone who lacks programming
D. all of the above knowledge and uses scripts or programs
developed by others to attack computer
873. The type of malware that is triggered systems.
by the user. code automatically makes
878. Viruses, worms, and trojans are common
copies of itself.
know as?
A. Virus A. Malware
B. Worm B. Formalware
C. Keystroke logger C. Scams
D. Toolbar D. The Spreading attackers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 631

879. This can be used so that authorized users 884. Unauthorized access to computer net-
don’t make accidental changes to data. work security systems.

PRACTICE BOOK» NOT FOR SALE


A. Version Control A. Security
B. Encryption B. Surfing
C. Hashing C. Hacking
D. Biometrics D. Saving

880. Why is it important to always log off 885. What should you be aware of when set-
your account when you have no use for the ting your privacy settings on social me-
computer? dia?
A. So the computer won’t lose battery A. Allow everyone to see my location

B. So the account would be safe from get- B. Location services are switched off
ting hacked C. Post photo’s of where I am when I am
C. So you don’t forget the password on my holiday

D. So you can’t lose any data from your D. none of above


account 886. A person who breaks code to gain access
to a computer
881. In system hacking, which of the following
is the most crucial activity? A. A Spy
A. Information gathering B. A Hacker
B. Covering tracks C. An Employee
C. Cracking passwords D. A Teacher
D. None of the above 887. In the CIA Triad, which one of the follow-
ing is not involved?
882. When computer systems are infected and
taken control of, then used to send high A. Availability
volumes of traffic to a specific destination B. Confidentiality
to shut down the service.
C. Authenticity
A. Botnet
D. Integrity
B. DDOS
888. Which of the following is the **BEST**
C. Malware description of what a certificate authority
D. Spyware does?
A. Issues digital certificates that certify
883. Encrypt “cryptosystem” with key 7 us-
that a password is correct.
ing Shift Cipher
B. Issues digital certificates that certify
A. jygwhvjfkalt
the ownership of public keys
B. jyfuarzfzopt
C. Issues digital certificates that certify
C. jyfwavzfzalt access to a digital network
D. jyfwaerfzret D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 632

889. What type of self-replicating program 894. Heidi teaches piano lessons in her spare
copies to other computers on a network time. She has been building a digital foot-
without any user intervention and con- print to promote her business. She likes to
sumes bandwith and computer resources? post short videos of her students perform-
A. Virus ing, on her social media accounts. When
she does, she never gives out the home lo-
B. Trojan Horse cation or full name of the student. This is
C. Worm an example of:

NARAYAN CHANGDER
D. backdoor
A. a publicity practice.
890. An individual who develops contact with
B. a privacy concern.
Internet users, through chat rooms, online
forums, or e-mail, to exploit them finan- C. a marketing policy.
cially or involve them in dangerous rela-
tionships. D. a copyright violation.
A. encryptor
895. What is the most common age for people
B. online predator who start committing into cyber crime
C. firewall
A. 15-20
D. computer security
B. 21-25
891. Which of the following is “personal data”
which may be held about someone on the C. 26-30
computer system of a supermarket?
D. 30+
A. Their address
B. The amount they spent last year at the 896. A fraudulent email which is trying to ob-
supermarket tain your username and password for a
C. Their loyalty card number particular site will typically:
D. All of the above A. have a heading with a logo which ap-
892. Why do hackers hack? pears genuine
A. To make discoveries B. address you by name
B. To protect information C. offer large sums of money
C. To steal information
D. appear to come from a friend
D. To expose corruption
E. All of the above 897. Extra copies of computer files that can be
893. A software program that attempts to used to restore files that get lost or dam-
identify and neutralise software that has aged.
a malicious intent (malware) on a system. A. Back-up files
A. Anti-malware software
B. Antivirus software
B. Firewall
C. Hacker C. Operating Software
D. Security incident management policy D. Poogies

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 633

898. While Trish was playing an online game, C. Extranet based VPN
a pop-up appeared, prompting her to click
D. Country-to-country VPNs
on the flashing lights to receive more

PRACTICE BOOK» NOT FOR SALE


points for her game. What should she do?
903. What port number is SNMP (Simple Net-
A. Click on the flashing lights. work Management Protocol)?
B. Turn off the game and the gaming con- A. tcp 80
sole.
B. tcp 161
C. Click the X in the corner of the pop-up
to make it go away. C. udp 161
D. Save the pop-up message until she re- D. tcp 3389
ally needs extra points to win.
904. What is the CIA triad?
899. Which of these is a physical prevention
measure? A. Professional certification for those
with strong managerial background and
A. Biometrics
technical expertise.
B. Magnetic wipe
B. The three underlying principles of data
C. Encryption protection:confidentiality, integrity, and
D. Authentication availability.

900. What is an encryption? C. Describes the connection of nontradi-


tional computing devices to the Internet.
A. way of scrambling data so that only au-
thorized parties can understand the infor- D. The avenue or path the hacker uses to
mation. commit the attack.
B. it takes readable data and alters it so 905. What is phreaking?
that it appears random.
A. Hacking into a phone system.
C. service to retrieve forgotten password
D. virtual suggestions how to make a B. Hacking into a network.
strong password C. The act of circumventing or breaking
past security boundaries.
901. The process of reconverting the en-
crypted data into a readable and usable D. An attempt to steal, damage, or de-
form. stroy data on a computer system.
A. copyright
906. Which of the following is not a character-
B. firewall istic of a credible source?
C. decryption A. The author is not named on the web-
D. computer security site

902. Site-to-Site VPN architecture is also B. The domain is .edu or .gov


known as C. Multiple scholarly sources are cited
A. Remote connection based VPNs D. The source is well-organized and fol-
B. Peer-to-Peer VPNs lows rules of spelling and grammar

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 634

907. Which are examples of social engineering B. Data Integrity (data protected from be-
A. Phishing ing changed during transit)

B. Disguising yourself as an employee to C. Securely negotiating a key over a un-


gain access to computer systems secure media
C. Sending an email with a virus you cre- D. Anti replay protection
ated attached to it
912. What is a potential consequence of cyber-
D. Using brute force to access a system bullying?

NARAYAN CHANGDER
E. Calling someone pretending to be IT A. Suspension, expulsion or other school-
support to steal confidential data related penalties
908. What is Copyright Infringement? B. A fine, jail time, a criminal record or
A. anyone who uses someone work with- other legal penalties
out permission C. Loss of friendships, even between best
B. a copy of someone work friends

C. anyone who uses copyright owners D. All of the answers are correct
work with permission
913. Which of the following is an example of
D. a picture of someone work a “phishing” attack?
909. What options should you choose on Face- A. Sending someone an email that con-
book with regards to who you share your tains a malicious link that is disguised to
information with? look like an email from someone the per-
son knows
A. Friends
B. Creating a fake website that looks
B. Custom
nearly identical to a real website in order
C. Everyone to trick users into entering their login in-
D. Only me formation
C. Sending someone a text message that
910. Which of the following is a phishing
contains a malicious link that is disguised
email? ?
to look like a notification that the person
A. You have won a lottery!! Follow this has won a contest
link to claim it!!
D. All of the above
B. Your bank account has been compro-
mised. Login here to protect yourself. 914. What can we use to protect our computer
C. Help.I am stuck aboard and urgently from hackers
need money transferred to me to get A. fire wall
home.
B. a picture which says “stay away”
D. All of the above. Be careful.
C. Using a non approved VPN
911. Hashing functions like MD5 and SHA are D. all of the above
used in IPSEC to provide which of the fol-
lowing services: 915. The response time and transit time is
A. Data confidentiality (privacy from used to measure the of a network.
eavesdropping) A. Security

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 635

B. Longevity B. Worm
C. Reliability C. Trojan

PRACTICE BOOK» NOT FOR SALE


D. Performance D. Spyware

916. Worms 921. Which one of the following can be consid-


ered as the class of computer threats?
A. do not change
A. Dos Attack
B. can replicate itself to send to other
uses to infect other computers B. Phishing
C. can take control of a computer and the C. Soliciting
hacker can use control the computer from D. Both A and C
somewhere else
922. What’s a switch in networking?
D. is a tube-shaped, segmented worm
found in the phylum Annelida A. To turn on off computer
B. A piece of hardware to let multiple
917. Alice posts a key for encrypting that any- computers comunicate
one can access. Bob uses that key to en-
crypt a message, then sends it to Alice. C. A piece of software that lets multiple
When Alice receives the message, she de- computers comunicate
crypts it using a private key. What kind D. A gaming console
of encryption process is this?
923. A company that provides Internet connec-
A. Symmetric Encryption tivity to individuals, businesses, and orga-
B. Public Key encryption nizations.
C. Vingenere Cipher A. cookie
D. Firewall software B. hacker
C. Internet Service Provider (ISP)
918. To measure human characteristic in order
to correctly identify an individual D. world wide web
A. Biometrics 924. Which one of the following should be
B. Encryption used as an extra layer to protect your data
and privacy?
C. Passwords
A. VDN
D. Locking the door
B. VLN
919. An attempt to steal, damage, or destroy C. VPN
data or a computer system
D. VGN
A. Attack vector
925. Checks and identifies threats based on
B. Cyber Security
normal expected network behaviors.
C. Cyber attack
A. Honey pot
D. Hacking B. Distributed intrusion detection system
920. Which type of malware will wait until it (DIDS)
is popular to attack? C. Anomaly based
A. Virus D. Signature based

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 636

926. Encryption is B. Copyright Designs and patents act


A. is used to scramble information so that C. Computer misuse act
it can be sent safely without anyone else
D. none of above
being able to read it.
B. is the method computers use to make 931. What does DDOS stand for?
files smaller by reducing the number of A. Denial Data Operation System
bits
B. Domain Data Overwrite Service

NARAYAN CHANGDER
C. is data copied to a suitable storage
medium then stored safely C. Distributed Domain Or Service
D. a high capacity storage device that can D. Distributed Denial Of Service
be used to backup data or move large
932. Which type of computer is 100% virus-
amounts of data between machines
proof?
927. When receiving an email from an un- A. Mac
known contact that has a link, you
should? B. Windows-based

A. Open the link to view its contents C. Chromebook


B. Report the suspicious email to TISO D. None
C. Forward the email to your co-workers 933. definition:allowing information to pass
to allow them to open the link first to any person or organisation without per-
D. Forward the email to your personal mission
email account so you can open it at home A. unauthorized closure
928. For $4, 000:Pop-Up ads are B. unauthorized inspection
A. Funny jokes C. unauthorized access
B. Just annoying advertisements but gen- D. unauthorized disclosure
erally safe
934. Unauthorized copying of software for
C. A way to win contests and get fun elec-
personal use.
tronics
A. Hacking
D. None of these
B. Capy and Paste
929. Which type of malware can self-replicate
around networks? C. Piracy

A. Trojan D. Modding
B. Worm 935. When email is sent what can be used to
C. Spyware prevent other recipients seeing the other
members’ email addresses?
D. Virus
A. CC
930. Which act would make it illegal to gain
B. BCC
unauthorized access to computer mate-
rial? C. Secure CC
A. Data protection act D. HTTPS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 637

936. This software can capture information 940. What is the best password policy?
like Web browsing habits, e-mail mes- A. Always write the same passwords in
sages, usernames and passwords, and

PRACTICE BOOK» NOT FOR SALE


every link
credit card information. If left unchecked,
the software can transmit this data to an- B. Your name, personal details
other person’s computer over the Internet. C. Have random password which you
can’t remember
A. Social Engineering
D. Never use remember password and
B. Shoulder Surfing keep complex passwords you can remem-
C. Spyware ber
D. Backdoor 941. What is firewall used for?

937. Which of the following are clauses of the A. Prevent hackers from internet
Computer Misuse Act 1990? B. Virus protection
A. It is an offence to look at someone C. To access network remotely
else’s computer files without their permis- D. Control traffic between internal net-
sion work and internet
B. 2-people cannot be logged on to 1- 942. You work for an IT company and want to
computer complete some work at home. You take
C. It is an offence to modify or change the a copy of the documents. Which of the
content of computer files without permis- following would be the best to do before
sion leaving the office?
D. You cannot have the password, ‘pass- A. Copy the data onto two memory sticks
word1234’ in case you lose one
B. Email the files to your personal email
938. A technician wants to configure multifac- address
tor authentication for a standalone PC that
C. Copy the data onto a CD and label it
contains confidential information. The PC
clearly
already requires a PIN.which of the follow-
ing should the technician implement? D. Password protect the files, then en-
crypt the files on the memory stick
A. A finger print scanner
943. GDMS reserves the right to monitor, col-
B. Challenge and response
lect, audit, access and inspect any data
C. Single sing on password within the network in the following circum-
D. passphrase stances (hint, check IT-POL-3). Check all
that apply
939. What port number is HTTPS (Hyptertext A. To collect evidence pertaining to com-
Transfer Protocol Secure)? pliance issues or validation with GDMS
A. tcp 161 policies
B. To detect malware on devices or mov-
B. tcp 80
ing through the network
C. tcp 22
C. To ensure GDMS sensitive data in not
D. tcp 443 being exfiltrated

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.3 Network Security and Cybersecurity 638

D. To collect metrics on employee produc- C. It is approved by Corporate Security


tivity and IT Security
D. Never
944. One of the biggest cyber heist in his-
tory where 81M USD was transferred to 949. Examples of external threats are
a Philippine bank.
A. malware, hacking, sabotage and social
A. Bangladesh Bank heist engineering techniques.
B. South Korea Bank Heist B. employee sabotage, power loss, un-

NARAYAN CHANGDER
C. AMEX Bank Heist safe practices, unauthorised access by
employees.
D. India Central Bank heist
C. software that has not been updated,
945. It can be a software program or a hard- writing down your password.
ware device that filters all data packets D. overloading power sockets, accidently
coming through the internet, a network, using a USB storage device that is in-
etc. it is known as the : fected with a virus.
A. Antivirus
950. A hacker uses hundreds of different IP ad-
B. Firewall dresses to overrun a bank’s website with
C. Cookies requests. This effectively shuts down the
website and prevents any Internet users
D. Malware
from accessing it. Which of the following
946. How many members does the club have? is the name for this kind of attack?

A. 400 A. DNS Spoofing


B. 404 Error
B. 300
C. Denial of service
C. 350
D. Distributed denial of service
D. 550
951. Black hat hackers
947. Why are cyber vulnerabilities unlikely to
ever go away? A. are criminals who break into computer
networks with malicious intent.
A. The government won’t allow people to
fix them. B. are vigilantes who find system vulnera-
bilities and inform the organisation, or the
B. Criminals need them to steal identi- public, rather than exploit the vulnerabil-
ties. ity.
C. They are side effects of the freedom C. are employed by an organisation to
and ease of communicating online. test the security of their computer net-
D. They’re protected by law. work. Also known as penetration testers.
D. like to wear hats that are black.
948. It is ok to test out ethical hacking tech-
niques on GDMS-C networks if (hint, check 952. Crimes commited by computers or net-
IT-POL-4): work
A. It is for security research A. Cybersecurity
B. It is for my program B. Cybercrime

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 639

C. Threat C. Sending a message to a friend from


D. Social network your own account

PRACTICE BOOK» NOT FOR SALE


D. Looking over peoples shoulders to find
953. What always needs to be turned in to en- their password
sure your computer is safe?
A. Firewall 957. Where does the name malware come
from?
B. The Winter Wall
A. Maleficent Software
C. Lightningwall
B. Magnificent Hardware
D. Waterwall
C. Malicious Tools
954. How can bystanders best help cyberbully
D. Malicious Software
victims? (Check all correct answers.)
A. Tell them what happened wasn’t their 958. What kind of physical impairment can be
fault. overcome by adjusting fonts, cursors, and
colors, using screen reading software, and
B. Encourage them to talk to a trusted
using colors differing in darkness?
adult.
A. Cognitive disability
C. Help them confront the cyberbully.
B. Hearing impairments
D. Participate in the bullying.
C. Motor impairments
955. Which of the following describes a credi-
D. Visual impairment
ble source?
A. The author is not listed. 959. Why these 4 elements (confidentiality,
B. There are no sources cited. integrity, authenticity & availability) are
considered fundamental?
C. The page is poorly designed and con-
fusing to navigate. A. They help understanding hacking bet-
ter
D. The domain is .edu.
B. They are key elements to a security
956. Which of these is not a form of hacking? breach
A. Logging onto a facebook account with- C. They help understands security and its
out permission components better
B. Using an unlocked computer which is D. They help to understand the cyber-
not your own crime better

6.4 Wireless Communication Technologies


1. Which of the following problem occur due 2. What is frequency reuse
to adjacent channel interference? A. Process of selecting frequency of mo-
A. Cross Talk bile equipment
B. Missed Calls B. Process of selection of mobile users
C. Blocked Calls C. Process of selection of number of cells
D. Near-Far effect D. Process of selecting and allocating

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 640

channels 8. An antenna which attempts to direct all its


energy in a particular direction is called
3. In multiple access is achieved by allo-
cating different time slots for thedifferent A. One to one antenna
users B. Single directional antenna
A. TDMA C. Prpogational antenna
B. CDMA D. Directional antenna
C. FDMA 9. Identify FOUR(4) types of laptop wireless

NARAYAN CHANGDER
D. SDMA communication technologies
4. Radio Transmitters, receivers and remote A. Cellular WAN
controls are commonly referred to as B. Bluetooth
A. Wireless Technology C. Infrared
B. Telecommunication Industry D. Ethernet
C. Telecommunication Systems E. Wi-Fi
D. none of above
10. TWO (2) types of touchscreens
5. causes Reflection. A. Resistive
A. Large buildings, earth surface and ob- B. Conductive
jects with large surface area
C. Capacitive
B. Obstacles with dimensions in order of
D. Summative
wavelength
C. Surfaces with rough textures such as 11. When all the radio channels are in use in a
Foliage, lamp posts, street signs, walking trunking system
pedestrian, etc. A. The user is blocked
D. none of above B. The queue may be provided
6. Up to ‘X’ Bluetooth devices can be con- C. The access to the system in denied
nected together at any one time. What is D. All the above
‘X’?
12. In dynamic channel assignment strategy,
A. five
base station requests channel from
B. seven
A. Neighbouring Cell
C. eight
B. Neighbouring Cluster
D. ten
C. Neighbouring base station
7. Why neighbouring stations are assigned D. MSC
different group of channels in cellular sys-
tem? 13. What is a cluster in a cellular system?
A. To minimize interference A. Group of frequency
B. To minimize area B. Group of Cells
C. To minimize throughput C. Group of Subscribers
D. To minimize capacity of each cell D. Group of Mobile Systems

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 641

14. How do FM waves travel? 19. Unlike Large scale models, small scale
models do not characterise the pathloss,
A. As changes in the frequency of the
but it characterises the (CO1) (B1)

PRACTICE BOOK» NOT FOR SALE


wave
A. attenuation
B. As changes in the amplitude of the
wave B. noise
C. As changes in the wavelength of the C. interference
wave D. fluctuations and fading
D. As changes in the resonance of the
wave 20. uline.5cm are used to predict the average
received signal strength at a distance from
15. Large Scale Models are used to character- the transmitter, as well as the variability
ize the signal strength when the T-R seper- of the signal strength in close proximity to
ation is (CO1) (B1) a particular location. (CO1)(B2)
A. within a building A. Propogation Models

B. within 50 meters B. Propagation Mechanisms

C. exceeds several 100 meters C. Power Delay Profiles

D. is exactly 10 meters D. Channel Line Models

21. According to Frii’s equation of free space


16. What does Wireless Communication used
propagation, the Received Power is ex-
for?
pressed as a function of (CO1) (B2)
A. Transfer of information over short dis-
A. wavelength of the Signal
tance
B. Gains of antennae involved
B. Transfer of information over long dis-
tance C. transmitter-receiver seperation dis-
tance
C. Both (i) and (ii)
D. the total loss due to the hardware
D. none of above
22. In Flat Fading,
17. THREE (3) common types of IR networks
A. Coherence time < Symbol period
A. Line of sight, Scatter, Reflective
B. Coherence time > Symbol period
B. Line of sight, Scatter, Formative
C. BW of signal < BW of Channel
C. Line of sight, Scatter, Summative
D. BW of signal > BW of Channel
D. Line of sight, Scatter, Effective
23. In wireless communication systems the
18. Wireless data communications are essen- medium of propagation of signals is
tial component of ? (CO1) (B2)
A. Mobile Computing A. Optical Fiber Cables
B. Electric Transmitters B. Twisted Pair of Cables
C. Virtual Networks C. Open Air Interface
D. none of above D. Wave Guides

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 642

24. How can cell phones make long distance C. Coherence time = Symbol period
calls? D. none of above
A. Strong Wifi signal
30. The signal strength as the distance
B. Good reception
between the transmitter and receiver in-
C. Satellite telephone systems creases. (CO1)(B2)
D. The government A. increases
25. What is a cell in cellular system B. remains same

NARAYAN CHANGDER
A. A group of cell C. decreases
B. A group of subscribers D. becomes zero
C. A large group of mobile systems 31. In Frequency selective fading,
D. A small geographical area
A. Coherence time < Symbol period
26. Which of the following technology dis- B. Coherence time > Symbol period
tributes the coverage of the cell and ex-
C. BW of signal < BW of Channel
tends the cell boundary to hard-to-reach
places? D. BW of signal > BW of Channel
A. Cell Sectoring 32. The difference between the effective
B. Cell Splitting transmitted power and effective received
C. Micro cell zone concept power when expressed in dB scale, it is
termed as (CO1)(B1)
D. Scattering
A. Path loss
27. In fixed channel assignment strategy, each B. Transmission Loss
cell is allocated a predetermined set of
C. Receiver Loss
A. Voice channel
D. System Loss
B. Frequency
C. Base station 33. Why the shape of the cell is not circle
D. Control Channel A. small area

28. In free space, the radio signals propagate B. Complex Design


as a straight line between a sender and C. Overlapping regions or gap left
receiver then it is called as D. Omni directionally
A. line-of-sight (LOS) Communication
34. To connect to cellular WAN n your lap-
B. Communication with interacting ob-
top, you must install an adapter that is
jects
designed to work with cellular networks.
C. Simplex Communication What is the name of the adapter card?
D. Unicast Communication A. WAN access card
29. In Fast fading, B. Cellular Wi-Fi card
A. Coherence time < Symbol period C. Bluetooth Cellular card
B. Coherence time > Symbol period D. Cellular WAN card

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 643

35. Actual radio coverage of a cell is called C. Power of receiving antenna


A. Imprint D. Power of transmitter

PRACTICE BOOK» NOT FOR SALE


B. Matrix
41. Which mode is used for installing net-
C. Fingerprint works in wireless communication device
D. Foot Print characteristics
A. Mobile and wireless
36. Two Bluetooth devices establish a connec-
tion to share resources. This statement re- B. Mobile and wired
fer to? C. Fixed and wireless
A. Bluetooth configuration
D. Fixed and wired
B. Bluetooth Class 2
42. What is Mobile communication? b) d)
C. Bluetooth pairing
D. Bluetooth setup A. Allows to communicate from differ-
ent locations without the use of physical
37. Which of the following application refers medium
to the ability of smart phones to cause ed- B. Allows to communicate from different
ucators in reconsidering their potential as locations with the use of physical medium
classroom tools.
C. Allows to communicate from same
A. Revolutions and Social Change locations without the use of physical
B. Entertainment medium
C. Education Changes D. Allows to communicate from same lo-
D. none of above cations with the use of physical medium

38. Which of the following is the drawback for 43. The is defined as, “the difference (in
cordless telephones? dB) between the effective transmitted
power and the received power, and may or
A. Security
may not include the effect of the antenna
B. Wireless technology gains“.
C. Limited coverage area A. Power Loss
D. Mobile B. Path Loss
39. What is the use of detector in wireless C. Path factor
communication? D. Noise figure
A. To detect the audio signals
44. Which of the following is not a character-
B. To rectify and filter the radio frequency
istic of Wireless Connection?
C. Both (i) & (ii)
A. Has become the de-facto standard for
D. none of above access in offices/homes
40. Doppler shift is directly proportional to B. Expensive to install and maintain
A. Velocity of the mobile device C. Enables to connect to the Internet
B. Height of antenna D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 644

45. Among the following Identify the commu- C. Mid field


nication system, in which LOS communica-
D. Circular field
tion is followed. (CO1)(B2)
A. Micrwave Communication Links 50. What is a borrowing strategy in fixed
B. High speed Optical Networks channel assignments?

C. Under Water Communication systems A. Borrowing channels from neighbour-


ing cell
D. Wireless LAN

NARAYAN CHANGDER
B. Borrowing channels from neighbour-
46. distribution describes random shadow- ing cluster
ing effects which occur over a large num-
C. Borrowing channels from same cell
ber of test locations which have same T-R
distance but different levels of clutters in D. Borrowing channels from other bases-
the propogation path. tation in same cell
A. Log-Normal
51. Interference in cellular system is caused by
B. Log-periodic
A. Two base station operating in samefre-
C. Poisson’s quency band
D. Exponential B. Leakage of energy signals by noncellu-
47. An is an ideal antenna which radiates lar systems into cellular frequencyband
power with unit gain uniformly in all direc- C. Two calls in progress in nearby mo-
tions, and its gain is often used as refer- bilestations
ence antenna gains in wireless system.
D. All the above
A. anisotropic antenna
B. ionising radiator 52. In what frequency spectrum is divided into
smaller spectra and is allocated to each
C. isotropic radiator user
D. entropy antenna
A. FDMA
48. Which type of transmission technique is B. CDMA
employed by paging system?
C. CGMA
A. Multicasting
D. TDMA
B. Unicasting
C. Hybrid 53.
D. Simulcasting causes Scattering.
A. Surfaces with rough texture such as
49. The of a transmitting antenna is de- Foliage, lamp post, street signs, walking
fined as, “the region beyond the fraun- pedestrian, etc.
hofer distance (df), which is related to the
largest linear dimension of the transmit- B. Large buildings, earth surface and ob-
ter antenna aperture and the carrier wave- jects with large surface area
length”. C. Obstacles with dimensions in order of
A. Far field wavelength
B. Near field D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 645

54. It is referred to as the transfer of informa- C. Radius of the cell


tion between two or more points that are D. Both a & b
not connected by an electrical conductor.

PRACTICE BOOK» NOT FOR SALE


A. Wireless Networking 60. Which of the following pair of parameters
that describes the time varying nature of
B. Wireless Access the channel in small scale region are that
C. Wireless Communication are inversely proportional to each other.
D. none of above A. Mean excess delay & Excess delay
spread
55. Propagation model that characterize rapid
B. Coherence time & Doppler spread
fluctuation is called
C. RMS delay spread & Coherence time
A. Large scale propagation model
D. none of above
B. Small scale propagation model
C. Fading model 61. In Slow fading,
D. Okumura model A. Coherence time < Symbol period
B. Coherence time > Symbol period
56. If an antenna is radiating power in all direc-
tions uniformly with unity gain, one such C. Coherence time = Symbol period
ideal radiator is known as (CO1) (B1) D. none of above
A. Adiabatic Radiator 62. Capacity of a cellular system is directly
B. Isotropic Radiator proportional to
C. Ergodic Radiator A. The number of times the cluster is
replicated
D. Free Radiator
B. Number of base stations
57. FM stands for
C. Number of Cells
A. Frequency Magnetism D. Number of users
B. Frequency Magnetism
63. Which of the following is a CDMA standard
C. Frequency Magnetism of second generation network?
D. none of above A. ETACS
58. Which type of antenna is used for center B. EDGE
excited cells? C. IS-95
A. Sectored antenna D. IS-136
B. Omnidirectional antenna
64. Select the CORRECT statement of capaci-
C. Dipole antenna tive touchscreen.
D. Grid antenna A. When it is touched by finger, an inter-
ruption is created in the screens electro-
59. Co channel reuse ratio depends on static field.
A. Frequency allocation of nearest cells B. When it is touched with finger, the 2
B. Distance between the centers of the layers meet at the point of touch thus mak-
cochannel cells ing a circuit at the point of touch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 646

C. Two layer of conductive material with a C. Packet Switching


very small gap between them which acts D. Circuit Switching
as a resistance.
70. of an antenna is an area over which an
D. This information is recognized by the
antennaextracts power from the incident
mobile’s processor / chip and passed on
radio waves.
to the mobile’s OS there by triggering and
event / action at the point of touch. A. Effective Area
B. Effective Aperture

NARAYAN CHANGDER
65. The propagation model that estimates ra-
C. Effective Amplification
dio coverage of a transmitter is called
D. Cummulative Aperture
A. Large scale propagation model
B. Small scale propagation model 71. Select THREE (3) major types of wireless
adapters are used in laptops.
C. Fading model
A. Mini-PCI
D. Okumura model
B. Midi-PCIe
66. The techniques used to improve the capac- C. PCI Express Micro
ity of cellular systems are D. Mini-PCIe
A. Sectoring
72. are typically characterized by very
B. Splitting small system especially in very densely-
C. Random access Protocol populated area
D. Micro cell zone approach A. 2.5G
B. 2G
67. What are p oints on a standing wave
C. 3G
where the amplitude of the wave is zero?
D. 3.5G
A. Antinodes
B. Nodes 73. causes Diffraction.
A. Large buildings, earth surface and ob-
C. Refraction
jects with large surface area
D. Reflection
B. Obstacles with dimensions in order of
68. What is orbiting Earth that receive radio, wavelength
television, and telephone signals and then C. Surfaces with rough textures such as
transmit them around the world? Foliage, lamp posts, street signs, walking
A. GPS pedestrian, etc.
D. none of above
B. Communication Satellite
C. Transmitter 74. represents the maximum radiated
power available from the transmitter in
D. Cell Phone Tower the direction of maximum antenna gain
69. The basic GSM is based on traffic chan- A. Effective Isotropic Radiated Power
nel B. EffectiveRadiated Power
A. Connection less C. Effective Isotropic Power
B. Connection Oriented D. Effective Power

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.4 Wireless Communication Technologies 647

75. Select the time dispersion prameters from C. connecting to another database to
the following. share a network connection.
D. connecting to another mobile device or

PRACTICE BOOK» NOT FOR SALE


A. Mean excess delay
B. Coherence time computer to share a network connection.

C. Coherence bandwidth 81. is defined as the range of frequen-


cies over which two frequency components
D. RMS delay spread
have the strong potential for amplitude
E. Excess delay spread correlation
76. Which out of these is not a feature of Wire- A. Coherence gain
less? B. Coherence time
A. More faster and secure C. Coherence bandwidth
B. Printer Support D. excess bandwidth
C. Convenient and every where 82. Free space propagation model is to predict
D. none of above
77. Which of the following does not pertain A. Received signal strength
to an application of wireless communica- B. Transmitted power
tions? C. Gain of transmitter
A. Health Care D. Gain of receiver
B. Robotics 83. Wired connection of iOS-based devices
C. Business Communication used ‘X’. What is ‘X’?
D. none of above A. Lighting connector

78. Distributed antenna systems are used at B. USB


C. Lightning connector
A. Transmitters of base station
D. VGA
B. Inputs and outputs of repeaters
C. Receivers of mobile station 84. Which modulation scheme is used by Blue-
tooth?
D. Transmitters of mobile system
A. GFSK
79. Class 2 Bluetooth wireless device has a B. DQPSK
transmission operating range of?
C. BPSK
A. approximately 100m
D. MSK
B. approximately 10m
85. Which of the following application refers
C. approximately 1m
to the ability of wireless communication
D. approximately 3m to provide easiness for people to work to-
gether to support a common cause.
80. What is Tethering?
A. Revolutions and Social Change
A. connecting to another printer to print
a test page. B. Aid Following Catastrophes
B. connecting to another Wi-Fi to share a C. Education Changes
network connection. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 648

86. What is the drawback of dynamic channel C. Single Directional


assignment? D. Simple Design
A. Increase probability of blocked call
89. The distance from an antenna, beyond its
B. Cross talk Far field distance df, which is also related
C. Decrease channel utilization to the largest physical dimension of the an-
D. Increase storage and computational tenna and the wavelenth of the transmit-
load on system ted signal is known as (CO1)(B1)

NARAYAN CHANGDER
A. Franklin distance
87. Which of the following is a universally
adopted shape of cell? B. Frii’s distance
A. Hexagonal C. Fraunhofer distance
B. Square D. Fergussion distance
C. Circle 90. Which of the following is associated with
D. Rectanguler the handoff in first generation analog cel-
lular systems?
88. What is the main reason to adopt hexagon
shape in comparison to square and trian- A. Breathing cell
gle? B. Locator receiver
A. Small Area C. MAHO
B. Largest Area D. Cell dragging

6.5 Types of Networks


1. creates a network but broadcasts the data D. Fibre optics use wireless signals on 4G
packet to the intended recipient while ethernet uses copper and electrical
A. router signals

B. gateway 3. It is responsible for Broadcasting the data


to all other connected hosts on the net-
C. bridge
work.
D. switch A. Router
2. What is the main difference between fibre B. Hub
optic and ethernet connections? C. Switch
A. Fibre optics use light transmitted in D. Smartphone
glass threads while ethernet uses copper
wires and electrical signals 4. A school wants to create a network so
that students can access their files on any
B. Fibre optics use copper wires and elec-
computer within the school building. What
trical signals while ethernet uses light
type of network should they use?
transmitted in glass threads
A. PAN
C. Fibre optics use light transmitted in
glass threads while ethernet uses wire- B. LAN
less signals on 4G C. WAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 649

D. VPN 10. Which of the following would normally be


used to connect networks across different
5. It may also operate at higher layers of continents?

PRACTICE BOOK» NOT FOR SALE


the OSI model, including the network layer
and above. A. Fibre optic cables
A. Routers B. Microwave links
B. Switch / Switches C. Wi-Fi
C. Hubs D. none of above
D. Central Connecting Devices
11. BLUETOOTH is
6. is a standard for wirelessly connecting
devices ins small areas, such as an office. A. wired network
Devices connect to a wireless router and B. computer network
therefore the Internet.
C. wireless network
A. WiFi
B. Ethernet D. cable network

C. WiMAX 12. How does ethernet work?


D. Fiber Optic Cable
A. It uses wireless signals to transmit
7. The best example is the internet. electrical impulses
A. WAN B. It uses wireless signals to transmit
B. SAN light impulses
C. VPN C. It uses wired signals to transmit elec-
trical impulses
D. VLAN
D. It uses wired signals to transmit light
8. A type of network that is spanned inside a impulses
building and operated under single admin-
istrative system 13. Example of Hosts that make up a LANs.
A. Point-to-Point
A. Laptop, Smartphone, Tablet and PC’s
B. Local Area Network
B. LAN, WAN and MAN
C. Wide Area Network
C. Hub, Routers, and Switches
D. Metropolitan Area Network
D. SAN, PAN, WLAN
9. Define LAN
A. Connected devices share the re- 14. Computer network is:
sources of a single processor or server
A. Collection of hardware components
within a small geographic area
and computers
B. Normally find within a business and
school B. Interconnected by communication
channel
C. These are computers that share re-
sources over a large area C. Sharing of resources and information
D. None of the above D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 650

15. You are a member of a club that deals with 20. A network of cash machines is connected
computer networks. The club has to take a in a .
project to build a MAN. Where would this A. LAN
project likely take place?
B. WAN
A. A small building/organization C. PAN
B. University or college D. none of above
C. Home 21. A large company wants to be able to share

NARAYAN CHANGDER
D. None of the above confidential documents between it’s head
offices in the UK and USA. What type of
16. www.google.com is an example of network will they use for this?
A. Web browser A. PAN
B. Website B. LAN
C. WAN
C. Application
D. VAN
D. Game
22. network connection is a dedicated net-
17. Which of these is a an ADVANTAGE of a work used for data storage.
PAN? A. SAN
A. As the devices are in a small area they B. PAN
cannot be hacked C. LAN
B. Data is automatically synchronised be- D. WAN
tween devices
23. it acts as an intermediary between you
C. The range is very short which removes and the internet
any interference from other devices
A. firewall
D. Removes the need for Local Area Net-
B. vpn
works completely
C. proxy server
18. How far can Wi-fi reach? D. none of above
A. Around 50 meters 24. What connection type is best if you want
B. Around 70 meters to move around inside?

C. Around 20 meters A. 4G
B. Wi-fi
D. Around 100 meters
C. Ethernet
19. Which of the following can be al- D. Fibre optics
lowed/disallowed in a firewall
25. Device of Network
A. domain names
A. hub
B. ip addresses B. cable
C. keywords C. Router
D. all of the above D. 1, 3

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 651

26. Which of these is an example of a device B. They use wi-fi and Bluetooth to con-
which would be used in a PAN? nect radio towers to phones

PRACTICE BOOK» NOT FOR SALE


A. Mobile Device C. They use wireless signals to connect
B. Keyboard radio towers and satellites to phones

C. Monitor D. They use wired signals to connect ra-


dio towers and satellites to phones
D. Mouse
32. What does a computer network allow com-
27. What is acronym for MAN? puters to share?
A. Local Area Network A. Electricity
B. Metropolitan Area Network B. Resources
C. Wide Area Network C. Mice
D. Personal Area Network D. none of above
28. All Abu Dhabi Banks around the world are 33. Are particularly useful when an organiza-
connected together throughout tion has a lot of users who travel a lot and
A. WAN must connect from remote locations.
B. LAN A. WAN
C. WIRELESS B. SAN
D. none of above C. VPN
D. VLAN
29. A hybrid topology is
A. a made up topology 34. Are becoming more common as businesses
increasing have geographically separated
B. when two or more topologies are offices, but need to share more informa-
used. tion between them.
C. when a network doesn’t have a struc- A. WAN
ture
B. SAN
D. none of above
C. VPN
30. often used to connect computers to D. VLAN
mobile phones, cameras, game controllers,
and other peripheral devices. 35. Allows a secure private connection over a
A. WiFi public network, using an encrypted ‘tun-
nel’.
B. Bluetooth
A. WAN
C. WiMAX
B. SAN
D. Fiber Optic Cable
C. VPN
31. Which best explains how mobile connec- D. VLAN
tions work?
A. They use wi-fi to connect radio towers 36. What is a Computer network
to phones A. Safari

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 652

B. Biggest network 42. when you play a game against someone in


London you use
C. Two or more computer connected to-
gether to share information A. WAN
D. Google Chrome B. LAN
C. Internet
37. What is the acronym MAN stand for?
D. none of above
A. Magnetic Acces Network

NARAYAN CHANGDER
43. Which of these is NOT a benefit of having
B. Metropolitan Area Network
a network?
C. Multi-Area Network
A. You can share files easily.
D. Multi Acces Networking B. You can make nice posters.
38. It is the arrangement of the elements of a C. You can share a printer, this saves
communication network. money!
A. Network Topology D. It is easy to back up all the data as it
is stored on the server.
B. Bus Topology
44. The school wants to use a wired connec-
C. Metropolitan Area Network
tion for their network. What type of con-
D. Computer Network nection will they likely use?

39. Which of the following would be the LEAST A. WiFi


likely to be used in a LAN? B. USB
A. Wi-Fi C. Ethernet Cable
B. Ethernet cable D. Fibre Optic Cable
C. Fibre optic cable 45. A network infrastructure designed to sup-
D. none of above port file servers and provide data storage,
retrieval, and replication.
40. A series of number used to identify a net- A. LAN
work device.
B. SAN
A. IP Address C. WLAN
B. IM Address D. WAN
C. MAC Address
46. Type of network
D. OP Address
A. LNA
41. Network dedicated to providing disk stor- B. LNE
age to other computers on the network. C. WAN
A. WAN D. MEN
B. SAN
47. (A data network designed for a town or
C. VPN city)definition what
D. VLAN A. WAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 653

B. MAN C. Local area net


C. SAN D. last ace note

PRACTICE BOOK» NOT FOR SALE


D. CAN 54. A network infrastructure that spans a
physical area larger than a LAN but smaller
48. The P in PAN stands for
than a WAN. Typically operated by a single
A. Personal entity.
B. Pin A. LAN
C. Program B. WAN
D. Point C. WLAN
49. Internet is an example of . D. MAN

A. WAN 55. Which type of network covers a large ge-


ographical area?
B. MAN
A. LAN
C. CAN
B. WAN
D. SAN
C. CAN
50. A network that is spread across the cities,
D. DAN
countries and continents
A. LAN 56. Choose the lowest to largest computer net-
work connections.
B. MAN
A. PAN, LAN, MAN, CAN, WLAN, SAN,
C. PAN WAN
D. WAN B. PAN, MAN, LAN, WLAN, CAN, WAN,
SAN
51. Which of these is a piece of software?
C. PAN, LAN, WLAN, CAN, MAN, SAN,
A. mouse
WAN
B. Word processor
D. LAN, WLAN, CAN, MAN, WAN, Internet
C. keyboard
57. Each device connected to the network is
D. speakers called a
52. Which of these is a use of a VPN A. node
A. Used by employees access to their B. hub
work network from outside of the office C. computer
B. Home use for personal security when D. stand alone machine
browsing the internet
58. Which of these is not a wireless connec-
C. Encrypting data when transmitting it
tion?
D. All of the above
A. Bluetooth
53. LAN stands for B. 4G
A. Lower area network C. Wi-fi
B. Local area network D. Ethernet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 654

59. A network infrastructure which is very 65. A computer network is a set of connected
personal to a user and it is considered as A. computers
the smallest network of all types.
B. routers
A. SAN
C. cables
B. PAN
D. topologies
C. WLAN
66. Which is listed from slowest to fastest?
D. WAN

NARAYAN CHANGDER
A. Wifi, ethernet, Fibre optics
60. A home computer network is sometimes B. Fibre optics, 4G, ethernet
also called a C. Fibre optics, bluetooth, 4G
A. LAN D. 4G, fibre optics, ethernet
B. WAN
67. We use internet to
C. Internet
A. eat
D. PAN B. to share information
61. The W in WAN stands for. C. Jump
A. Welsh D. Type
B. West 68. Allow communication between hosts on
C. Wide different networks. They act as gateway
to other networks.
D. Word
A. Hub
62. technology is used in PAN. B. Switch
A. Bluetooth C. Routers
B. router D. None of the Above
C. modem 69. Which type of network will use external
D. none of above hardware such as dedicated connections
(e.g. telephone lines)?
63. A computer network is? A. LAN
A. a collection of information B. WAN
B. A group of connected computers C. CAN
C. a collection of nets D. DAN
D. something that works 70. Allows users to log in from anywhere in
the organization, offering easy sharing of
64. The smallest network is a . peripherals, files and applications.
A. LAN A. LAN
B. PAN B. WLAN
C. WAN C. PAN
D. none of above D. MAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 655

71. A person who secretly gains access to a 77. Which of the following networks is a
computer in order to gain information or WAN?
cause damage.

PRACTICE BOOK» NOT FOR SALE


A. The Internet
A. Hackers
B. A school network
B. Computer Professionals
C. A network of bank cash dispensers
C. Internet Trolls
D. none of above
D. none of above
72. Arrange the following types of networks 78. transfer data by sending light down
according to their size from largest to an extremely thin glass tube, which are
smallest extremely fast.
A. LAN, WAN, MAN A. Dialup
B. WAN, LAN, MAN B. Ethernet
C. MAN, LAN, WAN C. Cable Internet Access
D. WAN, MAN, LAN D. Fiber Optic Cable
73. What does a LAN stand for?
79. Usually is a series of local areas networks
A. Local Arena Network connected together.
B. Local Area Network
A. LAN
C. Long Area Network
B. WLAN
D. Local Arena Name
C. PAN
74. Wirless signals are broadcasted
through D. MAN

A. the ground 80. A part of a computer system or network


B. the air that is designed to block unauthorized ac-
cess while permitting outward communica-
C. the water
tion.
D. steel
A. Firewall
75. What is the fastest type of network con-
B. Antivirus
nection?
A. Ethernet C. Brickwall

B. Mobile data D. Firefox


C. Fibre optics 81. is one of the most common forms of
D. Wi-fi broadband Internet access in homes (some-
times referred to as a coaxial cable).
76. Which of these covers the largest area?
A. Dialup
A. LAN
B. PAN B. Ethernet
C. WAN C. Cable Internet Access
D. MAN D. Fiber Optic Cable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 656

82. The amount of data that can be transmit- 88. Which type of network covers a small ge-
ted in a given period of time is known as ographical area?
what?
A. WAN
A. Data collisions
B. PAN
B. Latency
C. DAN
C. Bandwidth
D. none of above D. LAN

NARAYAN CHANGDER
83. It connects similar networks 89. creates a network but broadcasts the data
A. repeater packets to all computers connected to the
network
B. gateway
A. router
C. bridge
D. none of above B. hub

84. Which of these connections is the MOST C. switch


COMMON when connecting devices within D. gateway
a PAN?
A. Wi-Fi 90. Transmission signals can be disrupted by
interference referred to as
B. Bluetooth
C. USB Cable A. Noise

D. Ethernet Cable B. intereference

85. Which is not included in Central Connecting C. disruptions


Devices? D. none of above
A. Hub
91. Select the following that are Network
B. Switch
Topologies
C. Laptop
A. Mesh
D. Router
B. Star
86. Which of these is a piece of hardware?
C. Circle
A. Spreadsheet
B. CPU D. Bus

C. Publisher 92. If there is a problem with the then peo-


D. Windows movie maker. ple on the network will be unable to access
their files.
87. WLAN is a LAN that is used without
A. Internet server
A. router
B. computer B. File server

C. cables C. Mail server


D. PAN D. Database server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 657

93. Define what is a LAN? B. 2


A. Normally find within bussines and C. 3

PRACTICE BOOK» NOT FOR SALE


school D. 4
B. Connected devices share the re-
courses of a single processor or server 99. Computer network in a small area such as
within a small geographic area a home, an office building or school cam-
pus.
C. These are computers that share re-
courses over a large area A. LAN
D. Non of the above B. WLAN
C. PAN
94. is needed to make an internet connec-
tion. D. MAN
A. Table 100. Most inexpensive type of network
B. Camera A. MAN
C. Router B. LAN
D. MS Teams C. PAN
95. What connection type are many countries D. WAN
building for homes and businesses?
101. A network infrastructure that provides
A. Ethernet access to users and end devices in a small
B. Wi-fi geographical area.
C. Bluetooth A. LAN
D. Fibre optics B. WAN
96. Dont require that devices rely on physical C. MAN
cable to connect to the network. D. WLAN
A. LAN
102. Connections are faster and more secure
B. WLAN for this network
C. PAN A. Wired
D. MAN B. Wireless
97. Check which is NOT part of Computer Net- C. Ring
work. D. Mesh
A. Bus Topology
103. It covers a wide area which may span
B. Personal Area Network across provinces and even a whole coun-
C. Point-to-Point try.
D. Wide Area Network A. Metropolitan Area Network

98. How many MAIN types of network are B. Local Area Network
there? C. Wide Area Network
A. 1 D. Personal Area Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 658

104. Definition of network C. VPN


A. system to connect two or more devices D. VLAN
B. system not connect two or more de- 110. Which of the following peripherals is
vices MOST likely to be shared via a network?
C. system don’t connact two or more de- A. Projector
vices
B. Printer
D. system to connict two or more devices

NARAYAN CHANGDER
C. Keyboard
105. What is acronym of LAN D. none of above
A. Local Area Network
111. Switches use
B. Local Acces Network
A. IP address
C. Line And Networking
B. MAC address
D. Line-Less Networking
C. MCA adress
106. What software is able to block unwanted D. 1.3
connections to the network?
A. Firewall 112. Home networks are more likely to use
a
B. Snowywall
A. router
C. Rainwall
B. switch
D. Flamewall
C. hub
107. Which of the following devices has access D. none of above
control list
A. proxy server 113. Which is the shortest network covering
network?
B. firewall
A. WAN
C. hub
B. LAN
D. none of above
C. PAN
108. Which of these statement are true about D. MAN
LAN
A. A LAN connects computers in a small 114. Network in limited geographical area
area such as an office such as school or office

B. A modem is needed to connect a com- A. LAN


puter to a LAN B. MAN
C. A LAN consists of only one computer C. WAN
D. none of above D. none of above

109. Connects geographically separated com- 115. Which is the largest network connec-
puters or LAN’S into one virtual network. tion?
A. WAN A. WAN
B. SAN B. WLAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 659

C. MAN 121. Where does the computers in Star Topol-


ogy are connected?
D. SAN

PRACTICE BOOK» NOT FOR SALE


A. Hub
116. The process by which Bluetooth mobile
B. Cable
devices can establish a connection.
A. Pairing C. Server

B. Discovery D. Router

C. peer-to-peer 122. dedicated transoceanic cabling or satellite


D. syncing uplinks may be used to connect this type of
network.
117. What is the major advantage to a busi- A. LAN
ness using a VPN instead of a dedicated
private WAN? B. MAN

A. It is cheaper. C. WAN

B. It is faster. D. none of above

C. It is more secure. 123. Normally used to transfer data or syn-


D. It is more expensive. chronize devices, for example updating
contact details from a phone to a laptop
118. connects hubs and switches to the inter- or downloading photos.
net A. LAN
A. router B. WLAN
B. repeater C. PAN
C. network interface card D. MAN
D. none of above
124. Are wireless connections usually faster
119. It is responsible for connecting hosts and than wired connections?
transmitting data. A. Yes, except for fibre optics
A. Laptop, PC’s and Tablets B. Yes, except for wi-fi
B. Central Connecting Devices C. No, usually wired is faster
C. Smart Phone D. No, they are about the same
D. Connectors
125. What type of connection would Brett
120. Check all the ways you can communicate likely use to sync the data between his
one computer/device to another. smartwatch and smartphone?
A. Ethernet cable A. WiFi
B. WiFi B. Bluetooth
C. Satellite C. 3G
D. Router D. Ethernet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 660

126. Brett uses a smartwatch to track the ex- 131. It is a network that serves a large city
ercise he does each day. He wants to
A. LAN
sync this data with his smartphone though.
What type of network will he use here? B. MAN
A. PAN C. WAN
B. LAN D. none of above
C. WAN 132. Mr John is a small businessman that runs

NARAYAN CHANGDER
D. VPN a Hardware, he has been experiencing
problem with his small accounting depart-
127. Which of these is most likely to use a ment which he depends on to provide him
WAN? with the sales reports. Mr John want to be
able to shared information between his 7
A. School
computer station and have on central print-
B. University ing area, what type of network would you
C. Multi-National Company recommend to Mr John?

D. Local Company A. LAN


B. MAN
128. What is the 3 common types of Network
Infrastructure? C. WAN

A. LAN, WAN and MAN D. SAN

B. SAN, PAN and WLAN 133. A network topology is


C. Router, Switch and Hub A. the shape of the network
D. Smartphone, Laptop and Tablet B. a WAN

129. A business wants to allow it’s employ- C. A kind of top


ees to securely connect to the business net- D. A link to the network
work from home. What type of network
will they likely use? 134. is a web browser.
A. PAN A. Internet
B. LAN B. Google
C. WAN C. Google chrome
D. VPN D. DIS

130. What type of network is a home net- 135. What are the three common types of com-
work? puter networks
A. PAN A. ROM, MAN, LAN
B. DAN B. RAM, WAN, LAN
C. LAN C. MAN, LAN, WAN
D. WAN D. NON OF THE ABOVE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 661

136. Network that covers large area using A. WAN


many types of media B. SAN

PRACTICE BOOK» NOT FOR SALE


A. LAN C. VPN
B. MAN
D. VLAN
C. WAN
142. If you connect your phone to a Bluetooth
D. none of above
speaker you have created a .
137. The internet is owned by A. LAN
A. no one B. WAN
B. the USA C. PAN
C. NATO D. none of above
D. the government
143. Which of these covers the smallest
138. You are a member of a club that deal with area?
computer networks, the club have taking a A. MAN
project to build a MAN, where would this
project likely to take place? B. LAN
A. A small building/organization C. VPN
B. University or College D. PAN
C. Home 144. Which type of Network connects devices
D. None of the above in the range of a person?
A. Local Area Network
139. A network infrastructure that provides
access to other networks over a wide ge- B. Virtual Private Network
ographical area. C. Personal Area Network
A. LAN D. Wide Area Network
B. WAN
145. A LAN what allows WiFi connections.
C. WLAN
A. LAN
D. MAN
B. WLAN
140. The Internet is an example of type of
C. PAN
Network.
D. MAN
A. LAN
B. MAN 146. Similar to a LAN but wirelessly intercon-
nects users and end points in a small geo-
C. WAN
graphical area.
D. SAN
A. MAN
141. Other examples of this network include B. LAN
businesses that have offices in multiple
cities, connecting the networks at each of- C. WLAN
fice location. D. WAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.5 Types of Networks 662

147. Which of the following is the advan- C. email


tage/s of a client server
D. the Internet
A. centralized backup
B. database of user names and pass- 153. Which type of network will use hardware
words owned by the user and is easy to set up?
C. when the server breaks down the A. LAN
whole network is down B. WAN

NARAYAN CHANGDER
D. both a and b
C. PAN
148. A unique number assigned to a network D. DAN
interface card when it is manufactured.
A. OP Address 154. It is two devices connected to each other
B. Mac Address with a physical medium, such as wire or
radio signals.
C. IP Address
A. Network
D. IM Address
B. Local Area Network
149. A computer network is where two or
more devices are connected together so C. Wide Area Network
they can share D. Metropolitan Area Network
A. people
155. What kind of Network does our ICT lab
B. resources
has?
C. cables
A. LAN
D. none of above
B. WAN
150. What type of network is the internet?
C. MAN
A. LAN
D. none of above
B. WAN
C. PAN 156. Which of the following is the advan-
D. DAN tage/s of proxy server
A. it saves bandwidth
151. A wide area network (WAN)
B. hides your ip address
A. connects two or more LANs together
B. means Wi-Fi can be used C. both a and b
C. is easier to use than a LAN D. none of above
D. connects two or more computers to-
157. A group of connected computers is a
gether
A. Computer network
152. Computer networks can be connected via
cables or B. Network
A. wirelessly C. Topology
B. plumbing D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 663

158. The large organisation doesn’t want to A. WAN


use the internet for transmitting data and
B. SAN
would prefer a dedicated private connec-

PRACTICE BOOK» NOT FOR SALE


tion. Who would supply this? C. VPN
A. A Telecommunications Provider D. VLAN
B. An Internet Service Provider
162. network connection spans over sev-
C. A Cable Company eral buildings in a city or town.
D. They would need to setup the connec-
A. CAN
tion themselves.
B. MAN
159. The network in a school or office is usu-
ally a . C. PAN
A. LAN D. WLAN
B. PAN
163. What does the acronym LAN mean?
C. WAN
A. Local Area Network
D. none of above
B. Local Access Network
160. Short range network between a com-
puter and a mobile phone or similar C. Line And Networking
portable device. D. Line-less Networking
A. LAN
164. Network Infrastructure can very greatly
B. WLAN in terms of ?
C. PAN
A. Size of the are covered
D. MAN
B. Number of users connected
161. Advantage is that all storage is main-
C. Number and types of service available
tained in a single location, making backup
tasks much easier. D. All of the above

6.6 Network Topologies


1. ADV:More secure (messages cannot be in- A. Bus topology
tercepted by other work stations on net- B. Star topology
work)
C. Ring topology
A. Star
D. Mesh topology
B. Bus
3. Convert the binary number 10101010 to
C. Ring Hex
D. none of above A. AA
B. BB
2. A topology that has no single point of fail-
ure because of redundant cables and de- C. CC
vices: D. DD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 664

4. The best use of wireless connections is C. power lines


for D. none of above
A. Security and gaming
10. All computer are connected to the single
B. Portable devices backbones. Which topology is that?
C. Getting a connection in difficult to
A. Tree topology
reach areas
B. Star topology
D. none of above

NARAYAN CHANGDER
C. Ring topology
5. What are the 5 types of network topol-
D. Bus topology
ogy?
A. Mesh and Hybrid Topology 11. All devices have to be connected to by two
or more links in a network topology
B. Mesh, Star, Hybrid, Bus, Ring Topology
A. true
C. Star and Ring Topology
B. false
D. Bus and Star Topology
C. none of the above
6. Ring Topology Disadvantages “choose 2”
D. none of above
A. Requires more cables
B. Data packets travel at great speed 12. What type of topology is this? A topol-
ogy which is a type of networking where
C. Easier to fault find all nodes cooperate to distribute data
D. A break in the ring will bring it down amongst each other.

7. A message (packet) used in Ring topology A. Bus


to avoid collisions: B. Ring
A. Terminators C. Star
B. Hubs D. Mesh
C. Token E. Hybrid
D. MSAU
13. What are the ADVANTAGE of bus topology
8. What is a node? and Star topology?
A. any hardware that can receive, create, A. If the backbone is failed.It will affect
store or send data on a network the whole system
B. a computer on a network B. If the central host is down the entire
system will down
C. a switch/hub
C. If one computer is down .It will not af-
D. a server
fect the whole system
9. There are two types of network architec- D. none of above
ture . Client server & peer to peer . These
network architecture are connected using 14. A describes how data travels from
which cable? computer to computer.
A. Patch cable A. token ring
B. Twisted pair cable B. infrastructure

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 665

C. bridge 20. It is a peer to peer topology.


D. network’s logical topology A. MESH TOPOLOGY

PRACTICE BOOK» NOT FOR SALE


15. What does ‘A’ equal in denary? B. BUSH TOPOLOGY

A. 8 C. RING TOPOLOGY

B. 9 D. STAR TOPOLOGY
C. 10 21. Which is a network where each computer
D. 11 is linked to the next, and the last is linked
to the first? ?
16. Which network topology has exactly two
A. Bus
neighbours for communication purpose?
B. Ring
A. Bus
C. Star
B. Ring
C. Star D. none of above

D. none of above 22. Signals that are copied because of reflec-


tion and scattering and that arrive at the
17. What type of topology is this? A topol- receiver at different times.
ogy that is a network configuration where
device connections create a circular data A. multipath
path. B. attenuate
A. Bus C. goodput
B. Ring D. throughput
C. Star
23. What type of topology is this? A type
D. Mesh of network topology that is for a LAN in
E. Hybrid which all nodes are individually connected
to a central connection point, like a hub or
18. Sending message from one computer to an- a switch.
other with address is called
A. Bus
A. Peer to computer
B. Ring
B. Network to peer
C. Star
C. Computer to peer
D. Mesh
D. Point to Point
E. Hybrid
19. Bus Topology Disadvantages “choose 2”
24. ADV:higher data transmission speeds
A. Backbone breaks, whole network
down A. Star
B. Easy to add stations B. Bus
C. Difficult to isolate problems C. Ring
D. Works well for small networks D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 666

25. This is a technical term that describes the 31. Which device broadcasts any data to all de-
layout of connections in a network. vices on a network?
A. Network Topology A. Router
B. Standalone Computer B. Switch
C. Network Node C. Hub
D. Workstation
D. WAP

NARAYAN CHANGDER
26. The path that data travels between com-
puters (what you cant see) in a network 32. In Star Topology maximum numbers of
is called computers are

A. Geographical Topology A. Not Defined


B. Network Topology B. 50
C. Logical Topology C. 75
D. Physical topology D. 100
27. What is the function of hub and switch? 33. What is a client?
A. act as the centralized nod
A. Powerful Computers that provide ser-
B. act as a storage of the data vices to other computers
C. act as a processor of the data B. Computers that ask for the services a
D. none of above server provides

28. A modem is a device that allows a com- C. Physical connection between devices
puter to connect to the internet using a (a) D. A circuitboard with the components to
A. telephone line send/receive data
B. ethernet cable 34. Which law is this an example of:A(B+C) =
C. optic fiber cable (A.B)+(A.C)A+(B.C) = (A+B).(A+C)
D. none of above A. Associative
29. what are the types of topology? B. Commutative
A. physical & modenial C. Absorption
B. logical & soliloquiy D. Distributive
C. physical & logical
35. I have 8 computers and 2 electronic de-
D. none of above vices connected as a network but split in
a two floored storey building. Which type
30. A series of number used as address for a
of network is this?
device in a network .
A. IP Address A. Wide Area Network

B. IM Address B. Local Area Network


C. MAC Address C. No Area Network
D. OP Address D. Social Area Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 667

36. covers which network technology? 41. which Topology use switch /hub
A. Ethernet with a ton of subcommittees. A. Star

PRACTICE BOOK» NOT FOR SALE


B. Token Ring which now inactive B. ring
C. Wireless LAN (WLAN); specifications C. bus
such as WiFi and many subcommittees.
D. mesh
D. Resilient packet ring
42. When you create a HOTSPOT from your
37. -The more devices you add to the network, phone, you are creating which network
the more likely data collisions are. Mean- type?
ing this topology is no good for larger net-
works. A. LAN

A. Bus B. WAN

B. Star C. MAN

C. Ring D. PAN
D. none of above 43. IT TRANSMITS DATA ONLY IN ONE DIREC-
TION.
38. Who is the best in terms of speed?
A. BUS TOPOLOGY
A. Star
B. RING TOPOLOGY
B. Bus
C. HYBRID TOPOLOGY
C. Ring
D. STAR TOPOLOGY
D. none of above

39. -if the bus cable gets broken, it splits the 44. What is Ring Topology?
network into separate parts.Since the sep- A. Topology is a network configuration
arated networks don’t have terminators where device connections create a circu-
at both ends of the bus. There will be a lot lar data path.
of reflected signals which can shut down
B. Is a type of networking where all
the entire network.
nodes cooperate to distribute data
A. Bus amongst each other.
B. Star C. Topology is the arrangement of the el-
C. Ring ements of a communication network.
D. none of above D. none of above

40. The hub usually sends the message to all 45. IN THIS TOPOLOGY, EACH COMPUTER IS
devices inside the network. This process CONNECTED TO ONE ANOTHER IN THE
is called: FORM OR SHAPE OF A RING OR CIRCLE.
A. Multicasting A. EXTENDED TOPOLOGY
B. Broadcasting B. HYBRID TOPOLOGY
C. Unicasting C. BUS TOPOLOGY
D. Selective Forwarding D. RING TOPOLOGY

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 668

46. What is the role of a terminator in a bus C. Yes, Dual-Ring Topology


network? D. No
A. To stop signals from bouncing back
along the cable. 52. Which devices could be connected within a
network?
B. To destory Sarah Connor.
A. Computers
C. To end the network and stop things
dropping off the end of the cable. B. Servers

NARAYAN CHANGDER
D. I’ll be back. C. Printers
D. Tablets
47. What is the central node called in a star
network? 53. Which of the three main topologies rely on
A. Server a single main cable to transmit data pack-
ets?
B. Switch
A. Ring
C. Node
B. Star
D. Cable
C. Bus
48. What letters does hexadecimal use?
D. none of above
A. A-F
54. A signal containing the address of the in-
B. A-D
tended receiving machine travels from a
C. P-W source machine in both directions to all ma-
D. A-Z chines connected to the bus until it finds it
intended recipient
49. Each NIC has a unique
A. RING TOPOLOGY
A. IP Address
B. BUS TOPOLOGY
B. MAC Address
C. TREE TOPOLOGY
C. Postal Address
D. STAR TOPOLOGY
D. HTTP Address
55. Select three hardware that allows you to
50. What type of network does the Studio connect to a Network.
School have?
A. Router
A. LAN
B. CPU
B. WAN
C. NIC
C. MAN
D. Transmission media
D. PAN
56. Which Topology is Unidirectional?
51. Can the ring topology have a second con-
nection between the nodes? If yes, what A. Mesh Topology and Star Topology
is it called? B. Hybrid Topology
A. Yes, Mesh Topology C. Ring Topology and Bus Topology
B. Yes, Double-Ring Topology D. Ring Topology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 669

57. Which device will only send data packets C. Ring Topology
to the intended recipient?
D. Hybrid Topology

PRACTICE BOOK» NOT FOR SALE


A. Switch
B. Server 63. Can two conected computers be considered
a network?
C. Hub
A. yes
D. none of above
B. no
58. The very fastest networks use this type of
C. server
connection
D. none of above
A. Fibre Optic
B. LAN 64. Each node (file server, workstations, and
C. IP peripherals) is connected to a central de-
vice called a hub.this is:
D. WiFi
A. Tree
59. CHALLENGE QUESTION:Why is a Ring net-
B. Bus
work more secure than a Bus?
C. Star
A. Because you need to hack all comput-
ers on a Ring network to see all the net- D. Hybrid
work traffic
65. I have two LANs connected. Which type
B. Because it is a closed loop
of network consists of two or More Local
C. Because buses have lots of windows Area Network?
D. Because it requires less cable A. Geographical Area Network
60. Fill in the Blank All traffic must pass B. Wind Area Nework
through the or C. Wide Area Network
A. hub or switch
D. Area Network
B. hub or star
C. switch or hybrid 66. What is the Network Topology?

D. bus and mesh A. Type of cabling used in the network


B. Physical layout of the devices and ca-
61. A topology uses hubs or switches as a cen- bling
tral point of connection:
C. All of the Above
A. Bus topology
D. none of above
B. Star topology
C. Ring topology 67. A router can
D. Mesh topology A. Forward data packets
62. It is a bus topology in a closed loop. B. Absorb signals
A. Tree Topology C. Repeat signals
B. Star Topology D. absorb data packets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 670

68. Star Topology Disadvantages “choose 2” A. Ring


A. Failure of the central hub can bring B. Star
down the entire network
C. Bus
B. Costs are higher (installation and
D. none of above
equipment) than for most bus networks
C. Easy to add devices as the network ex- 74. It is the placement of the various com-
pands ponents of a network and the different

NARAYAN CHANGDER
D. Hub provides centralized management connectors usually represent the physical
network cables, and the nodes represents
69. It illustrates how data flows within a net- usually the physical network devices (like
work. switches)
A. Network A. logical topology
B. LAN B. physical topology
C. Physical Topology C. Local Area Network
D. Logical Topology D. Virtual network
70. Question 10:Which of these components is
75. Which 2 are Disadvantages of a Star Topol-
internal to a computer and is required to
ogy?
connect the computer to a network? (1-4)
A. Requires additional hardware such as
A. Wireless Access Point
the central hub or switch
B. Network Interface card
B. if the main cable is damaged or fails
C. Switch the whole network fails
D. Hub C. More collisions with lots of machines
71. Networked computers can share (select on the network
which one is true) D. If the central device fails the whole
A. Hardware, software and data network goes down.
B. Optical discs, software and data 76. What are the advantages of a bus net-
C. Hardware, software and Clients work?
D. none of above A. Easy to set up and install

72. The layout that computers are connected B. Simple to add new devices
in a network is called C. Good for temporary networks
A. Geographical Topology D. High data transfer speeds
B. Network Topology
77. What is TCP stands for in TCP/IP
C. Logical Topology
A. Transmission central protocol
D. Physical topology
B. Transfer control Protocol
73. One of my workstations has gone down
C. Transmission control protocol
and my entire network has gone down.
Which topology am I using? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 671

78. , the most popular LAN technology, has 83. You have learned that there are three
many advantages, including ease of instal- types of network topology. Which one is
lation, scalability, media support, and low NOT network topology?

PRACTICE BOOK» NOT FOR SALE


cost. A. BUS
A. Unshielded twisted pair B. WAN
B. Ethernet C. RING
C. coaxial cable D. STAR
D. digital pulses 84. -the max number of possible connections
on the network is determined by the
79. What is the name for any device connected switch-if you need more, you might need
to a network? to buy a new one.
A. Node A. Bus
B. Server B. Star
C. Workstation C. Ring
D. Hub D. none of above

85. Which of these are mail protocols?


80. Hackers are more accessible to
A. SMTP and POP
A. RING
B. TCP and FTP
B. Wired
C. FTP and SMTP
C. Wireless
D. POP and IP
D. Modems
86. ADV:One cable fails, only one station is af-
81. What is a Transmission Media? Select fected. Simple to isolate faults.
three answers. A. Star
A. Cable (wire) B. Bus
B. Transmission Medium C. Ring

C. Data being transmitted D. none of above

D. Movement of data 87. Which device allows a network to connect


to the Internet?
E. Radio Wave (wireless)
A. Router
82. Which class of IP address provides a max- B. Switch
imum of only 254 host addresses per net-
C. Hub
work ID?
D. Server
A. Class A
B. Class B 88. It is a network topology wherein each
node is connected by interface connectors
C. Class C to a single central cable.
D. Class E A. Star Topology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 672

B. Tree Topology 94. File which Contains list of computers which


C. Mesh Topology are disk-less ( without hard disk)

D. Bus Topology A. Boot param file

89. Which network topology would you typi- B. Inetd


cally find in most homes? C. all files on server
A. Star
D. non of the above

NARAYAN CHANGDER
B. Bus
C. Mesh 95. What is point-to-point topology
D. WiFi A. This is the most complex topology that
consists of a permanent link between two
90. Bus Topology Advantages “Choose 2” topologies. Because it’s a very popular
A. Use less cable than other topologies WAN topology.
B. Data packets travel at great speed B. This is the simplest topology that con-
C. Inexpensive to install sists of a permanent link between two
topologies. its very rare to see this WAN
D. One cable failure does not bring down
topology.
the entire network
C. This is the simplest topology that con-
91. Which is a network which is linked by a
sists of a permanent link between two
shared cable?
topologies. Because it’s a very popular
A. Bus WAN topology.
B. Ring D. This is the most complex topology that
C. Star consists of a permanent link between two
D. none of above topologies. its very rare to see WAN topol-
ogy.
92. Which was the earliest type of network
used? 96. Networks are easy to set up, which net-
A. Star work is harder to modify?
B. Ring A. BUS
C. Bus B. RING
D. BT Cellnet C. STAR
93. what is logical topology D. none of above
A. How the connection between the
nodes appears to the data link layer. 97. Which device routes a data packet to the
specific node to which it is addressed?
B. How the connection between the
frames appears to the data link layer. A. A Switch
C. How the connection between the net- B. A Bridge
work appears to the data link layer.
C. A Hub
D. How the connection between the me-
dia appears to the data link layer. D. A Server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 673

98. What is a disadvantage of a Mesh net- C. Carrier Signal Multiple Access with
work Collision Detection

PRACTICE BOOK» NOT FOR SALE


A. Redundant connections D. Carrier Sense Multiple Access with Col-
B. Slower than Star lision Detection

C. No single point of failure 104. What are the disadvantages to a star net-
work?
D. Expansion doesn’t disrupt the network
A. If the central node fails, the entire net-
99. Connects a similar network together like work will fail
LAN and LAN
B. It is expensive to set up
A. Moderm
C. Expensive to add new devices
B. Router
D. Very poor data security
C. Bridge
105. What’s a “stand-alone” computer?
D. Gateway
A. A smelly computer that nobody wants
100. What are the disadvantages to a bus net- to be next to
work? B. A single computer in a room by itself
A. Data only travels in 1 direction C. A single computer in a network
B. Poor data security D. A computer not joined in a network
C. If the backbone breaks, every follow-
ing device loses connection 106. Which of the following is valid IP ad-
dress?
D. Very expensive to set up
A. 12.0.0.1
101. Networked computers can share B. 168.172.19.39
A. Hardware, software and data C. 192.168.24.43
B. Optical discs, software and data D. none of above
C. Hardware, software and clients
107. What is the device called that serves out
D. none of above the wireless signals in our school?
102. HTTP stands for. A. Wireless access point
A. . Hyper Technology Transmission B. Wireless thing
Piece C. Wireless router
B. Hypertext Transfer Protocol D. Wireless switch
C. Hypertext Talking Package
108. The disadvantages of this topology it is
D. Hypertext Transfer Program expensive and impractical for large net-
work
103. CSMA/CD stands for
A. RING TOPOLOGY
A. Carrier Sense Multiple Access with Col-
umn Dexterity B. STAR TOPOLOGY

B. Carrier Sense MAC Address with Colli- C. TREE TOPOLOGY


sion Detection D. MESH TOPOLOGY

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 674

109. IT DEFINES THE WAY PERIPHERAL AND A. physical topology


NETWORKING DEVICES CONNECTED TO B. virtual network
ONE ANOTHER
C. logical topology
A. PARTIAL MESH TOPOLOGY
D. Local Area Network
B. BUS TOPOLOGY
C. NETWORK TOPOLOGY 114. It is the arrangement of a network includ-
D. NETWORKING TOPOLOGY ing its nodes and connecting lines.

NARAYAN CHANGDER
A. network topolgy
110. What is a network Topology?
B. star topology
A. A network topology is the pattern in
which nodes are connected to a meme C. ring topology
B. 420 kush meister D. mesh topology
C. A network topology is the pattern in 115. Which of the TCP/IP model layers is re-
which nodes are connected to a local area sponsible for breaking down the message
network (LAN) or other network via links. into packets?
D. A network topology is the pattern in A. Network
which nodes are connected to Mr Fields
brain cells B. Application
C. Transport
111. A Topology is essentially the layout of
the network. Networks can be arranged D. Internet
in lots of different topologies. The ones
you need to know about are 116. A LAN usually (Select which one is true)
A. STAR A. Used by international organisations
B. BUS B. Is only used by one computer
C. MESH C. Usually operates on a single site
D. RING D. none of above

112. + Very few data collisions on a 117. In the centre of a STAR topology there
network compared with other network will be a
topologies (layouts)
A. hub
A. Bus
B. switch
B. Star
C. server
C. Ring
D. terminator
D. none of above
118. A problem with a star network is
113. It is the arrangement of network devices
and nodes to form a logical or physical A. There are data crashes
structure. This topology deals with net- B. It stops if a single computer stops
work protocols that are used to control the working
data flow across the network. The ether-
net protocol is the most common protocol C. It is expensive
used for logical topology. D. You can’t add a printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 675

119. Question 2:Which of these is a character- 124. Which of these is an advantage of a Ring
istic of a LAN? (3-6) network?

PRACTICE BOOK» NOT FOR SALE


A. It covers a wide geographical area A. Expensive
B. Computers are connected together us- B. Reliable
ing a leased line or a satellite
C. Fast
C. Users can share files and peripherals
D. Data can only be transmitted at a very D. none of above
slow rate
125. Coaxial cable uses a braided metal shield
120. The bus topology cable ends with that to protect data from
used to absorb unwanted signals.
A. Electro Magnetic Interference (EMI)
A. Hubs
B. Fire
B. Terminators
C. Switches C. Moisture

D. Servers D. none of above

121. The amount of information in a network 126. The client PC doesn’t have to store any
transmission (headers, acknowledgments, data because the server PC store all the
retransmissions) that isn’t part of the ap- data . Based on the statement above .
plication data. Which network architecture is that?
A. throughput A. Peer to peer
B. overhead
B. Bus topology
C. goodput
C. Star topology
D. multipath
D. Client server
122. Network computers can do the following
(which is correct)? 127. An operational mode for Wi-Fi networks,
A. Use Video conferencing, play games in which wireless stations connect through
and write emails a wireless access point before they can be-
B. Use Video conferencing, play games, gin communicating with other devices.
send emails A. hotspot
C. Use Video conferencing, create B. omnidirectional antenna
games, send emails
C. unidirectional antenna
D. none of above
D. infrastructure mode
123. What advantage does a Bus have over a
Ring? 128. Which network topology uses a server?
A. If one computer fails, the network
A. Star
keeps working
B. It’s only £4 for a Day Saver B. Mesh

C. It uses less cable C. Ring


D. none of above D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 676

129. What is Hybrid Topology? B. Ensures devices over a wide range can
A. Easy to design and implement. all connect

B. a type of network topology that uses C. Does not rely on a network of cables
two or more differing network topologies D. Very high security
C. It is a type of network expensive.
135. Which of the following is a disadvantage
D. he arrangement of the elements of a
of a star network topology?
communication network

NARAYAN CHANGDER
A. If the central switch or server fails, the
130. A ring network: whole network is down
A. is reliable B. Requires a high performance switch or
B. is fast server in the centre as all traffic passes
C. requires additional software to func- through it.
tion efficiently C. Extra hardware such as hubs and
D. none of above switches may be needed
D. All 3 of them
131. It is a network topology where every pe-
ripheral node is connected to a central node 136. How many types of network topologies
called a hub or switch. are there?
A. Tree Topology
A. 8
B. Star Topology
B. 10
C. Ring Topology
C. 5
D. Hybrid Topology
D. 7
132. DIS:if the main cable fails, network data
can no longer be transmitted to any of the 137. Why would you use a fiber optic cable in-
nodes (work stations) stead of a ethernet cable?
A. Star A. Distance
B. Bus B. Speed
C. Ring C. Cost
D. none of above D. Distance and Speed
133. What are the “Common Physical Compo-
nents of a Network”? 138. Definition:An electrical component called
a “resistor, “ placed at the ends of a phys-
A. Electric Power ical bus network to absorb the signal in-
B. MS Windows stead of allowing it to bounce back up the
wire.
C. Switch, PC, cables.
D. none of above A. logical topology
B. signal bounce
134. What are the advantages of a mesh net-
work? C. wireless bridge
A. Suitable for large wireless networks D. terminator

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 677

139. THIS TYPE OF TOPOLOGY IS EASY TO 144. P2P stands for


TROUBLESHOOT, ONLY THE COMPUTER A. Peer-to-Peer
THAT IS THE SOURCE OF ERROR IS AF-

PRACTICE BOOK» NOT FOR SALE


FECTED AND NOT THE ENTIRE NETWORK. B. Peer-to-Peripheral

A. STAR HUNT C. Peripheral-to-Peer

B. STAR TOPOLOGY D. none of above

C. TREE TOPOLOGY 145. The actual arrangements (what you see)


of nodes on a network is called
D. MESH TOPOLOGY
A. Geographical Topology
140. DIS:low security-all computers on the
B. Network Topology
network can see all data transmissions by
other computers on the network. C. Logical Topology
A. Star D. Physical topology
B. Bus 146. Hub is the main:
C. Ring A. Server
D. none of above B. Client
C. Workstation
141. Data is stored where, in a client-server
network? D. Central Device
A. Centrally 147. Which topology has the least data colli-
B. On each PC sions?
C. In the switch A. Bus
D. In the hub B. Ring
C. Star
142. Question 8:Which transmission media is
capable of having a much higher band- D. No collisions
width? (6-9) 148. A topology in which each device in the
A. Coaxial network is connected to every other de-
B. Twisted pair cable vice, providing multiple pathways in the
event of a device or cable failure.
C. Plastic
A. mesh topology
D. Fibre optic
B. point-to-mutipoint topology
143. -Data collisions are common on a net- C. extended star topology
work. When there is a data collision the
D. physical ring topology
data much be resent, which slows the net-
work down. 149. RF Signals stand for
A. Bus A. Radio Frequency Signal
B. Star B. Radio Fraction Signals
C. Ring C. Radio Frequency Signals
D. none of above D. Radio Frequency Signs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 678

150. What is cloud computing? (1-4) 155. Which BEST describes a computer net-
A. Storing large amounts of data on a sin- work?
gle computer A. 1 or more computers connected to-
gether
B. Using the internet to store and access
data and programs remotely B. 2 or more computers connected to-
gether
C. Storing hard copies of data as a
backup C. 3 or more computers in the same room
connected with a cable

NARAYAN CHANGDER
D. Using the internet to communicate
with other users D. 3 or more computers in the same room
connected wirelessly
151. In this topology all traffic must past
156. Which network topology cannot use WiFi
through the hub or switch.
technology?
A. STAR TOPOLOGY
A. Mesh
B. RING TOPOLOGY
B. Star
C. MESH TOPOLOGY C. Partial Mesh
D. TREE TOPOLOGY D. Every topology can use WiFi
152. It is the placement of the various compo- 157. Which of the following are uses of Hybrid
nents of a network. Topology:
A. Network A. Found in large enterprises
B. LAN B. Found in smaller enterprises
C. Physical Topology C. Used in places that require scalability
and flexibility
D. Logical Topology
D. Used in areas that have an electrical
153. What is the most commonly used Net- shortage and lack amenities
work Topology?
158. A BUS topology is (Which one is cor-
A. Mesh Topology rect)?
B. Tree Topology A. Easy to set up
C. Star Topology B. Expensive to set up
D. none of above C. Hard to set up
154. What type of network is this? In this D. none of above
network all the workstations, servers and 159. IN THIS TOPOLOGY, EACH COMPUTER
printers are joined to one main cable. At IS CONNECTED DIRECTLY TO A CENTRAL
each end of the cable a terminator is fitted CONNECTION POINT WHICH IS USUALLY
to stop signals reflecting back down. A SWITCH, ROUTER, ETC.
A. Ring Network A. STAR TOPOLOGY
B. Star Network B. HYBRID TOPOLOGY
C. Bus Network C. STRING TOPOLOGY
D. Mesh Network D. TREE TOPOLOGY

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 679

160. To which class the following IP address A. If one computer fails, the network
belongs to:192.168.20.50 keeps working.

PRACTICE BOOK» NOT FOR SALE


A. Class A B. Data is sent in only one direction to
B. Class B avoid collisions.
C. It is commonly used for client-server
C. Class C
networks.
D. Class D
D. All of the above.
161. Which network topology uses one main
166. What is usability
cable to connect all of the computers?
A. way through which we can come to
A. Bus
know the usefulness of that product
B. Ring
B. way of understanding the products
C. Star competitors
D. Mesh C. advantages and disadvantages for the
compnay
162. + Simple to add more devices to the net-
work, since each device is connected to the D. All of the above
switch using a separate cable. 167. What are the two ways of defining a net-
A. Bus work geometry?
B. Star A. LAN and WAN
C. Ring B. PAN and WAN
D. none of above C. VIRTUAL AND PHYSICAL
D. LOGICAL AND PHYSICAL TOPOLOGY
163. Which network topology is in a closed-
loop? 168. Which network topology needs a switch
A. Hybrid Topology or hub?
B. Mesh Topology A. Mesh
C. Ring Topology B. Partial Mesh
D. Circle Topology C. Star
D. Bus
164. Every device, whether a PC or a smart-
phone that is connected to a network. 169. Which of these is an advantage of a Bus
Must have a network?
A. TCP/IT protocol in order to send pack- A. Easy to install
ets
B. Fast
B. Network Interface Card
C. Good security
C. Router
D. none of above
D. Switch
170. It is a network topology that can be
165. Which of the following is true about bus viewed as a collection of star networks ar-
topologies? ranged in a hierarchy.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 680

A. Star Topology 176. Question 1:What is a standalone com-


B. Tree Topology puter? (1-4)
C. Mesh Topology A. A computer that is not connected to a
network
D. Bus Topology
B. A computer that is being used as a
171. The is a network topology that relies server
on a main line of network coaxial cabling.
C. A computer that does not have any pe-
A. Ring Topology

NARAYAN CHANGDER
ripherals attached to it
B. Bus topology D. A computer that is used by only one
C. Start person
D. Hybrid star bus
177. Google chrome is
172. Which of the following networks will al- A. utility software
low an Internet connection?
B. operating system software
A. star
C. application software
B. mesh
C. all of the above D. Non of the above

D. none of above 178. Which protocol is used to send packets


173. Every node is connected to a central node A. IP
called hub or switch B. FTP
A. Definition of Network Topology
C. SMTP
B. Definition of Mesh Topology
D. TCP
C. Definition of Network
D. Definition of Star Topology 179. What does NIC stand for?
A. Network Internet Card
174. What are the advantages of a star net-
work? B. New Internet Creator
A. If a computer goes down, the rest of C. Network Interface Card
the network can still function D. Network Interceptor Card
B. There are very few data collisions
C. Very high data security 180. Which 2 are Disadvantages of a Bus
Topology?
D. It is cheap to set up and maintain
A. Requires additional hardware such as
175. Which of the following class of IP pro- the central hub or switch
vides a maximum of 65, 534 host ad-
B. if the main cable is damaged or fails
dresses per network ID?
the whole network fails
A. A
C. More collisions with lots of machines
B. B on the network
C. C D. If the central device fails the whole
D. D network goes down.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 681

181. full mesh topology? C. Fiber-optic cabling


A. This topology provides low availability, D. Baseband

PRACTICE BOOK» NOT FOR SALE


but requires that every end system be in-
terconnected to every other system. 186. The path that data travels between com-
puters in a network is called
B. This topology provides high availabil-
ity, but requires that every end system be A. Geographical Topology
interconnected to every other system. B. Network Topology
C. This topology provides high availabil- C. Logical Topology
ity, but doesn’t require that every end sys-
D. Physical topology
tem be interconnected to every other sys-
tem. 187. NETWORK TOPOLOGY WAS CON-
D. This topology provides high availabil- STRUCTED IN 1969 BY
ity, but requires that none of the end sys- A. DR. HOWARD FRANK
tem be interconnected to any other sys-
tems B. BILL GATES
C. LADY ADA
182. Which type of network needs a server?
D. HOWARDS FLANK
A. Star
B. Ring 188. + Are not dependent on a central switch
working to keep the whole network run-
C. Bus
ning.
D. Frankie and Benny’s
A. Bus
183. What kind of cables that bus topology B. Star
usually use?
C. Ring
A. UTP
D. none of above
B. Coaxial
C. STP 189. A network with all the nodes acting as
both servers and clients .A PC can access
D. 1000 Base FX files located on another PC and also pro-
184. DIS:if the central devices (switch) goes vide files to other PC.According to the
down, network data can no longer be statement above.Which network architec-
transmitted to any of the nodes. ture is that?
A. Star A. Client server
B. Bus B. Peer to peer
C. Ring C. LAN
D. none of above D. MAN

185. uses extremely thin strands of glass 190. Static Routing


to carry pulses of light long distances and A. The path keeps changing to reach a de-
at high data rates. vice on network.
A. Coaxial Cable B. It is a Fixed path to reach a device on
B. Broadband network.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 682

C. Path can be fix or Changing to reach a 195. Points to point links make fault identifi-
Device over a network cation easy, this is Advantage of:
D. none of above A. Hybrid
191. WHAT ARE THE FIVE NETWORK TOPOLO- B. Tree
GIES C. Star
A. MESH TOPOLOGY, STAR TOPOLOGY, D. Mesh
HYBRID TOPOLOGY, EXTENDED TOPOL-

NARAYAN CHANGDER
OGY, RING TOPOLOGY 196. Select the correct use for Bus Topology
B. BUS TOPOLOGY, RING TOPOLOGY, A. It is used for each device that has ex-
STAR TOPOLOGY, EXTENDED TOPOLOGY, actly two device for communicating rea-
MESH TOPOLOGY sons
C. BUS TOPOLOGY, RING TOPOLOGY, B. It is used for small or temporary net-
TREE TOPOLOGY, EXTENDED TOPOLOGY, work when not relying on the large or high
MESH TOPOLOGY data transfer speed
D. BUS TOPOLOGY, TOKEN RING TOPOL- C. Topology for a Local Area network in
OGY, STAR TOPOLOGY, EXTENDED TOPOL- which all nodes are individually connected
OGY, MESH TOPOLOGY to a central connection point
192. Question 7:Which of these is the correct D. none of above
definition of a router? (1-4) 197. What is an advantage of creating a net-
A. Forwards data packets along a net- work?
work
A. It’s expensive
B. Corrects errors that are found in data
B. Share peripherals
packets
C. Share virusses
C. A type of transmission media that pro-
vides the greatest bandwidth D. Share routers
D. A server within a network 198. A star topology will cause a network fail-
193. What does a Hub do? ure if

A. Once received sends data packets to A. If the hub/switch fails


all workstations B. If one of the many of the computers fail
B. Sends data packets only to intended re- C. If the printer fails
cipient using MAC address D. none of above
C. Sends data packets through the inter-
net 199. Disadvantage of Mesh Topology
D. Reduces network traffic A. Issues with broadcasting messages.
B. Single point of failure affects the
194. Which topology is the most unreliable?
whole network
A. Ring
C. Bottlenecks due to overloaded
B. Star switch/hub.
C. Bus D. Expensive and impractical for large
D. Unreliable network networks.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 683

200. Advantage of Bus Topology C. All devices are equal but some are
A. Only one wire-less expensive more equal than others

PRACTICE BOOK» NOT FOR SALE


B. Not fault tolerant D. none of above

C. No security 206. What type of topology is this? A type of


D. Limited cable length network topology that uses two or more
differing network topologies.
201. It is best suited for small networks, Ad- A. Bus
vantages of:
B. Ring
A. BUS
C. Star
B. Star
D. Mesh
C. Mesh
E. Hybrid
D. Tree
207. A type of network topology in which each
202. What is the network topology also device is connected to two other devices
known as hierarchical topology? on either side through an RJ-45 cable or
A. Tree Topology coaxial cable.
B. Star Topology A. Bus
C. Ring Topology B. Ring
D. Hybrid Topology C. Star
D. none of above
203. -in wired networks, every device needs
a cable to connect to the central switch or 208. Which of these are in the correct order?
server. This can be expensive, e.g. for an (smallest to largest )
office building with 50 terminals.
A. B, KB, MB, TB, GB
A. Bus
B. GB, KB, MB, TB, B
B. Star
C. B, KB, MB, GB, TB
C. Ring
D. KB, MB, TB, GB, B
D. none of above
209. ADV:Easy to add new work stations to
204. What piece of hardware is usually at the the network (without disrupting the net-
centre of a star network? work)
A. router A. Star
B. hub B. Bus
C. server C. Ring
D. none of above D. none of above

205. Which of these statements is correct 210. Which network topology is the hardest
when referring to P2P networks? to add a new computer to?
A. All devices are equal A. Ring
B. There is one central device B. Star

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 684

C. Bus C. Ring
D. none of above D. none of above

211. Which of these is an advantage of a Star 216. Which gate only has an output of 1 if both
network? inputs are 1?
A. No extra hardware needed A. OR
B. Reliable B. NAND
C. AND

NARAYAN CHANGDER
C. Cheap
D. none of above D. NOR

212. -if there is a problem with the switch or 217. The way network are designed to commu-
server then the whole network is affected. nicate.The above statement refer to
A. Bus A. Network topology
B. Star B. Network architecture
C. Ring C. Peer to peer network
D. none of above D. Client server network

213. What is hub and spoke 218. -To try and avoid data collisions, devices
must wait for the bus cable to be avail-
A. VLAN version of the star topology in able before they can send any data, this
which a central site interconnects branch can slow the network down.
sites using point-to-point links.
A. Bus
B. WLAN version of the star topology in
which a central site interconnects branch B. Star
sites using point-to-point links. C. Ring
C. WAN version of the star topology in D. none of above
which a central site interconnects branch
219. I don’t have a server in my network.
sites using point-to-point links.
What type of network is this?
D. LAN version of the star topology in
A. Mesh
which a central site interconnects branch
sites using point-to-point links. B. Star
C. Client-Server
214. ADV:No problem with collisions, each sta-
tion has its own cable to the server. D. Peer-2-Peer (P2P)
A. Star 220. IN THIS TOPOLOGY, ONE OR MORE
B. Bus STAR TOPOLOGIES HAVE AN ADDITIONAL
NETWORKING DEVICE THAT IS CON-
C. Ring
NECTED TO A MAIN NETWORKING DE-
D. none of above VICE.
215. -the switch itself is also an expensive A. STARS TOPOLOGY
piece of hardware. B. HEART TOPOLOGY
A. Bus C. RING TOPOLOGY
B. Star D. EXTENDED TOPOLOGY

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 685

221. A device designed to filter and transfer IP 226. The Internet is an example of which topol-
packets between dissimilar types of com- ogy:
puter networks is called: A. mesh

PRACTICE BOOK» NOT FOR SALE


A. Hub B. star
B. Switch C. tree
C. Load Balancer D. none of above

D. Router 227. Which network topology is best for a


small number of computers?
222. What’s the central computer in a network A. Star
usually called?
B. Ring
A. The sever C. Bus
B. The hub D. EE
C. The server 228. The of a cable will determine its
D. The central computer speed.
A. Diameter
223. The IP 123.213.321.1 belongs to Class
B. Jacket material (PVC or Plenum)
A.
C. Shield
A. Yes
D. Category (CAT) rating
B. No
229. CHALLENGE QUESTION:Which network
C. Wrong IP topology is the most secure?
D. none of above A. Ring
B. Star
224. Device that causes broadcasting and col-
lision domains is: C. Bus
A. Hub D. CNN

B. Switch 230. What is the most popular physical net-


work called? (Our school uses it)
C. Router
A. Computer
D. Repeater
B. Wireless
225. All data transmitted between nodes in C. Ethernet
the network is transmitted over this com- D. Fiber
mon transmission medium and is able to
receive by all nodes in the network simul- 231. This topology has a central connection
taneously. point, which is normally a device such as a
hub, switch, or router.
A. BUS TOPOLOGY
A. mesh
B. STAR TOPOLOGY B. star
C. RING TOPOLOGY C. ring
D. MESH TOPOLOGY D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 686

232. Which of the following is NOT an advan- 237. DIS:performance degrades with heavy
tage of a star network topology? traffic
A. There is no central node to fail A. Star
B. Simple to add or remove a node as it B. Bus
has no effect on any other node C. Ring
C. Good security-no workstation can in- D. none of above
teract with another without going through
238. + Tends to have better performance that

NARAYAN CHANGDER
the server first
other network layouts. Data goes straight
D. Very few data collisions as each node to the central device so all devices can
has its own cable to the server transmit data at the same time.
233. What is considered the easiest topology A. Bus
to design and implement. B. Star
A. Star Topology C. Ring
B. Tree Topology D. none of above
C. Mesh Topology 239. Which class of IP address has the maxi-
mum amount of host addresses available
D. Bus Topology
by default?
234. Which network topology is the strongest A. A
against damage? B. B
A. Star C. C
B. Mesh D. D
C. Ring 240. Select the three advantages of RING
D. none of above TOPOLOGY.
A. It is easy to install extra network de-
235. A software or hardware used to prevent vices
unauthorised access to the network.
B. The addition of new nodes has no ef-
A. Hub fect on the network’s performance
B. Firewall C. Each node is linked independently, a
C. Modem failure of one node or its link transmission
media has no effect on any other nodes
D. Router
D. Each computer has equal access to re-
236. The term used when electricity bounces sources
off the end of a cable and back in the other
241. The actual arrangements of cables and
direction is called (or “reflection”).
nodes on a network is called
A. signal propagation A. Geographical Topology
B. signal bounce B. Network Topology
C. physical star topology C. Logical Topology
D. network backbone D. Physical topology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 687

242. Question 9:Which type of transmission 247. What topology provides the most fault
media is the least expensive to manufac- tolerance?
ture? (6-9)

PRACTICE BOOK» NOT FOR SALE


A. Star-bus
A. Coaxial
B. Mesh
B. Twisted pair cable C. Bus
C. Plastic D. Ring
D. Fibre optic
248. It connects two dissimilar networks to-
243. I can use wireless connections in my net- gether like LAN and WAN
work. Which topology am I using? A. Hub
A. Ring B. Switch
B. Star C. Router
C. Bus D. Gateway
D. none of above
249. It is a connection point inside a network
244. What are the disadvantages to a mesh that can receive, send, create, or store
network? data
A. Lower security as there is no central A. Node
node B. switch
B. Very difficult to set up and maintain C. hub
C. Not suitable for wired networks D. signal
D. Very slow data transfer speeds
250. Which of the following class of IP pro-
245. A single RJ-45 network cable or coaxial vides a maximum of 16, 777, 214 host
cable connects all of the devices on a net- addresses per network ID?
work. A. A
A. Bus B. B
B. Ring C. C
C. Star D. D
D. none of above
251. What type of topology is this? A topol-
246. Which of the following is a disadvantage ogy for a LAN in which all the nodes are
of both bus and ring topologies? connected to a single cable

A. High maintenance A. Bus

B. Very Expensive B. Ring


C. Star
C. An issue on a single node can break
the flow of data D. Mesh
D. Extremely Costly Infrastructure E. Hybrid

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 688

252. examples of Nodes are: B. A Switch


A. Printers, Modems and Light Bulbs C. A Gateway
B. Computers, Printers, Fans and D. A Server
Modems
258. Which IS NOT a benefit of joining a com-
C. Computers, Printers, Routers and puter to a network?
Modems
A. Printers can be shared
D. none of above

NARAYAN CHANGDER
B. Files can be shared
253. ADV:Consistent performance, even when C. Software can be installed on a the
the network is being heavily used. server and shared
A. Star D. Networks are easy to set up
B. Bus
259. + Relatively cheap to set up when com-
C. Ring pared with other topologies. As total
D. none of above length of wiring needed is much less, and
the hardware you need(the central cable
254. Wi-Fi networks can operate in one of two and terminators) is cheaper than switches,
modes:infrastructure and both to buy and maintain.
A. hotspot A. Bus
B. ad hoc B. Star
C. fiber C. Ring
D. channels D. none of above
255. + IF a device fails or a cable is discon- 260. According to the associative law of addi-
nected the rest of the network is unaf- tion,
fected.
A. A + B = B + A
A. Bus
B. A = A + A
B. Star
C. (A + B) + C = A + (B + C )
C. Ring
D. A + 0 = A
D. none of above
261. What is processor speed measured in?
256. In which topology does data move in only A. Hertz
one direction to prevent collisions?
B. Watts
A. Star
C. Amps
B. Mesh
D. Volts
C. Ring
D. Bus 262. Which topology has terminators?
A. Bus
257. Which of the following devices broad-
casts a signal to all other devices on a net- B. Ring
work? C. Star
A. A Hub D. Terminal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.6 Network Topologies 689

263. A NETWORK TYPE THAT IS EASY TO USE B. MESH TOPOLOGY


AND EVERY COMPUTER AND NETWORK-
C. LINEAR BUS TOPOLOGY
ING DEVICES IS CONNECTED TO A SINGLE.

PRACTICE BOOK» NOT FOR SALE


A. BUS TOPOLOGY D. EXTENDED TOPOLOGY

B. RINGS TOPOLOGY 269. This is a type of network topology in


C. LINEAR BUSES TOPOLOGY which each device is connected to a switch
or hub in the middle.
D. MESH TOPOLOGY
A. Star
264. Which is a network where each computer
is linked to a central server on its own ca- B. Ring
ble? C. Bus
A. Bus
D. none of above
B. Ring
C. Star 270. To create a network the following is re-
quired (select the correct one)
D. none of above
A. Python Software
265. What SSID stands for
B. Microsoft Word
A. Service setter ID
C. Use cables, telephone lines, satellites
B. setting service ID
and radio waves
C. Service Set Identifier
D. none of above
D. Non of the above

266. DIS:may be costly to install because of 271. The best use of powerline connections is
the length of cable required. for

A. Star A. Security and gaming


B. Bus B. Portable devices
C. Ring C. Getting a connection in difficult to
D. none of above reach areas
D. They connect the power supply unit
267. Which network topology has a central
(PSU) to the motherboard
hub or switch, connected to all other de-
vices?
272. Which of the following is an advantage
A. Star of tree topology?
B. Mesh A. It is perfect for devices that act as the
C. Bus root device on the network.
D. Ring B. It is perfect for devices that allow a
dual connection.
268. IN THIS TOPOLOGY, EACH COMPUTER
IS CONNECTED TO EVERY DEVICE ON THE C. It is perfect for devices that connect to
NETWORK a WAN.
A. STAR TOPOLOGY D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 690

273. always accrues when two different basic C. Glass


network topologies are connected.this is: D. Rubber
A. Hybrid
277. It is a local network topology in which
B. Tree
the infrastructure nodes connect directly,
C. Star dynamically and non-hierarchically to as
D. Mesh many other nodes as possible and cooper-
ate with one another to efficiently route
274. What is Network Topology?

NARAYAN CHANGDER
data from/to clients.
A. the network is a local network topol- A. Star Topology
ogy in which the infrastructure nodes con-
nect directly B. Tree Topology

B. an arrangement of intersecting hori- C. Mesh Topology


zontal and vertical lines. D. Bus Topology
C. Mesh Topology
278. What is the function of a server?
D. Network topology is the arrangement
A. Store software, user files and backups
of the elements of a communication net-
work B. Store software, user files and biscuits

275. Which of the following are disadvantages C. Stores the CPU and RAM
of the star topology? D. Stores the CPU, RAM and the HDD
A. The whole network is affected if the
279. What is the correct answer? Each node
central point fails because no node can
is directly connected to every other nodes
communicate
in the network.
B. It is expensive to implement because
A. Definition of Star Topology
each device connects directly to every
other device in the network B. Definition of Hybrid Topology
C. Data collisions never occur because C. Definition of Mesh Topology
the devices are connected by a central D. none of above
switch
D. Wired networks can be expensive if 280. ADV:Inexpensive to install, as it requires
you need to connect lots of devices less cable and no additional hardware.
A. Star
276. What is the core of a fiber optic cable
made of? B. Bus
A. Copper C. Ring
B. Wire D. none of above

6.7 Network Protocols and Standards


1. The logical layout of connections in a com- B. map
puter network is called its C. hierarchy
A. architecture D. topology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 691

2. Ethernet is a protocol for data transmis- 7. Which layer does the IP protocol belong
sion in a in?
A. Layer 1-Physical

PRACTICE BOOK» NOT FOR SALE


A. Wired network
B. Wireless network B. Layer 2-Data Link
C. Mail server C. Layer 3-Network
D. Web server D. Layer 4-Transport
E. Layer 5-Application
3. What problem can occur through using
cloud computing? 8. Which of the following is the odd one out?
A. There can be privacy and security is- FTP, HTTP, IMAP, HTTPS
sues A. IMAP
B. More hardware needs to be added to B. FTP
a company network to store data C. HTTPS
C. Only a small amount of data can be D. HTTP
stored
9. Which item is not a protocol?
D. Only a small amount of software can
be stored A. MAC
B. IMAC
4. What term describes a network where one
computer can be both client and server? C. POP3
A. peer-to-peer D. HTTP
B. cloud 10. Which delivery method is used to transmit
C. BYOD information to one or more end devices,
but not all devices on the network?
D. quality of service
A. unicast
5. This is a protocol that dictates how data is B. multicast
sent over a WAN
C. broadcast
A. HTTP
D. none of above
B. TCP/IP
11. Which of these components is internal to
C. FTP a computer and is required to connect the
D. SMTP computer to a network?
6. Which of these describes an IPv4 ad- A. Wireless Access Point
dress? B. Network Interface Card
A. Six sets of hexadecimal numbers be- C. Switch
tween 00 and FF, separated with a colon D. Hub
B. Four sets of numbers between 0 and
12. POP3 is a protocol used for.
255, separated with a full stop
A. Reading Protocols
C. Eight groups of hexadecimal numbers
between 0000 and FFFF B. accessing emails
D. Six sets of numbers between 0 and C. downloading images from the server
128, separated with a comma D. Sending files

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 692

13. Which type of transmission media is the A. You can use it in a range of ‘hard to
least expensive to manufacture? reach’ locations making users more mo-
bile
A. Coaxial
B. It is simple to join a WiFi network
B. Twisted pair cable
C. It reduces Health & Safety issues by
C. Plastic
removing wires
D. Fibre Optic D. It can transmit signals over very long

NARAYAN CHANGDER
distances (> 1 mile)
14. What is a Standard?
A. A set of programs that enable commu- 19. Before data transmission begins, devices
nication send messages to one-another, completing
a task called?
B. A set of specifications one must follow
to communicate A. Data Transmission

C. A globally adopted protocol B. Handshaking Process


C. Network Protocol
D. Layers of the networking model
D. Packet Switching
15. Transfers data packets between comput-
ers and networks by finding the most ef- 20. Which OSI layer uses frames as a PDU?
fective route A. Data Link layer
A. Hub B. Transport layer
B. Switch C. Application layer
C. Router D. Network layer
D. none of above 21. One of the advantages of UDP?

16. Which is never passed on when a packet A. Secure


is routed? B. Larger
A. TCP port number C. Smaller
B. IP address D. Faster
C. MAC address 22. IPv6 addresses are expressed with the
D. none of above use of:
A. Octagonal numbers
17. a means of sending files across the Inter-
B. Binary numbers
net between one or more points
C. Hexadecimal numbers
A. SIP
D. Decimal numbers
B. UDP
23. Connects multiple computers together in a
C. FTP
network. Only sends data to the specific
D. TCP computer address

18. Which is a disadvantage of WiFi? (Select A. Switch


3 Answers) B. Hub

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 693

C. Repeater 28. What is the role of a web server?


D. Modem A. To control centralised access to web-

PRACTICE BOOK» NOT FOR SALE


site data including content and layout
24. What term describes storing personal files B. To control which devices on a network
on servers over the internet to provide ac- are able to access the Internet
cess anywhere, anytime, and on any de-
vice? C. To request a specific web page from a
web host and display the results
A. cloud
D. To allow the user to create their own
B. BYOD web pages
C. quality of service
29. FTP is used for.
D. converged network A. . reading files from the server
25. HTTPS is different than HTTP that it: B. . training people to manage server
space
A. sends and receive messages in en-
crypted form C. . moving files from one computer to
another across the internet
B. sends and receive messages in com-
pressed form D. . following files from the server to your
email
C. sends and receive messages in de-
crypted form 30. It is the protocol that is responsible for
automatically assign IP addresses to net-
D. sends and receive messages in plain
work devices:
form
A. DNS
26. Which of the answers listed below refers B. IMAP
to an IPv4 loopback address?
C. DHCP
A. 127.0.0.0
D. POP
B. 127.0.0.1
31. What is the usual file size of the packets
C. 127.1.0.1
of data sent using TCP/IP?
D. 127.0.0.2 A. 1 Megabyte
27. Which of these statements is true? B. 1000 Megabytes
A. A client-server network has a central C. 1 Kilobyte
computer that provides services to the D. 1000 Kilobytes
rest of the network
32. Which protocol holds the email until you
B. A client-server network is cheap and actually delete it?
easy to set up
A. POP3
C. A client-server network cannot be
used to share files B. IMAP

D. Each computer on a client-server net- C. SMTP


work is maintain separately D. FTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 694

33. What is a standard? C. Layer 3-Network


A. A unit of measurement D. Layer 4-Transport
B. A type of connection for a network ca- E. Layer 5-Application
ble
39. Which statement is correct about network
C. A set of rules for how something be- protocols?
haves or interacts
A. Network protocols define the type of
D. A person who standardises online con- hardware that is used and how it is

NARAYAN CHANGDER
tent mounted in racks.
34. Provides the rules for file transfer be- B. They define how messages are ex-
tween computers. changed between the source and the des-
A. FTP tination.

B. FPS C. They all function in the network access


layer of TCP/IP.
C. HTTP
D. They are only required for exchange
D. SMTP of messages between devices on remote
E. UDP networks.

35. Which protocol(s) are used for web- 40. Which layer do HTTP, SMTP, FTP protocols
pages? belong in?
A. SMTP A. Layer 1-Physical
B. POP B. Layer 2-Data Link
C. HTTP C. Layer 3-Network
D. HTTPS D. Layer 4-Transport
E. Layer 5-Application
36. a means of putting datagrams together
A. Wifi 41. The difference between IMAP and POP
protocols:
B. IP
A. IMAP allows to download emails once
C. HTTP
the user access the email account while
D. TCP POP not
37. What process involves placing one PDU in- B. POP allows to download emails once
side of another PDU? the user access the email account while
IMAP not
A. encapsulation
C. Both protocols allow to download
B. encoding
D. Both protocols doesn’t allow to down-
C. segmentation load
D. flow control
42. Which two devices are intermediary de-
38. Which layer communicates using bits? vices? (Choose two)
A. Layer 1-Physical A. hosts
B. Layer 2-Data Link B. routers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 695

C. servers 48. When will it be appropriate to use UDP in-


D. switches stead of TCP?

PRACTICE BOOK» NOT FOR SALE


A. Sending an email
43. Which protocol is a cryptographic protocol
B. Sending an image
designed for secure communications?
C. Streaming Live
A. TLS/SSL
D. Sending a music file
B. FTP
C. HTTP 49. TCP/IP Stands for
D. POP3 A. Transmission Control Protocol
B. Total Control Protocol
44. Which term refers to a network that pro-
vides secure access to the corporate of- C. Transmission Controlling Protocol
fices by suppliers, customers and collabo- D. Transmission Control Protocols
rators?
50. Which of the four layers in the TCP/IP
A. intranet model will include the hardware used at
B. Internet the user’s end, such as a wireless router?
C. extranet A. Internet
D. extendednet B. Link
C. Transport
45. Which protocol(s) are used for email?
D. Application
A. POP
B. SMTP 51. What is cloud computing?
C. HTTP A. Storing large amounts of data on a sin-
gle computer
D. IMAP
B. Using the internet to store and access
46. A protocol that downloads emails onto a data and programs remotely
client computer and removes the mail mes- C. Storing hard copies of data as a
sage from the mail server. backup
A. SMTP D. Using the internet to communicate
B. SFTP with other users
C. POP 52. SMTP is used for .
D. IMAP A. Retrieving emails
E. HTTPS B. Maintain CPU performance
47. Which protocol is used to resolve domain C. Downloading files
names to IP addresses? D. Sending emails from one server to an-
A. DNS other
B. TCP 53. What is Hypertext used for?
C. DHCP A. Creating websites
D. ARP B. Sending emails

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 696

C. Saving programs C. Star


D. Storing data D. Mesh
54. A MAC Address is usually displayed in. 59. Ensures that communication between a
A. Binary host and a client are secured by encrypt-
ing communications.
B. Denary
A. FTP
C. Floats
B. HTTPS

NARAYAN CHANGDER
D. Hexadecimal
C. USD
55. Which of these is a correct definition of
DNS? D. URL
A. An internet service that is used to de- E. HTTP
tect errors
60. Which is the first of the four layers in the
B. An internet service that stores data in TCP/IP model?
large quantities for different companies
A. Internet
C. An internet service that provides a
messaging service for users to communi- B. Transport
cate C. Application
D. An internet service that translates al- D. Link
phabetic names into IP addresses
61. IMAP stands for:
56. Which of the following is NOT a network
protocol? A. Internet Message Access Protocol

A. UDP B. Internetwork Mapping Access Proto-


col
B. TCP
C. Internet Mapping Add Protocol
C. LAN
D. Internetwork Message Added Proto-
D. SMTP
col
57. The main job of DNS protocol:
62. Each network interface controller has a
A. It translates between domain names unique
and IP addresses
A. MAC address
B. It automatically assigns IP addresses
to network devices B. IP address

C. It transfers web pages C. Signal


D. It enables file sharing across the net- D. Protocol
work
63. Why are standards important in network-
58. What network has the router or switch ing?
placed in the centre and the devices around A. They allow hardware and software to
it? interact across different manufacturers
A. Ring B. They help keep systems private so that
B. Bus other products can’t interact with them

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 697

C. They allow governments to maintain 69. A large corporation has modified its net-
complete control over the Internet work to allow users to access network re-
sources from their personal laptops and

PRACTICE BOOK» NOT FOR SALE


D. They provide paperwork for people
who wouldn’t have anything else to do smart phones. Which networking trend
does this describe?
64. How could you improve security on your A. cloud computing
WIFI?
B. bring your own device
A. Turn off WPA settings
C. online collaboration
B. Delete your IP address D. video conferencing
C. Generate ultra secure wifi
70. Which of these is a benefit of cloud com-
D. Add confirmed MAC addresses to the puting?
WIFI
A. It can reduce costs for a company as
65. What is the bit length of an IPv4 address? they do not need to buy additional hard-
ware to store data
A. 32 bit
B. It is the cheapest option for a company
B. 64 bit to store their data as they do not need to
C. 48 bit pay for cloud computing
D. 128 bit C. Data can be accessed anywhere as an
internet connect is not needed to access
66. Select TWO rules TCP/IP must follow? data and software stored in cloud comput-
A. Senders computer name ing

B. Packets are numbered D. Data will always be more secure in a


cloud computing system
C. Error Check
71. Which protocol would be most suitable for
D. None of the above
accessing a banking website?
67. The units of data that are sent over the A. HTTPS
network.
B. FTP
A. Routing.
C. HTTP
B. Data. D. none of above
C. Packets.
72. Which of these Protocols deals with Email?
D. Protocols. (Click 3)
68. Which protocol prepares the message for A. FTP
being sent and reassembles the parts of in- B. POP
coming messages into the correct order?
C. SMTP
A. TCP
D. IMAP
B. IP
73. it works together with another protocol,
C. MAC Secure Sockets Layer (SSL), to transport
D. UDP data securely.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 698

A. TCP C. Best path selection


B. HTTPS D. Support VLSM
C. Ethernet
79. TCP/IP is
D. IP
A. two of the protocols used in network
74. VOIP is used for. communication
A. . moving files from one computer to B. a suite of communication protocols

NARAYAN CHANGDER
another across the internet C. a set of layers used on the internet
B. . accessing emails D. a standard by the International Stan-
C. . Sending emails from one server to dards Organisation
another
80. allows webpages to be shared across dif-
D. . having a conversation over the inter- ferent computers and browsers
net
A. HTTP
75. Select the network layer where IP ad- B. IP
dress/Packet Number/Error check is com-
pleted. C. SMTP
A. Application Layer D. FTP
B. Transport Layer 81. Which layer of the TCP/IP model splits
C. Internet Layer data into packets and reassembles them
at the destination?
D. Link/Physical Layer
A. Application
76. Which protocol governs the way we trans-
B. Transport
fer and load hypertext?
C. Internet
A. FTP
B. SMTP D. Network Access

C. POP3 82. A service that translates a URL addresses


D. HTTP into an IP addresses.
A. DNS
77. A protocol that allows email messages to
be read and stored on a messaging server. B. DHCP
A. SMTP C. Encryption
B. SFTP D. TCP/IP
C. POP E. UDP/IP
D. IMAP 83. a means of addressing and routing data
E. HTTPS packets across a network
A. UDP
78. Which of the following are the benefits of
OSPF routing over RIP? Tick all that apply. B. IP
A. No hop count limitation C. SIP
B. Faster convergence D. FTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 699

84. An FTP protocol is used for 89. Transmission control protocol (TCP) splits
A. Copying files from one host to another data into

PRACTICE BOOK» NOT FOR SALE


B. Distributing web pages A. segments
C. Accessing emails B. groups
D. Creating secure communications C. parcels

85. Select the correct order of TCP/IP layers D. packets


used in the Unit 2 Spec
90. Which transmission media is capable of
A. Application, Transport, Internet, Data
having a much higher bandwidth?
Link
B. Physical, Data Link, Network, Trans- A. Coaxial
port, Application B. Twisted pair cable
C. Network Interface, Internet, Trans- C. Plastic
port, Application
D. Fibre Optic
D. Internet, Application, Transport, Link

86. Which protocol holds the email only until 91. The checksum in a data packet is used
you receive it? to

A. SMTP A. ensure that all the data has arrived


and is not corrupted
B. FTP
C. IMAP B. ensure that the packet has been sent
to the right place
D. POP3
C. tell the computer what protocols were
87. a low-cost means of putting datagrams to- used
gether principally for streaming video etc
D. ensure that the user is logged on
A. TCP
B. Wifi 92. stateless signalling used for setting up
VoIP and media streaming
C. HTTP
A. SMTP
D. UDP
B. SIP
88. What is meant by latency in the perfor-
mance of a network? C. UDP
A. The amount of time data takes to travel D. Ethernet
from the source to the destination
B. The maximum rate that data can be 93. What is SMS used for?
transferred at A. Picture messages
C. The number of errors that are found in B. Text messages
a data packet after transmission
C. Browsing the internet
D. The route a packet takes when it is be-
ing transmitted D. Connecting to WiFi

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 700

94. What is meant by hosting? C. IMAP


A. A service that allows individuals and D. none of above
organisations to make their website avail-
able on the world wide web 99. What is an ISP?
B. A service that creates websites for A. It is a networking device that com-
companies bines the functionality of several different
C. A service that transmits data in a net- networking devices in one.

NARAYAN CHANGDER
work B. It is an organization that enables indi-
D. A service that translates alphabetic viduals and businesses to connect to the
names into IP addresses Internet.
C. It is a standards body that develops
95. two common standards are Bluetooth and
cabling and wiring standards for network-
801.11
ing.
A. TCP
D. It is a protocol that establishes how
B. Wireless computers within a local network commu-
C. HTTPS nicate.
D. SMTP 100. Which protocol would download the
email from to your computer and delete it
96. mail servers use this protocol to send and
from the server?
receive mail messages, mail applications
typically use this only for sending mes- A. FTP
sages to a mail server.
B. SMTP
A. SMTP
C. POP3
B. HTTP
D. HTTP
C. IP
D. Wifi 101. What does Protocol mean?
A. Rules
97. What is meant by a data packet?
B. Security
A. A unit of data that travels along a net-
work C. Services
B. The number of error found in data D. Orders
when it has been transmitted
C. The data a computer needs to connect 102. Provides the rules to be followed by a
to a network web server and a web browser when re-
questing and supplying data.
D. A connection point in a network that al-
lows data to be shared A. FTP
B. SFTP
98. Which email protocol keeps a copy of the
email on the mailserver? C. HTTP
A. POP D. HTTPS
B. SMTP E. SMTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.7 Network Protocols and Standards 701

103. DNS is an address book mapping to 108. The OSI model consists of layers
A. 3

PRACTICE BOOK» NOT FOR SALE


A. IP address, domains. B. 5
B. domains, IP addresses C. 7
C. IP addresses, protocols D. 8
D. protocols, domains 109. Which of these describes a MAC ad-
dress?
104. IMAP protocol is usually used at:
A. Six sets of hexadecimal numbers be-
A. Outlook program tween 00 and FF, separated with a colon
B. Web based email programs B. Four sets of numbers between 0 and
C. Databases 255, separated with a full stop

D. Desktop applications C. Eight groups of hexadecimal numbers


between 0000 and FFFF
105. In the layer model, if one layer is im- D. Six sets of numbers between 0 and
proved what happensto the other layers? 128, separated with a comma
A. They are updated 110. A good protocol should be able to
B. They break A. Delete packets of data
C. They can no longer communicate B. Start and end a message
D. Nothing, layers are independent. C. Give away MAC addresses
That’s thepoint of them D. Delete security settings
106. Which of these is the correct definition of 111. A service that allocates an IP addresses
a router? to a host on the network.
A. Forwards data packets along a net- A. DNS
work B. DHCP
B. Corrects errors that are found in data C. Encryption
packets
D. TCP/IP
C. A type of transmission media that pro-
E. UDP/IP
vides the greatest bandwidth
D. A server within a network 112. wired (cable connection) protocol
A. HTTP
107. Which layer does the Ethernet and Wifi
B. TCP
protocol belong in?
C. Ethernet
A. Layer 1-Physical
D. IP wired (cable connection) protocol
B. Layer 2-Data Link
113. What term describes a policy that allows
C. Layer 3-Network
network devices to manage the flow of
D. Layer 4-Transport data to give priority to voice and video?
E. Layer 5-Application A. quality of service

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 702

B. internet 116. What does the acronym SSL represent?


C. intranet A. System Service Layer
D. extranet B. Secure Sockets Layer
C. System Synchronize Link
114. What is the roles of a web client?
D. Secure System Link
A. To control centralised access to web-
site data including content and layout 117. Which protocol is used to automatically

NARAYAN CHANGDER
provide IP addresses to network comput-
B. To control which devices on a network ers?
are able to access the Internet
A. DNS
C. To request a specific web page from a
B. HTTP
web host and display the results
C. DHCP
D. To allow the user to create their own
web pages D. ARP

118. The process of sending data between two


115. Which of these is a valid IPv4 address?
computers on the Internet.
A. 192.168.2.256 A. Messaging
B. 192.168.2.1000 B. Networking
C. 192.168.2.200 C. Routing
D. 192.168.2.328 D. Addressing

6.8 Network Devices


1. POE is abbreviation for: A. Router
A. PowerOver Ethernet B. Switch
B. Power on Edge C. Firewall
C. Pass Over Enternal D. Loadbalancer
D. 4. A device that can operate in place of Hub
is a
2. Which is the correct answer to the be-
low:”A number of devices that communi- A. switch
cate with each other without the need of B. repeater
the internet” C. router
A. LAN D. none of above
B. WAN
5. Why do NICs do?
C. TCP/IP
A. Allow devices to control one another
D. DSL
B. Allow devices to connect to a printer
3. Which network device you usually use for C. Allows devices to interface with one
blocking of the traffic. another

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 703

D. Allow devices to connect to a network D. provide optional services to an applica-


tion developer
6. Which of the following is the most secure

PRACTICE BOOK» NOT FOR SALE


protocol to use when accessing a wireless 11. designed to connect multiple network de-
network? vices and systems within a limited geo-
A. WEP graphical distance.
B. WPA A. WAN
C. WPA2 B. LAN
D. TKIP C. MAN
D. PAN
7. Which of the following component is inter-
nal to Compute rand is required to connect 12. A network system that carry telephone
the Computer to a network calls over the data networks and Internet.
A. wireless access point A. Hardware firewalls
B. network interface card B. VoIP
C. switch C. Server
D. hub D. WAP
8. is any set of instructions that tells the 13. Which device filters data packets and only
hardware what to do and how to do it. sends to those that require the data?
A. Peripherals A. router
B. Hardware B. switch
C. Software C. hub
D. router D. WAP
9. You have a server that has a 100BaseFX 14. A Network device has two ports. It splits
network interface card that you need to one network to two networks to decrease
connect to a switch. The switch only has the number of collisions or it connects 2
100BaseTX switch ports. Which device networks to one network.It uses the MAC
should you use? address to take the decision for forward-
A. Gateway ing the packets.
B. Bridge A. Switch
C. Repeater B. Hub
D. Media converter C. Bridge

10. What is Routing? D. Router

A. to take the large network and filter it, 15. Which cloud storage are being describe be-
without changing the size of the network. low:Combination of both cloud; some re-
B. to check messages are sent to the sides in private cloud, while less sensitive
right device. data can be access from public cloud

C. the process of finding a path on which A. Public Cloud


data can pass from source to destination B. Private Cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 704

C. Hybrid Cloud 21. Which of the following devices is used to


D. none of above amplify a signal in a network?
A. MODEM
16. allows information to be delivered to other
computers or electronic devices connected B. Repeater
to the network C. Hub
A. network D. RJ 45 Connector
B. web browser 22. What network device is used to connect

NARAYAN CHANGDER
C. hub two LAN’s together that uses the same
D. country protocol?
A. Hub/Switch
17. A computer that gains itself of the services
B. Router/Modem
provided by servers.
C. Bridge
A. Cable
D. Server
B. Server
C. Client 23. Is an electronic device that connects to
the Internet via an ISP (Internet Service
D. Mainframe
Provider). It converts digital data to ana-
18. This type of network is used to transmit log signals for transmission over a phone
data between Europe and North America. line.
A. WAN A. Modem
B. LAN B. Hub
C. WLAN C. Repeater
D. none of above D. Switch

19. Routing tables of a router keeps track of 24. What is the function of Network Interface
Cards?
A. MAC address of assignments A. connects the clients, servers and pe-
ripherals to the network through a port
B. Port assignment to network devices
B. allows you to segment a large network
C. Distribute IP addresses to network de- into smaller, efficient networks
vices
C. connects networks with different pro-
D. Routes to use for forwarding data to tocols like TCP/IP
its destination
D. boost the signal between two cable
20. What does the data get broken down in to segments or wireless access points
allowing it to travel across a network such
as the internet? 25. A group of computers and other devices
connected together is called a network,
A. Packets and the concept of connected computers
B. Pieces sharing resources is called
C. Parts A. Networking
D. Points B. Inter-Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 705

C. Inter-Connection 30. Name the highlighted part of the


D. Computer Group URL:https:// www.facebook.com/

PRACTICE BOOK» NOT FOR SALE


A. Protocol
26. Commonly used cable for television signal
B. Subdomain
transmission with internet signal.
C. Domain
A. STP
D. Top-level Domain
B. Coaxial
C. Fiber Optic 31. Bluetooth
D. UTP A. rely on some form of ‘AP’ (Access Point
B. They exist in public places such as air-
27. Device that transfers packets of data be-
ports, hotels, internet cafes’, etc
tween two or more networks.
C. wireless network technology designed
A. Router for very short range connections
B. Switch D. refers to any system, where it is pos-
C. Firewall sible to connect to a network or to sin-
D. Node gle computer through wireless communi-
cation.
28. It is a network security system that con-
32. Which of the following devices is used to
trols the incoming and outgoing network
connect two networks which are different
traffic based on an applied rule set It es-
in terms of cable?
tablishes a barrier between a trusted, se-
cure internal network and another net- A. Gateway
work (e.g., the Internet) that is assumed B. Bridge
not to be secure and trusted. It exists both
as a software solution and as a hardware C. Router
appliance. D. None of these
A. Hub 33. The internet is an example of this type of
B. Firewall network.
C. Client A. LAN
D. Repeater B. WLAN
C. WAN
29. Your company purchases a new bridge that
filters packets based on the MAC address D. none of above
of the destination computer. On which
34. Which of the following can be described as
layer of the OSI model is this device func-
the act of exploiting a bug or flaw in soft-
tioning?
ware to gain access to resources that nor-
A. Network mally would be protected?
B. Transport A. Privilege escalations
C. Data Link B. Chain of custody
D. Session C. Default account
E. Physical D. Backdoor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 706

35. Which of the following can be changed on a 40. What should you configure to improve
managed switch by an administrator? (Se- wireless security?
lect all that apply.)
A. Enable the SSID
A. Duplexing B. IP spoofing
B. VLAN assignment C. Remove repeaters
C. Routing table D. MAC filtering
D. Port speed

NARAYAN CHANGDER
41. Your boss asks you to limit the wireless
36. Connects multiple computers together in a signal of a WAP from going outside the
network. Shares data between all comput- building. What should you do?
ers A. Put the antenna on the exterior of the
A. Router building

B. Hub B. Disable the SSID

C. Switch C. Enable MAC filtering

D. Terminator D. Decrease the power levels of the WAP

42. Cable that is made up of conductor, insula-


37. In Ring Topology data flows in:
tor, braiding, and sheath.
A. One direction
A. Fiber optic
B. Both direction
B. STP
C. do not flow
C. Coaxial
D. none of above
D. UPT
38. *They connect many computers together 43. What is the drawback of cloud computing
within a single local area network, or LAN in education system?
.
A. The need for high speed internet ac-
A. Router cess
B. Hub B. The management of data and products
C. Switch C. The absence of hardware
D. Modem D. The wide connection of networks

39. is an Internet standard protocol 44. Which network device are being describe
used by email clients to retrieve email mes- below:Take any data packet received at
sages from a mail server over a TCP/IP one of its port and broadcast it to every
connection. computer in the network
A. IMAP A. Hub
B. HTTP B. Switch
C. FTP C. Bridge
D. POP3 D. Router

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 707

45. In email terminology, what does CC stand 50. Which is the correct answer to the be-
for? low:”A computer that does not communi-
cate with other devices”

PRACTICE BOOK» NOT FOR SALE


A. Correct Contact
A. LAN
B. Constant Copy
B. WAN
C. Confirmed Contact
C. Stand-Alone
D. Carbon Copy
D. Server
46. A device that is used to connect a number 51. The blue cables commonly used to connect
of LANs is- client computers to a local area network.
A. Router A. Bluetooth
B. Repeater B. Near Field Communication
C. Bridge C. Unshielded Twisted Pair (UTP)
D. All of these D. Fibre Optic

52. On the base of which address router de-


47. Which of the following are true about the
cides where to send the packet?
MAC address?
A. MAC address
A. 32-bit address
B. ARP address
B. 48-bit address
C. IP address
C. 64-bit address
D. Post code
D. represented with decimal numbers 0-
255 53. Personal internet journals where the
writer will type in their observations on
E. represented with hexadecimal num- some topic and provide links to some rele-
bers vant websites

48. At which OSI model layer does a media A. Blogs


converter operate? B. Microblogs
A. Layer 1 C. Macroblogs
B. Layer 2 D. B-blog

C. Layer 3 54. An eight-port switch receives a frame on


port number 1. The frame is addressed to
D. Layer 4
an unknowns device. What will the switch
do?
49. Commonly used cable in computer net-
working. A. Send the frame out ports two through
eight.
A. LAN
B. Send the frame out all eight ports.
B. TPC
C. Drop the frame.
C. Coaxial
D. Send the frame out the destination
D. Fiber optic port.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 708

55. A small computing device, typically small 60. A host wants to send a message to
enough to be handheld another host that has the IP address
115.99.80.157. IP does not know the
A. PDA
hardware address of the destination de-
B. WAP vice. Which protocol can be used to dis-
C. POE cover the MAC address?

D. Workstation A. ICMP

NARAYAN CHANGDER
B. DHCP
56. What does e-mail stand for?
C. DNS
A. Electric Mail
B. Electron Mail D. ARP

C. Electronic Mail 61. A Network component with high-speed


D. Election Mail network that consists of one or more hard
drives, a fiber optic cables connection, and
57. To increase security of emails you need the an embedded operating system. It con-
following except for nects to the network, allowing users on
the network to access and share files,
A. Use strong passwords
stream media, and back up data to a cen-
B. Use spam filters tral location
C. Do not change password regularly A. NAS
D. Run anti-virus and anti-spam software B. SAN
58. *Performs more than one function. *More C. Router
convenient to purchase and configure just D. WAP
one device. *Combines the functions of
a switch, a router and a wireless access 62. NIC Stands for
point into one device. The Linksys E2500
is an example of it. A. Network Intersection cord
A. Switch B. Network Interface Card
B. POE C. No Interface connection
C. WAP D.
D. Multipurpose Devices
63. Used by businesses to promote them-
59. *This cable can transmit data over a long selves on the internet.
distance at the highest speed. It can trans- A. Blogs
mit data up to 40 kilometers at the speed
of 100Gbps. B. Microblogs

A. Coaxial C. Macroblogs
B. STP D. B-blog
C. UTP
64. They are high-powered business comput-
D. Fiber optic ers. They are designed for specialized,

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 709

high-end applications like engineering pro- 69. Its task is to send network traffic to its
grams such as CAD (Computer Aided De- correct destination. It works by reading
sign). They are used in 3-D graphics de- the destination network address within

PRACTICE BOOK» NOT FOR SALE


sign, video animation and virtual reality each pocket and transmits it along its way.
simulation. A. router
A. Desktop B. modem
B. Laptop C. switch
C. Server D. hub
D. Workstation
70. Which layers of the OSI model does a net-
65. For what purpose you would use proxy? work adapter operate at? (select two)
A. Block the traffic. A. Physical
B. Loadbalance the traffic. B. Data Link
C. Achieve high availability of your ser- C. Network
vice.
D. Transport
D. Hide your actual IP address.
71. Uses electromagnetic fields to automati-
66. In a wireless network, why is an SSID cally identify and track tags attached to
used? objects. This is a kind of IoT technology
A. To secure the wireless access point that is widely used in Transport and Logis-
tics, easy to deploy, and the communica-
B. To identify the network
tion range and the frequency depends on
C. To encrypt data the type of technology.
D. To enforce MAC filtering A. ZigBee
67. Which of the following is a good reason to B. WIFI
install a firewall? C. Barcode
A. To limit public access to just your DHCP D. RFID
server instead of your whole network.
E. Sensors and Smartphones
B. To cache web pages.
72. A computer network is a system of:
C. To prevent hackers from accessing
your network. A. two or more computing devices con-
nected to one another
D. To translate between internet IP ad-
dresses and the IP addresses on your pri- B. Data transfer and information storage
vate network. C. Sharing devices like scanners
68. Which of the following is the least secure D. A whole lot of individual machines
type of wireless encryption? working on their own
A. WEP 64-bit 73. A box that connects your home network to
B. WEP 128-bit your internet service provider, or ISP.
C. WPA with TKIP A. Switch
D. WPA2 with AES B. Router

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 710

C. Modem 78. How many pairs of wires does the UTP


has?
D. Hub
A. 4
74. A device that connects networks with dif- B. 6
ferent protocols-
C. 8
A. Switch
D. 10
B. Hub
79. Which of these is not a benefit to cloud

NARAYAN CHANGDER
C. Gateway computing?
D. All of these A. Saves storage space on your PC

75. A device that amplifies a signal as it B. Gives you access to files from any com-
passes through it to counteract the effects puter
of attenuation. C. Protects your files from being lost due
to PC failure
A. Server
D. Completely protects your information
B. Client from cloud hackers
C. Cable
80. Which network device are being describe
D. Repeater below:This device checks the incoming
data packet and works out the destination
76. Which connector is used for UTP cabling on address and sends the data packet to the
a network? computer with that address only
A. RF-11 A. Hub
B. BNC B. Switch
C. RS-232 C. Bridge
D. RJ-45 D. Router

77. You are the network administrator for a 81. Each computer has a unique , like a tele-
small organization. Recently, you con- phone number for the internet.
tracted with an ISP to connect your organi- A. Meme
zation’s network to the internet to provide B. Graphic Card
users with internet access. Since doing
C. IP Address
so, it has come to your attention that an
intruder has invaded your network from D. Network Pin
the internet on three separate occasions.
82. Client computers
What type of network hardware should
you implement to prevent this from hap- A. sharing internet connections
pening again? B. these are the normal computers that
A. Switch user can use it to get their work done.
C. can Sharing hardware, such as print-
B. Firewall
ers.
C. Router
D. can Control who can or cannot have ac-
D. CSU/DSU cess to the network.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 711

83. A network device has several ports and 88. The most basic networking device that
refers to a table of MAC addresses to de- links multiple computers or other network
termine which port to use to forward the devices together.

PRACTICE BOOK» NOT FOR SALE


frame.It forwards the data to the exact A. router
destination only.
B. modem
A. Bridge
C. switch
B. Switch
D. hub
C. Router
D. Repeater 89. computer network that connects comput-
ers within a limited area such as a home,
84. network that covers a broad area using school, computer laboratory, or office
leased telecommunication lines building, using network media
A. LAN A. LAN
B. MAN B. MAN
C. WAN C. WAN
D. NET D. NET

85. They are computers used primarily by 90. network that allows information to be
large organizations for critical applica- shared between devices over LAN
tions, bulk data processing such as cen- A. wifi
sus, industry and consumer statistics, en-
B. hotspots
terprise resource planning and transaction
processing. C. ethernet
A. Mainframe D. server
B. Print Server 91. network type that covers the network con-
C. Desktop nection of an entire city or connection of a
small area .
D. Laptop
A. WAN
86. Which cable sends data as light? B. LAN
A. Copper C. MAN
B. Fibre Optic D. PAN
C. Ethernet
92. Which of these is a disadvantage of the
D. none of above ring topology?
87. RFID in Internet of things stands for? A. If one cable is disabled the whole net-
work can crash
A. Radio Frequency Infrared Device
B. If the central hub crashes the whole
B. Repeated Free Induction Decay network breaks
C. Request For Implementation Date C. Only four computers can be attached
D. Reduced-Fat Informed with Details to the ring
E. Radio-frequency identification D. Everyone has to sit facing each other

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 712

93. An infrastructure device designed for con- 98. Which of the following is the unauthorized
necting wireless/wired client devices to a access of information from a Bluetooth de-
network is commonly referred to as: vice?
A. Captive Portal A. Bluejacking
B. Access Point B. Bluesnarfing
C. IDF C. Deep Blue
D. Active Hub D. The Blue Brothers

NARAYAN CHANGDER
94. Select 3 reasons for using a network 99. many businesses use this Wi-Fi technology
to allow the public an access point to a
A. Increased security-user access to the wireless network
network is controlled
A. hotspots
B. Data transfer can be controlled
B. coldspot
C. Sharing resources and devices
C. satellites
D. Centralisation of data D. bluetooth
95. .dynamically assigns an IP address and 100. Which of the following are true regarding
other network configuration parameters bridges? (select two)
to each device on a network so they can
communicate with other IP networks A. Bridges are used to separate one part
of a subnet from another.
A. HTTPS
B. Bridges can connect two segments
B. FTP that use different types of network archi-
C. DNS tecture.

D. DHCP C. Bridges can process multiple frames


simultaneously.
96. A cabled network used in one building. D. Bridges operate at layer 3 of the OSI
A. WAN model.

B. WLAN 101. A wireless network switch has con-


nectivity issues but only when the air-
C. LAN A cabled network used in one
conditioning system is running. What can
building.
be added to fix the problem?
D. none of above
A. Shielding
97. At which OSI layer does a router operate B. A wireless network
to forward network messages? C. A key deflector
A. Network D. Redundant air-conditioning systems
B. Session
102. All of the following are examples of so-
C. Physical cial networking websites except for
D. Transport A. Twitter
E. Data Link B. Instagram

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 713

C. Microsoft Word 108. which type of computer on a network pro-


D. Facebook vides something such as file space?

PRACTICE BOOK» NOT FOR SALE


A. Client
103. This network device connects a number of
other devices and sends data to one spe- B. Server
cific device only.
C. Peer
A. Hub
D. Node
B. Switch
C. Bridge 109. Which cloud storage are being de-
D. Router scribe below:Customer and cloud storage
provider are integrated and operate as a
104. Name the highlighted part of the single entity
URL:https://www.google .com/
A. Public Cloud
A. Protocol
B. Private Cloud
B. Subdomain
C. Domain C. Hybrid Cloud

D. Top-level Domain D. none of above

105. allows computers, smartphones, or other 110. What device can be described as a hub for
devices to connect to the Internet or a wireless network?
communicate with one another wirelessly
within a particular area A. Bridge
A. wifi B. Switch
B. html C. Access Point
C. LAN D. Firewall
D. ftp
111. Which topology allow to connect comput-
106. The amount of data that can be trans- ers including server in a ring?
ferred over wires or fibre optic cable or
wireless-usually measured in megabits per A. Star
second. B. Tree
A. Light C. Ring
B. Switch
D. LAN
C. Bandwidth
D. Router 112. Which of the following hardware devices
links multiple networks and directs traffic
107. A device that can be used to to connect between networks?
dissimilar types of Network is
A. Repeater
A. repeater
B. bridge B. Router

C. gateway C. Hub
D. router D. Bridge

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 714

113. Hafsa thinks that the main disadvantage 118. Which of these is an advantage of the bus
from using this device results from a fact topology?
that any incoming signal on any of its ports A. It is easy and cheap to set up
is re-created or copied and sent out on all
connected ports, B. It is useful for large companies

A. Hub C. You can pick people up

B. Switch D. Anyone can join

C. Access Point 119. Which cloud storage are being de-

NARAYAN CHANGDER
D. Bridge scribe below:Customer and cloud storage
provider are different companies
114. What is drawback of hub A. Public Cloud
A. Bluetooth and infrared B. Private Cloud
B. Poor security C. Hybrid Cloud
C. Intelligent device D. none of above
D. none of above
120. Network devices called concentrators be-
115. What is TCP responsible for doing on a cause they serve as a central connection
network? point for a LAN. It extends the range of
A. It breaks up messages from com- a signal by receiving then regenerating it
puters into small packets to send them and sending it out all other ports. Allows
across the network for collisions on the network segment and
are often not a good solution.
B. It finds computers on the network
A. switch
C. It helps send messages to the correct
computer B. Computer
D. It directs traffic on a network, even if C. Router
part of the network is broken D. Hub
116. What is the name of the type of network 121. Which network device are being describe
that doesn’t have a server? below:This device will convert analogue
A. Client/Server data into digital data and vice-versa
B. Peer to Peer A. Switch
C. Server to Server B. Modem
D. Client to Client C. Router
D. Bridge
117. Which network is able to connect and
send data to each computer via central hub 122. disadvantages of a Network
or switch without looking where the data A. share files, resources
is sent?
B. hare resources such as printer, scan-
A. Star ner and internet connections.
B. Router C. Store data centrally (by using server)
C. Bus for ease of access and backup
D. LAN D. The computer is vulnerable to hackers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 715

123. A type of network device that amplifies 128. Which network component connects a de-
received signal so it can be transmitted vice to transmission media and allows the
over greater distance without loss in qual- device to send and receive messages?

PRACTICE BOOK» NOT FOR SALE


ity is called: A. Peripheral
A. Patch Panel B. Protocol
B. Multiplexer C. Network interface card
C. Repeater D. Server
D. Passive Hub
129. intranet
124. Unique address given to each device on
A. requires password entry and can only
the internet
be accessed from agreed points
A. Media Access Control address
B. Can be accessed from anywhere pro-
B. Internet Protocol address vided user has an ISP account
C. Data Packets address C. Will not give full protection against
D. Data Protocol address hackers and viruses

125. Which of the following, when removed, D. Covers topics of global interest
can increase the security of a wireless ac- 130. On the base of which address switch de-
cess point? cides where to send the packet?
A. MAC filtering A. IP address
B. SSID B. ARP address
C. WPA C. Post code
D. Firewall D. MAC address
126. Which of these is an advantage of cloud
131. WAP stands for
storage?
A. Wired Access Point
A. The user has no control over their data
B. Wireless Access Point
B. Many programs can be run at the same
time, regardless of the processing power C. Whatsapp
of your device D. Wireless Account Permission
C. Accessible anywhere with an internet
132. URL is short for
connection
A. Uniform Resource Locator
D. Portability
B. Unicorn Riding Laser
127. What type of device could allow a vehi-
C. Unlikely Reference Look-up
cle to place a show a warning on the dash-
board, which might also notify the car’s D. Nothing Just URL
manufacturer?
133. In almost all cases, this device is respon-
A. digital network sible for sending out WIFI signals in your
B. generator home for you to connect to.
C. smart phone A. Router
D. sensor B. Hub

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 716

C. TCP IP 139. Devices that connect entire networks to


each other. They use IP addresses to for-
D. MAC
ward packets to other networks. They
134. What do you call on the physical address contain tables of IP addresses along with
of the device? optimal routes to other networks.

A. IP Address A. Switches

B. NIC Address B. Routers

NARAYAN CHANGDER
C. MAC address C. Hubs

D. Serial number D. Bridges

140. Which of the following best describes


135. This network device connects a LAN to
how a switch functions?
the internet.
A. It connects multiple cable segments
A. Hub
(or devices) and broadcasts frames to all
B. Switch of its ports.
C. Bridge B. It connects multiple cable segments
D. Router (or devices) and forwards frames to the
appropriate segment.
136. hard ware required to connect to a WAN C. It connects multiple segments of dif-
using a telephone system ferent architectures. It translates frames
A. Modem and broadcasts them to all its ports.

B. printer D. It connects multiple segments of dif-


ferent architectures. It translates frames
C. screen and forwards them to the appropriate seg-
D. none of above ment.

137. Several networks connected together us- 141. Cable consists of color-coded pairs of in-
ing a router. sulated copper wires.

A. WAN A. UTP

B. WLAN B. STP

C. LAN C. TPC

D. none of above D. Ethernet cable

138. Which of the following devices does NOT 142. Which of the following is a valid MAC ad-
operate at the network layer of the OSI dress?
model? A. 192.168.12.15
A. Router B. 34-9A-86-1G-B3-24
B. Firewall C. 83-5A-5B-0B-31-55-F1
C. Access Point D. C0-34-FF-15-01-8E
D. Layer 3 Switch E. 255.255.255.0

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 717

143. A Network component that consists of A. Mainframe


one or more hard drives, an Ethernet con- B. Print Server
nection, and an embedded operating sys-

PRACTICE BOOK» NOT FOR SALE


tem. It connects to the network, allowing C. Network Printer
users on the network to access and share D. File Server
files, stream media, and back up data to a
central location 148. networks connect computers to-
gether over large physical distances, re-
A. NAS
motely connecting them over one huge net-
B. SAN work and allowing them to communicate
C. Router even when far apart.

D. WAP A. WAN (Wide Area Network)


B. MAN (Metropolitan Area Network)
144. MODEM is
C. LAN (Local Area Network)
A. Modulation Demodulation
D. CAN (Campus Area Network)
B. Modulator Demodulator
C. Model Demodulator 149. A device that connects the internal net-
works and the outside network (Internet).
D. none of above In such a situation, it could also act as a
proxy server and a firewall.
145. The speed of an internet connection is
known as its A. Gateway
A. Bandwidth B. Switch
B. ISP C. Repeater
C. Router D. Hub
D. Broadband 150. This network device broadcasts data to
all computers in a network.
146. You have critical services running on mul-
tiple servers and you want to achieve high A. Hub
availability for clients, which network de- B. Switch
vice you can use for this purpose?
C. Bridge
A. Router
D. Router
B. Proxy
C. Loadbalancer 151. Ethernet Twisted pair cable has how
many conductors?
D. Proxy
A. 6 CONDUCTORS
147. It is a device that connects printers to B. 8 conductors
client computers over a network. It ac-
C. 10 conductors
cepts print jobs from the computers and
sends the JOBS to the appropriate print- D. 12 conductors
ers, queuing the jobs locally to accommo-
date the fact that work may arrive more 152. Cable is completely immune to EMI and
quickly than the printer can actually han- RFI
dle. A. Coaxial

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 718

B. TPC 158. Which of the following network device


C. Fiber optic has the slowest type of connection?

D. STP A. DSL
B. Router
153. Which of the following is an unauthorized
wireless router that allows access to a se- C. Dial-up modems
cure network? D. None Of The Above
A. Rougue access point 159. This network device connects one LAN to

NARAYAN CHANGDER
B. Evil twin another LAN that uses the same protocol.
C. War-driving A. Hub
D. AP isolation B. Switch
C. Bridge
154. Below are examples of good email neti-
quette except for D. Router
A. Always check spelling and grammar 160. How many wires are connected in a RJ
B. Use capital letters to highlight com- 45 connector?
ments A. 4
C. Do not send spam B. 8
D. Respect people’s privacy C. 2
155. A network in which the nodes are located D. 16
within a small geographic area. 161. What device is used to connect a number
A. MAN of computers together to make a LAN?
B. NOS A. Hub/Switch
C. WAN B. Bridge
D. LAN C. Router/Modem
D. Server
156. designed to connect devices over large
distances like states or between countries. 162. small device that connects computers to-
A. WAN gether
B. LAN A. wifi
C. MAN B. server
D. PAN C. queue
D. hub
157. Each pair is wrapped with an additional
metal shield, then all pairs are wrapped in 163. If all devices are connected to a central
a single outer plastic sheath. hub, then topology is called
A. UTP A. Bus Topology
B. STP B. Ring Topology
C. Fiber optic C. Star Topology
D. Coaxial D. Tree Topology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 719

164. Which of the following answers refers 168. A server is


to a data link layer (Layer 2) device de-
A. A computer you use all the time
signed to forward data packets between

PRACTICE BOOK» NOT FOR SALE


Local Area Network (LAN) segments? B. Provides services for clients
A. Router C. Connects all the other computers to-
B. Hub gether

C. Switch D. Provides a WiFi signal


D. Firewall
169. Rules used to allow successful data trans-
165. Which of these is NOT an advantage of mission are called
networks? A. Interconnections
A. Sharing peripheral devices such as B. Medium
printers and scanners
C. Protocols
B. Possible to communicate globally
D. Networks
C. Can protect against viruses
D. PCs can be backed up and updated by 170. Mention which one from this type is
one central PC working specifically to users of an orga-
nization !
166. It is an integrated part of Future Inter-
net and could be defined as a dynamic A. Network
global network infrastructure with self B. Indonet
configuring capabilities based on standard
and interoperable communication proto- C. Internet
cols where physical and virtual ‘things’ D. Intranet
have identities, physical attributes, and
virtual personalities and use intelligent in- 171. A box that lets all of your wired and wire-
terfaces, and are seamlessly integrated less devices use that internet connection
into the information network. at once and allows them to talk to one an-
A. Internet of Things other directly.
B. Artificial Intelligence A. Hub
C. Geo-Localization B. Switch
D. Architecture C. Router
E. ZigBee D. Modem
167. arge computer network that spans a
172. Which is not a wired method of connect-
metropolitan area and falls between a LAN
ing to the internet?
and a WAN
A. LAN A. Dial-up

B. MAN B. Cable
C. WAN C. ADSL
D. NET D. HTTPS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.8 Network Devices 720

173. What is the main reason for adding some- 178. Provide network access to wireless de-
body into the BCC list for an email? vices such as laptops and PDAs. Use radio
waves to communicate with radios in com-
A. It keeps them updated
puters, PDAs, and other wireless devices.
B. It adds them to the conversation Have limited range of coverage.
C. It adds them privately and hides them A. Routers
from view
B. WAP
D. It allows them to see older messages

NARAYAN CHANGDER
C. Switches
174. What type of connector do twisted pair D. Servers
cables on computer networks use?
179. How do switches and bridges learn
A. RJ-11 where devices are located on a network?
B. RJ-30 A. When a frame enters a port, the
C. RJ-45 source IP address is copied from the
frame header.
D. NONE OF THE ABOVE
B. When a frame enters a port, the des-
175. networks connect computers to- tination IP address is copied from the
gether over relatively small distances, frame header.
such as within a single building or within C. When a frame enters a port, the des-
a small group of buildings. tination MAC address is copied from the
A. WAN (Wide Area Network) frame header.

B. MAN (Metropolitan Area Network) D. When a frame enters a port, the


source MAC address is copied from the
C. LAN (Local Area Network) frame header.
D. CAN (Campus Area Network)
180. What does isolation mode on an AP pro-
176. This network is connected without ca- vide?
bles. A. Hides the SSID
A. WAN B. Segments each wireless user from ev-
ery other wireless user
B. WLAN
C. Stops users from communicating with
C. LAN
the AP
D. none of above D. Stops users from connecting to the In-
ternet
177. Which of the following hardware de-
vices regenerates a signal out all con- 181. What two security precautions can best
nected ports without examining the frame help to protect against wireless network
or packet contents? attacks?
A. Router A. Authentication and WEP
B. Repeater B. Access control lists and WEP
C. Switch C. Identification and WPA2
D. Gateway D. Authentication and WPA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 721

182. A network device that transfers small D. Protocol


amounts of DC current over Ethernet cable,
along with data, to power other network 186. In witch layer use Router?

PRACTICE BOOK» NOT FOR SALE


devices such as Wi-Fi access points. A. 1
A. WAP B. 2
B. NIC C. 3
C. POE D. 4
D. EAP
187. This is a LAN which works using wireless
183. converts your computer’s digital sig- network technology such as Wi-Fi.
nal into an analog signal with the tele- A. WAN
phone line.
B. LAN
A. modem
C. MAN
B. computer
D. PAN
C. printer
D. none of above 188. a hardware that is in-charge of filtering
and forwarding packets through the net-
184. networks typically spans a town or work, but with limited capability.
city and is owned by a single person or
company, such as a local council or a large A. router
company. B. modem
A. WAN (Wide Area Network) C. switch
B. MAN (Metropolitan Area Network) D. hub
C. LAN (Local Area Network)
189. Select the two advantages of the IoT:
D. CAN (Campus Area Network)
A. Cutting down waste
185. A is a set of rules governing data com- B. Wastes time and money
munication between two devices.
C. The ability to access information from
A. Sender anywhere at anytime
B. Medium D. Slows down communication between
C. Message devices

6.9 Internet and Web Technologies


1. are theoretical user profiles created by UX D. VPN
and web designers to define what kind of E. TTL (time-to-live)
user a website is being built for and what
their needs are. 2. are used to give different styles to a
A. User Persona website and are separate from template
markup or content. A given HTML docu-
B. Front End ment can take on a drastically different
C. Elements feel based on its CSS.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 722

A. Cascading Style Sheets 7. Javascript is language.


B. JavaScript A. Programming
C. WordPress B. Scripting
D. Custom Module C. Application
E. Staging D. applet

3. What would you need to construct before 8. The part of the internet that users can ac-

NARAYAN CHANGDER
building your website? (KLO 3.1b) cess using web browsers such as Google
Chrome is called the?
A. A storyboard
A. World Wide Web
B. A wireframe
B. The Intranet
C. A prototype
C. HTTP
D. A protocol
D. The Deep Web
4. A type of network where no one outside
an organisation is allowed access is called 9. What is the name of the software you
a(n): need to view web pages?

A. telnet A. A router
B. A network interface card
B. extranet
C. A web borwser
C. intranet
D. A firewall from a single external css
D. internet
file The same html code can be displayed
on many different screen sizes and de-
5. These are actions that happen on the
vices without alterationEasier to allow vi-
user’s end inside their web browser (or
sually impaired people to personally ad-
client). HTML, CSS and Javascript are all
just the way the page looks for specific
client side technologies in that they don’t
CSS properties. All browsers support the
depend on the web server to function.
original CSS1 properties. But later ver-
A. Client Side sions such as CSS3 have less support, es-
B. Domain/subdomain pecially for browsers on non-desktop com-
puters such as smart phones and tablets.
C. Domain Registrar
10. A is a graphic organizer in the form
D. Angular
of illustrations or images displayed in se-
E. Java quence for the purpose of pre-visualizing a
motion picture, animation, motion graphic
6. What does DOM stand for? or interactive media sequence. (KLO 3.1a)
A. Document Object Model A. Wireframe
B. Dimensional Object Modifier B. Navigation Map
C. Document Object Modifier C. Storyboard
D. Document Open Model D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 723

11. is a computer server that tells a user’s A. Eclipse


computer where a particular resource is B. Storyboard
hosted.

PRACTICE BOOK» NOT FOR SALE


C. Lucidchart
A. Name Server
D. Notepad++
B. CDN
C. Media Query 16. What would be the output of <table>
<tr> <th>Student ID</th> </tr> </ta-
D. PHP ble> (KLO 3.2d)
E. HubSpot CMS A. It would create a whole table with ten
12. In a start-up business, where budget is rows.
an issue and purchasing multiple storage B. It would create a table of all the stu-
spaces is not feasible, which of the fol- dent ID’s
lowing information repositories would you C. It would create a table with informa-
use? (KLO 1.2) tion of all the students in a class.
A. A repository that can store big chunks D. It would create a table with only one
of data for a few pounds a month. row named ‘Student ID’.
B. A repository, like DropDown, where
you can store only 2GB of data. 17. You might also hear this discussed as the
information architecture. What this refers
C. A repository, like DropBox, where you to is the structure and hierarchy of the
can store and use data easily-free of cost. pages of the website.
D. A repository, like FTP, where you can A. Navigation Map
personalize the amount of storage and
who can access it by hiring a database B. Opening Tag And Closing Tags
manager. C. Self-Closing Tag

13. Domain, which is used to map an address D. Attributes


to a name is called (KLO 2.1c) E. HTML5
A. Generic Domains 18. Internet works on (KLO 2.1d)
B. Inverse Domain A. packet switching
C. Main Domains B. circuit switching
D. Sub-Domains C. signal switching
14. Which of these statements were true? D. data switching
A. The SQL query must be quoted in PHP 19. What is the difference between HTML and
B. String values inside the SQL query CSS?
must not be quoted A. CSS is one type of HTML
C. Numeric values must be quoted B. HTML gives a webpage structure. CSS
D. The word NULL must be quoted provides styling.

15. When constructing a website, using HTML, C. CSS structures a webpage. HTML
which of the following editor would you strictly provides styling.
use? (KLO 2.1) D. There is no difference.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 724

20. A response code indicating that the client A. Template


was able to connect to the specific server, B. Mood board
but could not find what was requested.
This generally occurs when a user at- C. User Experience (Ux)
tempts to follow a broken or dead link. D. Meta Elements
A. 404 Error E. Selector
B. 500 Error 25. A module that appears on multiple tem-

NARAYAN CHANGDER
C. 403 Error plates throughout a website.
D. 180 Error A. Global Module
E. 001 Error B. Smart Content
C. RSS
21. The system of files and directories is called
D. 404 Error
A. File system E. Sub-page
B. File directory 26. This is a fairly loose term that’s thrown
C. File Manager around a lot. In general, it’s a collection
of code (classes, libraries, etc.) that is
D. File dataset reusable for future projects.
22. This is when a website doesn’t follow con- A. Framework
ventional scrolling top to bottom but in- B. XML
stead only a piece of the page moves while
you scroll. C. 301 Redirect

A. Scroll-Jacking D. Scroll-Jacking

B. Hero E. HTML (Hypertext Markup Language)

C. Mood board 27. A collection of aspirational design ele-


ments you would like to see incorporated
D. User Experience (Ux)
into your website. Think of it as a scrap-
E. Mood Board book of sorts.
23. What would the following code A. Mood board
display? (KLO 3.2c) <iframe B. CSS (Cascading Style Sheets)
src=https://top.instructure.com></iframe>
C. Semantic Elements
A. A website named Canvas inside your
D. User Persona
website.
E. Value
B. A box of frames.
C. A hyperlink of Canvas. 28. The amount of information (aka traffic)
carried on a network at one time.
D. All of the above.
A. Bandrate
24. A template is the coded version of one B. Bandwidth
of the page layouts you saw in the wire-
frame. A website will be made up of many C. Mobile Data
different templates. D. Internet speed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 725

29. is the language used to add style to docu- you about the design, look, and feel of
ments created with HTML. the website alongside brief explanation?
(KLO 3.1a)

PRACTICE BOOK» NOT FOR SALE


A. CSS (Cascading Style Sheets)
B. Structural Elements A. A prototype
C. User Research B. A wireframe
D. Front End C. A protocol
E. VPN D. A storyboard

30. The most popular front-end framework for 34. is an acronym for HyperText Markup Lan-
building websites and applications. It was guage. It is the standard language used to
originally developed by some developers create web pages. It provides a way to
at Twitter and is free and open source. make structured documents using a series
of element tags.
A. Bootstrap
B. Production A. HTML

C. Responsive Design B. jQuery

D. Sticky Nav/Persistent Nav C. HubSpot CMS


E. CSS (Cascading Style Sheets) D. Module
E. Sitemap
31. The Internet began as a network of con-
nectedcomputers at research facilities and 35. Cameron has decided that he is going to
universities.The network was developed send a file to his cloud service. What ac-
by the tive process is he engaging in?
A. Advance Research Project Agency A. Downloading
(ARPA).
B. Uploading
B. World Wide Web Consortium
C. Cryptology
C. Skynet
D. Espionage
D. EarthLink
36. If you want to have more than one prop-
32. The allows you to instantly inspect an erty for a CSS selector, what character
HTML element and assess its CSS format- separates them?
ting.
A. comma (, )
A. Code Navigator
B. semi-colon (;)
B. box model
C. colon (:)
C. CSS Designer
D. dash (-)
D. Chrome

33. Suppose you start building a website for 37. A platform where anyone has the ability
AlRajhi bank, and they ask you for the to write applications for it, or a piece of
blueprints of the website with an expla- software for which source code is made
nation. Then, you would provide them available for free, allowing for redistribu-
with their website’s wireframe. However, tion and the ability to modify that code.
what would you provide if they asked A. Open Source

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 726

B. WordPress 42. The style that you are applying to a selec-


tor, e.g. border.
C. Custom Module
D. Framework A. Property

E. User Interface (UI) B. Value


C. Keyword
38. The World Wide Web (WWW), commonly
known as the Web, is D. Length Units

NARAYAN CHANGDER
A. Resources transferred via the Hyper- 43. Which of the following is not a loop state-
text Transfer Protocol (HTTP) and are pub- ment?
lished by a software application called a
A. for loop
web server.
B. while loop
B. an information system where docu-
ments and other web resources are iden- C. do.while loop
tified by Uniform Resource Locators.
D. beef loop
C. same as the internet.
44. A(n) CSS style is contained in a style sheet
D. None of the above
separate from the webpage.
39. DNS maps human, readable domain names A. inline
into actual
B. linked
A. IP addresses.
C. box model
B. domain names.
D. separated
C. servers.
D. caches. 45. are HTML elements that don’t appear vis-
ibly for the user on a webpage, but give
40. Used by expert HubSpot CMS developers the web browsers additional information
to create customized functionality above about the page keywords, author of the
and beyond the out of the box capabilities document, last modified, etc.
of the platform. A. Meta Elements
A. Custom Module B. User Persona
B. Library C. User Flow
C. XML D. Value
D. 301 Redirect E. Domain/subdomain
E. Template
46. Computer web pages are written in type
41. What does HTML stand for? (KLO 3.2a) of language which is(KLO 2.3c)
A. Hyper Text Markup Language A. hypertext
B. Hyperlink and Text Markup Language B. multimedia
C. Home Tool Markup Language C. hyperlinks
D. None D. assembly

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 727

47. Which of the following is an internet pro- B. Wix


tocol?
C. Dreamweaver

PRACTICE BOOK» NOT FOR SALE


A. HTTP
D. A domain name.
B. HTML
C. CSS 52. is simply a site that allows visitors to
interact with the content in some way. It
D. UTP
could be as simple as a blog that allows
48. A , also known as a page schematic or comments and includes a contact form.
screen blueprint, is a visual guide that rep- (KLO 3.2i)
resents the skeletal framework of a web- A. Interactive website
site. (KLO 3.1b)
B. Easy Website
A. Wireframe
C. None
B. Storyboard
D. 0
C. Navigation Map
D. None 53. Which of the following connections has the
fastest speed to send and receive large
49. Why JavaScript is called as Lightweight amounts of data?
Programming Language?
A. dial-up
A. because JS can provide programming
functionality inside but up to certain ex- B. satellite
tent C. wireless
B. because JS is client side scripting
D. leased line
C. because JS is available free of cost.
D. because we can add programming 54. Another common free, open-source CMS
functionality inside JS written in PHP.
A. Drupal
50. What HTML5 tag is the preferred tag to
divide up a page into separate sections? B. HubSpot CMS
A. <div> C. Module
B. <section> D. Bootstrap
C. <block> E. User Experience (UX)
D. <divide>
55. Which word below complete the quote “
51. Imagine you are about to start a small Watch your thoughts, for they become
business where you would review prod- “
ucts and eventually sell them. For that,
A. actions
you would need to run a blog or a website
where your users, or customers, would B. habits
read reviews and purchase items they
C. words
deem fit for their purpose. What do you
need to start a website? (KLO 2.1c) D. character
A. A website. E. destiny

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 728

56. Recent surveys indicate that the most pop- 61. Not used as frequently as it once was a
ular browser is few years ago, but a portal refers to the
A. Internet Explorer login environment of any given software.
B. Bing A. Portal
C. Chrome B. RSS
D. Firefox C. 404 Error
57. A property in CSS is the part of a web D. Parallax

NARAYAN CHANGDER
pages foundational HTML code (font size, E. Navigation Map
color, margin) whose appearance or style
is changed by CSS. 62. Which tag should be used to create a main
A. Property heading on a page?
B. Sitemaps A. <h1>
C. IIS/Microsoft Server B. <head>
D. SSL C. <main>
E. Node.js D. <heading>
58. When creating a table in HTML, which of
63. In Architecture, to improve efficiency,
the following tags would you NOT use?
servers normally store requested files in
(KLO 3.2d)
a cache in (KLO 2.2)
A. <tr>
A. Server
B. <tbhr>
B. Domain
C. <table>
C. WebServer
D. <th>
D. Memory
59. Any page that is not your homepage. An-
other way to think of this is any page on 64. All HTML elements can be consider as
a URL that is a sub-folder of your main do-
main. A. boxes

A. Sub-page B. styles
B. Wireframe C. functions
C. Opening Tag And Closing Tags D. scripts
D. Self-Closing Tag
65. is a wireless technology standard for
E. Property exchanging data over short distances from
fixed and mobile devices, and building per-
60. What is this an example of? /* This is a
sonal area networks (PANs).
multi-line comment */
A. Syntax A. Infrared

B. Property B. WIFI
C. Value C. Bluetooth
D. Comment D. 4G

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 729

66. ISP stands for? (KLO 2.1d) C. Website


A. Internet Service provider D. Web Content

PRACTICE BOOK» NOT FOR SALE


B. International Service platform
72. Secure Sockets Layer is a security technol-
C. Internet server provider
ogy for establishing an encrypted link be-
D. None tween a web server and a browser. This
is absolutely necessary when dealing with
67. Choose the correct HTML element for the monetary transactions.
largest heading:(KLO 3.2a)
A. SSL
A. <h1>
B. <heading> B. Web Host / Web Server
C. <head> C. CDN
D. <h6> D. Media Query

68. Which is correct CSS syntax? E. jQuery


A. { body; color=black;}
73. JavaScript is Side Scripting Language.
B. body:color= black
A. JSP
C. body {color:black;}
B. Servlet
D. (body color is black)
C. Server
69. This is a development technique to create
perspective on a site when an element D. Browser
moves faster or slower than the page
scroll. 74. How can you make a numbered list?
A. Parallax A. <list>
B. Hamburger Navigation B. <ol>
C. Wireframe C. <dl>
D. Opening Tag And Closing Tags D. <ul>
E. Attributes
75. is a value set in seconds that tells how
70. https://mail.google .com/mail/index.htmlWhat long it will be until your local computer re-
part of the URL in red- freshes its DNS information for a given do-
A. The domain suffix main record. So for example, a TTL value
B. The domain name of 3600 would be 60 minutes (3600/60)
or one hour.
C. The path
A. TTL (time-to-live)
D. The protocol prefix
B. IP
71. When a client requests a web page, what
software is used as a tool? C. AJAX

A. Web Browser D. HubL


B. Web Server E. WordPress

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 730

76. Frames are not used in HTML5 anymore. C. Process register


They have been discontinued as technology D. Locator
advances, and new syntaxes come into the
scene. However, how is it possible for 81. is the latest version of HTML. HTML5 fo-
you, a Web Developer, to know if you are cuses on features that can be used on
working on HTML or HTML5? (KLO 3.2) low-powered devices, the native ability to
A. The image tags are different. work with multimedia and graphic content,
and new semantic web tag elements .
B. The font styling tags are different.

NARAYAN CHANGDER
A. HTML5
C. Through DOCTYPE.
B. IIS/Microsoft Server
D. Through the table tags.
C. SSL
77. Technology that carry information, such as D. Name Server
sound, by systematically modulating prop- E. JSON
erties of electromagnetic energy waves
transmitted through space. 82. A method to prevent outside computers
A. Transistors from accessing a local network. This helps
with security threats from outside enti-
B. Radio Waves ties.
C. Telephone Cables A. Firewall
D. Wi-Fi B. ASP/.Net
78. ISP exchanges internet traffic between C. IP
their networks with help of (KLO 2.1d) D. AJAX
A. internet exchange point E. JavaScript
B. subscriber end point 83. A method by which a web server can redi-
C. ISP end point rect traffic from a given URL to another
URL. This tells the search engines that this
D. internet society
is a “permanent redirect” and to update
79. When you think about target audience, their indexing of the original URL.
you think about people. Which of the fol- A. 301 Redirect
lowing is not an example of a group of tar- B. User Experience (UX)
get audience? (KLO 3.4a)
C. Hero
A. 9-13+
D. Mood board
B. Gender-Time
E. Meta Elements
C. Teens-Adults
84. What is the viewport?
D. None of the above.
A. The viewport is the user’s visible area
80. A is one of a small set of data holding of a web page.
places that are part of the computer Pro-
B. A physical port located on the front of
cessor. (KLO 2.1c)
a display screen.
A. Domain C. A menu option to change the appear-
B. Path ance of your screen.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 731

D. It’s a HTML tag element. 89. CSS helps us bring life and color to our
websites. Which of the ways listed be-
85. Which of the following is an advantage of low is NOT a form of enabling CSS into an

PRACTICE BOOK» NOT FOR SALE


creating a web page using HTML? HTML document? (KLO 3.2b)
A. Design is unlimited-if you can imagine A. Outline Style CSS
it, you can build it
B. Internal Style Sheet
B. You need to learn code before you can
create even a simple web page C. External Style Sheet
C. The software you need to write the D. d. Inline Style
code can be expensive
90. For inserting table rows, why would you
D. Simple pages can be created very need to use the <tr> tag? (KLO 3.2d)
quickly
A. Because it gets difficult for
86. A CSS3 module allowing styles to ap- Notepad++ to understand.
ply depending on conditions. Horizontal B. Because it makes more sense to use
screen resolution “breakpoints” are the <tr> than <tablerows>
most popular use of media queries, which
C. Because it is the syntax provided for
are a cornerstone of responsive web de-
creating HTML tables’ rows.
sign.
A. Media Query D. Because it helps create rows and
columns.
B. Python
C. Java 91. is an identification string, essentially the
name of a website. New Breed’s Domain
D. Joomla Name is newbreedmarketing.com. A sub-
E. Portal domain is simply a domain that’s part of a
larger domain.
87. A development environment where a web-
site can be developed in private before it A. Domain/subdomain
is moved into the live production environ- B. TTL (time-to-live)
ment.
C. DNS
A. Staging
D. mySQL
B. 301 Redirect
E. Open Source
C. Scroll-Jacking
92. is the ability of a website to adapt and
D. Template
scale to allow usability on all device types
E. User Interface (Ui) regardless of manufacturer or operating
system. This is done by using a variety
88. You can apply formatting to multiple ele-
of CSS properties.
ments at once by listing each in the selec-
tor, separated by A. Responsive Design
A. periods B. Parallax
B. commas C. Sub-page
C. quotation marks D. Navigation Map
D. <> E. User Research

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 732

93. When you open an online-shopping app, D. Hero


such as Namshi, Jollychic, SHEIN, or E. User Experience (Ux)
Souq.com, how are you able to view the
products that are being displayed? (KLO 98. A server-side scripting language. Orig-
1.1b) inally it stood for Personal Home Page,
A. Through a magazine. but now is a recursive backronym
PHP:Hypertext Preprocessor. Because it
B. Through an online catalogue. powers the biggest CMS platforms in the

NARAYAN CHANGDER
C. Through an information booth. world (WordPress, Drupal, etc) it’s one
D. Through telephone. of the most common technologies on the
Internet.
94. A computer on internet is identified A. PHP
by(KLO 2.1a)
B. Java
A. email address
C. Joomla
B. street address
D. Global Module
C. IP address
E. Production
D. server address
99. is the underlying protocol used by the
95. are outlines or maps of the pages that
World Wide Web and this protocol defines
make up a website.
how messages are formatted and trans-
A. Sitemaps mitted, and what actions Web servers and
B. CSS3 browsers should take in response to vari-
ous commands. (KLO 3.2)
C. Client Side
A. HTML
D. Web Host / Web Server
B. XML
E. Media Query
C. IP
96. Which CSS concept describes how the or-
D. HTTP
der and placement of rules in the style
sheet affect the application of styles? 100. What statement are used frequently in
A. cascade theory scripts to set up a block of statements that
repeat?
B. inheritance theory
A. Conditional
C. descendant theory
B. Function
D. specificity theory
C. Loop
97. is a markup language that sets a collection
of rules to define the encoding format for a D. Arithmetic
document type. It’s goal, as with JSONis 101. What is the correct HTML for creating a
to be easily readable by humans as well hyperlink? (KLO 3.2g)
as machines.
A. <a name=http://www.w3schools.com>WeSchool.com<
A. Extensible Markup Language
B. Sitemap B. <a url=http://www.w3schools.com>W3Schools.com</
C. User Experience (UX)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 733

C. <a href=http://www/W3schools.com>W3Schools.com”>W3Schools</a>
B. Firewall
C. TTL (time-to-live)

PRACTICE BOOK» NOT FOR SALE


D. <a>http://www.w3schools.com</a> D. DNS
102. What does the term Email means? E. CSS
A. Extraordinary Mail 107. The practice of categorizing online con-
B. Encrypted Mail tent through tags, which allows non-
technical users to collectively classify and
C. Electronic Mail
find information
D. none of above
A. Wiki
103. This refers to “media devices such as mo- B. Ajax
bile phones and PDA’s were the primary C. Folksonomy
source of portable media from which we
could obtain information and communicate D. Blog
with one another 108. Which switching method offers a a dedi-
A. Online systems cated transmission channel?
B. Mobile Media A. Packet switching
C. Social Media B. Circuit switching
D. Web 2.0 C. Virtual-circuit packet switching:
D. Datagram packet switching:
104. describes the emotions, attitudes, and
ease-of-use a person has when using a 109. Which is the selector in this CSS? p
product or service. {color:red;}
A. User Experience (UX) A. p
B. Semantic Elements B. color
C. User Persona C. red
D. User Flow D. none of above
E. Apache 110. Which is the selector for a link?
105. What is the name of the algorithm cre- A. a { }
ated by the founders of Google, Sergey B. link { }
Brin and Larry Page? C. href { }
A. RankWeb D. a href { }
B. RankPage
111. “A software that finds websites, web-
C. PageRank pages, images, videos, news, maps, and
D. PageGrade other information related to a specific topic
or keywords .”
106. The most popular web server type in the
A. Search Engine
world. Apache began in early 1995 and
played a major role in the initial rise of the B. Subject Directory
World Wide Web. C. Search Directory
A. Apache D. Search Subject

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 734

112. How can you make a bulleted list? 117. is the path typical users take when start-
ing on a website and moving toward an
A. <ol>
action on the site. Creating a smooth path
B. <ul> that is intuitive for users to follow is part
C. <list> of user experience (UX) design.

D. <dl> A. User Flow


B. Elements
113. The grouping of individuals with common

NARAYAN CHANGDER
C. VPN
interests or goals into specific groups or
communities D. Firewall

A. Ajax E. DNS

B. RTF 118. A tool used to build websites that make


it easier for people without web develop-
C. Social networking
ment experience to manage the content of
D. Blog a website.
A. Content Management System (CMS)
114. JavaScript Code is written inside file hav-
ing extension B. Custom Module
A. .jsc C. Framework

B. .jvs D. Staging

C. .js E. Hamburger Navigation

D. .javascript 119. The word Javascript after Java was came


from what word?
115. Using CSS code in HTML elements is know A. cool
as
B. coffee
A. inline styling
C. tea
B. external styling
D. choco
C. internal styling
120. The computers in our classroom are:
D. JavaScript styling
A. WiFi
116. Short for JavaScript Object Notation and B. 3G/4G
pronounced J-Sawn. It gives humans a
C. Wired
way to easily read a collection of data in
a logical manner that is still machine read- D. Not Connected
able.
121. are companies that provide space to
A. JSON make websites accessible on the Internet.
B. PHP The web host is the server which phys-
ically hosts the files and databases that
C. jQuery make up a website.
D. HubSpot CMS A. Web Host / Web Server
E. Bootstrap B. Domain Registrar

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 735

C. Angular 126. The large image, headline and call to ac-


tion that will usually be seen above the
D. Python
fold of the homepage.

PRACTICE BOOK» NOT FOR SALE


E. Joomla
A. Hero
122. are sets of angle brackets with an HTML B. Conversion Map
element character(s) that contains a piece C. CSS (Cascading Style Sheets)
of content or part of the structure for a
web page Example of opening tag:<p> D. Semantic Elements
E. User Flow
A. Opening Tag And Closing Tags
B. User Interface (Ui) 127. The world’s most popular blogging plat-
form which is free and open-source.
C. Declarations
A. WordPress
D. Wireframe
B. Global Group
E. IIS/Microsoft Server
C. Library
123. Which of these statements is not true? D. XML
A. The web operates on a client-server E. Scroll-Jacking
model.
128. What type of online platform does
B. Web servers and web browsers speak Google Slides, Prezi, Slides.com, Visme,
HTTP to each other and do so using host and Zoho Show represents?
names, domain names, and IP addresses.
A. Presentation/Visualization
C. A web server is special software that
B. File Management
knows how not to respond to requests for
web pages. C. Cloud Computing
D. None of the above D. Blogging

129. What information does a web crawler


124. The term of sending data from your com-
NOT record about a web page?
puter to another computer on a network
or the internet is: A. URL
A. Create B. Content
B. Download C. Last Updated

C. Modify D. Quality (Credibility)


E. Usefullness
D. Upload
130. DNS client adds suffix atc.jhda.edu. be-
125. UTP stands for? fore passing address to the c
A. Unique Twisted Pair A. DNS Client
B. Upgraded Twisted Pair B. DNS Server
C. Unshielded Twisted Pair C. DNS Label
D. Unshielded Tight Pair D. DNS Recipient

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 736

131. Suppose you are about to startup a busi- 135. An online journal created by an individual
ness that is all about providing education or an organization that can cover a wide
to students who are unable to purchase range of topics
books worth thousands of SARs. While
A. Mashup
doing so, you want to ensure that your em-
ployees have full access to data, communi- B. Wiki
cation, and interaction within the company. C. Podcast
To do this, what type of network would
you install? (KLO 1.2a) D. Blog

NARAYAN CHANGDER
A. Extranet 136. When connecting to a hotspot, what
B. Private would be the first thing that usually ini-
C. Intranet tiates the use of a hotspot? (KLO 3.2h)

D. Internet A. A WiFi signal


B. A website
132. Software used to view pages on the
WWW? C. A web selector that identifies the
hotspot and lists the terms of use.
A. Web Browser
D. A webpage that identifies the hotspot
B. Search Engine
and lists the terms of use.
C. Web Page Editor
D. Web App 137. Another critical piece of the planning
phase, a conversion map shows you the
133. Which of the these statements is not alignment between pages, their calls to ac-
true? tion and the stage in the buyer’s journey.
A. The web server continues in HTML A. Conversion Map
mode until it encounters a PHP opening B. Navigation Map
tag (<? php).
C. Structural Elements
B. The web server starts scanning the
file in HTML mode. It assumes the state- D. User Research
ments are HTML and sends them to the E. Elements
browser without any processing.
C. The web server continues in PHP mode 138. Supposed your company is comfortable
until it encounters a PHP closing tag (? displaying ads using Facebook, but it has
>). been months since the traffic has been de-
teriorating. What would you do to en-
D. None of the above.
hance traffic, and ensure that your target
134. Which is the value in this CSS? p audience is able to see your business’ ad?
{color:red;} (KLO 2.2)

A. p A. Display more ads on Facebook.


B. color B. Use Twitter only.
C. red C. Retargeting
D. none of above D. Avoid content marketing.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 737

139. positioning keeps the element in the D. CSS Values


normal document flow, while position-
ing takes it out of the normal flow. 144. A numeric system which directs traffic to

PRACTICE BOOK» NOT FOR SALE


a particular server on the Internet. All
A. relative, absolute
websites eventually map back to an this
B. absolute, relative number where the files actually live.
C. fixed, static A. IP
D. parallel, universal B. Node.js
140. Server on internet is also known as (KLO C. JSON
2.3) D. HTML
A. Hub E. Global Group
B. Host
145. What is a search engine?
C. Gateway
A. a paid library website that gives reli-
D. Repeater
able information
141. Which of the following tags is an empty B. a library online catalog
tag?
C. searches the Internet and identifies
A. <br> items that match the characters and key-
B. <section> words entered by a user
C. <header> D. a collection of full text articles used for
D. <article> research projects
E. <p> 146. Each of the following reasons are issues
with using email, except:
142. These are actions that happen on the web
server’s side when a user is interacting A. emails are not private
with a website. A common server-side ex- B. emails can be sent immediately
ample would be taking a form submission
and storing the information in a database. C. not everyone has access to a computer

A. Server Side D. you don’t know if the recipient has


read the email
B. SSL
C. Name Server 147. As a Web Developer, how would you en-
sure that a visually impaired user is able
D. Node.js
to access your website? (KLO 3.4c)
E. HTML
A. You would leave the website as it is.
143. In CSS, what is used to find, or se- B. You would enable a text-reader, and
lect, HTML elements based on their ele- use audio to convey meaning and/or infor-
ment name, ID, class, attribute, and more? mation.
(KLO 3.2b)
C. You would use visuals to ensure the
A. CSS Outline user understands each and every instruc-
B. CSS Selectors tion provided.
C. CSS Blocks D. You would do nothing.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 738

148. Based on a company network. Uses B. Design and Structure


TCP/IP and an authorisation system to log C. Usability
in.
D. Images
A. internet
B. intranet 153. is generally any single line of CSS
that appears between the curly braces,
C. extranet
whether shorthand or longhand.
D. none of above
A. Keyword

NARAYAN CHANGDER
149. Along with HTML and CSS, JavaScript is B. Declaration
one of the three essential technologies of
websites, known as the programming lan- C. Value
guage of the web. D. Boogers
A. JavaScript
154. HubSpot’s CMS that is an add-on to the
B. Drupal core marketing platform. It differs greatly
C. Global Group for most of its competitors in that it fully
integrates into your marketing and sales
D. Library
automation platforms.
E. 301 Redirect
A. HubSpot CMS
150. What is a scripting language designed B. Global Module
specifically for use on the web. It has fea-
tures to aid you in programming the tasks C. Portal
needed to develop dynamic web applica- D. Production
tions? E. Sticky Nav/Persistent Nav
A. Javascript
155. A local telephone network is an example
B. PHP
of a network.
C. HTML
A. Packet switched
D. CSS
B. Circuit switched
151. What is a way to store information C. Bit switched
(in variables) to be used across multiple
pages? D. Line switched

A. POST 156. are the HTML elements used to organize


B. SESSION the content of a web page. Structural el-
ements like <div> and <span> are used
C. METHOD
to group block level and inline content to-
D. ENCRYPT gether.
152. When you want to present a website A. Structural Elements
that lacks ambiguity and focuses on the B. Self-Closing Tag
placement of items in appropriate areas,
C. Attributes
which of the following aspect are you re-
ferring to? (KLO 3.4b) D. Property
A. Audience E. Server Side

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 739

157. are parts of CSS code where a property 162. Collection of documents stored on a com-
and value for the selector are displayed puter which is permanently connected with
inside a pair of curly brackets. {font- internet around the world is called (KLO

PRACTICE BOOK» NOT FOR SALE


size:1.5em;} 2.1a)
A. Declarations A. Telnet
B. Mood Board B. www
C. Selector C. LAN
D. CSS3 D. FTP
E. Web Host / Web Server 163. What are expressions that PHP tests or
evaluates to see whether they are true
158. Inside which tags should a <title> ap-
or false. Conditions are used in complex
pear?
statements to determine whether a block
A. <html> </html> of simple statements should be execute?
B. <head> </head> A. Loopings
C. <p> </p> B. Conditions
D. <h1> </h1> C. Arithmetic
159. The live environment which is accessible D. Functions
to the public on the Internet. 164. is a wireless technology standard for
A. Production exchanging data over short distances from
B. 404 Error fixed and mobile devices.

C. Parallax A. Infrared

D. Sub-page B. WIFI

E. Structural Elements C. Bluetooth


D. 4G
160. Firefox, Chrome, Safari, and Internet Ex-
ploder are all examples of? 165. Fairly recent in the scheme of things
and is a server-side runtime environment
A. Websites
which uses Google’s V8 JavaScript engine.
B. Search engines It has event-driven architecture and start-
C. Web browsers ing to replace PHP for some uses.
D. Internet service providers A. Node.js
B. Media Query
161. What type of network would be used for
an organization which wants to keep all its C. PHP
information private but accessible to some D. jQuery
outsiders?
E. Module
A. Intranet
166. What is the piece of software used by
B. Extranet search engines to visit webpages to add
C. Bot Net them to the index?
D. MIFI A. Bug

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 740

B. Caterpillar Guido van Rossum in the Netherlands as


C. Spider the successor to the ABC language.

D. Worm A. Python
B. CSS
167. is a computer system that processes
requests via HTTP, the basic network pro- C. Open Source
tocol used to distribute information on the D. Content Management System (CMS)
World Wide Web. (KLO 2.3a)

NARAYAN CHANGDER
E. RSS
A. Web server
B. Mail Server 172. HTML stands for?

C. Proxy Server A. Hypertext Markup Language

D. None B. High Tech Made-up Language


C. Hyperlink Text Markup Language
168. What is a network adapter?
D. Hypertext Masking Language
A. Powerful Computers that provide ser-
vices to other computers 173. To send an email, you need to have each
B. Computers that ask for the services a of the following, except:
server provides A. a file to attach to the email
C. Physical connection between devices B. your own email adress
D. A circuitboard with the components to
C. information to type in the email
send/receive data
D. the email address of each intended re-
169. Term that define registered hosts accord- cipient.
ing to their generic behavior, is called (KLO
2.1c) 174. The ability to create a unique experience
for a user based on certain segmentation
A. Generic Domains
criteria in HubSpot based on list member-
B. Main Domains ship, event tracking or referral source.
C. Super-Domains A. Smart Content
D. Sub-Domains B. Framework
170. What are HTTP[S] used for? C. Staging
A. To send information across the inter- D. User Interface (UI)
net in packets E. Wireframe
B. To ensure that information is sent to
the correct computer 175. Proxy server reduces load on the (KLO
2.3c)
C. To send mail across the internet
A. Proxy Server
D. To transmit webpages across the inter-
net B. Node Server
C. Domain Server
171. Another widely used general-purpose
programming language. It was created by D. Original Server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 741

176. describes all the parts of a website E. Front End


that can be seen and interacted with by
users. Front end web development usu- 180. A CSS class attribute is represented by

PRACTICE BOOK» NOT FOR SALE


ally involves coding with HTML, CSS, and A. a # prior to the selector name
JavaScript.
B. boldface type on the declaration
A. Front End
C. a period before the selector name
B. Property
C. HTML5 D. quotation marks around the HTML ele-
ment
D. Server Side
E. IP 181. Which type of programming language is
CSS?
177. Which of the following is an advantage of
creating a web page using web authoring A. markup language
software? B. scripting language
A. Design is unlimited-if you can imagine C. compiled language
it, you can build it
D. none of above
B. You need to learn code before you can
create even a simple web page 182. A network of networks connected by high
C. The software you need to write the speed data channels.
code can be expensive A. internet
D. Simple pages can be created very B. intranet
quickly
C. extranet
178. Type of networks covers a large geo-
graphical area and usually consists of sev- D. none of above
eral smaller networks, which might use
183. DNS can be pictured as an inverted hier-
different computer platforms and network
archical tree structure with one root node
technologies:
at top and a maximum of (KLO 2.1c)
A. SAN (small area network)
A. 128 Levels
B. MAN (middle area network)
B. 129 Levels
C. GAN (great area network)
C. 130 Levels
D. WAN (wide area network)
D. 131 Levels
179. This is when the main menu of a site will
stay on your screen, even as you scroll 184. Error to indicate that you do not have per-
down below the fold of the website. It mission to view the page.
is a common best practice in modern web
A. 403 Error
design.
A. Sticky Nav/Persistent Nav B. 360 Error

B. Sub-page C. 180 Error


C. Navigation Map D. 001 Error
D. Structural Elements E. 900 Error

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 742

185. are HTML elements that provide informa- that behavior can lead to a better website
tion to the web browser processing the experience and design.
page as well as the developer building it.
A. User Research
These like <header>, <section>, and <arti-
cle> define their content in their name. B. Attributes
A. Semantic Elements C. Property
B. User Research D. HTML5

NARAYAN CHANGDER
C. Front End E. ASP/.Net
D. Elements
190. Name of domain is domain name of node
E. Firewall at top of the (KLO 2.1c)
186. Web page that integrates content and A. Sub Tree
script from multiple Web sites to create
B. Main Tree
new applications
C. Leaf Node
A. Mashup
B. Semantic web D. Bottom Tree

C. Analytics 191. Which network would be best for a Col-


D. Podcast lege?
A. MAN
187. Not the same thing as JavaScript. It is
a general purpose computer programming B. LAN
language. C. WAN
A. Java
D. CAN
B. Open Source
C. Content Management System (CMS) 192. Logging on to my banking is considered
an
D. Smart Content
A. Intranet
E. 404 Error
B. Extranet
188. A group of modules that appears on multi-
C. Internet
ple templates throughout the website. For
example, the footer of a website is a com- D. World Wide Web
mon global group.
193. JavaScript is designed for following
A. Global Group
purpose-
B. Module
A. To Style HTML Pages
C. Bootstrap
B. To Perform Server Side Scripting Oper-
D. Sitemap tion
E. Hero C. To add interactivity to HTML Pages.
189. is the process of investigating how users D. To Execute Query Related to DB on
behave on a website and examining how Server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 743

194. Which comparison operator is applicable D. Podcats


with this question? (Are the two values
equal in both value and data type? ) 199. Bluetooth and Wi-Fi enable devices to

PRACTICE BOOK» NOT FOR SALE


communicate using
A. ==
B. > A. Router
C. === B. WLAN
D. <= C. Switch

195. FTP stands for D. Radiowaves


A. Free Tower Protocol 200. What is FTP used for?
B. Final Transfer Protocol
A. To send information across the inter-
C. Fast Transfer Protocol net in packets
D. File Transfer Protocol B. To ensure that information is sent to
the correct computer
196. is the company that actually manages the
reservation of Internet domain names. A C. To send mail across the internet
domain name registrar must be accredited
D. To copy files from one computer to an-
by a generic top-level domain registry such
other
as ICANN (the Internet Corporation for As-
signed Names and Numbers). function. 201. Another name for electronic document
A. Domain Registrar found on the web is .
B. DNS A. Webpage
C. mySQL B. Website
D. CSS C. Homepage
E. Content Management System (CMS)
D. Pagesite
197. A standard piece of back-end HubSpot
CMS development. 202. Who created the World Wide Web in
1989?
A. Module
A. Al Gore
B. Portal
C. Production B. Tim Berners-Lee
D. Responsive Design C. Bill Gate
E. Conversion Map D. Steve Job

198. A Web feed format for downloading au- 203. Who is making the Web standards? (KLO
dio or digital media files that can be syn- 2.1a)
dicated, subscribed to and downloaded au-
tomatically as new content is added. A. Microsoft

A. Ajax B. Google
B. Wiki C. The World Wide Web Consortium
C. RTF D. Mozilla

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 744

204. Which of the following devices provides 209. Self-closing tags are opening tags that
access to the internet? don’t have a corresponding closing tag but
instead close themselves with a forward
A. Adapter
slash before the right angle bracket.
B. Modem
A. Self-Closing Tag
C. Router B. Declarations
D. Switch C. Wireframe

NARAYAN CHANGDER
205. This type of internet connection Offers D. Sitemaps
high-speed Internet connections over the E. SSL
cellular radio network to computers and
devices with built-in compatible technol- 210. Content Delivery Network. This is the
ogy (such as 3G, 4G, or 5G) or a wireless practice of hosting website assets across a
modem or other communications device global network of servers versus a single
web server.
A. Mobile Broadband
A. CDN
B. Fiber to the Premises (FTTP)
B. Angular
C. Wi-Fi C. Python
D. Digital Subscriber Line (DSL) D. Java
206. Who runs/own the internet? E. Global Module

A. The US Government 211. allows you to create and edit CSS


rules at the same time.
B. The Russians Government
A. navigator
C. No single person or group runs/own
the internet B. css designer

D. World Wide Web Consortium C. box model


D. inline
207. Which App will let you change the font
character? 212. In Uniform Resource Locator (URL), path
is pathname of file where information is
A. Docs (KLO 2.2)
B. Slides A. Stored
C. Sheets B. Located
D. All of the Above C. to be transferred
D. Transferred
208. Bluetooth allows for the exchange of
data across each of the following, except: 213. HubSpot’s server-side templating lan-
A. Long Distances guage. Though very similar to Jinja 2’s
syntax, it is actually written from the
B. Short Distances ground up in Java for better performance.
C. Wired Devices A. HubL
D. Wireless Devices B. HTML

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 745

C. Drupal 219. These controls were first used on mobile


D. Global Group but since have seen expanding use on desk-
top sites as well to reduce clutter in the

PRACTICE BOOK» NOT FOR SALE


E. XML header area.
214. are used to provide additional informa- A. Hamburger Navigation
tion about HTML elements. For example
an HTML element like a paragraph can B. Template
have an attribute of being aligned (left, C. HTML (Hypertext Markup Language)
center, or right).
D. User Interface (Ui)
A. Attributes
E. Wireframe
B. Wireframe
C. Sitemaps 220. A data communications network that con-
nects personal computers within a very
D. IIS/Microsoft Server
limited geographical area-usually a single
E. Name Server building. Its use a variety of wired and
215. The Switch is the device that wireless technologies:

A. tells the the brain what to do A. LAN (local area network)


B. causes harm when touched B. SAN (small area network)
C. distributes signals to the network C. GAN (great area network)
D. consumes data frequently D. MAN (middle area network)
216. You should save HTML files with which 221. A proxy server keeps copies of responses
file extension? to (KLO 2.3c)
A. .htm A. Current requests
B. .index
B. Recent requests
C. .webpage
C. Pending requests
D. .html
D. Received Requests
217. The is a programmatic construct that
enables you to format or redefine the de- 222. </h> is
fault settings of any HTML element. A. Header Tag
A. navigator
B. Headline Tag
B. css designer
C. Half of a tag
C. box model
D. Closing header tag
D. inline model
223. The space between HTML content and a
218. https://facebook.com is an example of
border around that content is the
a.?
A. URL A. padding
B. HTML B. margin
C. Protocol C. box structure
D. IP Address D. line spacing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 746

224. What is coaxial cable used for? 229. Why online collaboration useful nowa-
days?
A. Transmitting TV and Broadband sig-
nals A. Actions can’t be done quickly
B. Connecting LANs B. Need to be in the same place at the
same time together
C. Connecting WANs
C. Allows working together virtually
D. Connecting clients to a server
D. Documents are stored in multiple

NARAYAN CHANGDER
225. A collection of related webpages and as- places
sociated items, such as documents and pho-
230. As a user, who has just booked the next
tos,
flight to Dubai for a meeting, you are in
A. Webpage dire need of an internet connection on your
B. Website way to the airport. You are in a public bus
full of people using their phones. What
C. Homepage would you need to connect to an encrypted
D. Pagesite hotspot? (KLO 3.2h)
A. You need to get the security key and
226. Body tags are used; the network name (SSID).
A. Used for only the header B. You need to get a password only.
B. Used only for the paragraph C. You need to hack into the network in
order to use it.
C. element that wraps everything that is
visible on the page. D. All of the above.
D. Not used in HTML 231. What is the correct HTML for adding a
background color? (KLO 3.2a)
227. is the CSS code that defines the settings
for for a CSS property. A. <background>yellow</background>

A. Value
B. <body style=”background-color:yellow;”>
B. VPN
C. Firewall C. c. <body bg=”yellow”>
D. TTL (time-to-live) D. None
E. mySQL 232. For your document to be displayed as
transformed text, instead of ordinary
228. A page or collection of Web pages that text, you need a code of text that appears
can be viewed and modified by anybody to display a series of things based on what
with a Web browser and access to the In- it is instructed to display. What do you
ternet need to start this code? (KLO 3.3)
A. Ajax A. Objects
B. Wiki B. Tags
C. Blog C. Hyperlinks
D. Mashup D. Document Readers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 747

233. When choosing domains, you have the B. CMS


choice to choose how your website’s URL C. Web Host
would end. For example, .com or .org.

PRACTICE BOOK» NOT FOR SALE


This type of domain is usually referred to D. Web Soft
as what? (KLO 2.1c) 238. Each of the following features are typical
A. TLR of 2G mobile phones systems except:
B. TLL A. Caller ID
C. TLS B. Internet Access
D. TLD C. Multimedia Messaging
D. Video Streaming
234. Which of the following topologies would
be used if every single computer was to 239. Rich Site Summary or Really Simple
have its own dedicated connection from Syndication XML files contain information
the central hub? that’s frequently updated, such as blog en-
A. Star Topology tries and news headlines, using a family of
standard web feed formats.
B. Bus Topology
A. RSS
C. Ring Topology
B. Staging
D. none of above
C. User Interface (UI)
235. The quickest way to specify that all mar- D. Hamburger Navigation
gins should be 10px is to enter the code
E. Opening Tag And Closing Tags
A. all margine:” 10px;
240. Virtual Private Network. This allows re-
B. martin-top; margin-right; margin-
mote computers to log into a Local Area
bottom;margin-left:10px
Network and gain access to servers other-
C. margin:10px 10px 10px 10px wise restricted to outside users.
D. margin:10px A. VPN
236. The most popular JavaScript library de- B. Server Side
signed to simplify client-side scripting to C. ASP/.Net
extend and simplify what can be done in D. IP
plain JavaScript.
E. HubL
A. jQuery
241. is the latest version of CSS, introducing
B. Joomla
A1features like rounded corners, shadows,
C. Global Module gradients, transitions or animations, and
D. Portal new layouts like multi-columns and flexi-
ble box or grid layouts.
E. Responsive Design
A. CSS3
237. For a computer to store your website,
B. Apache
and ensure that all files are available to
the end user, which of the following would C. Domain/subdomain
you NEED:(KLO 2.1e) D. Domain Registrar
A. Website E. Python

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 748

242. An implementation by which Web data D. HTTP is an application layer protocol.


is contextualized with the addition of
247. In a CSS rule, styling information is con-
machine-readable metadata
tained in the
A. Social networking
A. selector
B. Ajax
B. declaration
C. Mashup
C. class
D. Semantic web D. id

NARAYAN CHANGDER
243. What contains a list of files and the infor- 248. What type of signals are transmitted
mation needed for the operating system to across fibre optic cables?
find those files?
A. Electric
A. System
B. Light
B. Folder
C. Sound
C. Directory
D. Radio
D. Database
249. is a dedicated computer or a software
244. An application that enables users with system running on a computer that acts
an Internet connection to access and view as an intermediary between an endpoint
webpages on a computer or mobile device. device, such as a computer, and another
A. Browser server from which a user or client is re-
questing a service. (KLO 2.3c)
B. Surfer
A. Proxy Server
C. Search Engine
B. Mail Server
D. Subject Directory
C. Web Server
245. PHP uses settings in a file named to D. None
control some of its behavior
250. is a coding language and web-app frame-
A. php.ini
work mostly maintained by Google that is
B. PHP Session used to address challenges encountered in
C. PHP Server developing single-page web apps.
D. PHP Post A. Angular
B. mySQL
246. Since a protocol is a set of rules that
govern a conversation between a client C. CSS
and server, which of the following would D. Open Source
be correct about an HTTP protocol? (KLO E. Smart Content
2.1a)
251. What for statament parameter sets
A. HTTP is a transportation layer proto-
starting value?
col.
A. counter
B. HTTP is not part of the OSI layers, it is
just a protocol. B. condition
C. HTTP is not used on a web server or a C. increment/decrement
web client. D. do-while

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 749

252. A(n) CSS style is applied directly in C. Web Host / Web Server
the line of code of an HTML element. D. CDN

PRACTICE BOOK» NOT FOR SALE


A. designer E. PHP
B. box model
257. Which of these statements were the rule
C. inline of declaring variable in PHP?
D. navigator A. All variable names have a dollar sign
253. Error to indicate that the web server is ($) in front of them. This tells PHP that it
not accessible. is a variable name.

A. 500 Error B. Variable names must begin with a let-


ter or an underscore. They cannot begin
B. 360 Error with a number.
C. 180 Error C. Variable names can be any length.
D. 001 Error D. Variable names can include letters,
E. 900 Error numbers, and underscores only.
E. All of the above
254. Short for Asynchronous JavaScript and
XML. With this web apps can send and re- 258. When CSS rules conflict
ceive data in the background without dis-
rupting the display and behavior of the A. rules farther down on the list override
page. rules that are higher on the list.

A. AJAX B. decisions are made alphabetically by


rule name
B. JSON
C. the rule with the lowest specificity is
C. HTML applied
D. Drupal D. rules higher on the list override rules
E. Library that are lower on the list

255. are sketches of the key information that 259. Microsoft’s server-side programming lan-
goes on each page of a website, essen- guage. It’s a direct competitor to PHP and
tially showing the site skeleton. is most commonly used in business appli-
A. Wireframe cations.

B. Selector A. ASP/.Net

C. CSS3 B. Name Server

D. Client Side C. Node.js

E. CDN D. JSON
E. Drupal
256. Microsoft’s version of a web server.
Though not as popular as Apache it’s often 260. When a client sends a request to a server,
used for business applications. browser looks for it in the (KLO 2.2)
A. IIS/Microsoft Server A. Addresses
B. Client Side B. Cookie Directory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 750

C. Active Directory C. Interactive Website


D. Host Directory D. Idle Website
261. An extended Intranet where people out- 266. A programming methodology that allows
side the organisation can also connect to users to create dynamic and interactive
the Intranet. World-wide but private ac- Web pages without the need to refresh or
cess to an Intranet. reload the page
A. internet A. Podcast

NARAYAN CHANGDER
B. intranet B. Blog
C. extranet C. Wiki
D. none of above D. Ajax
262. Which tag would correctly display an im- 267. Characteristics of Unicode
age called logo.jpeg?
A. is a text encoding, representation, and
A. <image = logo.jpeg/> handling standard for most of the world’s
B. <img = logo.jpeg/> writing systems.
C. <href = “logo.jpeg/> B. is a universal character encoding that
D. <img src = “logo.jpeg”/> is used to process, store, and exchange
text data in any language.
263. In HTML, there are various instances
C. maintains the standard, which in-
where a programmer would want to em-
cludes 143, 859 characters that encom-
bed a file or a website into another web-
pass 154 present and historic scripts, as
site. How is that possible? (KLO 3.2c)
well as symbols, emoji, and non-visual
A. Through the wireframe. control and formatting codes.
B. Through CSS. D. ALL OF THE ABOVE
C. Through iFrames.
268. Domain Name System. See the entry
D. Through hyperlinks. “Name Server” on this point.
264. When promoting a business, that uses A. DNS
web marketing, which of the following B. AJAX
would be an essential technique in order to
drive more traffic to your website? (KLO C. HubL
1.1) D. JavaScript
A. SEO E. Custom Module
B. CEO
269. TRUE OR FALSE? The most common
C. CFO languages used for Web programming
D. CBE are:XML HTML JavaScript Perl 5 PHP
A. TRUE
265. What type of webpage that changes its
content upon interacting with the user? B. FALSE
A. Dynamic website C. MAYBE
B. Static Website D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 751

270. According to HTML defaults, page back- 275. What is the correct HTML element for in-
ground color is usually serting a line break? (KLO 3.2a)

PRACTICE BOOK» NOT FOR SALE


A. black A. <br>
B. dark blue B. <break>
C. white C. <lb>
D. light gray D. None

271. is a very popular database choice for de- 276. are individual HTML components of an
veloping web apps. It is a central piece document or webpage. For example, a
of the LAMP stack (Linux, Apache, MySQL, paragraph in an HTML document is an el-
Perl/PHP/Python). ement.
A. mySQL A. Elements
B. HubL B. HTML5
C. JavaScript C. Server Side
D. WordPress D. ASP/.Net
E. Framework E. AJAX

272. An information repository is place where 277. Which word is not used in HTML struc-
programmers, or database managers, can ture?
do which of the following? (KLO 1.12
A. footer
A. Deploy a second tier of data storage.
B. body
B. Have only one storage technology.
C. head
C. Runs on a specific operating system.
D. arm
D. Unorganized your files for further man-
agement. 278. includes all the parts of a website, app,
computer, smartphone, etc. that the user
273. Which format usually works best for pho- can manipulate and interact with.
tos?
A. User Interface (UI)
A. JPEG
B. Meta Elements
B. DOC
C. Mood Board
C. GIF
D. Selector
D. WAV
E. Client Side
274. JavaScript can be written-( may select
279. Which Direction of Data Flow does this
multiple answers)
situation represents? Nicholas noticed
A. directly into JS file and included into that listening to the radio there is no direct
HTML way we would engage with the signals
B. directly into HTML pages apart from receiving it on the radio and
is curious to know what form of transmis-
C. directly on the Server Script sion is happening or its direction of data
D. None of these flow.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.9 Internet and Web Technologies 752

A. Half Duplex D. Caliology Area Network


B. Full Duplex 281. In web development this refers to a pre-
C. Simplex written set of code that can be leveraged
D. Radio Waves for future projects.
A. Library
280. What is the meaning of the CAN net-
work? B. Bootstrap
A. Canadian Agency Network C. Sitemap

NARAYAN CHANGDER
B. Caribbean Area Network D. User Experience (UX)
C. Campus Area Network E. Mood board

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
7. Input/Output and Storage
Devices

7.1 Storage Devices: Hard Disk, SSD, and Flash Memory


1. What is the most common spindle speed 4. Which of the following storage mediums
for a magnetic hard drive? allow y0u to write information several
times
A. 5400RPM
A. CD-R
B. 15000RPM
B. CD-RW
C. 7200RPM
C. DVD
D. 20000RPM
D. Laser disks
2. Give two (2) disadvantages of Storage 5. What is the difference between SSD and
compared to Memory. HDD
A. Slow data access A. SSD is faster than HDD when transfer-
B. Limited data storage ring data
B. portable, higher capacity of storing
C. Contents need to be copied to memory
data, very durable, faster performance
before being accessed by processor.
C. small capacity (most CDs < 1GB ca-
D. Fast data access pacity) & although they are fairly reliable
and durable but they can be easily dam-
3. When replacing a power supply, which of
aged
the following tends to vary among power
supplies and must be chosen properly to D. because they are read only
support all connected devices?
6. A DVD can store how much data?
A. Wattage A. 15GB
B. Voltage B. 4.7MB
C. Amperage C. 650MB
D. Resistance D. 4.7GB

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 754

7. What type of storage would be most suit- 12. Used to store digital data, a common stor-
able for a business directory? age format used for audio.This description
refers to
A. CDR
A. Blue Ray Disc (BD)
B. Cloud storage
B. Compact Disc (CD)
C. USB
C. Digital Video Disc (DVD)
D. Paper D. none of above

NARAYAN CHANGDER
8. What might be stored in RAM? 13. The methods and structures that an op-
erating system uses to organize files on
A. The instructions to do a power-on-self-
a storage device like a hard drive. File
test
systems often use directory structures to
B. The instructions of the operating sys- keep track of files.
tem A. File System
C. The instructions to load the operating B. Compression
system
C. Encryption
D. The instructions not needed at present D. File Permissions
by the CPU, currently in the virtual mem-
ory 14. What is a Memory Card an example of?
A. Magnetic Storage
9. What kind of media is most commonly
B. Optical Storage
used when large amounts of data need to
be archived on a regular basis? C. Flash Memory
A. Tape D. Primary Storage

B. Optical disc 15. Which size hard drive is typically found in


the average laptop?
C. External hard drive
A. 3.5”
D. Network share
B. 5.25”
10. What is the back end of cloud computing? C. 2.5”
A. The third party company D. 1.8”

B. The personal computer user 16. What is the meaning of the acronym HDD

C. The internet A. Hardware Disk Drive


B. Hard Disc Drive
D. Your personal home server
C. Hard Disk Drive
11. Very large and cheap storage capacity. D. Hardware Disk Driver
Very slow.
17. Number of Bits in a nibble.
A. Blu-Ray
A. 2
B. Magnetic Tape B. 4
C. Hard disk C. 6
D. Floppy Disk D. 8

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 755

18. What type of storage device are you most B. Heat-Assisted Magnetic Recording
likely to find in a mobile phone? C. 3D Flash Memory

PRACTICE BOOK» NOT FOR SALE


A. Optical D. Synthesized DNA Strands
B. Magnetic
23. The place that the computer uses to save
C. Cloud information is called
D. Solid state A. mouse
19. Which of the following dedicated expan- B. keyboard
sion slots/ports on the PC motherboard C. printer
enable(s) connecting an M.2 device? (Se-
lect all that apply) D. storage
A. B key slot 24. Which of the following is not a considera-
B. PCIe slot tion when upgrading power supplies?
C. M key slot A. You might find that you do not have a
matching motherboard connector on your
D. B+M key slot new power supply.
E. USB slot B. You might find that your case has a non-
20. What storage media would you choose removable power supply.
for:Storing video on a video camera C. You might find that your power rating
A. Optical DVD-R is not adequate on the new power supply.

B. Cloud Hard Disk D. You might find that you do not have
enough of the appropriate connectors
C. Solid State coming from the power supply for the de-
D. Blu-Ray vices that you have installed.

21. Which of the following refer to examples 25. Servers commonly use what type of sec-
of optical disc drives? (Select 3 answers) ondary storage?
A. CD-ROM drive A. SSD
B. Microdrive B. HDD
C. CD-ROM drive C. external SSD
D. Floppy disk drive D. USB Drives
E. CD-ROM drive 26. A type of storage medium that consists of
a flat, round, portable disc made of metal,
22. Type of drive that allows bits of data to
plastic and lacquer that is written and read
become smaller and more tightly packed
by a laser.This description refers to
together while still retaining data. It uses
a tiny laser to briefly heat the recording A. Solid State Drive (SSD)
surface of the hard drive to write the data B. Hard Disk
making it more receptive to the effects of
magnetism, which allow writing on much C. USB Flash Drive
smaller areas than were possible before. D. Memory Card
A. External Hard Disk Drives E. Optical Disc

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 756

27. Which of the following statements about C. Concentric Circles called Tracks
dual-rail power supplies is LEAST true?
D. EEPROM
A. Dual-rail power supplies have electri-
cally separate 12VDC connections. 32. A flash memory storage device that con-
B. Dual-rail power supplies typically sup- tains its own processor to manage its stor-
port more cumulative amperage than age. This description refers to
single-rail supplies. A. Solid State Drive (SSD)

NARAYAN CHANGDER
C. Dual-rail power supplies are less likely B. Hard Disk
to be overdrawn by connected compo-
nents. C. USB Flash Drive
D. Dual-rail power supplies feature most D. Memory Card
of the same connections as a single-rail E. Optical Disc
supply.

28. A removable flash memory storage de- 33. What method does an SD card use for stor-
vice that you insert and remove from a ing data?
slot in a computer, mobile device, or card A. Magnetic disks and platters
reader/writer.
B. Non-volatile memory chips
A. Memory Slot
C. Magnetic tape
B. Memory Cards
D. Reflective surface and optical readers
C. SSD
D. Blue-ray 34. In optical disks, which plastic disk do they
use?
29. A contains no moving parts, but uses
Non-Volatile Flash Memory called NAND A. the plastic which can reflect the laser
Flash Memory using EEPROM chips. beam
A. Magnetic Hard Drive B. Magnetic storage is read-write, which
makes it possible to re-use the storage
B. Solid State Device
capacity over and over again by deleting
C. ROM BIOS Chip older data
D. Floppy Diskette C. 1, 099, 511, 627, 776 bytes
30. A consists of 1024 Bytes. D. 1GB to 32GB depending on the price
A. Kilobyte paid

B. Gigabyte 35. Which type of secondary storage would


C. Megabyte you recommend for low latency and fast
transfer speeds?
D. none of above
A. Solid state
31. Which of the following is NOT a component
of a magnetic hard drive? B. Magnetic
A. Platters C. Optical
B. Read/Write Heads on Actuators D. Cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 757

36. Which of the following is not one of the 40. Which of the following is the least
three major components of a hard disk portable and durable form of storage?
drive system?

PRACTICE BOOK» NOT FOR SALE


A. Magnetic hard disk
A. Drive interface B. USB memory stick
B. Controller C. CD-R
C. Hard disk D. DVD-RW
D. Host adapter 41. An electronic device that connects a
computer to a computer network.Which
37. A client is looking for a desktop drive tech-
adapter card related to this function?
nology that saves money over SSDs but of-
fers performance increases over HDDs and A. Bluetooth
can be used to house the operating system. B. MIDI card
Which of the following is the best to rec-
C. Modem card
ommend?
D. Sound card
A. Dual-drive technology
E. Network card
B. SSHD
C. eMMC 42. BIOS
A. Basic Input Output Software
D. Magnetic-only drive
B. Basic Input Output System
38. How many of the following statements C. Best Input Output System
are NOT correct? (choose 1-4 answers)
D. Basic Input Output Server
A. Data stored on the cloud is more se-
cure than data stored “locally” 43. Which optical disc format supports a data
capacity of 25GB?
B. Portable devices may lack the process-
ing power of “Fixed” devices A. Double-sided, double-layer DVD+R
C. Login credentials will be needed to ac- B. Single-sided, single-layer Blu-ray disc
cess shared devices C. Double-sided, single-layer DVD-R
D. Laptop computers are able to do all the D. Double-sided, single-layer DVD+R
same tasks that a desktop computer can
44. What is an advantage of using SSD
39. To transmit data between two Bluetooth A. allowed you to store a lot of data, very
and enabled computers or devices to com- fast transfer data
municate with each other.Which adapter
B. SSD is faster than HDD when transfer-
card related to this function?
ring data
A. Bluetooth
C. portable, higher capacity of storing
B. MIDI card data, very durable, faster performance
C. Modem card D. small capacity (most CDs < 1GB ca-
pacity) & although they are fairly reliable
D. Sound card
and durable but they can be easily dam-
E. Network card aged

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 758

45. Which Blu-ray standard defines rewritable A. Storage device


disks? B. Storage capacity
A. BD-RE C. Storage media
B. BD-R
D. Storage
C. BD-R/RW
51. Which of the following is NOT a feature of
D. BD-ROM
virtual storage?

NARAYAN CHANGDER
46. Why do computers have secondary stor- A. All your files are located on your local
age computer only
A. Primary Storage might be full B. All your files can be backed-up auto-
B. To give another option where to save matically
files C. Collaboration on files is possible in
C. Main memory is volatile real-time
D. none of above D. All your files are located on many re-
mote servers
47. Which of the following technologies are
NOT considered hot swappable nor hot 52. CD’s, DVDs and Blu-Ray are classified as
pluggable? what type of storage?
A. SATA HDD A. Cloud
B. USB Flash Drive B. Optical
C. RAID Storage C. Solid state
D. Standard EIDE HDD D. Magnetic

48. Which of the following refers to ‘volatile’ 53. Megabyte =


memory? bytes?
A. CPU A. 1 trillion
B. ROM B. 1 million
C. RAM C. 1 billion
D. HDD D. 1 quadrillion
49. A mass storage device similar to a hard E. 1 thousand
disk drive that uses flash memory with no
54. Which offers the fastest access times?
moving parts
A. RAM
A. hard disks
B. Cache
B. USB
C. Hard Disk Drive
C. memory card
D. Register
D. Solid state drive

50. Storage holds data, instructions and in- 55. Why would a user choose to swap their
formation for future use. The statement hard disk for an SSD?
refers to the definition of A. It has a quicker access speed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 759

B. It usually has a higher storage capac- B. USB card


ity C. Video card

PRACTICE BOOK» NOT FOR SALE


C. It is more reliable D. Video capture card
D. It is more portable
60. What type of storage device is the follow-
56. Which of the following best describes the ing a description of? Data is stored on sili-
concept of hot-swappable devices? con microchips. There are no moving parts.
A. Power does not need to be turned off A. Solid State
before the device is inserted or removed. B. Optical
B. The device can be removed with power C. Magnetic
applied after it is properly stopped in the
D. Paper
operating system.
C. Care must be taken when swapping 61. Off-line storage is comprised of:
the device because it can be hot to the A. CD/DVD
touch.
B. DVD-RAM
D. The device can be swapped while still
C. Blu-ray disks
hot, immediately after powering down the
system D. USB flash memory/SD cards

57. Why does blu-ray have more storage than 62. A desktop PC with an internal single drive
other optical disks? of 16TB is likely to be:
A. Because it uses blue lasers which have A. Optical
shorter wavelengths. B. Magnetic
B. to make the copy of original data to in C. Solid state
case you lose your original data.
D. ROM
C. it is a disk with bumps can be read by
laser 63. This storage has to be copied to RAM be-
fore it can be processed by the CPU.
D. allowed you to store a lot of data, very
fast transfer data A. ROM Storage
B. Secondary Storage
58. discs such as CDs, DVDs, and Blu-
ray discs are a storage medium that uses C. Teritary Storage
lasers for both reading and writing infor- D. Primary Storage
mation. They store information through
pits in their reflective coating. 64. To connect devices that make and control
sound-such as synthesizers, samplers, and
A. Optical computers.Which adapter card related to
B. Hard this function?
C. Solid A. Bluetooth
D. Flash B. MIDI card
59. Connects to high-speed USB ports.Which C. Modem card
adapter card related to this function? D. Sound card
A. TV Tuner card E. Network card

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 760

65. What kind of technology does the optical 69. On a hard disk, what is the storage capac-
drive use? ity of each sector?
A. laser beam reflect technology A. 512 bytes
B. the plastic which can reflect the laser B. 512 KB
beam C. 64 MB
C. Magnetic storage is read-write, which D. 32 GB
makes it possible to re-use the storage

NARAYAN CHANGDER
capacity over and over again by deleting 70. List three (3) advantages of Solid State
older data Drive (SSD).
D. 1, 099, 511, 627, 776 bytes A. Have lower storage capacities than
hard disks
66. IS A THIN SHINY CIRCULAR DISK THAT
CAN STORE UPTO 700 MB OF DATA AND B. Fast transfer rate
MEASURES 4.7 INCHES IN DIAMETER . C. More durable
A. CD D. Lighter weight
B. DVD E. Cost is higher per gigabyte
C. BLU RAY DISC
71. Which of these is not a negative to cloud
D. HARD DISK computing?
A. Uses storage space on your PC
67. The smallest container within a computer’s
storage system that is used to store in- B. Can cost money
formation such as data, settings, and com-
C. There is a risk of your information be-
mands used in a computer program. A file
ing hacked
is the smallest container that can be copied,
deleted, or moved within a file system. D. Requires an internet connection
A. File 72. Which of these is an advantage of physical
B. File Format storage?

C. File System A. The user does not have to worry about


physical damage.
D. Compression
B. The user has full control over how their
68. Which of the answers listed below refer to data is stored.
the characteristic features of SAS? (Select C. It can be vulnerable to hacking.
3 answers)
D. It is easy to expand storage.
A. Does not require bus termination
B. Requires bus termination 73. Pits and Lands can be found on

C. Point-to-point connection A. Optical Disks

D. Serial interface B. Magnetic Disks


C. Solid State Drives
E. Identifies devices on a SCSI chain via
SCSI IDs and LUNs D. Blu Ray Disks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 761

74. The hardware that records and/or re- 79. Birefringence is a problem with what type
trieves items to and from storage media of optical media?

PRACTICE BOOK» NOT FOR SALE


A. Usb Flash drive A. CD
B. Pen Drive B. DVD
C. Storage Capacity C. DVD-RAM
D. Storage Device D. Blue-ray disks

75. Which type of storage medium uses elec- 80. The process of tracking changes to a file
tric circuits? so that a file can be repaired or restored
A. Magnetic in case of file corruption or data loss.

B. Optical A. File Permissions

C. Solid state B. Journaling

D. none of above C. Drive


D. Partitioning
76. If by mistake you delete an important file,
what is the correct action you need to 81. Find the full form of the following
take? Acronym:Mbps
A. Use recovery programs A. Million bytes per second
B. Look in the Recycle Bin (Windows) or B. Mega bytes per second
Trash (Macs)
C. Million Bites per second
C. it’s not possible to recover the file
D. Mega Bites per second
D. Ask the Help of your ISP
82. From lowest to highest, order these ex-
77. is the concentric rings on a disk sur- amples of storage media by their typical
face. capacity. A solid-state drive in a mobile
A. Track phone. A DVD-R to distribute a film. A
hard disk in a desktop PC.
B. Sector
A. Hard disk, DVD-R, Solid state
C. Cylinder
B. DVD-R, Hard-disk, Solid-state
D. Platter
C. Solid-state, Hard disk, DVD-R
78. Which of the follow symptoms might be
D. DVD-R, Solid-state, Hard disk
causing extended read/write times on a
storage drive? 83. Which of these would most closely match
A. Depleted storage space a CD?
B. Physical hardware faults A. 200 megabytes
C. Insufficient amount of RAM B. 650 megabytes
D. Disk fragmentation C. 3.7 gigabytes
E. Loose cable connections D. 600 gigabytes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 762

84. Secondary storage is considered 89. All of these devices are optical
A. IAS A. CD R

B. L1 Cache B. CD RW
C. SSD
C. HDD
D. DVD RAM
D. USB
90. Optical storage devices save data as pat-
E. SSD terns of dots that can be read using

NARAYAN CHANGDER
85. The process of converting information so A. Laser Light
it cannot be understood without decrypt- B. Solar light
ing it using a key, especially to prevent C. Magnetic field
unauthorized access.
D. none of above
A. Compression
91. What does the acronym ‘ROM’ stand for?
B. Encryption
A. Rapid Only Memory
C. File Permissions B. Read Online Memory
D. Journaling C. Read Only Memory
D. Random Only Memory
86. What is the world’s largest computer net-
work? 92. Which is NOT an example of flash mem-
ory?
A. Facebook
A. SD Card
B. Google
B. Solid state drive (SSD)
C. iCloud
C. USB drive
D. Internet D. Magnetic hard disk drive (HDD)

87. Which of the following types of storage de- 93. What is optical disk
vices uses pits and lands to store its data? A. it is a disk with bumps can be read by
A. Cloud laser
B. allowed you to store a lot of data, very
B. Solid state
fast transfer data
C. Magnetic C. SSD is faster than HDD when transfer-
D. Optical ring data
D. portable, higher capacity of storing
88. Which of these statements is true about data, very durable, faster performance
Flash Memory compared to Magnetic Hard
Disks? (Choose Two) 94. Hard disks are classified as what type of
storage?
A. More Durable
A. Magnetic
B. Holds more data B. Solid state
C. Less expensive C. Cloud
D. Faster data transfer D. Optical

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 763

95. Which of the following is the most 100. Capacity is the number of bytes (charac-
portable form of storage? ter) a storage media can hold. This state-
ment refers to the

PRACTICE BOOK» NOT FOR SALE


A. USB memory stick
B. DVD-RW A. Storage device
C. Portable hard disk B. Storage capacity
D. Internal hard disk C. Storage media
96. What types of optical media stores its D. Storage
data in concentric tracks?
101. What are the output voltages that have
A. CD
been commonly produced by PC power sup-
B. DVD plies over the years? (Choose all that ap-
C. DVD-RAM ply.)
D. Blue-ray disks A. +3.3VDC

97. What is the Term used to describe the pro- B. +5VDC


cess of dividing the disk into tracks and C. -5VDC
sectors?
D. +12VDC
A. Formatting
E. -12VDC
B. Deragmentation
C. Outsourcing 102. What storage technology do compact
D. Erasing disks use?
A. optical
98. Type of memory that implements tiers of
solid-state flash memory stacked on top of B. magnetic
each other allowing for much greater stor-
C. flash
age capacity at a lower cost than 2D flash
memory. D. none of above
A. Heat-Assisted Magnetic Recording
103. Which one of the following is not an ex-
B. 3D Flash Memory ample of a system utility?
C. Synthesized DNA Strands A. Task manager
D. File B. Disk defragmenter
99. Which of the following statements are not C. Disk cleanup
true (select as many as appropriate)
D. Word processor
A. Paper is not an appropriate method for
storing data 104. Which of the following is the fastest for
B. There are some situations where pa- data transfer?
per is the only means of storing data A. SSD
C. The durability of paper makes it ideal
B. Magnetic Hard Disk Drive
for storing data
C. Blu-Ray
D. Paper can be a quick and convenient
means of storing data/information D. Magnetic Tape

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 764

105. Give two (2) advantages of Memory WHICH TYPE OF DISK WOULD BE THE
compared to Storage? MOST SUITABLE FOR THIS PURPOSE?
A. Fast data access. A. CD
B. Limited data access. B. DVD
C. Contents are directly accessible by the C. BLU RAY DISC
processor. D. PEN DRIVE
D. Slow data access.

NARAYAN CHANGDER
111. Which technology is based on flash mem-
106. CDs are cheap and very reliable, so why ory and is intended eventually to replace
don’t we use them for carrying work conventional hard disk drives that have
around? moving discs and other mechanisms?
A. It’s a lie. Blank CDs are really expen- A. USB flash drives
sive B. Memory cards
B. You’d need about 20 CDs instead of C. Solid-state drives
one memory stick
D. Optical drives
C. CDs are very fragile
D. CDs are easily ‘wiped’ by magnets 112. What type of storage device is the fol-
lowing a description of? Data is recorded
107. An image is 20 x 20 pixels and each pix- by making marks in a pattern that can be
els is coded with 4 bits read back with the aid of light, usually a
beam of laser light precisely focused on a
A. The whole image is 400 bytes
spinning disk.
B. The whole image is over 1 kilobyte
A. Paper
C. The whole image is 50 bytes
B. Optical
D. The whole image is 200 bytes
C. Magnetic
108. A compact, portable storage device that D. Solid State
uses special memory chips to store data.
113. The use of user and file attributes that
A. Hard Disk Drive (HDD)
control which users can read, write, move,
B. Optical Drive or delete each file.
C. Flash Storage A. File Permissions
D. Solid State Devices (SSD) B. Journaling

109. Optical drives read information using a C. Drive

A. memory chip D. Partitioning

B. magnetic sensor 114. BIOS (Boot-up program)


C. laser sensor A. ROM
D. binary code B. RAM

110. RAGHAV WANTS TO COPY 3 MOVIES ON C. Cache


A DISK, SO AS TO SEE THEM AT HIS PLACE. D. Hard Disk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 765

115. Which of these storage options is best D. Storing data on the hard disk when
for storing games external to a portable main memory runs out of space
games console, thereby minimising the

PRACTICE BOOK» NOT FOR SALE


need for internal flash memory capacity? 120. Which of the answers listed below re-
A. DVD-R fer to storage media device interfaces for
SSDs? (Select 3 answers)
B. Flash memory cards
A. NVMe
C. Mini-hard disks
D. Proprietary, small optical disks B. IDE
C. PCI
116. Which of these is the major advantage of
optical disks for storing an album of mu- D. SATA
sic?
E. PCIe
A. Low cost
B. Low durability 121. Which one of these is an advantage of an
external hard disk drive
C. Fast data access speed
D. High capacity A. Its the lowest cost per GB
B. It can overheat
117. Which of the following is NOT a benefit
of using an SSD rather than a magnetic C. It has the same data loss risk as an in-
drive? ternal device
A. It uses less power D. It has no password on it making it easy
B. It lasts longer to access
C. It’s more expensive
122. You just installed more memory in your
D. It’s faster and more reliable computer, but it’s not recognized. Your
friend suggests you upgrade your BIOS.
118. Which of these is one characteristic of
What is the best way to do this?
ROM?
A. Read and write A. Flash the BIOS.
B. Volatile B. Order a new BIOS chip from the moth-
erboard manufacturer.
C. Non-volatile
D. Large capacity in comparison to other C. Order a new BIOS chip from the mem-
types of primary memory external to the ory manufacturer.
CPU D. You can’t upgrade a BIOS.
119. What is best definition of virtual stor-
123. Give three (3) types of DVD.
age?
A. Storage which appears local but is A. DVD-ROM
physically located elsewhere B. EPROM
B. Storage which you never have to pay C. EEPROM
for
D. DVD-R
C. Storing data on removal media such as
optical media, tape and flash drives E. DVD-RW

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 766

124. The process of writing on an optical disc C. IDE/EIDE


is call D. SATA
A. formatting
130. What does the red stripe on a ribbon ca-
B. ripping ble indicate?
C. burning A. Pin 16
D. reading B. Pin 1

NARAYAN CHANGDER
125. Which of the following is not an advan- C. The manufacturer’s trademark
tage of a solid state drive? D. Parity
A. Cheaper than hard drives
131. CDs have a spiral track. A laser beam re-
B. Storage capacity flects off it to read binary data as ‘burnt’
C. Robust spots (or not ‘burnt’) as the disk spins
D. Portable round.
A. False-CDs don’t actually spin
126. What is the physical component where
data is stored in a HDD? B. False-you can’t use lasers, it is danger-
ous.
A. Read/write head
C. True-and you can fit about 650 million
B. Platter bits on a CD
C. Sector D. False-there is no spiral track, but the
D. Cluster rest is correct

127. This storage has can be directly accessed 132. Which of the following refer to SSD form
by the CPU factors? (Select 2 answers)
A. Flash Storage A. SATA
B. Secondary Storage B. M.2
C. Teritary Storage C. NVMe
D. Primary Storage D. mSATA

128. Computer storage is used for: E. PCIe

A. Saving files 133. What types of optical media stores its


B. Speeding up the computer data in a single, spiral track?

C. Making the computer last longer A. CD

D. Safely shutting down the computer for B. DVD


later use C. DVD-RAM

129. Which of the following is the most com- D. Blue-ray disks


mon disk interface used for optical drives 134. A utility in which all fragmented files on
on home and office computers? a drive are found and reconsolidated into
A. Parallel port the same physical location on the disk.
B. SCSI A. Journaling

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 767

B. Drive C. 1 billion
C. Partitioning D. 1 quadrillion

PRACTICE BOOK» NOT FOR SALE


D. defragmentation E. 1 thousand
135. A storage device that reads and writes
140. What is the typical storage capacity of a
data to and from a round rigid disk in the
flash memory drive?
computer is called:
A. 1GB to 32GB depending on the price
A. CPU
paid
B. Motherboard
B. Cost, durability, capacity, speed, relia-
C. Hard Disk bility, portability
D. Soft Disk
C. They can be easily affected by mag-
136. What is a possible use of an external netic fields.
solid state drive D. Because it uses blue lasers which have
A. to make the copy of original data to in shorter wavelengths.
case you lose your original data.
141. Which one is NOT secondary storage
B. it is a disk with bumps can be read by
laser A. Hard disk
C. allowed you to store a lot of data, very B. Floppy Disk
fast transfer data
C. Cache
D. SSD is faster than HDD when transfer-
ring data D. CD

137. Which of the following is NOT an exam- 142. Connects to a digital video camera.Which
ple of a shared information access device? adapter card related to this function?
A. Database server A. TV Tuner card
B. Smart TV B. USB card
C. Cloud storage C. Video card
D. Data centre D. Video capture card
138. A typical use for a DVD-R could be:
143. Hardware RAID Level 0:(Select 3 an-
A. Storing the operating system swers)
B. Transferring data between home and A. disk striping
school
B. Is suitable for systems where perfor-
C. Storing instructions in use by the CPU mance has higher priority than fault toler-
D. Storing archive files ance

139. KB = C. Is also referred to as disk mirroring


bytes? D. Decreases reliability
A. 1 trillion E. Offers less volume capacity in compar-
B. 1 million ison to RAID 1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 768

144. Type of ROM that uses electrical charges B. A physical material on which computer
A. RAM keeps data, information, programs, and
applications
B. PROM
C. Holds data, instructions, and informa-
C. EPROM tion for future use.
D. EEPROM D. none of above
145. Secondary storage is used for 150. When parts of a single file, program, or

NARAYAN CHANGDER
A. Storing data being used by the com- application are stored in different areas of
puter a physical disk.
B. Storing programs to be used immedi- A. Drive
ately by the arithmetic and logic unit B. Partitioning
C. Long-term storage of data C. Fragmentation
D. Storing programs being executed D. Defragmentation
146. Which of the following are examples of 151. What is the purpose of the jumper pinout
hot-swappable drives? (Select all that ap- on a magnetic EIDE hard drive?
ply)
A. To set the primary drive to master.
A. USB drive
B. To set the secondary drive to slave.
B. PATA drive
C. To allow the master/slave relationship
C. SATA drive to be based on Cable Select setting.
D. IDE drive D. All of the above
E. eSATA drive
152. Secondary storage gets its name
147. List two (2) advantages of USB Flash because
Drive. A. It is secondary to main memory
A. Small and light weight B. It is mostly used in secondary schools
B. Difficult to transfer documents C. It is fast-things load in a second
C. Easy to transfer documents D. none of above
D. Data recovery is difficult
153. Which of these would most closely match
148. Which SATA revision operates at a data a hard drive in a laptop
transfer rate of 3Gbps? A. 800 kilobytes
A. SATA 1 B. 50 megabytes
B. SATA 2 C. 500 megabytes
C. SATA 3 D. 500 gigabytes
D. None of the above 154. What is cloud storage?
149. Define storage medium. A. Storing data on the server of another
A. Hardware that records (writes) and/or company, accessible through the Internet
retrieves (reads) items to and from stor- B. Storage accessible anywhere with an
age media. internet connection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 769

C. Running programs on a remote server, B. Drive


accessible with an Internet connection C. Partitioning

PRACTICE BOOK» NOT FOR SALE


D. All of the above
D. Fragmentation
155. Which of these is not flash memory?
160. What is the largest NTFS volume size sup-
A. Memory Stick ported, assuming a 64KB cluster size as
B. Memory Card maximum?
C. Solid State Drive A. 256GB
D. Cache B. 2TB
C. 128TB
156. The physical material on which a com-
puter keeps data, information, programs D. 256TB
and application. This statement refers to
the 161. Due to a blackout, power is no longer
coming from the wall outlet, and your com-
A. Storage device
puter is now off. You do not have a UPS,
B. Storage capacity and you need to remove a disc out of the
C. Storage media DVD drive.What is the easiest method for
retrieving the disc?
D. Storage
A. Remove the drive and carefully pry
157. Which of the answers listed below de- open the tray.
scribe the features of Solid-State Drives B. Add a UPS between the wall outlet and
(SSDs)? (Select 3 answers) the computer.
A. Low performance
C. Push an unbent paper clip into the hole
B. Relatively high device cost on the front of the drive.
C. Relatively low device cost D. Press the drive’s eject button while
D. Lower capacity in comparison to mag- pressing the computer’s restart button.
netic drives
162. What optical storage method can typi-
E. High performance cally store up to 50GB of data?
158. Where does the CPU keeps its A. Blue Ray disc
data/instructions its working on? B. DVD
A. The CPU keeps its date/instructions C. CD
from RAM
D. none of above
B. The data is kept in the PSU
C. From ROM 163. Which storage technology is the most
durable?
D. None of the above
A. Magnetic Tape
159. The process of dividing a single physical
B. Solid State Drive
disk into multiple logical drives called vol-
umes. C. Hard Drive
A. Journaling D. CD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 770

164. Which type of memory is used to store C. SSD


programs and data when there is insuffi-
D. External Hardisk
cient RAM?
A. Random Access Memory (RAM) 169. Allows television signals to be received
B. Read Only Memory (ROM) by a computer.Which adapter card related
to this function?
C. Virtual memory
A. TV Tuner card
D. Flash memory

NARAYAN CHANGDER
B. USB card
165. A personal, portable blood pressure mon-
itor has some internal secondary storage. C. Video card
Which of these is it likely to be? D. Video capture card
A. Magnetic
170. What type of storage medium is a hard
B. Cloud
drive?
C. Optical
A. Paper
D. Solid state
B. Optical
166. What are the disadvantages of Optical
Storage Media C. Solid State

A. small capacity (most CDs < 1GB ca- D. Magnetic


pacity) & although they are fairly reliable
and durable but they can be easily dam- 171. which is not a type of storage
aged A. Solid State Drive
B. because they are read only B. USB
C. laser beam reflect technology
C. Optical Drive
D. the plastic which can reflect the laser
beam D. Doofer

167. Temporary sections of the hard disk cre- 172. Which of the following usually stores the
ated by the operating system when RAM most data?
is full.
A. SSD
A. Virtual Memory
B. Magnetic Hard Disk Drive
B. Random Access Memory
C. Blu-Ray
C. Read Only Memory
D. Memory Stick
D. Cache Memory

168. It is a flash memory storage that users 173. Which is not a benefit of SSD over HDD
insert and removes from a slot in personal A. Lighter
computer, smartphone, digital camera or
card reader/writer. B. More reliable
A. Flash drive C. Lower power use
B. Memory card D. Longevity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 771

174. Some companies keep all there back up 178. How many of the following statements
files on magnetic tape. ARE correct? (choose 1-4 answers)

PRACTICE BOOK» NOT FOR SALE


A. Because it is very cheap to store mas- A. Database servers are used to store
sive amounts and manage databases that are stored on
the server and to provide data access for
B. It is really quick to restore lost files if
authorized users.
they are backed up on tape
B. e-book readers are handheld devices
C. They are too old-fashioned to use
SSD’s C. Portable devices will have the same ca-
pabilities as fixed devices
D. Tape cannot be erased, once you have
D. Cloud-based services can be accessed
written on it
anywhere
175. Name one type of memory that a com- 179. DVD-R format is:
puter uses.
A. Write once, read many times and non-
A. RAM volatile
B. Keyboard B. Write many times, read many times
C. Folders and volatile

D. All of the above C. Write once, read many times and


volatile
176. A sales person requires that a large num- D. Write many times, read many times
ber of document, data, presentation, im- and non-volatile
age, and video files be accessible on their
personal mobile device when making sales 180. What is the file size for a text file that
pitches to new customers. A cloud solu- contain the following:Welcome, to Com-
tion is not feasible, since cellular and in- puter Science.
ternet connections are not always guaran- A. 29 bytes
teed at a customer site. Which of the fol- B. 26 bytes
lowing accessories would a technician sug-
gest to BEST meet the sales person’s re- C. 28 bytes
quirements? D. 32 bytes
A. Credit card reader 181. Consists of electronic components that
B. Micro SD Card store instructions waiting to be executed
by the processor
C. Docking station
A. Random fetching memory
D. Wireless hotspot
B. Random execute memory
177. All of these are example of optical disc C. Random access memory
except
D. Random devices
A. Tape drive
182. The top-level folder, or directory, of a file
B. CD system.
C. Bluray (BD) A. Drive
D. DVD B. Partitioning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 772

C. Fragmentation 188. The rotations of a platter in a hard drive


D. Defragmentation are calculated by
A. RPM
183. Which of the following refer(s) to (a)
nested RAID level(s)? (Select all that ap- B. dpi
ply)
C. RMP
A. RAID 5
D. none of above
B. RAID 1+0

NARAYAN CHANGDER
C. RAID 1 189. What storage media would you choose
D. RAID 10 for:Storing the operating system for a
computer
E. RAID 0
A. Cloud Hard Disk
184. What does the e stand for in eMMC?
B. Hard Disk/Solid State
A. Embedded
B. Enhanced C. DVD-R
C. Extended D. Blu-Ray
D. External
190. Ssecondary Storage is also called:
185. A portable flash memory storage device A. Back up memory
that you can plug in a USB port.This de-
scription refers to B. Main memory
A. Solid State Drive (SSD) C. Auxiliary memory
B. Hard Disk D. External memory
C. USB Flash Drive
D. Memory Card 191. Which of the following statements refer
to the characteristic features of magnetic
E. Optical Disc drives? (Select 3 answers)
186. Examples of storage media include all of A. High capacity
the following except
B. Low device cost
A. monitors and printers
C. High performance
B. floppy disk and hard disk
C. CD and DVD D. Low performance
D. Tape and PC Cards E. High device cost

187. Used mainly as video and data storage, 192. The/an retains the data stored on it
holds over 7 times a CD’s capacity.This de- even if the power goes off
scription refers to
A. RAM
A. Blue Ray Disc (BD)
B. Compact Disc (CD) B. LED

C. Digital Video Disc (DVD) C. HDD


D. none of above D. CPU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 773

193. What type of media are used in a com- 198. Room 102 has solid state drives in all the
puter Hard drive? computers

PRACTICE BOOK» NOT FOR SALE


A. magnetic A. Great-they will be faster than hard disk
drives
B. optical
B. Not good-SSD’s are so slow.
C. solid state
C. Why not-they are cheaper than old
D. photo hard disk drives
194. Refers to the “blue laser” used to read D. OK, but be careful-SSD’s are more
the disc.It allows six times more storage fragile.
than a DVD.This description refers to
199. Examples of flash memory card formats
A. Blue Ray Disc (BD) include:(Select all that apply)
B. Compact Disc (CD) A. SD
C. Digital Video Disc (DVD) B. CompactFlash
D. none of above C. SSHD

195. Which of these is magnetic storage? D. microSD/ miniSD


E. xD
A. CD-R
B. SSD 200. The difference between storage and
memory are storage
C. Flash memory
A. It holds data permanently
D. Hard disk
B. It stores data temporarily
196. Which of the following is a disadvantage C. Directly accessible to the CPU
of virtual storage?
D. The content is copied to main memory
A. A cloud provider can take responsibil- before being accessed by CPU
ity for backup of your files
B. If your connection to your virtual stor- 201. Another name for Primary Storage
age goes down you lose access to your A. RAM
files B. ROM
C. Files may be held in many locations C. IMAS
D. You can spread your file load across D. CPU
different servers
202. Which of the following stores the most
197. Which of these types of storage is usually commonly used instructions close to the
the most expensive? CPU for quick access?
A. CD ROM A. Virtual Memory
B. Solid State Drive B. Cache Memory
C. Magnetic Hard Disk Drive C. Secondary Storage
D. Magnetic Tape D. Flash Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 774

203. Which of these is not an example of cloud 208. All of these devices are solid state
computing? A. USB Flash memory
A. Dropbox B. SSD
B. iCloud C. HDD
C. Facebook D. DVD
D. All are examples of cloud computing 209. Why you cannot store your own data
with CD-ROM or DVD-ROM?

NARAYAN CHANGDER
204. If you keep your work to a memory
A. because they are read only
stick
B. laser beam reflect technology
A. Don’t worry-it is safe now.
C. the plastic which can reflect the laser
B. Watch out, these devices often fail af- beam
ter a while
D. Magnetic storage is read-write, which
C. DON’T drop it, it will break easily makes it possible to re-use the storage
capacity over and over again by deleting
D. Don’t do it. They are really bulky to
older data
carry around
210. Why is SSD better than HDD? (give 4 rea-
205. Which primary storage is non-volatile? son)
A. RAM A. portable, higher capacity of storing
B. CACHE data, very durable, faster performance
B. small capacity (most CDs < 1GB ca-
C. ROM
pacity) & although they are fairly reliable
D. VRAM and durable but they can be easily dam-
aged
206. what is the term used to refers collec-
C. because they are read only
tively to hard disks and SSDs?
D. laser beam reflect technology
A. hard drive
211. Flash memory and USB memory sticks
B. SSD
are classified as what type of storage?
C. HDD A. Optical
D. Hard Disk B. Cloud

207. A device with similar capacity to an HDD C. Magnetic


that uses flash storage instead of mag- D. Solid state
netic disks to store data. SSDs are much
212. Tim is worried about losing his files
faster and more durable than hard disk
stored on his personal computer. Tim
drives but usually are more expensive.
should use to eliminate that problem.
A. Optical Drive
A. Cloud Computing
B. Flash Storage B. Networking
C. Solid State Devices (SSD) C. Storage Space
D. External Hard Disk Drives D. A newer computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 775

213. A storage device that uses light instead C. There are two kinds of ROM-DROM
of magnetism to store information. This in- and SROM
clude CD-ROM, DVD, and Blu-ray devices.

PRACTICE BOOK» NOT FOR SALE


D. none of above
A. Optical Drive
218. What term describes the computer part
B. Flash Storage that stores the essential information that
C. Solid State Devices (SSD) allows our computers to load and saves
the time and date of our computer?
D. External Hard Disk Drives
A. The OS
214. A removable flash memory storage de- B. RAM
vice, usually not bigger than 1.5 inches in
C. CMOS
height or width, that you insert in and re-
move from a lot in a computer, mobile de- D. Hard Drive
vice or card reader/writer.This description
219. What is meant by the term volatile in the
refers to
context of memory?
A. Solid State Drive (SSD) A. The changing state of the clock
B. Hard Disk B. Data is lost when the power is turned
C. USB Flash Drive off
D. Memory Card C. A description of ROM
E. Optical Disc D. Data is stored on the hard disk
220. Of the following voltage pairings, which
215. Type of ROM that can be written once
one accurately represents the input and
A. RAM output, respectively, of power supplies
B. PROM and AC adapters?
C. EPROM A. AC in, AC out
B. DC in, DC out
D. EEPROM
C. AC in, DC out
216. Synthetically produced artificial DNA that
D. DC in, AC out
is capable of storing vast amounts of infor-
mation and may be a solution to long-term 221. The speed of storage devices and mem-
massive storage. ory is defined by?
A. Synthesized DNA Strands A. Transfer rates
B. File B. Redundancy
C. File Format C. Capacity
D. File System D. access time
222. What are the risks of cloud computing?
217. Which of the following statements about
ROM is FALSE? A. No troubleshooting issues
A. The contents of ROM cannot be B. Full control over the data
changed C. Storing data without control
B. ROM is non-volatile D. No government intrusion

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 776

223. Which type of optical media comes with C. Access time


built-in encryption? D. 7200 rpm
A. CD
228. Which of the following platter spin rates
B. DVD is not commonly associated with conven-
C. DVD-RAM tional magnetic hard disk drives?
D. Blue-ray disks A. 5400 rpm

224. A consists of 1024 Megabytes. B. 7200 rpm

NARAYAN CHANGDER
A. Gigabyte C. 10, 000 rpm

B. Kilobyte D. 12, 000 rpm

C. Terabyte 229. is one or more aluminum, glass, or


D. Byte ceramic disk coated in magnetic media is
located within a hard drive.
225. Which of the following statements about A. Track
power supplies is true?
B. Sector
A. You must make sure that the voltage
selector switch on the back of the power C. Cylinder
supply is switched to the lower setting if D. Platter
the computer is going to be used in Eu-
rope. 230. What are the uses of cloud computing?

B. SATA hard drives most often use the A. Create new apps and services, analyze
same type of power connector that PATA data, embed intelligence, test and build
hard drives use. applications

C. Power supplies supply power to ATX- B. Collecting appropriate quantitative


based motherboards with connectors data, helps in drawing valid inferences
known commonly as P8 and P9. C. Input, present and compare collected
D. Power supplies convert AC input to DC data
output. D. Estimate income data, indicate suc-
cess or failure of planning
226. Which type of storage medium uses laser
beam? 231. From least to the most expensive (Per
A. Magnetic GB)

B. Optical A. Magnetic → Optical → Solid State

C. Solid state B. Solid State → Magnetic → Optical

D. none of above C. Solid State → Optical → Magnetic


D. none of above
227. Which of the following is a concept that
applies only to conventional magnetic hard 232. The physical material on which a com-
disk drives and not newer solid-state puter keeps data, information, programs,
drives? and applications
A. Storage capacity A. Adapter Card Slot
B. External attachment B. Adapter Card

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 777

C. Storage Media B. Magnetic


D. Hardisk C. Optical

PRACTICE BOOK» NOT FOR SALE


233. Which of the following are optical stor- D. Blu-ray
age devices? (Select THREE.)
238. The most common type of long-term stor-
A. CD age that uses thick magnetic disks encased
B. DVD in a protective housing to store data.
C. USB flash drive A. Hard Disk Drive (HDD)
D. SSD B. Optical Drive
E. BD C. Flash Storage

234. A desktop PC user wants to maximise the D. Solid State Devices (SSD)
speed of loading and using their operating
system (OS), which has frequent updates. 239. What color laser do CD/DVDs use?
Which configuration would work best? A. Red
A. OS stored on ROM, applications on B. Blue
hard drive
C. Green
B. OS stored on solid state drive, applica-
D. Colorless
tions on hard drive
C. OS stored on hard drive, applications 240. This card uses a landline telephone to con-
on solid state drive nect to Internet service provider
D. OS stored on ROM, applications on A. Network Card
solid state drive
B. Bluetooth Card
235. What does RAM do? C. Modem Card
A. Save data for later use D. none of above
B. Backing Up whole computer systems
241. Circuit board that connects everything in-
C. Storing Films, Games side your computer together
D. To store data and programs in current
A. RAM
use by the computer
B. ROM
236. Which of these types of storage is limited
C. Motherboard
by the maximum number of write times be-
fore it fails? D. CPU
A. DVD-RW
242. is two corresponding tracks on a
B. Solid state drive fixed disk.
C. Cloud storage A. Track
D. Blu-Ray B. Sector
237. Flash memory is: C. Cylinder
A. Solid state D. Platter

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 778

243. Which of the following is not an advan- 248. From highest to lowest speed, what is
tage of SSDs over HDDs? the correct order for these devices?
A. Low power consumption A. CD-R, solid state drive, hard disk
B. Small and light B. Solid state drive, hard disk, CD-R
C. Durable C. CD-R, Hard disk, solid state drive
D. Inexpensive D. Hard disk, CD-R, solid state drive
249. Type of ROM that can be written MORE

NARAYAN CHANGDER
244. Types of adapter cards slots
THAN ONCE using an ultraviolet light
A. Accelerated Graphics Port
A. RAM
B. Bluetooth card
B. PROM
C. MIDI card C. EPROM
D. Modem card D. EEPROM
245. What is the major advantage of a travel- 250. What type of memory is RAM?
ling sales rep using cloud storage for stor-
A. Temporary memory
ing files?
B. 1 and 3 are correct answers
A. Access the most recent files anywhere
as long as there is an internet connection C. Permanent storage
B. It is a cheap solution to getting access D. All of the above
to the files 251. Which type of storage medium uses mag-
C. Only has to take one copy of the files netised dots?
on a USB flash memory stick A. Magnetic
D. The read/write times to cloud storage B. Optical
are fast
C. Solid state
246. A circuit board that enhances functions of D. none of above
component of a system unit and/or pro-
vides connection to peripherals (external 252. Contains one or more inflexible, circu-
device) lar platters that use magnetic particles to
store data, instructions, and information
A. Adapter
A. Optical Disk
B. Adapter card
B. Usb Flash Memory
C. Network card
C. Hard disk
D. none of above D. SSD
247. Which of the following is type of Storage 253. The process of transferring items from a
interface? storage medium into memory
A. UAB A. Writing
B. SATA B. Drawing
C. SCSI C. Fetching
D. SD D. Reading

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 779

254. A FLASH DRIVE IS POPULARLY KNOWN 259. Why does the computer need ROM?
AS
A. Good features

PRACTICE BOOK» NOT FOR SALE


A. PEN DRIVE
B. To work fastly
B. CD
C. To have good music
C. DVD
D. Computer must obtain instructions
D. BLU RAY DISC when it is switched on.
255. IS A STORAGE MEDIUM FOR 260. This term refers to programs that are
PORTABLE DEVICES, LIKE MOBILES, DIGI- stored on ROM chips.
TAL CAMERAS AND MUSIC PLAYERS.
A. Firmware
A. MEMORY CARD
B. CMOS
B. FLASH CARD
C. Operating Systems
C. DVD
D. virtual machines
D. none of above

256. Which of the following best describes a 261. The software is free (don’t need to pay)
hybrid drive? A. Free Software
A. A drive that has a SATA interface as B. Open and Start Computer
well as one other
C. Open Source
B. A drive that has both HDD and SSD
components D. Proprietary

C. A drive that can be used with Windows 262. an Internet service that provides remote
or Mac OS storage to computer users.
D. A drive that is partially internal and A. Backup
partially external
B. Cloud Storage
257. Which are called primary memory C. World Wide Web
A. ROM D. none of above
B. RAM
263. How do the magnetic disk save the
C. SSD data?
D. HDD
A. Magnetic storage is read-write, which
E. USB makes it possible to re-use the storage
capacity over and over again by deleting
258. What is a disadvantage of cloud comput- older data
ing?
B. 1, 099, 511, 627, 776 bytes
A. It is vulnerable to hacking
C. 1GB to 32GB depending on the price
B. The storage can be easily expanded paid
C. Portability D. Cost, durability, capacity, speed, relia-
D. All of the above bility, portability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 780

264. The way a file is organized. File formats B. optical discs


are indicated by an extension such as .jpg, C. solid state drive
.gif, .png., .mp3, .wav, .wma, .mp4, .avi,
and .wmv. D. memory cards

A. File Format 270. How does increasing the amount of RAM


B. File System affect the performance of the computer
system?
C. Compression
A. More programs can be loaded at the

NARAYAN CHANGDER
D. Encryption same time.
265. Is RAM Volatile Or Non-Volatile? B. More instructions can be processed at
A. Volatile once.

B. Non Volatile C. More instructions can be processed


per second.
C. Neither
D. none of above
D. none of above
271. One advantage of flash memory over a
266. Which of the following tasks would you hard disk is that:
complete as part of a SATA installation?
A. It uses less power
A. Plug the 15-pin power connector into
the SATA drive. B. It is cheaper byte for byte

B. Configure the device ID using a jumper C. It generally has a much larger capacity

C. Complete a low-level format of the D. Before it fails you usually get de-
drive tectable anomalies

D. Use the 4-pin molex power connector. 272. What storage media would you choose
for:The main storage on a school network
267. Which storage technology provides fault
tolerance, called disk mirroring? A. DVD-R

A. RAID-0 B. Solid State

B. RAID-5 C. Optical DVD-R

C. RAID-1 D. Hard Disk

D. RAID-2 273. Reencoding a file to consume less storage


space.
268. These are the discs that can be recorded
several times A. File System

A. CDR B. Compression

B. DVD C. Encryption

C. CD RW D. File Permissions

D. Blue Ray 274. State three (3) types of Adapter Cards.

269. What type of storage media is normally A. MIDI card


used in a PC? B. Modem card
A. hard disks C. Sound card

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 781

D. Solid State Drive (SSD) 279. How many bytes are in a terabyte?
E. Hard Disk A. 1, 099, 511, 627, 776 bytes

PRACTICE BOOK» NOT FOR SALE


B. 1, 099, 511 bytes
275. Secondary storage is?
C. 1, 024 bytes
A. A storage of the most frequently used
data by the CPU D. 1, 099, 511, 627, 776, 554, 768, 534
bytes
B. A printed hardcopy of data
C. A permanent storage of data when the 280. Give three (3) types of Compact Disc.
power is turned off A. CD-R
D. A temporary storage of executing in- B. CD-ROM
structions and data
C. DVD
276. A school is considering moving all of its D. CD-RW
file storage to a virtual cloud based solu-
tion. Which of the following would be a E. BD
benefit of doing this?
281. Which of these is not a characteristic of
A. It will be cheap and save them money ROM?
B. There may be issues with storing sen- A. Small capacity
sitive data about students in a remote lo-
B. Non-volatile
cation
C. Large capacity
C. If their Internet connection goes down
they will no longer have access to their D. Holds the bootstrap
files
282. Series of instructions that tells a comput-
D. They no longer have to worry about ers what tasks to perform and how to per-
backing up the data, it will be done for form them.
them
A. System Software
277. All of these are Magnetic storage media B. ROM
A. Magnetic tape C. Utility Program
B. Hard disk D. Software
C. Floppy disk
283. Converts computer output into a video
D. SSD signal that travels through a cable to the
monitor, which displays an image on the
278. An HDD that can be connected as a pe- screen.Which adapter card related to this
ripheral to a computer. function?
A. Flash Storage A. TV Tuner card
B. Solid State Devices (SSD) B. USB card
C. External Hard Disk Drives C. Video card
D. Heat-Assisted Magnetic Recording D. Video capture card

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 782

284. Which of these is an optical storage de- 290. Which optical media has the greatest
vice? storage capacity?
A. Hard disk A. Compact disc
B. Cloud B. Dual-layer, Single-sided DVD
C. DVD-RW C. Dual-layer, Double-sided DVD
D. Flash memory
D. Single-layer, Single-sided Blu-ray disc
285. Which from followingis not example of

NARAYAN CHANGDER
solid state storage media 291. List three (3) types of optical disc.

A. SSD A. Compact Disk (CD)


B. HDD B. Digital Video Disc (DVD)
C. FLASH MEMORY C. Hard Disk
D. MEMORY STICK D. Solid State Drive (SSD)
286. The smaller pits and bumps of a blue laser E. Blue Ray Disc (BD)
on an optical media disk allow for:
292. A storage device that contains one
A. better birefringence results or more inflexible, circular platters that
B. worse birefringence results use magnetic particles to store data, in-
C. more data storage structions and information.This description
refers to
D. less data storage
A. Solid State Drive (SSD)
287. What is BIOS
B. Hard Disk
A. A type of processor
C. USB Flash Drive
B. The first instructions a computer runs
C. Back up storage D. Memory Card

D. Fast memory E. Optical Disc

288. A school with a limited budget is likely 293. An EIDE hard drive uses a power con-
to use what type of storage on its file nector and a data ribbon cable.
servers? A. 4-pin mini molex, 10-pin
A. Optical
B. 4-pin molex, 40-pin
B. Solid state
C. 15-pin SATA, 7-pin SATA
C. Magnetic
D. None of the above
D. Cloud
294. Which of these is not a property of flash
289. Which of the following is a magnetic stor-
memory?
age devices?
A. Solid state drive A. Durable
B. Hard Disk B. Solid state
C. Flash Device C. Slower than a hard disk
D. DVD D. Stores the BIOS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 783

295. removable, portable storage device in- C. Flash Disk


serted into a USB slot D. SD Card

PRACTICE BOOK» NOT FOR SALE


A. Usb lamp
300. One advantage of a hard disk over flash
B. USB hub memory is that:
C. USB flash drive A. It is physically smaller
D. USB sensor B. Before it fails you usually get de-
tectable anomalies
296. Connects to transmission media such as
cable television lines or phone lines.Which C. It uses less power
adapter card related to this function? D. Seek, read and write times are faster
A. Bluetooth 301. Which of the following refer to a popu-
B. MIDI card lar portable storage device utilizing flash
memory? (Select 3 answers)
C. Modem card
A. Solid-State Drive (SSD)
D. Sound card
B. Thumb drive
E. Network card
C. eSATA drive
297. A black and white image uses 1 bit per D. USB drive
pixel. So a 64 bit image would be stored
E. Flash drive
in an 8 byte file. How many bytes would
it take to store that same image if it were 302. What type of memory is accessed the
in color? quickest?
A. 512 A. Solid State Memory
B. 64 B. Magnetic Storage
C. 192 C. Blu-Ray
D. 24 D. CD/DVD

298. HDD latency is defined as:The time it 303. Enhances the sound-generating capabili-
takes for a specific ties of a personal computer.Which adapter
card related to this function?
A. file to download.
A. Bluetooth
B. block of data to rotate on a data track
B. MIDI card
to read-write head.
C. Modem card
C. sector on the HDD to be moved.
D. Sound card
D. none of above
E. Network card
299. Which of the following contains circu-
304. Choose all correct features about a solid
lar platters that use magnetic particles to
state hard drive (SSD)
store data, instructions, and information,
‘0’ and ‘1’ data Depend on how the mag- A. Very durable (less likely to break)
netic particles are aligned? B. Very portable (easy to carry around)
A. SSD C. High storage capacity
B. HDD D. Unlimited storage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 Storage Devices: Hard Disk, SSD, and Flash Memory 784

305. Which of these would match a typical C. Because it uses blue lasers which have
memory stick (flash memory) shorter wavelengths.
A. 2 megabytes D. to make the copy of original data to in
B. 500 megabytes case you lose your original data.

C. 8 gigabytes 310. Which of these is an example of cloud


D. 1 terabyte storage?
A. Google Drive

NARAYAN CHANGDER
306. A typical mp3 track needs about 50
megabytes of space B. Microsoft Azure
A. No-they are more like 3 megabytes C. iCloud
B. Yes-that’s about right D. All of the above
C. No-they’re more like 200 megabytes 311. Flash Memory Sticks are a form of what
D. No-they’re more like 1 gigabyte type of storage?
A. Optical
307. How do we measure CPU speed?
B. Solid state
A. Megabyte
C. Sequential
B. Gigahertz
D. Magnetic
C. Gigabyte
D. Megahertz 312. an ultra-small flash memory card de-
signed to provide high-capacity memory
308. What is a purpose of the ROM? in a small size. It’s used in many small
A. To store instructions for embedded portable devices such as digital cameras.
systems A. Flash Disk
B. To store the results of calculations B. SD card
from the ALU
C. CD
C. To store the operating system on a
D. Blue-ray
modern PC
D. To store instructions for applications 313. A police officer has a body worn video
software on a PC camera (BWV). Which is the most likely
secondary storage medium for this de-
309. What can you use to judge the quality of vice?
a secondary storage device?
A. Cloud
A. Cost, durability, capacity, speed, relia-
bility, portability B. Solid state

B. They can be easily affected by mag- C. Optical


netic fields. D. Magnetic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
8. Computer Peripherals and
Interfaces

8.1 Peripheral Devices: Scanner, Camera, and Microphone


1. A microphone is a 5. What type of data does a microphone
A. INPUT device transfer?

B. OUTPUT device A. Text

C. STORAGE device B. Numbers


D. none of above C. Sounds
D. Images
2. Which of these is not a Scanning device?
A. Camera 6. A pointing and input device that allows the
B. Scanner user to move a cursor around a screen and
select items with the click of a button.
C. Barcode Reader
A. Mouse
D. Graphics Tablet
B. Laptop Computer
3. Antonym of display is
C. CPU
A. on screen
D. Memory (RAM)
B. hide
C. show 7. What is a peripheral device?
D. see A. Hardware that contains the main part
of a computer and all of the robotics.
4. Which is the digital system?
B. The parts inside the computer, like
A. Computer Software.
B. Printer C. Hardware that attaches to a device to
C. Earphones help us use it.
D. Speakers D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Peripheral Devices: Scanner, Camera, and Microphone 786

8. Antonym of expensive is 14. Headphones are a


A. ridiculous A. INPUT device
B. affordable B. OUTPUT device
C. cheap C. STORAGE device
D. free D. none of above
9. Device used to capture pictures and record 15. A peripheral device used to select things

NARAYAN CHANGDER
videos is on a computer screen.
A. Printer A. Keyboard
B. Scanner
B. Mouse
C. Digital camera
C. Printer
D. keyboard
D. Earphones
10. Pick the correct answer. A computer is a
type of 16. A finger print sensor on an iPhone is a

A. Digital System A. INPUT device


B. Software B. OUTPUT device
C. Peripheral Device C. STORAGE device
D. none of above D. none of above

11. I am a storage device which stores many 17. Which of these would be Found in shops?
files, photos, and videos.
A. scanner
A. USB Drive
B. Barcode reader
B. Monitor
C. Computer
C. Keyboard
D. all of the above
D. Speakers
18. What data does a webcam transmit into a
12. Which one of these is a STORAGE device? computer?
A. Headphones
A. Pictures/Videos
B. Speaker
B. Sound
C. Mouse
C. Letters and numbers
D. USB
D. Clicks and movement
13. If I wanted to send images into a computer
I would use an. 19. A CD is a
A. INPUT device A. INPUT device
B. OUTPUT device B. OUTPUT device
C. STORAGE device C. STORAGE device
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Peripheral Devices: Scanner, Camera, and Microphone 787

20. Which of these is an Internal peripheral De- 25. It controls movement of cursor or pointer
vice? on screen.

PRACTICE BOOK» NOT FOR SALE


A. CD-ROM A. keyboard
B. Camera B. printer
C. Web CAM C. mouse

D. Printer D. none of above

26. What is the definition of an OUTPUT de-


21. It scans documents and convert it into an
vice?
electronic image
A. A peripheral device that sends infor-
A. plotter
mation into a device to control it.
B. scanner B. A peripheral device that sends infor-
C. monitor mation out of a device or shows informa-
tion.
D. printer
C. A peripheral device that saves infor-
22. What is the definition of an INPUT de- mation and can be moved around to an-
vice? other device.
A. A peripheral device that sends infor- D. none of above
mation into a device to control it.
27. What is the definition of a STORAGE de-
B. A peripheral device that sends infor- vice?
mation out of a device or shows informa-
A. A peripheral device that sends infor-
tion.
mation into a device to control it.
C. A peripheral device that saves infor-
B. A peripheral device that sends infor-
mation and can be moved around to an-
mation out of a device or shows informa-
other device.
tion.
D. none of above C. A peripheral device that saves infor-
mation and can be moved around to an-
23. A computer screen is a
other device.
A. INPUT device D. none of above
B. OUTPUT device
28. Pick the storage device that you can save
C. STORAGE device files, pictures and movies to.
D. none of above A. Hard drive
B. Mouse
24. What data does a microphone transmit to
a computer? C. Scanner
A. Pictures/Video D. none of above
B. Sound 29. A laptop touchpad is a
C. Letters and numbers A. INPUT device
D. Clicks and movement B. OUTPUT device

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Peripheral Devices: Scanner, Camera, and Microphone 788

C. STORAGE device 36. What could you use as a storage device to


D. none of above move your work to another computer?
A. Mouse
30. Which peripheral device is used to transmit
letters and numbers to the computer. B. Keyboard
A. mouse C. TV screen
B. speakers D. USB

NARAYAN CHANGDER
C. printer 37. GUI stands for
D. keyboard
A. Guide For User Intelligence
31. A TV screen is a B. Graphical User Interface
A. INPUT device C. Gimp User Interface
B. OUTPUT device D. none of above
C. STORAGE device
38. An iPad touch screen is a
D. none of above
A. INPUT device
32. A mouse is a
B. OUTPUT device
A. INPUT device
C. STORAGE device
B. OUTPUT device
D. INPUT AND OUTPUT device
C. STORAGE device
D. none of above 39. Input devices are .
A. devices which stores data.
33. A U.S.B is a device used for what?
B. devices which display processes data.
A. saving and storing data such as files,
photos and video. C. devices used with machines
B. to make music and change the volume. D. device which accept data and send it
C. to type letters and numbers. to the CPU

D. I don’t know. 40. Select all of the ways that peripheral de-
vices can be attached to a device?
34. What is used to save photos on a camera?
A. Bluetooth
A. a flash
B. Wifi
B. a memory card
C. Cords
C. a usb cable
D. I don’t know D. Magic

35. How many type of peripheral? ? 41. The buttons on an iPad are a
A. 2 A. INPUT device
B. 3 B. OUTPUT device
C. 4 C. STORAGE device
D. 5 D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Peripheral Devices: Scanner, Camera, and Microphone 789

42. What could you use as an input device to 48. Which one is your favorite subject?
move the cursor on a screen? A. math

PRACTICE BOOK» NOT FOR SALE


A. Mouse B. science
B. Keyboard C. technology
C. Microphone D. english
D. Camera 49. What could you use as an output device to
hear music from your computer?
43. A printer is a. A. Headphones
A. INPUT device B. Speaker
B. OUTPUT device C. Mouse
C. STORAGE device D. iPad
D. none of above 50. What type of data comes out of speak-
ers?
44. Powerpoint is used to make what?
A. sound
A. Presentations about a subject. B. letters
B. Maths programming. C. numbers
C. Maps. D. code
D. none of above 51. A monitor is
45. Earphones are a type of A. An input device that shows images
what it happening in the computer.
A. Digital System
B. An output device that shows images of
B. Peripheral Device what is happening in the computer.
C. Software C. A computer.
D. none of above D. A storage device.
52. The main circuit board that everything in-
46. A Printer is an
side the computer attaches to.
A. Input device A. Video Card
B. Output device B. Power Supply
C. Storage device C. RAM
D. I don’t know D. Motherboard

47. What could you use as an input device to 53. I am a device that allows a user to touch
write on a device? me to input information, but also outputs
images of what my system is doing.
A. Mouse
A. Mouse
B. Headphones B. Monitor
C. Camera C. Touch Screen
D. Touchscreen D. Headphones

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Peripheral Devices: Scanner, Camera, and Microphone 790

54. Pick the peripheral device from the choices 60. MICR stands for
below. A. Magnetic Ink Character Recognition
A. computer B. Mini In Close River
B. ipad C. Michigan Care Improvement Registry
C. earphones D. none of above
D. software app.
61. Distribute electricity to all parts inside the

NARAYAN CHANGDER
55. An Xbox controller is a computer.
A. INPUT device A. Heat Sink
B. OUTPUT device B. Power Supply
C. STORAGE device C. Computer Processor
D. none of above D. Motherboard

56. A keyboard is a 62. A is a device that is not a part of


A. INPUT device main processing system but is used with
the computer.
B. OUTPUT device
A. input
C. STORAGE device
B. peripheral
D. none of above
C. storage
57. A printer is used to D. output
A. Make letters and numbers
63. Which one of these is an OUTPUT device?
B. Make a paper copy of a document or
image A. Speakers

C. Connect to wifi B. Keyboard

D. none of above C. Mouse


D. Microphone
58. If I wanted to bring my work on a com-
puter home I would use a 64. A projector is a
A. INPUT device A. INPUT device
B. OUTPUT device B. OUTPUT device
C. STORAGE device C. STORAGE device
D. none of above D. none of above

59. A camera is an 65. Which one of these is an INPUT device?


A. Input device A. Computer Screen
B. Output device B. TV
C. Storage device C. Remote
D. I don’t know D. Speaker

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 Interface Standards: USB, HDMI, and Thunderbolt 791

8.2 Interface Standards: USB, HDMI, and Thunderbolt

PRACTICE BOOK» NOT FOR SALE


1. A customer contacts the help desk stating B. HDMI
a laptop does not remain charged for more C. VGA
than 30 minutes and will not charge more
than 15%. Which of the following compo- D. DVI
nents are the MOST likely causes the is- 5. Which of the following connection types
sue? (Choose three.) can be used simultaneously for video, stor-
A. LCD power inverter age, and audio?
B. AC adapter A. SPDIF
C. Battery B. DVI
D. Processor C. RCA
E. Motherboard D. Thunderbolt
E. RS232
2. You are installing a new video card that
has an HDMI port. Which of the follow- 6. Which of the following USB connector stan-
ing is true about HDMI cables? Each cor- dards is designed for USB peripherals, such
rect answer represents a complete solu- as printer, upstream port on a hub, or
tion. Choose two. other larger peripheral devices?
A. They can transmit analog or digital sig- A. USB Micro-A
nals. B. USB Mini-B
B. They can use HDMI or mini-HDMI con- C. USB Type-A
nectors.
D. USB Type-B
C. They are not used to connect to projec-
E. SATA
tors.
D. They can transmit audio as well as 7. You want a cable to charge and transfer
video. data for an Apple mobile device. Which of
the following connection types would sat-
3. How do you connect a DVI-A interface on isfy your requirements?
a peripheral to a DVI-D interface on the A. USB Micro-A
computer?
B. DVI
A. With a standard DVI cable
C. Lightning
B. You wouldn’t interconnect those two
D. USB Mini-B
interfaces.
C. With a cable that is terminated on one 8. Which of the following statements are
end with a DVI-A connector and on the true regarding USB 3.0 and USB 2.0? Each
other end with a DVD-D connector correct answer represents a complete solu-
tion. Choose two.
D. With a DVI-I cable
A. USB 2.0 provides more current at high
4. Which of the following display connections power as compared to USB 3.0.
provides the best picture? B. Unlike USB 2.0, USB 3.0 supports dual
A. DisplayPort simplex communication pathways.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 Interface Standards: USB, HDMI, and Thunderbolt 792

C. Unlike USB 2.0, USB 3.0 supports con- B. AGP


tinuous bursting. C. eSATA
D. USB 2.0 supports streaming but USB D. USB
3.0 doesn’t.
E. POST
9. What type of pointing device features a
ball and buttons on the top and a flat, 14. Which of the following display interfaces
steady surface on the bottom? is equivalent to DisplayPort with PCIe
added in?

NARAYAN CHANGDER
A. Track pad
A. Thunderbolt
B. Mouse
C. Touch pad B. VGA

D. Trackball C. DVI

E. Stylus D. HDMI
E. Svideo
10. A technician is hired to install network ca-
ble in a crawl space running the length of 15. Which of the following features are incor-
a hallway. To do so without a fire code porated in USB 3.0 standard? Each cor-
violation, which of the following types of rect answer represents a complete solu-
cable should the technician run? tion. Choose all that apply.
A. Plenum A. Full-duplex communication
B. Fiber B. Backward compatibility with USB 2.0
C. Shielded and 1.1
D. Coaxial C. Maximum data transfer rate of 480
Mbps
11. Which of the following is used for parallel
applications? D. Enhanced power efficiency

A. DB-25 16. Which of the following expansion ports


B. Thunderbolt would be used to enable the transfer of
power, data, and video to peripheral de-
C. VGA vices on an Apple computer?
D. RCA A. Lightning
12. Which of the following charging and data B. Thunderbolt
ports has a non-directional connector?
C. USB 2.0
A. USB Micro-B
D. HDMI
B. USB Type-A
E. Management
C. USB Micro-A
D. USB Type-C 17. Which of the following external ports
would a technician use to connect a key-
13. Which interface combines PCIe and Dis- board to a computer? Each correct answer
playPort into one serial bus and was de- represents a complete solution. Choose all
veloped by Apple? that apply.
A. Thunderbolt A. PS/2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 Interface Standards: USB, HDMI, and Thunderbolt 793

B. USB D. The files are not compatible with the


C. VGA type of disk used

PRACTICE BOOK» NOT FOR SALE


D. HDMI 22. Jennifer, a user, needs to extend her com-
E. DVI puter capacity by connecting external stor-
age devices. Which of the following con-
18. A user is experiencing issues synchronizing nectors will allow her to accomplish the
a smartphone. The user is able to connect task? Each correct answer represents a
to individual services, but each requires a complete solution. Choose three.
different password. Which of the follow-
A. eSATA
ing needs to be configured to allow the
user to access web services securely with B. IEEE 1394
a unique password? C. SATA
A. SIM D. USB
B. SMB E. MIDI
C. SSL
23. If you attach a gaming PC capable of gam-
D. SSO ing at 4K/60fps to your TV, you will need
which interface for data transmission?
19. Which of the following uses a single con-
nector to deliver both video and audio A. S/PDIF
without using any conversion adapter? B. MIDI
A. VGA C. PCI
B. HDMI D. HDMI
C. SPDIF
24. Which of the following is used to connect
D. DVI
a headset to a laptop?
20. Which of the following cables can be used A. eSATA
for both audio and video, and storage de-
B. BNC
vices?
C. RG-6
A. DVI
D. USB
B. HDMI
C. Component 25. You are installing a replacement monitor
on a desktop computer. Which of the fol-
D. Thunderbolt
lowing is true regarding a monitor’s re-
21. A user is connected to a docking station fresh rate?
with an optical drive and is trying to back A. The refresh rate is normally selected
up personal files to removable media, but by using the controls on the front panel of
is encountering write errors. Which of the the monitor.
following is MOST likely cause of the er-
rors? B. As you lower the resolution, the max-
imum refresh rate allowed tends to in-
A. The disk has already been finalized crease.
B. The files are encrypted C. As long as the graphics adapter can re-
C. There is a corrupt file on the hard drive fresh the image at a particular rate, the

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 Interface Standards: USB, HDMI, and Thunderbolt 794

attached monitor can accommodate that B. DB-9


refresh rate. C. SCSI
D. The refresh rate is normally expressed D. USB-C
in MHz.
E. TRS
26. Which of the following is a coaxial ca-
31. Which type of fiber-optic connector, con-
ble that is used for cable television trans-
taining one fiber-optic strand per connec-
mission and provides an impedance of 75
tor, is connected by pushing the connector
ohms?

NARAYAN CHANGDER
into a terminating device and can be re-
A. Cat 6 moved just by pulling the connector from
B. RG-58 the terminating device?
C. Cat 3 A. ST
D. RG-59 B. LC
C. SC
27. Which of the following connections are typ-
ically on the external PC chassis? Each D. BNC
correct answer represents a complete so- 32. What kind of peripheral is used to read
lution. Choose two. credit cards to initiate financial transac-
A. IEEE 1394 tions? Each correct answer represents a
complete solution. Choose two.
B. IDE
A. Signature pad
C. SATA
B. Barcode reader
D. eSATA
C. Chip reader
28. VGA cables use what type of signal be-
D. Magnetic reader
tween the adapter and monitor?
A. Digital 33. Which of the following devices will allow
a technician to use a single set of input de-
B. Analog vices on several computers?
C. Composite A. iSCSI
D. Compressed B. Layer 3 switch
29. What is the single, fixed resolution of an C. KVM switch
LCD called? D. PoE
A. Native resolution E. Docking Station
B. Aspect ratio 34. James, a technician, is upgrading the
C. Default resolution firmware on an older KVM switch. The
D. Refresh rate specifications call for a serial port to con-
nect to the computer on one side, and an
E. Burned-in resolution Ethernet jack to connect to the switch on
30. Which of the following connector types is the other side. Which of the following con-
typically not associated with hard drive nectors does he need for this cable?
use? Choose 2 A. MT-RJ
A. eSATA B. DB-9

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 Expansion Slots and Cards 795

C. RJ-45 to connect it to the PC?


D. BNC A. MIDI

PRACTICE BOOK» NOT FOR SALE


E. FO B. eSATA
C. HDMI
35. You need to connect a piano keyboard to
a PC. Which of the following interfaces D. VGA
should you look for on a piano keyboard E. HDMI

8.3 Expansion Slots and Cards


1. This expansion card allows musician to 3. video games uses this card to generate
connect musical instrument to the com- complex scenes in a video game.
puter. A. Graphic card
A. MIDI card
B. sound card
B. Sound card
C. USB card
C. Graphic card
D. Wifi card
D. Modem card
2. Expansion slot is used to 4. Mouse is an example of a

A. Hold an adapter card A. Peripherals


B. Hold memory modules B. input device
C. hold processor C. pointing device
D. hold the power supply D. All of the answer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9. Computer Applications and Uses

NARAYAN CHANGDER
9.1 Scientific and Engineering Applications
1. Because they reproduce rapidly and are chemical use. It is also a branch of engi-
easy to grow, now produce a host of neering that combines physical science, life
important substances useful for health and science, math economics (a)
industry.
A. Electrical Engineering
A. Transgenic Plants
B. Aerospace Engineering
B. Transgenic Bacteria
C. Chemical Engineering
C. Transgenic Animals
D. none of above
D. none of above
5. What type of education is required to be
2. What is the Fahrenheit equivalent for-40 an engineer?
degrees Celsius?
A. Bachelors degree at a credited school
A. -38.28 degrees Fahrenheit
B. Exams-Fundamentals of Engineering
B. -40 degrees Fahrenheit
Test-Engineering in Training
C. -16.23 degrees Fahrenheit
C. Practice for 4 years-principles and
D. -87.33 degrees Fahrenheit practice exam-licensed engineer

3. Measurement in resistance. D. All of the above

A. Volts 6. Collect data from test to figure out what’s


B. Ohms going wrong and how it can be fixed
C. Ampere A. How to develop details of a solution
D. Farad B. How to cause problems
C. The Steps of the Design Process
4. Address issues related to chemical produc-
tion, transformation of raw materials, and D. How AC and DC differ

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Scientific and Engineering Applications 797

7. When a wire or foil strip inside a fuse A. Brainstorming


melts, the fuse is said to be (a) B. Hypothesis

PRACTICE BOOK» NOT FOR SALE


A. Civil Engineered C. Evaluation
B. Evolution
D. Mock up
C. Mock Up
13. Design, develop, and test the manufac-
D. Blown
ture of electrical equipment and large-
8. may soon produce human antibodies scale electrical systems. (a)
that can be used to fight diseases. A. Aerospace Engineering
A. Transgenic Plants B. Chemical Engineering
B. Transgenic Bacteria C. Electronic Engineering
C. Transgenic Animals D. Electrical Engineering
D. none of above
14. Energy that will never run out (a)
9. Using Ohm’s Law how much current is go- A. Lifetime
ing through the following circuit? 15.5
volts 5 Ohms resistance B. Inexhaustible Energy
A. 7.75 amps C. Forever Energy
B. 77.5 amps D. Current
C. 3.1 amps 15. What are some external issues that con-
D. 3.7 amps strain the engineering design process? (a)
A. Materials and Cost
10. Goggles, rolled sleeves, and eye protec-
tion all demonstrate (a) B. Size and Shape
A. math C. Design and Time
B. technology D. All of the above
C. appropriate safety gear 16. What is the area formula? (a)
D. area A. L x W
11. Create technology to advance food, biolog- B. I x V
ical, irrigation, and machinery systems (a)
C. D x T
A. Civil Engineering
D. R/I
B. Agricultural Engineering
17. What is Ohm’s Law(the relationship be-
C. Computer Software Engineering
tween voltage, resistance, and current)?
D. Mechanical Engineering (a)
12. Technique teams use for generating ideas A. V=IR
where team members each suggest as B. D=VT
many ideas as possible without regard to
whether or not they are good and agreeing C. I=VR
on the best solution (a) D. T=VD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Scientific and Engineering Applications 798

18. What is the correct alignment of the elec- B. construct


tromagnetic spectrum? C. average
A. Red, Orange, Yellow, Blue, Green, Vio- D. area
let
B. Red, Orange, Yellow, Green, Blue, Vio- 24. What are some major engineering fields?
let (a)
C. Orange, Yellow, Red, Blue, Green, Vio- A. Civil and Mechanical

NARAYAN CHANGDER
let B. Electrical
D. Blue, Green, Yellow, Violet, Orange, C. Aerospace and Structural
Red
D. All of the above
19. The current through a conductor between
two points is directly proportional to the 25. What applications can gel electrophoresis
potential difference across the two points. be used for?

A. Celsius’ Law A. Parental Testing

B. Ohm’s Law B. Criminal Investigations

C. Fahrenheit’s Law C. Sequence Endangered Species DNA

D. none of above D. All of the above

20. Who do engineers interact with? (a) 26. Puts limits on what can be done and how
it will effect the society and economy and
A. Scientists if it is needed and how it will effect the
B. Technicians environment
C. Craftsman A. Describes the social impact of techni-
D. All of the above cal process, product, or system
B. Describes the economic impact of a
21. A 3 view drawing (a)
technical process, product, or system
A. Inexhaustible Energy
C. Describes the enviromental impact of
B. Engineering a technical process, product, or system
C. Isometric Drawing D. All of the above
D. Orthographic Drawing
27. Which is the correct statement of Ohm’s
22. What is the Celsius equivalent for-18 de- Law?
grees Fahrenheit? A. R = IV
A. 17.65 degrees Celsius B. V = R/I
B. -43.78 degrees Celsius C. All are correct
C. -22 degrees Celsius D. V = IR
D. -27.78 degrees Celsius
28. Research, design, develop, and test com-
23. The sum of all numbers in a list divided by puter systems and computer-related equip-
how many numbers make up the list (a) ment (a)
A. mock-up A. Chemical Engineering

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Scientific and Engineering Applications 799

B. Agricultural Engineering 34. What was the first animal that was
C. Computer Software Engineering clonned?

PRACTICE BOOK» NOT FOR SALE


D. Aerospace Engineering A. Cow
B. Goat
29. When an object is moved it creates fric-
tion which is the opposite force that slows C. Pig
down the object requiring more forced to D. Sheep
be applied to the object to move (a)
35. Design, develop, and test aircraft and
A. Development
spacecraft ranging from rockets and space-
B. Engineering craft to gliders and small passenger air-
C. Force craft (a)
D. Friction A. Aerospace Engineering
B. Chemical Engineering
30. processes and knowledge that can be used
to extend human abilities as well as sat- C. Electronic Engineering
isfy human needs and wants (a) D. Agricultural Engineering
A. engineering
36. A visual, mathematical, or 3-D representa-
B. mechanisms tion in detail of an object or design, often
C. technology smaller than the original. A model is of-
D. none of above ten used to test ideas, make changes to a
design, and learn more about what would
31. When a current of 10.0 A flows through happen to a similar, real object. (a)
a 50.0-O resistor in a circuit, what is the A. Mock-Up
voltage of that circuit?
B. Engineering
A. 5 V
C. Model
B. 60 V
D. Scale Model
C. 500 V
D. 0.20 V 37. A person who designs any variety of
things. This usually implies the task of
32. A person who is trained in and uses tech- creating drawings or in some ways uses
nological and scientific knowledge to solve visual cues to organize his or her work (a)
practical problems (a)
A. Technologist
A. Scale Model
B. Engineer
B. Technology
C. Ohm’s Law
C. Architect
D. Designer
D. Engineer
38. What is bacterial transformation?
33. a gradual development (a)
A. When bacterial DNA has new genes
A. evolution added to it
B. mock-up B. When bacterial DNA turns into RNA
C. isometric drawing C. When bacterial DNA is dissolved by sci-
D. valid entists

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Scientific and Engineering Applications 800

D. When bacterial DNA combines with a 44. They interlock and flow from another in a
virus’ DNA smooth process to get to the answer
A. Steps to the Engineering Design Pro-
39. What is the earliest example of engineer-
cess
ing? (a)
B. How to develop details of a solution
A. Screwvdriver
C. How parts of a system work together
B. Archimedes Screw
D. How to interpret aspects of design

NARAYAN CHANGDER
C. Nailvgun
45. Plan the design, construction, and mainte-
D. none of above nance of various civil structures (a)
40. A person who designs products, structures, A. Computer Hardware Engineering
or systems to improve people’s lives (a) B. Inexhaustible Energy
A. Designer C. Civil Engineer
B. Technologist D. Isometric Drawing
C. Engineer 46. What is the process of input, process, out-
D. Architect put, and feedback (a)
A. Mock-up
41. These people work out the production de-
B. Technology
tails and design the system for manufac-
turing a product (a) C. EDP (Engineering Design Process)

A. Engineer Technologist D. Architecture

B. Designer 47. What is engineering? (a)


C. Modeler A. the process of designing solutions

D. none of above B. the process of cooking


C. the process of architecture
42. Area of Circle (a)
D. none of above
A. ohm’s law
48. Why do the fragments of DNA in gel elec-
B. Pie x r trophoresis travel away from the negative
C. distance x time electrode?

D. none of above A. DNA is negatively charged so attracted


to the positive end of the unit
43. design, develop, and test small electronic B. DNA is positively charged to attracted
systems such as appliances, telephones, to the negative end of the unit
surgical devices, etc. (a)
C. the agarose gel in negatively charged
A. Electronic Engineer D. the agarose gel is positively charged
B. Chemical Engineer
49. A pictorial representation of an object in
C. Space Engineer which all 3D drawings are at full scale (a)
D. none of above A. Architecture

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Scientific and Engineering Applications 801

B. Orthographic Drawing 55. Which of the following best describes re-


C. Isometric Drawing combinant DNA?

PRACTICE BOOK» NOT FOR SALE


D. Engineering A. DNA that has genes from a different or-
ganism
50. How do engineers document data? (a)
B. DNA that is ONLY found in bacteria
A. Engineering Notebook
C. DNA that is used for the Human
B. Architecture Sketchbook Genome Project
C. Doctoring Planner D. DNA that is created by scientists for a
D. Teacher’s Lesson Plan variety of projects

51. What important milestones have occurred 56. Solve enviromental problems related to
during the progression of the engineering pollution, water use, materials, and en-
field? ergy use, waste treament, etc. (a)
A. Henry Ford’s Assembly Line A. Aerospace Engineering
B. Wright Brother’s First Flight B. Chemical Engineering
C. Thomas Edison’s Light Bulb
C. Electrical Engineering
D. Robert Goddards’s Liquid Fuel Rockets
D. Enviromental Engineering
E. All of the above
57. Has more than one resistor (anything that
52. In the engineering the design process, the
uses electricity to do work) and has multi-
first step is (a)
ple (parallel) paths to move along.
A. identify the problem
A. Parallel Circuit
B. procedure
B. Series Circuit
C. hypothesis
C. Compound Circuit
D. trial
D. none of above
53. Well-founded on evidence and corresponds
accurately to the real world (a) 58. Measurement in voltage.
A. Technology A. Ohms
B. Mock-Up B. Farad
C. Scale Model C. Volts
D. Valid D. Ampere
54. What is the purpose of gel electrophore-
sis? 59. Measuring instrument used to measure the
electric current in a circuit.
A. helps cut DNA
A. Ammeter
B. count the genes in DNA
B. Pyrometer
C. separates DNA based on size
C. Oscilloscope
D. allows for an exact replicated organ-
ism D. Multimeter

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Scientific and Engineering Applications 802

60. A member of a population of genetically B. Blue


identical cells produced from a single cell C. White
A. Transgenic D. Yellow
B. Genetic Engineering
64. Measurement in currents.
C. Clone
A. Amperes
D. Genetically Modified Organism
B. Farad

NARAYAN CHANGDER
61. Current goes through every component of C. Volts
the circuit.
D. Ohms
A. Parallel Circuit
65. What is an example of genes that can be
B. Compound Circuit
used in plants to make them better?
C. Series Circuit
A. Natural Insecticide
D. none of above
B. Disease Resistance
62. What are the simple machines? (a) C. Resistance to herbicides
A. Pulley and Lever D. Drought Tolerance
B. Wheel and Axel
66. What major functions do engineers per-
C. Wedge and Screw form? (a)
D. Plane A. Research & Development
E. All of the above B. Design & Production

63. Which of the following colors of the elec- C. Construction & Operations
tromagnetic spectrum is the coolest. D. Sales & Management & Consulting
A. Red E. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
10. Computer Ethics and Security

10.1 Types of Threats and Attacks


1. What are the different categories of hack- C. Segmant
ers? D. Datagram
A. Black, White and Grey
5. You enabled file encryption on your lo-
B. Green, Blue and frog cal computer.while you were on vacation,
C. Yellow, White and Green one of your co-workers managed to get
on your computer and share your impor-
D. Orange, Pink and Yellow tant files with other users.how did they
do this?
2. Which of the following is a common reason
individuals perform hacking attacks? A. they logged on and disabled encryption
A. Furthering a political agenda. B. they used the disk recovery tool to ac-
cess the encrypted files.
B. Stealing personal data for bank fraud.
C. all user logging into the system have
C. Accessing confidential information. access to encrypted files.
D. All of the above. D. They logged on with your username
and password.
3. Driven by a cause like social change, polit-
ical agendas, orterrorism 6. How can you protect computer systems
against worms and viruses?
A. All of these
A. Install a firewall to ensure software is
B. Hacktivists
not downloaded without your knowledge.
C. Organized Crime B. Update the operating system to en-
D. Advanced Persistent Threats sure there are no ‘back doors’.
C. Install anti-virus software, update it,
4. Data name at Layer 4:
scan and delete any worms/viruses.
A. Bit D. All 3 options would be suitable precau-
B. Packet tions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 804

7. What option can you configure on your 11. Hackers without any affiliation to a com-
workstation to increase security when you pany who attempt to break into a com-
leave your desk? pany’s network but risk the law by doing
so
A. file encryption
A. Gray Hats
B. multi factor authentication
B. Script Kiddies
C. single sign-on
C. Hacktivits
D. Screensaver password

NARAYAN CHANGDER
D. Blue Hats

8. Unwanted windows that designed to cap- 12. What type of software should you install
ture your attention and lead you to adver- to protect yourself from worms?
tising sites: A. software firewall
A. Popups B. antispyware
B. Spams C. Antivirus
C. Virus D. antispam

D. Trojans 13. This means to gain access without permis-


sion, unauthorized access.
9. Which of the following attacks involves A. hacking
the use of previously captured network
B. cybercrime
traffic?
C. identity theft
A. Replay
D. virus
B. Smurf
14. Ann, an employee, is cleaning out her desk
C. Vishing and disposes of paperwork containing con-
D. DDoS fidential customer information in a recy-
cle bin without shredding it first. This is
10. A colleague can’t open any Word docu- MOST likely to increase the risk of loss
ment he has stored on his local system. from which of the following attacks?
When you force open one of the documents A. Shoulder surfing
to analyze it, you see nothing but seem-
B. Dumpster diving
ingly random characters. There’s no visi-
ble sign the file is still a Word document. C. Tailgating
Regardless of what you use to view or D. Spoofing
open the Word documents, you don’t see
anything but random characters. Your col- 15. Mike, a user, states that he is receiv-
league was most likely a victim of what ing several unwanted emails about home
type of malware loans. Which of the following is this an
example of?
A. Virus
A. Spear Phishing
B. Crypto-Malware B. Hoaxes
C. RAT C. Spoofing
D. Backdoor D. SPAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 805

16. what type of malware is best known for A. Script kiddie


carrying other malware as a payload? B. Hacktivist

PRACTICE BOOK» NOT FOR SALE


A. virus
C. Insider
B. Worm
D. Competitor
C. trojan horse
21. Which of the answers listed below refers
D. rootkit
to a network protocol used in the most
17. It is a person who gains unauthorized ac- common types of spoofing attacks?
cess to a computing device or network. A. SMTP
A. Spyware B. RDP
B. Hacker C. SNMP
C. Virus D. Telnet
D. Trojan Horse
22. Gaining illegal access to a computer sys-
18. A zero-day attack exploits: tem.
A. New accounts A. Hacking
B. Patched software B. Spam
C. Vulnerability that is present in already C. Malicious Software
released software but unknown to the
D. Virus
software developer
D. Well known vulnerability 23. Fingerprint recognition is a kind of:

19. A network analyst received a number of A. Biometrics


reports that impersonation was taking B. Locked access
place on the network. Session tokens C. Cable shielding
were deployed to mitigate this issue and
defend against which of the following at- D. Safe storage
tacks?
24. Khaled has just been the victim of a pass-
A. Replay word attack . He used the password
B. DDoS ‘password’ for all his bank accounts and
social media accounts.By using the com-
C. Smurf
mon used password ‘password’, the c
D. Ping of Death ybercriminal was able to gain access to
Khaled’s account and many others by us-
20. The IT manager in your organization pro-
ing the technique. This technique tries
poses taking steps to deflect a potential
the same common password across many
threat actor. The proposal includes the fol-
usernames.
lowing:Create and follow onboarding and
off-boarding procedures.Employ the prin- A. brute-force
cipal of least privilege.Have appropriate B. rainbow
physical security controls in place.Which
type of threat actor do these steps guard C. password spraying
against? D. dictionary

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 806

25. What is the most appropriate definition of A. Adware


a hacker B. Computer worm
A. Someone who gains unauthorised ac- C. Trojan horse
cess to an IT system
D. Spyware
B. Someone who gains no access to an IT
system 30. It is a kind of TCP/IP attacks where the at-
C. Someone who modifys program code tacker is sending enough requests to over-
load a resource or even stopping its oper-

NARAYAN CHANGDER
D. Someone who logins in with their own ation:
details
A. DoS/DDoS
26. An email sent from unknown source dis- B. Spoofing
guised as a source known to the message
receiver is an example of:(Select 2 an- C. Man-in-the-middle
swers) D. DNS poisoning
A. Spoofing 31. It unknowingly attack the system after a
B. Dictionary attack client received a document.
C. Social engineering A. Malicious email attachment
D. Trojan horse B. Botnets
E. Brute-force attack C. Cyber Threats
D. Adware
27. What 2 places do scammers commonly use
information from to create targeted spear 32. Which of these might be considered to be
phishing attacks? [Choose 2] an external attack?
A. Social Media A. Spyware
B. Identification Cards B. Ransomware
C. Online public records C. Social engineering
D. Libraries D. Employee sabotage
28. Which of the following statements is true E. Unauthorised employee access to se-
regarding web browser plugins, toolbar, cure areas
and extensions? 33. What is data encryption?
A. they should be updated to the newest A. Making data unreadable by anyone
versions
B. Scrambling data so it is only readable
B. they are dangerous and should be to authorised people
deleted
C. Putting a password on data files
C. they will be detected and removed by
antivirus software D. none of above
D. they only function in internet explorer 34. Software designed to detect, disable, and
remove viruses, worms, and Trojans
29. Malicious software performing unwanted
and harmful actions in disguise of a legiti- A. Firewall
mate and useful program is called: B. Antivirus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 807

C. Data encryption C. Armored virus


D. none of above D. Backdoor

PRACTICE BOOK» NOT FOR SALE


35. A computer ****** is one type of mal- 39. Disruption of connection between a client
ware (malicious software) which is in- and server to prevent access to a service.
stalled without your knowledge, with the A. Denial-of-Service (DoS) Attack
purpose of doing harm . A ******** is a
program which infects (embeds itself in) B. Phishing
other programs or data files. It is eas- C. Man-in-the-middle attack
ily spread if a user innocently sends an in- D. DNS Tunelling
fected file to someone else
A. Virus 40. Phishing attacks are mainly using links
(shortened URLS) to get you to give
B. Trojan Horse them
C. WAN A. money
D. Worm B. coffee
36. Which of the following are examples of a C. personal information
cause of reputation loss? D. none of above
A. Loss of customer data. 41. What is hacking?
B. Loss of business income. A. Stealing information
C. Loss of trade secrets. B. Accessing a computer without permis-
D. Loss of service. sion or authorization
C. Breaking the web
37. Elite hackers are
D. A thing criminals do
A. Hackers who attempt to hack into a
network with permission ofthe company 42. is when someone edits a program
but are not employed by the company source code in the software to exploit or
B. Hackers who find and exploit vulnera- change it
bilities before anyone else does A. hacking
C. Malicious hackers who break into com- B. wardriving
puter systems and networks without au-
C. phishing
thorization or permission
D. cracking
D. Non-malicious hackers who attempt to
break into a company’ssystems at their re- 43. Due to a recent string of thefts in your
quest office, you need to harden your local sys-
tem.what action are most appropriate for
38. A collection of software tools used by a your situation?
hacker in order to mask intrusion and ob-
tain administrator-level access to a com- A. Install a lock
puter or computer network is known as: B. disable unused services
A. Trojan C. install antimalware
B. Rootkit D. buy a new computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 808

44. Phishing is a type of 49. What makes a good password?


A. Social Engineering A. Pa5sW0rd
B. Brute-force attack B. Password
C. Malware C. 123password
D. DDOS D. I don’t know
45. Which of the following malware types is 50. What can a virus do to your computer?
MOST likely to execute its payload after

NARAYAN CHANGDER
A. Delete files
Jane, an employee, has left the company?
B. Cause inappropriate adverts to appear
A. Rootkit
C. Spy on what you are doing
B. Logic Bomb
D. Steal your information
C. Worm
D. Botnet 51. What is a man in the middle attack
A. attack is a general term for when
46. Mona is the data security manager for a someone positions themselves in a con-
governmental organisation. One her de- versation between a user and an applica-
sired goals of security is to ensure that the tion. Either to eavesdrop or to imperson-
data can be accessed only by those who ate one of the parties, making it appear
are allowed to see it. This is known as as if a normal exchange of information is
data underway.
A. confidentiality B. another term for piggy in the middle.
B. integrity C. someone who hacks someone for a fi-
C. availability nancial gain but acts as someone talking
D. publicity to them
D. none of above
47. Harmful programs used to disrupt com-
puter operation, gather sensitive informa- 52. Which of these is not associated with a
tion, or gain unauthorized access to com- DDoS attack?
puter systems are commonly referred to A. Stolen data
as:
B. Prevent an internet site from function-
A. Trojans ing properly
B. Malware C. Flood a web server or other online re-
C. Viruses source with so many requests that it can-
D. Spyware not cope
D. A botnet
48. The perpetrator use Denial-of-Service
(DoS) Attack to make network resource 53. How configuration weakness is ex-
unavailable by? ploited?
A. Disrupt services A. Firewall holes
B. Restart computer B. Default settings
C. Give access C. Unwritten policy
D. Delete everything D. Lack of continuity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 809

54. Advanced Persistent Threats B. Financial Loss


A. no skill who only use the tools and ex- C. Reputation Loss

PRACTICE BOOK» NOT FOR SALE


ploits written by others D. Intellectual Property Loss
B. funded groups of hackers withcovert
59. It is used to protect private network from
and open-source intelligence at their dis-
external access through internet:
posal
A. Firewall
C. are the same as elite hackers
B. Antivirus
D. are the counterparts of the CIA triad
C. Popup blocker
55. Which external threat is being described? D. Anti-spams
”attempts to trick users into giving their
personal information, such as bank details 60. “When someone poses (acts) as an insti-
through phishing, pharming or shoulder tution, like a bank or a school, and sends
surfing” you a personalized message asking you to
A. Pharming provide private information.” is called
A. internet scam
B. Social Engineering
B. identity theft
C. Shoulder surfing
C. private information
D. Man-in-the-middle attacks
D. phishing
56. Smart cards, encryption, access control
lists (ACLs), intrusion detection systems, 61. Which of the following includes all hard-
and network authentication ware and software necessary to secure
data, such as firewalls and antivirus soft-
A. Technical controls ware?
B. Administrative controls A. Policies
C. Identification authorization B. Assets
D. Security threat C. Users and administrators
57. All executive officers have changed their D. Physical security
monitor location so it cannot be easily 62. What is gaining unauthorised access to a
viewed when passing by their offices. computer system also known as?
Which of the following attacks does this
action remediate? A. Hacking
A. Dumpster diving B. Spamming

B. Impersonation C. Phishing
D. Logging on
C. Shoulder surfing
D. Whaling 63. What virus emerged from the Philippines
and traveled around the world via email?
58. Compensation paid to individuals who
A. Zombies
have been negatively affected by a com-
pany being hacked, is an example of what B. Common Cold
type of loss? C. ILOVEYOU virus
A. Operational Loss D. IHATEYOUvirus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 810

64. Which type of malware generally infects 69. A program has been discovered that in-
files on a network and attempts to make fects a critical Windows system exe-
a system unreliable? cutable and stays dormant in memory.
A. Worm When a Windows mobile phone is con-
nected to the host, the program infects
B. Virus the phone’s boot loader and continues to
C. Bot target additional Windows PCs or phones.
Which of the following malware categories
D. Adware
BEST describes this program?

NARAYAN CHANGDER
65. What social engineering technique in- A. Zero-day
volves someone pretending to need your
information to confirm the identity of who B. Trojan
they are talking to? C. Virus
A. Pretexting
D. Rootlet
B. Baiting
C. Quid pro quo 70. Threat that attacks the systems using ma-
licious coding to exploit critical data.
D. none of above
A. Privilege escalation
66. It is the layer that offers a physical ad-
dress so a device’s data can be sent on the B. Insider Threats
network: C. SQL injection
A. Data-Link Layer D. Unauthorized access
B. Network Layer
C. Transport Layer 71. It is a type of malware that propagates
by inserting a copy of itself and becoming
D. Physical Layer part of another program.
67. A computer program containing malicious A. Computer virus
segment that attaches itself to an applica-
B. Computer worm
tion program or other executable compo-
nent is called: C. Trojan
A. Adware D. none of above
B. Spam
72. Your manager just got a new workstation
C. Virus
and is not part of a domain.he wants to
D. Flash cookie know which user account he should disable
to increase security. what should you telll
68. It is a stand-alone software and does not him?
require a host program to spread.
A. Guest
A. Computer virus
B. Computer worm B. users

C. Trojan C. power users


D. none of above D. administrator

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 811

73. Several desktops in your organization are 78. A collection of techniques used to deceive
displaying a red screen with the message internal users into revealing of informa-
“Your files have been encrypted. Pay 1 tion.

PRACTICE BOOK» NOT FOR SALE


bitcoin to recover them.” These desktops
A. Method of Attacks
have most likely been affected by what
type of malware B. Social Engineering
A. Zotob Worm C. Hackers
B. Adware D. Intruders
C. Ransomware 79. Common Security Threats
D. Rootkit A. Phishing
74. What threat manipulate an existing image B. Ransomware
of videos? C. flour-based
A. Spyware D. Type
B. Deep Fake
80. Unsafe IT practice by an employee is an
C. Worm example of what type of security threat?
D. Trojan A. Internal
75. Which is NOT illegal B. External
A. Virus C. Physical
B. DDos D. Structured
C. Trojan Horse 81. Within the layers of abstraction in the soft-
D. Adware ware domain, interface with the hard-
ware.
76. Malware that restricts access to a com-
A. applications
puter system by encrypting files or lock-
ing the entire system down until the user B. programming languages
performs requested action is known as: C. libraries
A. Grayware D. operating systems
B. Adware
82. What is Baiting
C. Ransomware
A. Leaving an infected device somewhere
D. Spyware for an employee to find and then insert
into a computer system
77. How often should you change your pass-
word? B. When you are asked to send your per-
sonal details in an email
A. 3 years
C. When an attack attempts to overload
B. 3 months
the server so hackers can get data
C. 4 months
D. When a website looks legitimate but it
D. 4 years is actually a fake.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 812

83. Phishing scams targeting selected individ- B. The person who is able to gain access
uals/groups of users are referred to as: to equipment or a network by tricking peo-
ple into providing the necessary access in-
A. Vishing
formation
B. Spear phishing C. It is any technical effort to manipulate
C. MITM attack the normal behavior of network connec-
tions and connected systems
D. Whaling
D. The unauthorized real-time intercep-

NARAYAN CHANGDER
84. Software written to cause loss of data tion of a private communication, such as
a phone call, instant message, and video
A. Malware conference or fax transmission
B. Social Engineering
88. HTTP layer works at Layer:
C. Phishing A. 2
D. Brute-force attack B. 3
C. 6
85. “A type of crime in which your private in-
formation is stolen and used for criminal D. 7
activity.” is called
89. Types of malware that can destroy data?
A. internet scam A. Trojan horse
B. identity theft B. Worms
C. private information C. Virus
D. phishing D. Adware
90. Which of the following are characteristics
86. Trojan:
of remote-access Trojans
A. It is named for its method of getting A. They can be deployed through mal-
past computer defenses by pretending to ware such as worms
be something useful
B. They allow attacks to connect to the
B. It is a self-replicating program that system remotely
uses the network to duplicate its code to
C. They give attackers the ability to mod-
the hosts on the network
ify files and change settings
C. Software program that displays adver- D. All of the above
tising on your computer, often displayed
in a pop-up window 91. Eavesdropping is:
D. It is unsolicited email that can be used A. The unauthorized real-time intercep-
to send harmful links or deceptive content tion of a private communication, such as
a phone call or video conference
87. Penetration is: B. The ways in which you can lose your
A. The practice of testing a computer sys- hardware and data
tem, network or Web application to find C. It is any technical effort to manipulate
vulnerabilities that an attacker could ex- the normal behavior of network connec-
ploit tions and connected systems

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 813

D. The use of a computer or its data for 96. Which of the following would BEST deter
unapproved or possibly illegal activities an attacker trying to brute force 4-digit
PIN numbers to access an account at a

PRACTICE BOOK» NOT FOR SALE


92. A user, Ann, is reporting to the company IT bank teller machine?
support group that her workstation screen
A. Account expiration settings
is blank other than a window with a mes-
sage requesting payment or else her hard B. Complexity of PIN
drive will be formatted. Which of the fol- C. Account lockout settings
lowing types of malware is on Ann’s work-
station? D. PIN history requirements

A. Trojan 97. What is the tier of threat actor skill levels


from top to bottom?
B. Spyware
A. APTOrganized CrimeHacktivistsScript
C. Adware
Kiddies
D. Ransomware B. APTHactivist Script Kiddies Elite Hack-
ers
93. what is a reason systems are attacked?
C. Organized CrimeHacktivistsScript Kid-
A. For financial gain.
diesAPT
B. To get personal information D. Hacktivists APTTrojan HorsesPhishers
C. To check the strength of the security of
a company. 98. Phishing is a common type of email-based
attack that falls under which general type
D. All of the above of threat?
94. Script Kiddies A. Social engineering

A. None of these B. Hoax

B. Hackers who are part of a crime group C. Spoofing


that is well-funded and highlysophisti- D. Vishing
cated
99. How is adware malicious?
C. Highly trained and funded groups of
hackers (often by nation states) with- A. Deletes files.
covert and open-source intelligence at B. Inappropriate and wastes your time/
their disposal
C. Slows your pc down.
D. Hackers with little to no skill who only D. Spies on you, collecting your informa-
use the tools and exploits written by oth- tion
ers
100. Which of the following actions is not con-
95. What is a Network Attack? sidered a web-browsing best practice?
A. To store data A. Limitating the use of PII
B. To gain unauthorized access B. disabling autofill
C. To lower security C. Closing untrusted source warnings
D. To give data D. updating plugins and toolbars

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 814

101. Malicious software collecting informa- to gather personal and financial informa-
tion about users without their knowl- tion.Which kind of exploit has been used
edge/consent is known as: in this scenario?
A. Logic bomb A. Domain name kiting
B. Adware B. Man-in-the-middle
C. Computer Worm C. DNS poisoning
D. Spyware D. Reconnaissance

NARAYAN CHANGDER
102. A user in your organization is having is- 106. Which of the following is an example of
sues with her laptop. Every time she active eavesdropping?
opens a web browser, she sees different A. Spoofing
pop-ups every few minutes. It doesn’t
B. Zero-day attack
seem to matter which websites are be-
ing visited-the pop-ups still appear. What C. Spear phishing
type of malware does this sound like D. MITM
A. Adware
107. Operational Loss is.?
B. Virus
A. Damages of the operating capability of
C. Ransomware an organisation.
D. BitLocker B. The loss of trust and lowered opinion
of people to a business.
103. A social engineering technique whereby
attackers under disguise of legitimate re- C. Where product designs or trade se-
quest attempt to gain access to confiden- crets are stolen.
tial information they shouldn’t have ac- D. Damages to the wealth of an organisa-
cess to is commonly referred to as: tion.
A. Phishing 108. Which of the following BEST describes a
B. Privilege escalation cyber terrorist?
C. Backdoor access A. Desires some kind of financial reward
or revenge
D. Shoulder surfing
B. Exploits internal vulnerabilities to
104. If you throw documents with personal in- steal information
formation on them away without shred-
C. Disrupts network-dependent institu-
ding them you are at risk of what?
tions
A. Shoulder surfing
D. Downloads and runs attacks available
B. Dumpster diving on the internet
C. Trojan horse
109. An attacker sets up 100 drone comput-
D. Viruses ers that flood a DNS server with invalid
requests. This is an example of which kind
105. An attacker uses an exploit to push a of attack?
modified hosts file to client systems. This
hosts file redirects traffic from legitimate A. Replay
tax preparation sites to malicious sites B. Backdoor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 815

C. Spamming B. PC
D. DDoS C. Hub

PRACTICE BOOK» NOT FOR SALE


110. The ILOVEYOU virus cost how much to D. Router
remove from the USA? 115. A person who attempts to gain access to
A. $20 million a computer system with the intent of dam-
B. $15 million aging data
C. $5 A. Programmer
D. 3 fiddy B. Hacker
C. User
111. Occurs when a computer crashes or an in-
dividual application fails D. Account Manager
A. System failure 116. Ransomware is an example of
B. Network failure A. Malware
C. Black hat B. Social Engineering
D. Firewall fail C. Phishing
112. Phishing emails are an example of a D. Brute-force attack
social engineering threat to IT systems.
What are two possible goals of a phishing 117. What precautions should you take
email? against a trojan horse?

A. To infect your computer with malware, A. Don’t select clickable advertise-


so confidential data can be stolen later. ments and be careful when download-
ing software programs to your computer.
B. To delete all your confidential data on Use anti-virus software which has ant-
your hard disk drive. spyware software within it to remove.
C. To get users to respond with confiden- B. To prevent this type of malware you
tial data. should make sure your computer’s oper-
D. To launch a denial of service attack to ating system is regularly updated.
take down a server storing confidential C. Never open a program or e-mail at-
data. tachment that you are not 100% sure of
113. What are some ways of preventing mal- the source (things are often too good to
ware attacks? be true). Only download programs from
trusted websites.
A. keeping your Operating System up to
date D. none of above

B. updating applications 118. A distributed denial of service attack can


C. updating Adobe Flash BEST be described as:

D. updating anti-virus software A. Invalid characters being entered into a


field in a database application
114. One of the following components work- B. Users attempting to input random or
ing at physical layer: invalid data into fields within a web
A. Switch browser application.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 816

C. Multiple computers attacking a single C. Social Media


target in an organized attempt to deplete D. System Failure
its resources.
D. Multiple attackers attempting to gain 123. The best definition of hacking is:
elevated privileges on a target system. A. Glass frog slippers
119. What is a Trojan Horse virus? B. Gaining an unfair advantage
A. A type of malware that appears to be C. Gaining unauthorized access

NARAYAN CHANGDER
a legitimate program (to trick the system),
D. Gaining a black, grey or red hat
but actually causes harm, potentially pro-
viding hackers with a back door access to 124. If a virus attacks the boot sector of your
the system. hard drive as well as files in the file sys-
B. A type of malware that deletes pro- tem, what type of virus is this?
grams on the system each time replacing A. polymorphics
them with itself.
B. multipartite
C. A type of malware that deletes impor-
tant files and features of a computer sys- C. companion
tem. D. macro
D. A type of malware that removes and
sends all of your files to a third party, over 125. What is unauthorised access?
time so you don’t notice. A. is a type of eavesdropping attack that
occurs when a malicious actor inserts him-
120. Rose just installed a new search en- self as a relay/proxy into a communica-
gine on her laptop. Now whenever she tion session between people or systems.
searches the Internet, she gets several
pop-up windows directing her to websites B. when an employee logs onto there
to buy products. What does Rose have? companys website with permission
A. Ransomware C. unauthorised access refers to individu-
als accessing an organisation’s networks,
B. Spyware
data, endpoints, applications or devices,
C. Adware without receiving permission.
D. Trojan horse D. none of above
121. One of the following security fea- 126. What can you download to help protect
tures cannot be provided through web your computer from malware?
browsers:
A. Super secret plans of the President
A. Virus checking
B. Anti-Malware software
B. Web sites blocking
C. Dead By Daylight
C. Popup blocking
D. More RAM
D. Network monitoring

122. Types of security threats 127. Purchasing receives an automated phone


call from a bank asking to input and verify
A. Social Engineering credit card information. The phone num-
B. White Hats ber displayed on the caller ID matches the

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 817

bank. Which of the following attack types B. Cracker


is this?
C. Worm

PRACTICE BOOK» NOT FOR SALE


A. Hoax
D. Malware
B. Phishing
C. Vishing 133. Which one of the below passwords is the
most secure against password cracking at-
D. Whaling
tacks?
128. Repeatedly trying usernames and pass- A. Password
words is an example of
B. P@55Word12!
A. Social Engineering
C. PassWord12
B. Brute-force attack
D. WoRd5pas$ x &&
C. Malware
D. DDOS 134. Which of the following terms is used
to describe a collection of intermediary
129. This program seems useful but is cover- compromised systems under control of a
ing up destruction. hacker?
A. salami shaving
A. Honeynet
B. Trojan Horse
B. Intranet
C. software piracy
C. Botnet
D. cybercrime
D. Malware
130. What is meant by the term ‘Grey Hat
Hacker’ 135. Alarm systems, locks, surveillance cam-
A. Illegal hacker-intent on doing harm eras, identification cards, and security
guards
B. Doesn’t steal but may access without
permission A. Physical controls
C. paid by companies to test their sys- B. Technical controls
tems fro vulnerabilities. C. Administrative controls
D. none of above D. APT’s
131. What is brute-force attack?
136. Your coworker Rachel has recently dis-
A. Guess login info covered that when she starts typing her
B. Guess email name into a field in a web browser, her
whole name appears as well as her ad-
C. Guess website
dress in the appropriate boxes.what is
D. Guess time this due to?
132. A is someone who breaks into some- A. adware infection
one else’s computer system, often on a
B. single sign-on
network; to test limits of system and gain
publicity. C. suspicious hyperlinks
A. Hacker D. Autofill

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 818

137. A computer that hosts a website is B. A threat actor whose main goal is fi-
known as a nancial gain.
A. Web storage server C. The most organized, well-funded, and
B. hard disk dangerous type of threat actor.
D. Any individual whose attacks are polit-
C. Web server
ically motivated.
D. computer server
E. A threat actor who lacks skills and so-
phistication but wants to impress their

NARAYAN CHANGDER
138. You are using google chrome and you
want to browse a website but not have friends or garner attention.
the website stored in your browsing his- 142. A set of program instructions that at-
tory.what should you do? taches itself to a file, reproduces itself,
A. log in to someone else to browse the and spreads to other files on the same com-
site puter
B. configure independent browsing A. Malware
C. use inprivate B. Computer virus
D. use google C. Computer worm
D. Trojan Horse
139. When a DDOS attack happens on a web-
site, what are other users likely to expe- 143. Which of the following best describes a
rience? script kiddie?
A. Their data will be stolen from a A. A hacker willing to take more risks be-
database cause the payoff is a lot higher
B. Nothing will happen at all B. A hacker whose main purpose is to
draw attention to their political views
C. Abusive text will appear on the home-
page C. A hacker who uses scripts written by
much more talented individuals
D. The website might crash and nothing
loads D. A hacker who helps companies see the
vulnerabilities in their security infrastruc-
140. Which of the following are a com- ture
mon form of sabotage from an external
144. Exploiting vulnerabilities of humans
source?
A. Malware
A. Phishing
B. Social Engineering
B. Denial of Service Attacks
C. Phishing
C. Distributing Malware
D. Brute-force attack
D. Accidental Loss of Equipment
145. How does a worker in a company con-
141. Which of the following is the BEST defini- tains a critical data?
tion of the term hacker?
A. Firewall
A. A general term used to describe any
B. IoT Devices
individual who uses their technical knowl-
edge to gain unauthorized access to an or- C. Insider Threats
ganization. D. Mobile Hardware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 819

146. It is password policy that sets how fre- C. Elite


quently old passwords can be reused: D. Blue Hats

PRACTICE BOOK» NOT FOR SALE


A. Enforce Password History
152. Which of the following is the correct def-
B. Maximum Password Age inition of a threat?
C. Minimum Password Length A. Any potential danger to the confiden-
D. Passwords Must Meet Complexity Re- tiality, integrity, or availability of informa-
quirements tion or systems
147. Which of the following is the single great- B. Instance of exposure to losses from an
est threat to network security? attacker
A. Employees C. The likelihood of an attack taking ad-
vantage of a vulnerability
B. Weak passwords
D. Absence or weakness of a safeguard
C. Email phishing
that could be exploited
D. Unsecure physical access to network
resources 153. Select ALL the malware
A. Worm
148. What is the storage location called that
holds all the development source files that B. Trojan Horse
version control systems use? C. WAN
A. Memory management D. Virus
B. Stored procedures
154. One of the following ways is NOT a
C. Normalization proper way to avoid unauthorized access:
D. Repository A. Use strong passwords
149. Short-hand term for malicious software B. Use antivirus
A. Mali C. Use firewalls
B. Hackers D. Use network monitor tools
C. Malware 155. A computer program that seems to per-
D. MalSof form one function while actually doing
something else
150. Social Engineering is some kind of:
A. Malware
A. Impersonation
B. Computer virus
B. Viruses
C. Computer worm
C. Malware
D. Trojan Horse
D. Man-in-the-middle
156. Which of the following malware types
151. Malicious hackers who break into com- typically allows an attacker to monitor
puter systems and networks without au- a user’s computer, is characterized by a
thorization or permission drive-by download, and requires no user
A. Black Hats interaction?
B. Gray Hats A. Virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 820

B. Logic Bomb A. Doesn’t necessarily steal but may ac-


cess IT systems without permission which
C. Spyware
is still illegal.
D. Adware B. Illegal hacker-intent on doing harm,
stealing for personal gain e.g. taking
157. What is tailgating?
credit card details.
A. Acquiring unauthorized access to con- C. Ethical hacker-paid by companies to
fidential data test their systems for vulnerabilities.

NARAYAN CHANGDER
B. Looking over someone’s shoulder in or- D. none of above
der to get information
161. Every ACME computer comes with the
C. Gaining unauthorized access to re- same account created at the factory.
stricted areas by following another per- Which kind of vulnerability is this?
son
A. Backdoor
D. Manipulating a user into disclosing
B. Misconfigurations
confidential information
C. Default accounts and passwords
158. An employee at your organization is con- D. Weak passwords
cerned because her ex-spouse “seems to
know everything she does.” She tells 162. This software is designed to disrupt the
you her ex keeps accessing her e-mail functioning of the computer, gain unautho-
and social media accounts even after she rised access and gather information with-
has changed her passwords multiple times. out the users knowledge-what is it?
She is using a laptop at home that was a A. Applications sofware
gift from her ex. Based on what you’ve B. Systems software
been told, you suspect the laptop has what
C. Malicious software
type of malware loaded on it
D. Utility software
A. Adware
163. Someone was recently caught sifting
B. Keylogger
through your company’s trash looking for
C. Logic Bomb confidential information. What is this an
D. Ransomware example of?
A. Trash snooping
159. Which of the following malware types B. Dumpster diving
may require user interaction, does not
hide itself, and is commonly identified C. Phishing
by marketing pop-ups based on browsing D. Social engineering
habits?
164. Computer threats can be or .
A. Botnet While computer security attacks can be
B. Rootkit or .
A. internal-external-physical-data
C. Adware
B. physical-internal-external-data
D. Virus
C. physical-data-internal-external
160. What is meant by a ‘black hat hacker’? D. external-physical-internal-data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 821

165. A desktop system on your network has C. Brute-force attacks


been compromised. Despite loading differ- D. Denial-of-service (DoS) attacks
ent operating systems using different me-

PRACTICE BOOK» NOT FOR SALE


dia on the same desktop, attackers appear E. Phishing
to have access to that system every time it 170. What is the general term for malicious
is powered up and placed on the network. software?
This could be an example of what type of
rootkit A. malware

A. Application B. virus

B. Kernel C. worm
D. trojan
C. Firmware
D. Virtual 171. This is using finger, hand, face, or iris
scans to gain access.
166. Any program that is designed to enter
A. software piracy
a computer without notice and disrupt its
normal operations B. Trojan Horse
A. Malware C. worm
B. Computer virus D. biometric protected

C. Computer worm 172. Layer 3 of the OSI model, provides an


D. Trojan Horse end-to-end logical addressing system so
that a packet of data can be routed across
167. Policies, procedures, security awareness several networks. Logical addressing re-
training, contingency planning, and disas- ferred to:
ter recovery plans A. MAC addresses
A. Administrative controls B. IP addresses
B. Physical controls C. Memory addresses
C. Technical controls D. Computer addresses
D. Authentication 173. What is meant by a ‘grey hat hacker’?
168. Which malware comprises computers and A. Doesn’t necessarily steal but may ac-
puts them under the control of an attacker, cess IT systems without permission which
who can control your computer from any- is still illegal.
where in the world? B. Illegal hacker-intent on doing harm,
A. Zombies AKA Bots stealing for personal gain e.g. taking
credit card details.
B. Trojan Horse
C. Ethical hacker-paid by companies to
C. LIZARDSQUAD
test their systems for vulnerabilities.
D. Worms
D. none of above
169. Common types of network attacks. 174. An attempt to use another person’s iden-
A. Malware tity to commit a crime.
B. Software A. Spyware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 822

B. Adware 179. Ray, a co-worker, is concerned that his


C. Virus computer is infected with adware. what
symptoms should you tell ray to look for
D. Identity Theft to confirm his suspicions?
175. you receive a security warning from your A. Excessive pop-ups.
antivirus software provider stating that B. pizza
a new virus is directly attacking the an-
C. search polo
tivirus software. what type of virus is

NARAYAN CHANGDER
this? D. multifactor login redirection
A. macro 180. At the lowest abstraction level of the
B. phage digital domain, that implement Boolean
functions using 0’s and 1’s
C. Retrovirus
A. architecture
D. armored
B. components
176. Property loss is.?
C. integrated circuits (IC chips)
A. Damages to the wealth of an organisa-
D. logic gates
tion.
B. Where product designs or trade se- 181. What is meant by the term ‘White Hat
crets are stolen. Hacker’
C. The loss of trust and lowered opinion A. Illegal hacker-intent on doing harm
of people to a business. B. Doesn’t steal but may access without
D. Damages of the operating capability of permission
an organisation. C. paid by companies to test their sys-
tems fro vulnerabilities.
177. Which type of software will help pro-
tect your computer from malicious net- D. none of above
work traffic?
182. Ann an employee is visiting Joe, an em-
A. Software firewall ployee in the Human Resources Depart-
B. password complexity tool ment. While talking to Joe, Ann notices a
spreadsheet open on Joe’s computer that
C. antispyware
lists the salaries of all employees in her
D. antivirus department. Which of the following forms
of social engineering would BEST describe
178. An administrator is instructed to disable this situation?
IP-directed broadcasts on all routers in an
organization. Which of the following at- A. Impersonation
tacks does this prevent? B. Dumpster diving
A. Pharming C. Tailgating
B. Smurf D. Shoulder Surfing
C. Replay 183. An attacker crafts a message that ap-
D. Xmas pears to be from a trusted source, but in

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 823

reality it redirects the recipient to a mali- 188. An attempt to flood the bandwidth or
cious site where information is harvested. resources of a targeted system so that
The message is narrowly tailored so it is it becomes overwhelmed with false re-

PRACTICE BOOK» NOT FOR SALE


effective on only a small number of victims. quests and in result doesn’t have time or
This describes which of the following? resources to handle legitimate requests is
A. Spear Phishing called:
A. Bluejacking
B. Phishing
B. MITM attack
C. Smurf Attack
C. Session hijacking
D. Vishing
D. DoS attack
184. Which of the following could be an indica-
tor of compromise 189. One method which will help prevent most
malware
A. Unusual outbound network traffic
A. Click on links in emails
B. Increased number of logins
B. Install, run and keep updated a secu-
C. Large numbers of requests for the rity software package
same file
C. Open files from unknown sources
D. All of the above
D. none of above
185. A hacker that uses pre-made tools to con-
190. Which external threat does this aim to
duct attacks is known as which type of
protect against? ”Use up-to-date anti-
hacker?
malware software and train users so that
A. Script kiddie they know what to look for “
B. Onion network A. Pharming
C. Red Team B. Social Engineering
D. Hypervisor C. Shoulder surfing
D. Man-in-the-middle attacks
186. Act of manipulating users into reveal-
ing confidential information or performing 191. What is meant by the term ‘Black Hat
other detrimental actions Hacker’
A. Social engineering A. Illegal hacker-intent on doing harm
B. Active attack B. Doesn’t steal but may access without
C. Lack of technical controls permission

D. Script kiddies C. paid by companies to test their sys-


tems fro vulnerabilities.
187. This is a program that attaches itself to D. none of above
another program.
192. Reputation Loss is.?
A. Trojan Horse
A. Damages to the wealth of an organisa-
B. worm
tion.
C. virus B. Where product designs or trade se-
D. software piracy crets are stolen.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 824

C. The loss of trust and lowered opinion C. Logic Bomb


of people to a business. D. Rootkit
D. Damages of the operating capability of
an organisation. 197. What is meant by the term ‘white hat
hacker’?
193. If an employee accidentally deletes data A. Illegal hacker-intent on doing harm,
it is an example of what type of security stealing for personal gain e.g. taking
threat? credit card details.

NARAYAN CHANGDER
A. Internal B. Doesn’t necessarily steal but may ac-
B. External cess IT systems without permission which
C. Physical is still illegal.

D. none of above C. Ethical hacker-paid by companies to


test their systems for vulnerabilities.
194. You have been asked to give training on D. none of above
network security.for your section on pass-
word management, which options should 198. Which of the following is an example of
you recommend to users? a vulnerability?
A. do not use complex passwords be- A. Virus infection
cause they are easy to forget B. Denial-of-service attack
B. Change default passwords on sys- C. Unauthorized access to confidential re-
tems. sources
C. use the same password on multiple D. Misconfigured server
systems so they are easy to remember
D. do nothing 199. a program file that installs itself without
permission
195. What does the term “spam” refer to in A. virus
computing?
B. antivirus
A. excessive pop-up windows
C. overwriting virus
B. unsolicited emails
D. trojan horse
C. social engineering attemps
D. installing malware on a computer 200. Hardware issue, operating system is-
sue, network protocol issue, and software
196. During a server audit, a security admin- bugs are some of weaknesses.
istrator does not notice abnormal activ- A. Configuration
ity. However, a network security analyst
notices connections to unauthorized ports B. Technology
from outside the corporate network. Us- C. Security Policy
ing specialized tools, the network security D. People
analyst also notices hidden processes run-
ning. Which of the following has MOST 201. Antivirus programs can recognize viruses
likely been installed on the server? through their:
A. SPIM A. names
B. Backdoor B. extensions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 825

C. signatures A. Cyberbullying
D. formats B. Identity Theft

PRACTICE BOOK» NOT FOR SALE


202. Shouldering is an example of C. A Prank

A. Malware D. Phishing

B. Social Engineering 207. The system administrator in your office


C. Phishing quits unexpectedly in the middle of the
day. it’s quickly apparent that he changed
D. Brute-force attack the server password and no one knows
what is it. what might you do in this type
203. White Hats are
of situation?
A. Non-malicious hackers who attempt to
A. use a trojan horse to find the password
break into a company’ssystems at their re-
quest B. Use a password cracker to find the
password
B. Hackers without any affiliation to a
company who attempt tobreak into a com- C. use social engineering to find the pass-
pany’s network but risk the law by doing word
so D. delete and reinstall the server
C. Hackers who attempt to hack into a
network with permission ofthe company 208. Which one of these is not a way of pro-
but are not employed by the company tecting a network?

D. Malicious hackers who break into com- A. Having a strong password


puter systems and networks without au- B. Removing anti-virus
thorization or permission C. Having an anti-virus
204. Occurs when access to computer re- D. Not sharing personal data with people
sources and data occurs without the con-
sent of the owner 209. Jane, an individual, has recently been call-
ing various financial offices pretending to
A. Insider Attack be another person to gain financial infor-
B. Lack of physical controls mation. Which of the following attacks is
C. Unauthorized Access being described?

D. Administrative Controls A. Phishing


B. Tailgating
205. A program that is written to appear like
a legitimate program. C. Pharming

A. Worms D. Vishing

B. Virus 210. Which malware probe into a bank access


C. Trojan Horse through data mining?

D. Denial of Service (DoS) Attack A. Cryptojacking


B. Wifi-Attacks
206. If someone uses your personal informa-
tion to sign up for a website without your C. Cloudjacking
agreement, this is called? D. Spear Phishing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 826

211. The act of masquerading as a trustwor- 216. A type of virus that can move itself be-
thy website or email to acquire user infor- tween systems and doesn’t need human
mation; identity theft is the intent intervention is called a
A. Worm A. worm
B. Spyware B. trojan
C. Phishing C. ransomware

D. Botnet Attack D. RAT

NARAYAN CHANGDER
217. AAA stands for
212. You were browsing the web on a ques-
tionable website, and now you get a pop- A. AvailabilityAuthenticationAuthoriza-
up window stating that if you do not pay tion
$100 within one hour, all files on your B. Authorization Authentication Account-
computer will be destroyed. What is this ing
an example of?
C. Accounting Availability Administration
A. heistware
D. APTActorsAdvanced Persistent
B. theftware Threats
C. extortionware 218. Ahmad is trying to set a new password
D. Ransomware for his online bank account. He knows that
the more complex the password is, it will
213. The protocol that is known to be be secure against a password cracking
connection-oriented: attack, but that it will be the usable .
A. TCP A. less, least
B. UDP B. less, most
C. IP C. more, least

D. IPX D. more, most

219. What makes the data leaks to external


214. Which external threat does this aim to
destination to an unknown area?
protect against? ”Do not use public en-
crypted wifi” A. Phishing
A. Pharming B. VPN

B. Social Engineering C. DDoS Attacks


D. Data Leakage
C. Shoulder surfing
D. Man-in-the-middle attacks 220. Which external threat is being described?
”involves looking over a shoulder of some-
215. Adware is a type of one to gain personal information. An ex-
ample is a pin code from someone at a cash
A. Social Engineering
machine or a password of someone logging
B. Brute-force attack into a computer”
C. Malware A. Pharming
D. DDOS B. Social Engineering

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 827

C. Shoulder surfing B. Malicious code that runs on a machine


D. Man-in-the-middle attacks without the user’s knowledge

PRACTICE BOOK» NOT FOR SALE


C. embedded into a document and is ex-
221. DDoS attacks happen when attackers ecuted when the document is opened by
send huge spam attacks to a the user
A. network D. software created to penetrate a com-
B. server puter system and cause possible damage
without the user’s consent
C. computer
D. keyboard 226. Which of the following does not fall
into the category of social engineering at-
222. Which of the following describes a type tacks?
of malware which is difficult to reverse en-
A. MITM attack
gineer in a virtual lab?
B. Spear phishing
A. Armored Virus
C. Shoulder surfing
B. Polymorphic malware
D. Tailgating
C. Logic Bomb
D. Rootkit 227. You have just landed at the airport and
have an unexpected six-hour layover. you
223. Attackers use malware like viruses, want to use your smartphone to get some
worms, and Trojan Horses to enter into work done.what should you disable as a
this, avoiding security checks precautionary device hardening measure
A. Zombies to help prevent potential attacks?

B. Spyware A. autofill

C. Keyloggers B. Bluetooth

D. Backdoor C. polo
D. FFC
224. In your role as a security analyst, you
need to stay up to date on the latest 228. Which type of denial-of-service (DoS)
threats. You are currently reviewing the attack occurs when a name server re-
latest real-time updates on cyberthreats ceives malicious or misleading data that
from across the world.Which of the follow- incorrectly maps host names and IP ad-
ing resources are you MOST likely using? dresses?
A. Threat hunting A. Spam
B. Threat feeds B. DNS poisoning
C. Intelligence fusion C. SYN flood
D. Advisories and bulletins D. ARP poisoning

225. A virus is 229. you have been asked to lead a class on


A. hardware designed to infiltrate a com- preventing social engineering. what topic
puter system and possibly damage it with- should you be sure to cover?
out the user’s knowledge or consent A. viruses and worms

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 828

B. Shoulder surfing companies in order to induce individuals


C. hardware theft to reveal personal information, such as
passwords and credit card numbers.
D. copy
D. none of above
230. What is malware short for?
A. Malicious System 235. A security administrator forgets their
card to access the server room. The admin-
B. Manageable Software
istrator asks a coworker if they could use

NARAYAN CHANGDER
C. Maintenance Software their card for the day. Which of the fol-
D. Malicious Software lowing is the administrator using to gain
access to the server room?
231. What am I? I try to get users to input
important information into a fake website A. Man-in-the-middle
often through an email or text link. B. Tailgating
A. Phishing
C. Impersonation
B. Pharming
D. Spoofing
C. Quid pro quo
D. Baiting 236. Non-repudiation occurs when you have
proof that someone has taken an action
232. A trojan is an example of
A. Malware A. Accounting

B. Social Engineering B. Administration


C. Phishing C. Integrity
D. Brute-force attack D. Access
233. A trial and error method of attempting to
guess passwords 237. Which type of software is required in or-
der to launch a Distributed Denial of Ser-
A. Malware vice (DDoS) attack?
B. Social Engineering
A. Zombie
C. Phishing
B. Trojan horse
D. Brute-force attack
C. Virus
234. What is the definition of external threats
D. Worm
A. A threat originating outside a company,
government agency, or institution. In con-
238. Which of the following could an employee
trast, an internal threat is one originating
also be known as?
inside the organisation.
B. is an attack meant to shut down a ma- A. Cybercriminal
chine or network, making it inaccessible B. Exploit
to its intended users.
C. Internal threat
C. the fraudulent practice of sending
emails purporting to be from reputable D. Script kiddie

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 829

239. While port scanning your network for 243. A wireless access point configured to use
unauthorized systems, you notice one of Wired Equivalent Privacy (WEP) is an ex-
your file servers has TCP port 31337 open. ample of which kind of vulnerability?

PRACTICE BOOK» NOT FOR SALE


When you connect to the port with netcat, A. Unpatched software
you see a prompt that reads “Enter pass-
word for access:”. Your server may be in- B. Default settings
fected with what type of malware C. Weak security configurations
A. Virus D. Zero-day exploit
B. Cryptolocker 244. Which security weakness that can create
C. Backdoor unforeseen security threats?

D. Spyware A. Technology
B. Configuration
240. The unauthorized practice of obtaining
C. Administration
confidential information by manipulating
people into disclosing sensitive data is D. Security Policy
known as:
245. Sara finds a message on her phone that
A. Zero-day attack she thinks might be a scam. She should:
B. MITM attack A. Forward the message to her friends to
see if they think it’s a scam too.
C. Social engineering
B. Reply and ask the sender not to send
D. Backdoor access
more mail.
241. You receive an email from your bank, C. Delete the message.
telling you that your account has been com- D. none of above
promised and you need to validate your ac-
count details or else your account will be 246. It is a kind of backup that starts with full
closed. you are supposed to click a link to backup then it only backup the data that
validate your information. What is this an has changed since the previous backup
example of? A. Full backup
A. a security breach at your bank that B. Incremental backup
needs to be resolved
C. Differential backup
B. spam
D. short-term backup
C. ransomware
247. What does spyware do?
D. Phishing
A. Shut system down
242. Which of these would be the safest pass- B. Restore hardware
word? C. Delete personal data
A. Password D. Gathers personal information
B. 9As5w0rD!
248. Which of the following are considered
C. Drowssap characteristics of a strong password?
D. PPAASSWWOORRDD A. Long

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 830

B. uses patterns 253. Which of these is an example of a strong


C. uses your name password?
D. contains PII A. Mr.Hillegonds
B. dugitalyrunninglolwhynot
249. If you receive a suspicious email, you
should C. Pa55word
A. open it up and click on any links. D. pleasedonthack
B. reply to the sender asking them to 254. Email filters can help in all the following

NARAYAN CHANGDER
leave you alone. EXCEPT
C. delete the email without opening it. A. Filtering spams
D. delete your email account. B. Protect against harmful attachments
250. You notice some unusual network traffic C. Avoid losing real email by mistake
and discover several systems in your orga- D. Enable encryption on your email
nization are communicating with a rather
dubious “market research” company on a 255. Black hat hackers usually hack for
regular basis. When you investigate fur- A. Fun
ther you discover that users of the af-
B. Their own gain
fected systems all installed the same piece
of freeware. What might be happening on C. Free WiFi
your network D. To persecute blameless frogs
A. These users unwittingly installed spy- 256. Which of the following is the best defini-
ware tion of a vulnerability?
B. These systems are all infected with
A. A short-coming
ransomware
B. An advantage
C. This could be normal behavior and
nothing to worry about C. A weakness
D. These systems are infected with logic D. An ecosystem
bombs 257. Which of the password attacks listed be-
251. Which the most common DoS attack that low takes advantage of a predefined list
sends more traffic to a device than what of words?
the program can accept. A. Replay attack
A. Buffer Overflow Attack B. Birthday attack
B. SYN Flood Attack C. Brute-force attack
C. Ping of Death Attack D. Dictionary attack
D. Teardrop Attack
258. The most common transport layer proto-
252. Which of these is the strongest? cols:
A. australiarunningplantmonkey A. TCP, IP
B. westernreligionpeeps B. TCP, UDP
C. drawingpictures C. IP, IPX
D. ignorethis D. IPX, SPX

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 831

259. Hackers who are part of a crime group 264. A piece of malware is infecting the desk-
that is well-funded and highly sophisti- tops in your organization. Every hour
cated more systems are infected. The infec-

PRACTICE BOOK» NOT FOR SALE


tions are happening in different depart-
A. Organized Crime
ments and in cases where the users don’t
B. Script Kiddies share any files, programs, or even e-mails.
C. Advanced Threats What type of malware can cause this type
of infection
D. White Hat
A. Virus
260. The creator sends an email, the recipient B. RAT
clicks the link and is sent to a fake website
C. BitLocker
A. pharming
D. Worm
B. phishing
265. You believe that your computer has con-
C. virus tracted a virus that has affected your ex-
D. spyware spyware cel files only. what type of virus is most
likely to do this?
261. What type of software is used to circum-
A. Macro
vent normal security processes on a com-
puter? B. retrovirus

A. Backdoor C. phage

B. Trojan horse D. excel virus

C. spyware 266. Two basic types of network delivered


threat.
D. phage virus
A. Passive
262. Select 3 of the most common social engi- B. Indirect
neering attack.
C. Active
A. Phishing
D. Random
B. Pretexting
267. Which of these could be used in a “phish-
C. Vishing
ing” attempt?
D. Spamming A. an email
263. Which external threat is being described? B. a website advert
”a version of phishing-instead you are redi- C. chatting online
rected to a fake (spoof) version of a gen-
uine website and you are asked to confirm D. All of these options
your details” 268. Which is the highest-risk vulnerability?
A. Pharming A. Remote hacking attacks
B. Social Engineering B. Faulty Locks
C. Shoulder surfing C. People
D. Man-in-the-middle attacks D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 832

269. OSI model consist of seven layers, they 273. A network administrator needed to re-
are:Physical- - -Transport-Session- strict the internal network to access some
- websites. Which rules he has to set?
A. Data Link-Network-Presentation- A. Inbound rules
Application B. Outbound rules
B. Network-Presentation-Data Link- C. Internet rules
Application
D. Web rules

NARAYAN CHANGDER
C. Application-Data Link-Network-
Presentation 274. One of the following ways can be used
D. Presentation-Application-Data Link- to secure wireless access:
Network A. Use Biometrics

270. It is a self-replicating program that uses B. Use Encryption protocols


the network to duplicate its code to the C. Use Web browsers
hosts on the network: D. Use Email filters
A. Virus
275. Lamia is working as a web developer
B. Worm in a company. The server of her com-
C. Phishing pany’s website started receiving too many
D. Rootkit requests that it could not handle . This
led to service interruption, and the any
271. what is phishing? more.This type of attack is known as a
A. going fishing at a lake. attack.

B. sending emails purporting to be from A. brute-force


reputable companies in order to induce in- B. rootkit
dividuals to reveal personal information, C. Denial of Service (DOS)
such as passwords and credit card num-
bers. D. backdoor

C. looking for possible security breaches 276. Identify which of the following is an at-
of a company either for a malicious gain tack?
or for good. A. Cyber Terrorist
D. none of above B. Hacker
272. Which of the following BEST describes an C. Denial of Services (DOS)
inside attacker? D. Industrial Spies
A. A good guy who tries to help a company
see their vulnerabilities. 277. It is malicious software meant to gain
access, disrupt computer operation, or
B. An attacker with lots of resources and gather sensitive information.
money at their disposal.
A. Spyware
C. An unintentional threat actor. This is
the most common threat. B. Hacker

D. An agent who uses their technical C. Malware


knowledge to bypass security. D. Trojan Horse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 833

278. A is a software program that is de- C. upgrade your browser to the newest
signed to copy itself from one computer to version
another, without human intervention.

PRACTICE BOOK» NOT FOR SALE


D. configure nothing
A. Denial of Service (DoS) attack
283. Password attack, trust exploitation, port
B. Virus redirection, man-in-the middle attack, and
C. Trojan Horses phishing are example of attack.
D. Worm A. Denial Of Service Attack (DoS)

279. What is an attack surface? B. Malware

A. A weakness or area that can be hacked C. Reconnaisance attack


on a network. D. Access attack
B. When a business creates virtual ma- 284. David just heard of a program that if
chines and forgets or ignores them. installed on your computer gives the at-
C. On a web server that is not indexed by tacker administrator-like access to your
search engines. machine. what type of software is he talk-
D. It routes traffic through a multitude of ing about?
networks A. trojan horse

280. Which of the following answers refers B. spyware


to an undocumented (and often legitimate) C. ransomeware
way of gaining access to a program, online D. rootkit
service, or an entire computer system?
A. Root access 285. A fraudulent email requesting its recip-
ient to reveal sensitive information (e.g.
B. Administrative access user name and password) used later by an
C. Zero-day vulnerability attacker for the purpose of identity theft
D. Backdoor is an example of:(Select 2 answers)
A. Phishing
281. A standalone malicious computer pro-
gram that replicates itself over a computer B. Watering hole attack
network is known as: C. Social engineering
A. Spyware D. Zero-day exploit
B. Worm E. Vishing
C. Trojan 286. It is a kind of malware that pretends
D. Spam to represent a legitimate organization and
asks for verification of victims information
282. You recently received a new worksta- such as password or username:
tion and need to properly secure it be-
fore browsing the internet.which actions A. Virus
should you take? B. Phishing
A. enable autofill C. Trojan
B. enable acceptance of cookies D. Adware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 834

287. What is a DOS (Denial of Service) at- 292. A colleague has been urging you to down-
tack? load a new animated screensaver he has
A. Where a server is bombarded with re- been using for several weeks. While he
quests which it can’t keep up so it crashes is showing you the program, the cursor on
his screen moves on its own and a com-
B. When a group of hackers break into a mand prompt window opens and quickly
large organisation closes. You can’t tell what if anything was
C. When a hacker breaks into a network displayed in that command prompt win-
dow. Your colleague says “It’s been do-

NARAYAN CHANGDER
and steals personal data and leaves a
virus to break the server ing that for a while, but it’s no big deal.”
D. When a hacker attacks a server by Based on what you’ve seen, you suspect
sending a virus. the animated screensaver is really what
type of malware
288. Your password should contain the follow- A. A Worm
ing:
B. A Trojan
A. letters, numbers, symbols
C. Ransomware
B. letters only
D. Adware
C. numbers only
D. symbols only 293. What malware is used specifically to get
unauthorised remote administrator access
289. What technology is usually used by ran- to a computer or network?
somware to prevent you from accessing
A. Spyware
your computer system?
B. Randomware
A. Encryption
B. Lock & Key C. Rootkit

C. Passwords D. Worm

D. none of above 294. Blue hats


290. A virus that covers itself in protective A. are 1 in 10, 000
code, making it harder to find a iradicate, B. have limited skill and only run other
is called what? people’s exploits and tools
A. stealth virus C. attempt to hack into a network with
B. polymorphic virus permission of the company but are not em-
ployed by the company
C. Armored virus
D. designed to infiltrate a computer sys-
D. trojan horse
tem and possibly damage it without the
291. Distributed denial of service attack user’s knowledge or consent
A. Zombies in movies attacking 295. Which of the following password attacks
B. Zombie dogs eating computers is MOST likely to crack the largest number
of randomly generated passwords?
C. The denied screen you get
D. A network to create zombie computers A. Hybrid
to flood in access in to a website B. Birthday Attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 835

C. Dictionary 301. Financial Loss is.?


D. Rainbow tables A. Damages to the wealth of an organisa-

PRACTICE BOOK» NOT FOR SALE


tion.
296. A computer that has been compromised
by a virus or Trojan horse that puts it un- B. Where product designs or trade se-
der the remote control of an online hijacker crets are stolen.
is called: C. The loss of trust and lowered opinion
A. Honeypot of people to a business.

B. Zombie D. Damages of the operating capability of


an organisation.
C. Logic bomb
D. Proxy 302. Most likely to be on a company payroll
A. White hat
297. This is when someone acts as someone
else to by items or get credit. B. Black hat
A. hacking C. Script Kiddie
B. identity theft D. Gray hat
C. cybercrime
303. Why is a trojan horse sneaky?
D. software piracy
A. It is very inviting
298. A recovery plan is a written plan that B. It creeps into your computer
describes the steps an organization would
take to restore its computer operations in C. It attacks your computer while it
the event of a disaster. seems like it completes a relevant task

A. emergency D. Because of the romans

B. backup 304. Netiquette come from these two words.


C. recovery A. Netizens
D. disaster B. Internet
299. What is ransomware? C. Character
A. blocks access until money is paid D. Etiquette
B. steals your money
305. Which external threat does this aim to
C. when someone steals your computer protect against? ”Train your users so that
D. Malware that multiplies they know what to look for when they
may be exposed to pharming, phishing,
300. Advantages of using ‘Password’. shoulder surfing “
A. easy to input A. Pharming
B. can be changed easily B. Social Engineering
C. number 1 only C. Shoulder surfing
D. number and number 2 D. Man-in-the-middle attacks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 836

306. A script kiddie is a threat actor who 310. Which one of the below passwords is the
lacks knowledge and sophistication. Script least usable for Amna for the user to enter
kiddie attacks often seek to exploit well- on a mobile phone?
known vulnerabilities in systems.What is A. Password
the BEST defense against script kiddie at-
tacks? B. MyPasswordConsistsOf50CharactersAnd8CapitalLetters

A. Build a comprehensive security ap-


proach that uses all aspects of threat pre- C. P@ssword123

NARAYAN CHANGDER
vention and protection. D. Amna@2008
B. Implement email filtering systems. 311. An example of something NOT a security
C. Properly secure and store data back- risk or threat to a computer is:
ups. A. Malicious Code
D. Have appropriate physical security B. Authorized Access
controls in place.
C. Theft
E. Keep systems up to date and use stan-
D. System Failure
dard security practices.
312. Sending emails as if they are from rep-
307. Which of the following can be used by a utable companies
security administrator to successfully re-
cover a user’s forgotten password on a A. Malware
password protected file? B. Social Engineering
A. Cognitive password C. Phishing
B. Password sniffing D. Brute-force attack
C. Brute force 313. Which external threat does this aim to
D. Social engineering protect against? ”Angle your computer
to ensure others cannot see what you are
308. A cyber attack that redirects users to a typing. Protect your details as you type”
fake website is known as: A. Pharming
A. Phishing B. Social Engineering
B. Pharming C. Shoulder surfing
C. Spoofing D. Man-in-the-middle attacks
D. TikToking 314. Malware that encrypts important data on
a computer but leaves the operating sys-
309. Which type of hacker can be prosecuted tem untouched (computer running but not
under UK IT legislation? working) is called
A. Black hat A. crypto-malware
B. Grey hat B. worm
C. White hat C. trojan
D. none of above D. RAT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 837

315. Alia opened a file that was on her USB file server and backup server crash at
drive at work. Immediately her computer exactly the same time. Examining the
slowed and did not function as expected. servers, it appears that critical operat-

PRACTICE BOOK» NOT FOR SALE


Shortly afterwards a number of work col- ing system files were deleted from both
leagues on the same network noticed their systems. If the disgruntled administrator
computers slowing down and not working was responsible for administering those
as normal. It seems like all the computers servers during her employment, this is
on the network reported the same thing. most likely an example of what kind of
A. Adware malware

B. Worms A. Crypto-malware

C. Social engineering B. Trojan

D. On-path attack C. Worm


D. Logic Bomb
316. Which of the following operating sys-
tems are susceptible to viruses? 320. When a person’s identity is established
A. windows with proof and confirmed by a system

B. windows, and mac OS X A. Accounting


C. windows, and mac OS X, and linux B. Authorization
D. Windows, and mac OS X, and linux, and C. Authentication
android D. Availability
317. “Information that can be used to iden- 321. An employee stealing company data
tify you because it is unique to you.” is could be an example of which kind of
called threat actor?
A. internet scam A. Insider
B. identity theft B. Nation state
C. private information C. Competitor
D. phishing D. Hacktivist
318. Which external threat is being described? E. Script kiddie
”a type of eavesdropping and can take
322. Which attack ask the user to enter sen-
place through public wifi connections which
sitive information in a commonly trusted
are not encrypted. An attacker is able to
screen.
intercept the data”
A. Trojan horse
A. Pharming
B. Trust exploitation
B. Social Engineering
C. Shoulder surfing C. E-mail bombs

D. Man-in-the-middle attacks D. Social engineering

319. A disgruntled administrator is fired for 323. It is a software that looks real but it ac-
negligence at your organization. Thirty tivates and attacks the host when loaded.
days later, your organization’s internal A. Computer virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Types of Threats and Attacks 838

B. Computer worm 328. In computer security, a situation in which


C. Trojan an unauthorized person is able to view an-
other user’s display or keyboard to learn
D. none of above their password or other confidential infor-
324. types of threat that may arise if a hacker mation is known as:
attacked your data. A. Tailgating
A. Information theft B. Man-in-the-middle attack
B. Identity theft

NARAYAN CHANGDER
C. Shoulder surfing
C. Steal time D. Brute-force attack
D. Data loss
329. If IT equipment is damage intentionally or
E. Disruption of service accidentally is an example of what type of
325. Occurs when a user is given access to a security threat?
certain piece of data or certain areas of a A. Internal
building
B. External
A. Availability
C. Physical
B. Accounting
D. none of above
C. Authorization
D. Administration 330. Which of these types of hackers?
A. White Hats
326. Malware engineers sometimes take
steps to prevent reverse engineering of B. Blacks Hats
their code. A virus, such as Zeus, that C. Green Hats
uses encryption to resist reverse engineer-
D. Red Hats
ing attempts is what type of malware
E. Elite
A. Armored Virus
B. Rootkit 331. Sara, a user, downloads a keygen to in-
C. RAT stall pirated software. After running the
keygen, system performance is extremely
D. Cryptolocker slow and numerous antivirus alerts are dis-
327. While using the internet, you type the played. Which of the following BEST de-
URL of one of your favorite sites in the scribes this type of malware?
browser. Instead of going to the correct A. Logic Bomb
site, the browser displays a completely dif-
B. Worm
ferent website. When you use the IP ad-
dress of the web server, the correct site is C. Trojan
displayed.Which type of attack has likely D. Adware
occurred?
A. Spoofing 332. It is the process of enforcing poli-
cies:determining what types or qualities of
B. Hijacking activities, resources, or services a user is
C. Man-in-the-middle permitted
D. DNS poisoning A. Authentication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.2 Security Measures and Techniques 839

B. Authorization 336. Which of the following wireless security


C. Accounting measures can an attacker defeat by spoof-
ing certain properties of their network in-

PRACTICE BOOK» NOT FOR SALE


D. Physical Security terface card?
333. At the outside break area, an employee, A. WEP
Ann, asked another employee to let her
B. MAC filtering
into the building because her badge is miss-
ing. Which of the following does this de- C. Disabled SSID broadcast
scribe? D. TKIP
A. Shoulder surfing
337. The layer that is responsible for mes-
B. Tailgating sage encryption/decryption, compression
C. Whaling and translation is:
D. Impersonation A. Layer 4
334. You receive an email from your bank B. Layer 5
telling you that your account has been com- C. Layer 6
promised and you need to validate your ac-
count details or else your account will be D. Layer 7
closed. You are supposed to click a link to 338. TCP/IP model uses one layer to repre-
validate your information. What is this an sent the upper layers of OSI model. This
example of? layer name is:
A. A security breach at your bank that
A. Application
needs to be resolved
B. Presentation
B. Spam
C. Session
C. Ransomware
D. Phishing D. Internet

335. Differentiate a computer worm from a 339. Salem opened an email attachment, but
computer virus immediately after opening it, his computer
froze, and all his files were encrypted . A
A. Written to look like something else
few minutes later, a message appeared on
that in fact is an attack tool
the screen demanding that he pay 20, 000
B. Require human interaction to facilitate AED to remove the encryption!
the spread of malicious code
A. Trojan horse
C. Use a variety of tools, scripts and pro-
B. Scareware
gram to launch attacks against network
D. Execute arbitrary code and installs C. Denial of Service (DOS)
copies of itself in the memory D. Ransomware

10.2 Security Measures and Techniques


1. Which of these is not a biometric mea- A. Retina scan
sure?
B. Fingerprint scan

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.2 Security Measures and Techniques 840

C. Vein matching 6. Identify the method and example to over-


D. Security pass come the following security risk.Daniel
wants to protect her assignment that she
2. Identify the method and example to over- keeps in her computer folder.
come the following security risk.Elisa is a A. Install firewall, Bull Guard Anti Virus
network engineer. He wants to control the B. Using data backup, Acronis Trueimage
incoming and outgoing network traffic of backup 2
his organization.
C. Install Antivirus, Kaspersky antivirus

NARAYAN CHANGDER
A. Turn on firewall, Zone Alarm ProFire-
wall D. Using cryptography, Securstore

B. Use data backup, Acronis Trueimage 7. Recognised methods of user authentica-


backup 2 tion
C. Install antivirus, Invisible Secret4 A. User login procedures

D. Install antispyware, Securstore B. Biometric authentication


C. Two-step verification
3. Which of the following are examples of D. Social engineering
BIOMETRICS measures?
A. fingerprint scans 8. Muthu want a new computer. What can
he do to prevent others from accessing his
B. voice analysis confidential data in this computer?
C. gait analysis A. Set a user name and password
D. passwords B. Use an uninterruptible power supply
E. RFID fobs (UPS) and a surge protector
C. Back up data and save it in a different
4. An antivirus program protects a computer location
against viruses by D. Install a spyware program and an an-
A. communicating and passing the infor- tivirus program
mation to the outsider.
9. A technology that creates a safe and en-
B. identifying and removing any computer crypted connection over a less secure net-
viruses found on storage media, in the work, such as the internet
computer memory or incoming email files.
A. Virtual Private Network
C. installing a new virus through the data B. Firewall
received.
C. Kerberos
D. reading the operating system and mod-
ifies it. D. Trusted computing
10. means hidden writing, the practice of
5. Methods for securing a wireless network. using to conceal text.
A. MAC Address filtering A. Antivirus
B. Wi-Fi Protected Access (WPA) B. Data Backup
C. Security tokens C. Anti Spyware
D. Packet filtering D. Cryptography

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 841

11. Which of the following are ways to make C. Disconnect from the Internet
a system more secure?
D. Use a firewall

PRACTICE BOOK» NOT FOR SALE


A. Add different access levels for differ-
ent users E. Pray at the altar of Lord Securitron the
B. Lock the door Omniscient

10.3 Cryptography and Encryption


1. The SHA-1 hashing algorithm creates a di- 5. Using an unsecured network is sometimes
gest that is how many bits in length? unavoidable, which one of the follow-
ing describes how confidential information
A. 96 bits
should be sent in that situation?
B. 128 bits A. In a compressed only format.
C. 160 bits B. In an encrypted format.
D. 192 bits C. In an unsigned email.
D. As quickly as possible.
2. A is a person who develops ways of
converting plain text to cipher text. 6. A replaces one set of characters with
A. Cryptographer symbols or another character set.
A. substitution cipher
B. Crypto
B. one time pad
C. Cryptanalysis
C. transposition cipher
D. Cryptosystem
D. none of above
3. “CIPHERTEXT” has been encrypted with 7. What country first started working on de-
Caesar cipher to “EKRJGTVGZV”. The key coding Enigma encoded messages?
used was:
A. Poland
A. 7
B. France
B. 6
C. Germany
C. 3 D. Great Britain
D. 2
8. tells you how to arrange those rules
4. is the process of giving individuals ac- A. cipher
cess to system objects based on their iden- B. key
tity.
C. encoding
A. Authentication D. deciphering
B. Authorization
9. What is seen as the most modern and flexi-
C. either authentication or authorization ble way to find out if a certificate has been
D. Neither authentication nor authoriza- revoked?
tion A. ASN.1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 842

B. CRL 15. What kind of code was the Enigma Code?


C. CSR A. Binary code
D. OCSP
B. Substitution Cipher
10. Convert 11111111 to decimal
C. Transposition Cipher
A. 255
D. Caesar Cipher
B. 245

NARAYAN CHANGDER
C. 235 16. This is the sender and receiver can con-
D. 225 firm each other’s identity and the ori-
gin/destination of the information.
11. Which of the following statements is IN-
CORRECT? A. Authentication
A. Original methods of encryption (such B. Non-repudiation
as the Caesar Cipher) do not need the use
of a key C. Integrity
B. Data can be encrypted using ciphers D. Confidentiality
and decrypted using a key
C. Users cannot read or understand en- 17. Events or attacks that steal, damage, or
crypted data without the use of a key destroy equipments.
D. The Caesar Cipher is an example of a A. Malicious Threats
substitution cipher
B. Accidental Threats
12. is the procedure used to convert data
C. Data Security Threats
from cipher text into plain text.
A. Decryption D. Physical Security Threats
B. Encryption
18. signs and encrypts email messages.
C. Cryptanalysis
D. none of above A. Wildcard certificate
B. Root certificate
13. PKI stands for
A. Public Key Interchange C. S/MIME certificate
B. Personal Key Infrastructure D. Self-signed certificate
C. Public Key Infrastructure
19. Which of the following is a NIST standard
D. Primary key interchange
that uses a discrete logarithm and is faster
14. key for data encryption and signature verifica-
A. algorithm for transforming plaintext to tion?
ciphertext A. ECC
B. info used in cipher known only to
B. DSA
sender/receiver
C. *recovering ciphertext from plaintext C. DH
D. *converting plaintext to ciphertext D. HMAC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 843

20. Authentication the following SSL certificates will you


A. Ensure message remains secret dur- want to purchase?

PRACTICE BOOK» NOT FOR SALE


ing transmission between parties A. Multi-domain SSL certificate
B. Ensure message is not altered while in B. Single SSL certificate
transit between communicating partners
C. Subdomain SSL certificate
C. Verifies sender is who she says she is
D. Wildcard SSL certificate
D. Proves that nobody but on sender
could have sent a particular message
26. What is the US governmental standard for
21. The user’s authorization is regularly encryption?
checked to ensure they still meet the terms A. Advanced Encryption Standard
of the license.
B. Asymmetric Encryption Standard
A. Authentication
C. RC4 Encryption Standard
B. Encryption
C. Governance D. Data Encryption Standard

D. Enforcement 27. A(n) is a keyless substitution cipher


22. ‘Switch the light on’ is a with N inputs and M outputs that uses a
formula to define the relationship between
A. Process the input stream and the output stream
B. Delay A. S-box
C. Terminator
B. P-box
D. Decision
C. T-box
23. Which two terms are used to describe ci- D. none of the mentioned
pher keys? (Choose two.)
A. key space 28. In the PKI, a certificate identifies a
B. keylogging certificate authority as an issuer of certifi-
cates.
C. key length
A. server
D. key randomness
B. personal
24. proves that the sender was legitimate
and not an imposter C. content signing
A. Integrity D. root
B. Confidentiality
29. The following are not polyalphabet
C. Availability cryptosystems
D. Authenticity A. Vigenere cipher
25. You are ready to publish a set B. Pigpen cipher
of websites that includes the
C. Dancing men cipher
use of www.myWebsite.com and
www.account.myWebsite.com. Which of D. Caesar’s cipher

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 844

30. In which of the following, the server pe- C. Symmetric encryption


riodically verifies its own certificate sta- D. Public-key encryption
tus and receives a time-stamped response
signed by the CA? E. Session-key encryption

A. Escrow 36. If you need to perform operations such


B. Key pinning as addition on encrypted elements, what
type of encryption scheme would you
C. Transposition use?

NARAYAN CHANGDER
D. Stapling A. Asymmetric
31. Encryption strength is based on: B. Homomorphic
A. Strength of algorithm C. Stream
B. Secrecy of key D. Lightweight
C. Length of key 37. In Cryptography, original message, before
D. All of the above being transformed, is called
A. Simple Text
32. When put a message into code what do we
call it? B. Plain Text
A. Encipher C. Cipher Text
B. Decipher D. Filled Text
C. Mix up 38. Algorithm used for asymmetric encryption
D. Distribute A. RSA
33. which is not a way to decode a message B. MD5
A. frequency analysis C. C19
B. brute force D. MIA
C. crib usage 39. What are the DRM achieve their core ob-
D. slice and dice jectives
A. Encryption
34. Which of the following is not a reason to
revoke an SSL certificate? B. Governance
A. The validity period has ended. C. Enforcement
B. The website is no longer in service. D. Authentication
C. The domain name has been changed. 40. Which of the following terms applies to
D. The private key has been compro- the concept of obfuscation?
mised. A. Encryption

35. A type of encryption scheme that uses a B. Security through obscurity


paired public and private key is known as: C. Hashing
A. Secret-key encryption D. Digital certificate
B. Asymmetric encryption E. MFA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 845

41. Which cryptographic service ensures that 46. A primary requirement for a good crypto-
the original sender cannot deny sending graphic hash function is that the function
data or engaging in a digital transaction should not have collisions. A collision in a

PRACTICE BOOK» NOT FOR SALE


based on the usage of a secret or private hash function is when:
key? A. there are few inputs, but a lot of out-
A. Confidentiality puts.
B. Integrity B. two inputs map to the same output.
C. Origin authentication C. two outputs come from the same in-
put.
D. Non-repudiation
D. there are few outputs, but a lot of in-
42. What is the meaning of Greek words puts.
“crypt” or “cryph” 47. Which of the following illustrate the secu-
A. hidden rity through obscurity concept? Choose all
that apply.
B. scary
A. Code obfuscation
C. away
B. Steganography
D. off
C. SSID broadcast suppression
43. This type of cipher mixes a number of D. Encryption
ciphertext alphabets in the cryptogram E. Substitution ciphers
so each plain letter text is continuously
changed. 48. What was the name of the place in the
UK that worked on decoding Enigma mes-
A. Monoalphabetic substitution cipher
sages?
B. Polyalphabetic substitution cipher A. Bletchley Park
C. Caesar cipher B. Buckingham Palace
D. Monastic cipher C. The Bombe
D. Turing Park
44. What is the purpose of hashing function?
A. Encrypt plaintext 49. AES stands for

B. Decrypt plaintext A. Advanced Encryption Standard


B. Additional Entry Services
C. Ensure that message have not
changed. C. Adopted Enhanced Server
D. none of above D. none of above
50. This is the mathematics, such as number
45. How would you write the number two in
theory, and the application of formulas
binary?
and algorithms, that underpin.
A. 1001 A. Cryptology
B. 0001 B. Cryptography
C. 0000 C. Cryptanalysis
D. 0010 D. Cryptographic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 846

51. What type of cipher encrypts plaintext one B. Stream cipher


byte or one bit at a time? C. CRC
A. block D. Hashing algorithm
B. elliptical
56. Which of the following makes the mathe-
C. stream matical relationship between the plaintext
D. enigma and the key as complex as possible, so
that a partially correct key is useless to
E. hash

NARAYAN CHANGDER
an attacker?
52. Which is the largest disadvantage of the A. Confusion
symmetric Encryption? B. Diffusion
A. 1.More complex and therefore more C. One-Time Pad
time-consuming calculations.
D. Transposition
B. 2.Problem of the secure transmission
of the Secret Key. 57. Crypto Inc wants to decrypt the following
C. 3.Less secure encryption function. ciphertext “HVVH OTHVTQHAF” into a
plaintext.Table: ABCDEFGHIJKLMNOPQRSTUVWXY
D. 4.Isn’t used any more. THE QUICKBROWNFXJMPDVRLAZY
53. Before computers why were messages A. ATTACK AT DAWN
usually encrypted? B. HELLO WORLD
A. They weren’t encrypted before com- C. I LOVE GAMES
puters
D. CODING ROCKS
B. So in war Commanders/leaders could
communicate safely with their troops 58. The DES function has components
C. To share messages with people who A. 2
were clever enough to solve them B. 3
D. All of these reason C. 4

54. What are the two simple cryptographic al- D. 5


gorithms 59. Hiding text in a picture is known as
A. Block cipher A. steganography
B. Caesar cipher B. stegasaurusopoly
C. Substitution cipher C. stenogramming
D. Symmetric cipher D. stagneography
55. A network stream needs to be encrypted. 60. Which of the following is used to verify
Sara, the network administrator, has se- data integrity?
lected a cipher which will encrypt 8 bits at A. SHA
a time before sending the data across the
network. Which of the following has Sara B. 3DES
selected? C. AES
A. Block cipher D. RSA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 847

61. Which of the following salting procedures A. Replay attack


will produce the most secure encryption? B. Brute-force attack

PRACTICE BOOK» NOT FOR SALE


A. Use a 3 character salt. C. Dictionary attack
B. Create a salt based on the username. D. Birthday attack
C. Use the same salt for every password. 67. decipher
D. Use a randomized salt for every pass- A. original message
word.
B. algorithm for transforming plaintext to
62. By encrypting “Hello world” using a rail ciphertext
fence cipher of size 3, the output will be: C. recovering plaintext from ciphertext
A. LDWORLO HEL D. *field of both cryptography and crypt-
B. HLWLEOODL R analysis
C. HORE LLWDLO 68. Digital signatures provide:Choose all that
apply.
D. LOLWDE LHOR
A. Integrity
63. Which of the following is an example of a
B. Authentication
cryptographic downgrade attack?
C. Confidentiality
A. MITM
D. Authorization
B. KPA
E. Non-repudiation
C. POODLE
69. What is the most secure method of authen-
D. XSRF
tication and authorization in its default
64. Which of the following cryptographic algo- form?
rithms is MOST often used with IPSec? A. TACACS
A. Blowfish B. Kerberos
B. Twofish C. RADIUS
C. RC4 D. LDAP
D. HMAC 70. Which of the following would provide the
STRONGEST encryption?
65. An asymmetric encryption key designed to
A. Random One Time Pad
be used only for a single session or trans-
action is known as: B. DES with 56 bit keys
A. Static key C. AES with 256 bit keys
B. Ephemeral key D. RSA with 1024 bit keys
C. Asymmetric key 71. What machine was used during WWII to
encrypt and decrypt German messages?
D. Symmetric key
A. Enigma
66. An attack against encrypted data that re-
B. Atbash
lies heavily on computing power to check
all possible keys and passwords until the C. Secret
correct one is found is known as: D. Puzzler

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 848

72. the caesar cipher is a type of 77. What is the point of binary?
A. monoalphabetic cipher A. It represents how computers interpret
electrical signals
B. polyalphabetic cipher
B. Because we like to make you do extra
C. bill cipher maths ;-D
D. enigma cipher C. For the lulz
D. Because it describes star systems
73. Which 128-bit block cipher encryption al-

NARAYAN CHANGDER
gorithm does the US government use to 78. Which of the following is the best certifi-
protect classified information? cate format that commonly uses the web
A. Skipjack of trust model?
A. ASN.1
B. Vignere
B. Bridge
C. Caesar
C. OpenPGP
D. AES
D. X.509
E. 3DES
79. A vulnerability of the Diffie-Hellman’s Key
74. What famous code was designed by a man Exchange is a lack of
named Samuel Morse? A. authentication
A. ala mode code B. integrity
B. horse code C. key exchange
D. secrecy
C. morse code
D. code 80. The full form of SSL is
A. Serial Session Layer
75. Flooding a server with useless traffic B. Secure Socket Layer
causes servers to become overloaded pre-
venting them responding to legitimate C. Session Secure Layer
client-server requests from users. D. Series Socket Layer
A. Malware 81. Which of the following enables processing
B. Surfing data in an encrypted form?
A. Diffusion
C. Denial of service attack
B. Homomorphic encryption
D. Configuration
C. Obfuscation
76. Which of the following answers refers to D. Hashing
a solution designed to strengthen the se-
curity of session keys? 82. These are are created with malicious intent
and sent by attackers
A. ECB
A. Trojan Horse
B. PFS B. Worm
C. EFS C. Virus
D. PFX D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 849

83. Today’s secure communications are en- 88. How many different ways of setting up
crypted using bit keys. the machine was there said to be?

PRACTICE BOOK» NOT FOR SALE


A. 156 A. 1000
B. 10 B. 1 Trillion
C. 356 C. 186 million million million
D. 256 D. 1 Million

84. Trial and error method used by programs 89. What are the examples of weak/deprecated
to decode encrypted data such as pass- cryptographic solutions? Choose all that
words or Data Encryption Standard (DES) apply.
keys, through exhaustive effort rather A. WEP
than employing intellectual strategies.
B. AES
A. Brute force attack
C. SSL
B. Theft
D. DES
C. DoS
E. PGP
D. Phishing
90. In cryptography, the order of the letters in
85. This is the information cannot be under- a message is rearranged by
stood by anyone for whom it was unin-
tended. A. transpositional ciphers

A. Authentication B. substitution ciphers

B. Non-repudiation C. both transpositional ciphers and sub-


stitution ciphers
C. Integrity
D. quadratic ciphers
D. Confidentiality
91. DES uses a key generator to generate six-
86. What type of cryptography is best suited teen round keys.
for key generation?
A. 32-bit
A. Asymmetric encryption
B. 48-bit
B. Hashing
C. 54-bit
C. One-Time Pad
D. 42-bit
D. Symmetric encryption
92. An emerging field of advanced comput-
87. What symbols does the Morse Code cipher ing technologies based on the principles of
use? physics is known as:
A. Simple Alphabet A. DNA Computing
B. Dots and dashes B. Edge Computing
C. Squares and triangles C. Quantum Computing
D. Numbers D. Fog Computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 850

93. Examples of means that provide random- 98. What Era of Cryptography begins with
ization during the encryption process in- Claude Shannon, the Father of Mathemati-
clude:Choose all that apply. cal Cryptography?
A. Cryptographic nonce A. Deciphering Cryptographic Messages
B. Obfuscation B. Classical Cryptography
C. Salting C. Modern Cryptography
D. Initialization Vector (IV) D. Middle Age Cryptography

NARAYAN CHANGDER
E. Shimming
99. encipher
94. What is the name for the issuer of an SSL
A. converting plaintext to ciphertext
certificate?
A. a certificate issuer B. coded message
B. a certificate authority C. *study of principles/methods of deci-
phering ciphertext without knowing key
C. a root authority
D. study of encryption principles/methods
D. the man in the middle
95. Hashing is 100. A security administrator discovers an im-
age file that has several plain text docu-
A. The interception of a key that is used ments hidden in the file. Which of the fol-
to decrypt data lowing security goals is met by camouflag-
B. The transformation of a string of char- ing data inside of other files?
acters into a fixed length value or key that
A. Integrity
represents the original input string
B. Confidentiality
C. When data from a database is misman-
aged C. Steganography
D. When minor changes in the original D. Availability
string can completely change the hash
value 101. This is the study of ciphertext, ciphers
and cryptosystems with the aim of under-
96. Which of the following refers to the con- standing how they work.
tents of a rainbow table entry?
A. Cryptology
A. Hash / password
B. Cryptography
B. IP address / domain name
C. Cryptanalysis
C. Username / password
D. Cryptographic
D. Account name / hash
97. Which of the following authentication sys- 102. “PLAINTEXT” has been encrypted with
tems makes use of a KeyDistribution Cen- Caesar cipher to “AWLTYEPIE”. The key
ter? used was:
A. Secutiry tokens A. 16
B. CHAP B. 12
C. Kerberos C. 11
D. Certificates D. 19

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 851

103. Which cryptographic attack relies on the 108. A combination of an encryption and de-
concepts of probability theory? cryption algorithm is called a

PRACTICE BOOK» NOT FOR SALE


A. KPA A. Key
B. Brute-force B. Cipher
C. Dictionary C. Secret
D. Birthday D. None of the above

104. It help prevent attackers from monitoring 109. The is the message after transforma-
or recording traffic between resources and tion
computers. A. ciphertext
A. Data Encryption B. Secret-text
B. Firewall C. plaintext
C. Antivirus D. None of the above
D. none of above 110. What is the art of breaking cryptosys-
tems?
105. Instructions that can be understood and
followed by a machine, A. Cryptanalysis
A. Crowdsourcing B. Cryptogram
B. Algorithm C. Cryptology

C. Program D. Cryptography

D. none of above E. Cryptocurrency

106. Encrypted information can only be 111. The field that covers a variety of com-
viewed by those who have been provided puter networks, both public and private,
the key that are used in everyday jobs.
A. Artificial Intelligence
A. Integrity
B. ML
B. Confidentiality
C. Network Security
C. Availability
D. IT
D. Authenticity
112. This person, known as the father of Com-
107. Encryption is used to puter Science, invented the CAPTCHA.
A. Write more effective algorithms in pro- A. Alan Turing
grams
B. Vigenere
B. Debug programs more effectively
C. Bill Gates
C. Protect sensitive information being
sent digitally D. Cliff Stoll

D. Make the internet faster when loading 113. Which of the following is used in conjunc-
information tion with the assumption that the output

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 852

of a cryptographic function should be con- 118. Interception of packets across a network


siderably different from the corresponding A. Phishing
plaintext input?
B. Packet sniffing
A. Confusion
C. Network forensics
B. Obfuscation
D. Firewalls
C. Collision
119. A group, or string, of random characters
D. Diffusion

NARAYAN CHANGDER
in a particular order, used to scramble data
to make it private or gibberish to out-
114. cryptography
siders.
A. *study of principles/methods of deci- A. Key
phering ciphertext without knowing key
B. Lock
B. *study of encryption princi-
C. Anchor
ples/methods
D. none of above
C. *field of both cryptography and crypt-
analysis 120. Which of the following ciphers would be
D. *coded message BEST used to encrypt streaming video?
A. RC4
115. Which best describes how the Caesar Ci-
B. RSA
pher works?
C. SHA1
A. You muddle up all the letters in the al-
phabet D. 3DES
B. You replace letters with numbers 121. What was the name of the man who
C. You reverse the letter of the alphabet led the team that cracked the German’s
“Enigma Code” in WW2?
D. You rotate the letters around the alpha-
A. Tim Berners-Lee
bet, but they stay in the right order
B. Alan Turing
116. How many keys are used in asymmetric C. Stephen Hawking
encryption?
D. Bill Gates
A. 2
122. Encrypted text that will appear to be a
B. 1
random string.
C. 0 A. Encryption
D. none of above B. Plaintext
117. What is a Ciphertext? C. Ciphertext

A. Encrypted message D. none of above

B. Text used to encrypt messages 123. If the received cipher text is C = 49, what
is the corresponding plaintext (suppose (n,
C. Message sent by sender to recipient
d) = (55, 3) is the private key of an RSA
D. Decrypted message cryptosystem)?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 853

A. 4 127. Encryption algorithm


B. 5 A. the formula for encrypting (coding) the

PRACTICE BOOK» NOT FOR SALE


plaintext (normal message)
C. 3
B. the encrypted (coded) message
D. 6
C. the original message to be encrypted
E. 2 (coded)

124. Your employer demands a copy of all pri- D. Changing data so that it can no
vate keys used on the devices you use longer be understood without a decryp-
for work since regulatory requirements tion(decode) key
require them to be able to decrypt any
official communications when legally re- 128. What is a method of defeating cryptogra-
quested. Which of the following is ex- phy scheme that tries every possible key?
plained in the scenario? A. Encryption Attack
A. Key escrow B. Brute Force Attack
B. Key recovery C. Substitution Attack
C. PKI hierarchy D. Cryptography Attack

D. Revocation 129. The original message in its original legi-


ble form.
125. Which of the following elements is most
likely to be an issue for Ping flood? A. Ciphertext
B. Plaintext
A. Confidentiality
C. Text Message
B. Integrity
D. none of above
C. Availability
D. Non-repudiation. 130. This is a cryptographic hash function
which takes an input and produces a 160-
126. How does the receiver of a message use bit (20-byte) hash value.
the digital signature to verify that the mes- A. Hash Functions
sage has not been tampered with?
B. SHA-3 (Secure Hash Algorithm 3)
A. Decrypt the signature with the
C. SHA-2 (Secure Hash Algorithm 2)
sender’s private key and compare with
a hash of the received message D. SHA-1 (Secure Hash Algorithm 1)
B. Decrypt the signature and unhash it to 131. It is pair of algorithms that take a key
see if it is the same as the received mes- and convert plaintext to ciphertext and-
sage back.
C. Telephones the sender to request con- A. Cryptosystem
firmation
B. Cryptography
D. Hashes the encrypted digest of the re-
C. Decryption
ceived message using the private key of
the sender’s certification authority D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 854

132. Which of the following concepts is en- 137. Who was the first know user of the Cae-
forced by certifying that email communica- sar Code?
tions have been sent by who the message
A. Caesar Romanus
says it has been sent by?
A. Key escrow B. Julius Caesar

B. Non-repudiation C. Alan Turing


C. Multifactor authentication D. There isn’t one

NARAYAN CHANGDER
D. Hashing
138. This is the practice of hiding a file, text,
133. What is the name of the electro- image or video inside another file.
mechanical device used by British cryptol- A. Substitution cipher
ogists to help decipher German Enigma-
machine-encrypted secret messages dur- B. Hide and seek
ing WWII? C. Pictogramography
A. Bomba D. Steganography
B. Bomby
C. Bombe 139. A 4X5 matrix cipher was used to encrypt
“good morning everyone”. What will it be
D. Bomb output?
134. Examples of key stretching algorithms in- A. GMIVOOONENORGREDNEY
clude:(Select 2 answers)
B. GOGYOREOONVNDIEEMNR
A. ROT13
C. GDRNVYEOMNGEOOOIERN
B. Twofish
D. none of above
C. Bcrypt
D. DSA 140. What are the characteristics of Elliptic
E. PBKDF2 Curve Cryptography (ECC)? Choose all
that apply.
135. One commonly used public-key cryptog-
raphy method is the algorithm A. Asymmetric encryption

A. RSS B. Low processing power requirements


B. RAS C. Suitable for small wireless devices
C. RSA D. Symmetric encryption
D. RAA E. High processing power requirements
136. The encryption key is bound with a set
141. Another term for trap-door function is
of conditions that must be met to use the
key.
A. Authentication A. One-way function

B. Encryption B. Bijective function


C. Governance C. Inverse function
D. Enforcement D. One-to-one function

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 855

142. The number of unique substitution boxes 147. Which algorithm uses two keys to en-
in DES after the 48 bit XOR operation are crypt and decrypt?

PRACTICE BOOK» NOT FOR SALE


A. 8 A. Symmetric algorithm
B. 4 B. Shift Algorithm
C. 6 C. Public Algorithm
D. 12 D. Asymmetric Algorithm

143. In cryptography, which of the five basic 148. Company A submitted a bid on a contract
protections ensures that the information is to do work for Company B via email. Com-
correct and no unauthorized person or ma- pany B was insistent that the bid did not
licious software has altered that data? come from Company A. Which of the fol-
lowing would have assured that the bid
A. Confidentiality was submitted by Company A?
B. Availability A. Digital signature
C. Encryption B. Encryption
D. Integrity C. Hashing
D. none of above
144. When you want to take a secret code and
decode it, this is known as 149. What must a user need to decrypt a file?
A. Encryption A. Coin
B. Decryption B. Key
C. Translation C. Token
D. Algorithm D. Graph

145. Which of the following terms applies to 150. Suppose the RSA cyrptosystem is used
the concept of data integrity? with public key (35, 7). What is the cor-
responding cipher text when the plaintext
A. MFA
“2” is sent?
B. Digital certificate
A. 27mod35
C. Hashing
B. 23
D. Security through obscurity C. 12
E. Encryption D. 72mod35
146. two private keys are required in the fol- 151. Sending requests to a single server using
lowing cipher hijacked machines
A. caesar A. Phishing
B. vigenere B. DoS
C. symmetrical C. Worms
D. asymetrical D. Virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 856

152. If you encrypted the word lesson using a 157. The science of encrypting and decrypting
Caesar cypher with a key of 1 which would information is called
it be?
A. Cartography
A. mgvvqr
B. Cryogeny
B. mfttpo
C. Cryptography
C. kdttph
D. none of above
D. kjdfkj

NARAYAN CHANGDER
158. Study of letters or groups of letters con-
153. What key is used if a Caesar cipher is
tained in a ciphertext in an attempt to par-
used to encrypt the message “QUICK” to
tially reveal the message is called:
a plain text “TXLFN”
A. 2 A. Frequency analysis

B. 3 B. Cryptography

C. 4 C. Encription
D. 5 D. Decription
E. 6 159. It is a science that applies complexmath-
154. This is the information cannot be altered ematics and logic to design strong encryp-
in storage or transit between sender and tionmethods.
intended receiver without the alteration A. Cryptosystem
being detected.
B. Cryptography
A. Authentication
C. Encryption
B. Non-repudiation
D. none of above
C. Integrity
D. Confidentiality 160. Hashing

155. In a trapdoor function, the function is A. Changes data before it reaches the
easy to: spreadsheet records to be compared to

A. encrypt B. Never stores sensitive data as plain


text
B. decrypt
C. Is not very secure
C. both encrypt and decrypt
D. Stop hackers being able to see data
D. neither encrypt and decrypt
and they will only see the hash values
156. What was the name of the machine de-
signed in Bletchley Park to break the 161. Cryptanalysis is used
enigma code? A. to find some insecurity in a crypto-
A. Bomba graphic scheme
B. Bombe B. to increase the speed
C. Enigma C. to encrypt the data
D. Prototype D. to make new ciphers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 857

162. DES stands for C. vigenere


A. Drop Encryption Server D. caesar

PRACTICE BOOK» NOT FOR SALE


B. Data Encryption Standard 168. Which of the following are examples of
C. Digital Encrypt Server key stretching algorithms? Choose all that
apply.
D. none of above
A. ROT13
163. Which of these is a method of encryption
B. Twofish
used on websites?
C. Bcrypt
A. .com
D. DSA
B. HTTP
E. PBKDF2
C. WWW
D. SSL 169. Which of the following mathematical ex-
pressions would produce the most secure
164. Agnes is sending a secure message to encryption when used in the encryption al-
Barry. Which key will Barry use to decrypt gorithm?
the message? A. value22
A. Agnes’s Public Key B. value * 22
B. Agnes’s Private Key C. value / 22
C. Barry’s Public Key D. value % 22
D. Barry’s Private Key
170. Which of the following is used to describe
165. Which of the following provides addi- a situation where a small change intro-
tional encryption strength by repeating duced to the input data before encryption
the encryption process with additional causes large changes in its encrypted ver-
keys? sion?
A. AES A. Diffusion
B. 3DES B. Confusion

C. Twofish C. Obfuscation

D. Blowfish D. Collision

171. When we solve a code what is the pro-


166. to encrypt a message you need 2 main
cess called?
parts, a & a key
A. Encipher
A. cipher
B. Decipher
B. code
C. Mix Down
C. algorithm
D. Distribute
D. crypt
172. While setting up a wireless corporate net-
167. who cracked the enigma machine work, which of following should an admin-
A. turing istrator avoid implementing
B. babbage A. EAP-TLS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 858

B. PEAP C. Either Authentication or Authorization


C. WEP D. Neither Authentication Nor Authoriza-
D. WPA tion

173. An intranet is behind a network device, 178. Which of the following terms applies to
which gives some protection against hack- the concept of confidentiality?
ers, viruses, and so on. Which is the net- A. Hashing
work device?

NARAYAN CHANGDER
B. Encryption
A. Proxy server
C. Security through obscurity
B. VPN
D. MFA
C. Firewall
E. Digital certificate
D. None of the three
179. Which is not the duty of the CA in the PKI
174. is a process of converting en- (Public Key Infrastructure)?
coded/encrypted data in a form that is
readable and understood by a human or a A. issuing certificates
computer B. revoking certificates
A. Cipher text C. revoking licenses
B. Cryptanalysis D. issuing public-private key pairs
C. Encryption
180. Cryptography means
D. Decryption
A. Encrypt algorithm
175. Man-in-the-middle attacks affect which
B. Decrypt algorithm
part(s) of the CIA triad?
C. Plaintext into ciphers text
A. Confidentiality only
D. none of above
B. Integrity only
C. Availability only 181. It is also called as private key cryptogra-
D. Confidentiality and Integrity phy.
A. Symmetric Cryptosystem
176. What type of key or keys are used in
symmetric cryptography? B. Asymmetric Cryptosystem

A. A shared private key C. Decryption Key


B. A unique key for each participant D. none of above
C. A single key pair 182. In the DES algorithm the Round Input is
D. Two unique sets of key pairs 32 bits, which is expanded to 48 bits via

177. is the process of identifying an indi-


A. Scaling of the existing bits
vidual, usually based on a username and
password. B. Duplication of the existing bits
A. Authentication C. Addition of zeros
B. Authorization D. Addition of ones

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 859

183. is the study of secure communications 189. The asymmetric cryptography algorithm
that allow only sender and intended recip- most commonly used is:
ient of a message to view the contents

PRACTICE BOOK» NOT FOR SALE


A. AES
A. encryption
B. RSA
B. cipher text
C. Twofish
C. decryption
D. Blowfish
D. cryptography
190. CIA Stands for
184. One key is used for data encryption and
another for data decryption. A. Confidentiality, Integrity, Authenticity
A. Symmetric Cryptosystem B. Confidentiality, Integrity, Availability
B. Asymmetric Cryptosystem C. Confidentiality, Interruption, Authen-
C. Asymmetric Key ticity

D. none of above D. Confidentiality, Integrity, Accountabil-


ity
185. Block ciphers means
191. These define access permissions for a
A. It take number of bits
user
B. Encrypt single unit
A. Group permissions
C. Both A and B
B. User Access levels
D. none of above
C. User Maintenance
186. What are the characteristic features of a
D. Group and user settings
session key? (Select 2 answers)
A. Used during a single session 192. Two benefits of including a digital signa-
ture
B. Asymmetric key
C. Reused during multiple sessions A. Detect unauthorised changes to mes-
sage
D. Symmetric key
B. Authenticate sender’s identity
187. What are the two types of symmetric ci-
C. Only the intended recipient can de-
phers?
crypt the message
A. Stream cipher and Block cipher
D. Signature can be used to provide se-
B. Substitution cipher and Stream cipher cure encryption key
C. Caesar cipher and Substitution cipher
193. If an attacker stole a password file that
D. Block cipher and Brute cipher contained one way encrypted passwords,
188. “letters” has been encrypted with Cae- what type of an attack would he/she per-
sar cipher to “cvkkvij”. The key used was: form to find the encrypted password?
A. 16 A. Man-in-the middle attack
B. 14 B. Birthday attack
C. 18 C. Denial of service attack
D. 17 D. Dictionary attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 860

194. What is chipper text 199. Which of the algorithms listed below
does not fall into the category of asym-
A. Encryption data
metric encryption?
B. Encrypted data
A. RSA
C. Data Decrypt B. GPG
D. none of above C. DSA
195. Who introduced the public key cryptosys- D. AES

NARAYAN CHANGDER
tem? E. PGP
A. Diffie 200. is the practice and study of tech-
B. Adleman niques for secure communication in the
presence of third parties called adver-
C. Shamir saries.
D. Rivest A. Cryptography
E. Xander Ford B. Cryptoanalysis
C. Cryptology
196. is the science and art of transform-
ing messages to make them secure and im- D. either Cryptography or Cryptoanalysis
mune to attacks.
201. As we saw in class, WEP is vulnerable at-
A. Cryptography tacks that allow an active attacker to flip
B. Cryptoanalysis bits in the and unauthorized modifications
to the message received by the recipient.
C. neither Cryptography nor Cryptoanaly- What be the best defense against this kind
sis of attack?
D. either Cryptography or Cryptoanalysis A. Use a different key for each direction
and for each wireless device.
197. When solving a code, we need a letter or
B. Protect the ciphertext using a MAC.
a word to help us get started, what is this
often referred to as? C. Encrypt using AES in Cipher Block
Chaining (CBC) mode
A. Help
D. Encrypt using AES in Electronic Code
B. Support Book (ECB) mode.
C. Key E. Prepend a random 32-bit nonce to the
D. Answer packet before applying the CRC and en-
crypting it
198. Which of the following ciphers uses dis-
202. What are three examples of administra-
tinct keys for encryption and decryption?
tive access controls? (Choose three.)
A. Shift
A. encryption
B. RSA B. hiring practices
C. Vigenere C. background checks
D. Caesar D. guard dogs
E. Buknoy E. policies and procedures

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 861

203. Both parties use the same key to encrypt C. Original image is converted into dupli-
and decrypt the messages cate image

PRACTICE BOOK» NOT FOR SALE


A. Symmetric key Cryptography D. none of above
B. Asymmetric key Cryptography 209. Digital Signatures provide:(Select 3 an-
C. Hashing Cryptography swers)
D. none of above A. Integrity
B. Authentication
204. Which of the following terms applies to
the authentication process? C. Confidentiality
A. Digital certificate D. Authorization
B. MFA E. Non-repudiation

C. Encryption 210. the set of rules that you are using to en-
D. Security through obscurity code the information
A. cipher
E. Hashing
B. key
205. What is data encryption standard (DES)?
C. encoding
A. block cipher
D. deciphering
B. stream cipher
211. A hash function takes an input of any
C. bit cipher length and converts it into an output of a
D. byte cipher fixed length. What term is used for this
output?
206. is the property that the sender and re-
ceiver are guaranteed that no third party A. field
can make any changes in the message dur- B. digest
ing the transmission. C. password
A. Non-repudation D. message
B. Authenticity
212. The following word was encrypted using
C. Confidentiality a Caesar cipher with a shift of 2:ecguct.
D. Integrity What word is it?
E. Honesty A. julius
B. caesar
207. Multiplication is an example of a
C. romans
A. Cryptographic function
D. cipher
B. One-way function
213. A browser running a secure connection
C. Autonomous function
will be using which transport protocol?
D. Encryption algorithm
A. https
208. Stenographer is B. http
A. Cover images C. csma/ca
B. Original images D. gsm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 862

214. Which three devices represent examples 219. The Rail Fence Cipher is a cipher that uses
of physical access controls? (Choose columns. The plaintext is written down-
three.) wards and starts a new column when the
A. firewalls bottom is reached. This technique used in
the Rail Fence Cipher is an example of:
B. locks
A. a product cipher
C. routers
B. a stream cipher
D. video cameras C. substitution

NARAYAN CHANGDER
E. swipe cards D. transposition
215. Which cipher uses the inverse alphabet to 220. Uses a number of computers over a net-
create encrypted messages? work of infected machines which send req
A. Atbash uests to a website which would bring it
offline
B. Caesar’s
A. SQL
C. Random Substitution
B. DoS
D. RSA
C. WLAN
216. Which of the following algorithms does D. USB
not belong to the category of symmetric
ciphers? 221. is the process of using an algorithm to
transform data from plain text to a cipher
A. RC4 text in order to protect the confidentiality,
B. DES integrity, and sometimes the authenticity
of the message.
C. RSA
A. Encryption
D. AES
B. Decryption
E. 3DES
C. Cipher
217. Which of the following MUST Matt, a se- D. Cryptanalysis
curity administrator, implement to verify
both the integrity and authenticity of a 222. How is the public key of the customer’s
message while requiring a shared secret? digital certificate signed?
A. RIPEMD A. Using the customer’s private key

B. MD5 B. Using the private key of the CA


C. Using the customer’s secret key
C. SHA
D. Using the public key of the CA
D. HMAC
223. In the DES algorithm the round key is
218. A Caesar cipher is an example of a bit and the Round Input is bits.
A. transposition cipher A. 48, 32
B. bimodal cipher B. 64, 32
C. substitution cipher C. 56, 24
D. substantial cipher D. 32, 32

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 863

224. Why are computers better than humans 229. Which of the following is an extension
at breaking encryptions such as the Vi- of the Diffie-Hellman key exchange into
genere? a complete discrete logarithm cryptosys-

PRACTICE BOOK» NOT FOR SALE


A. Computers are smarter than humans. tem, allowing for tasks like general en-
cryption?
B. Computers are faster than humans.
A. MD5
C. The Vigenere was originally designed
B. ElGamal
by a computer.
C. RIPEMD
D. They are not; humans are better at
breaking encryptions than computers. D. RSA
230. Which of the following would be the most
225. is the science of converting data into
secure method when storing passwords in
a secret code to hide the meaning of the
a database?
message during transmission.
A. Passwords are hashed.
A. Cryptography
B. Passwords are saved as plaintext.
B. Cryptanalysis
C. Passwords are both salted and
C. Cryptology hashed.
D. none of above D. Passwords are encrypted using an al-
gorithm.
226. Which of the following is a real one-way
function that is used for asymmetric en- 231. Which of the following refers to a solu-
cryption? tion designed to strengthen the security if
A. Division session keys?
B. Multiplication A. ECB

C. Modulo B. PFS
C. EFS
D. Remainder
D. PFX
227. A is a variable in a cipher used to en-
crypt or decrypt a message. 232. The process of using an algorithm to
transform information into a format that
A. Key cannot be read is
B. Cipher A. Encryption
C. Algorithm B. Decoding
D. Key Space C. Encoding
228. What term is used to describe concealing D. Decryption
data in another file such as a graphic, au- 233. A process for creating a unique “signa-
dio, or other text file? ture” for a set of data
A. masking A. Symmetric key Cryptography
B. obfuscation B. Asymmetric key Cryptography
C. steganography C. Hashing Cryptography
D. hiding D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 864

234. There are THREE types of modern cryp- B. preventive


tography except: C. masking
A. Symmetric key Cryptography D. deterrent
B. Asymmetric key Cryptography
240. What was explained by Leon Battista Al-
C. Hashing Cryptography
berti around the year 1467?
D. Caesar Cipher
A. Medieval Cryptography

NARAYAN CHANGDER
235. What are MD4 and MD5? B. Polyalphabetic Cipher
A. Symmetric Encryption Algorithms C. Classical Crytography
B. Asymmetric encryption Algorithms D. Modern Cryptography
C. Hashing algorithms
241. Which of the following terms illustrate
D. Digital certificates the security through obscurity concept?
(Select all that apply)
236. Which of the following provides the
strongest authentication security on a A. Code obfuscation
wireless network? B. Steganography
A. MAC filter C. SSID broadcast suppression
B. WPA2 D. Encryption
C. WEP
242. Which of the following offers the LEAST
D. Disable SSID broadcast secure encryption capabilities?
237. An algorithm in encryption is called A. Twofish
A. Cipher B. PAP
B. Algorithm C. NTLM
C. Procedure D. CHAP
D. Module
243. What cryptographic algorithm is used by
238. Crypto Inc wants to share messages se- the NSA and includes the use of elliptical
curely to it’s client. What should be im- curves for digital signature generation and
plmeneted? key exchange?
A. Cryptanalysis A. ECC
B. Digital signature B. AES
C. Cryptography C. IDEA
D. All of the above D. RSA

239. A warning banner that lists the negative 244. DES follows
outcomes of breaking company policy is A. Hash Algorithm
displayed each time a computer user logs
in to the machine. What type of access B. Caesars Cipher
control is implemented? C. Feistel Cipher Structure
A. detective D. SP Networks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 865

245. Symmetric key is D. HMAC


A. Sender only used same key E. SHA

PRACTICE BOOK» NOT FOR SALE


B. Receiver only used same key 251. Asymmetric key is
C. Sender and receiver use same key A. Sender use one key
D. none of above B. Receiver use same key
246. which is not the duty of PKI C. Both use different key
A. Certificate issuing D. none of above
B. providing access control 252. Which of the following authentication
C. key storage and updation protocols offer countermeasures against
replay attacks? Choose all that apply.
D. to generate primary and public key
A. IPsec
247. ensures that sensitive information
B. MPLS
are accessed only by an authorized person
and kept away from those not authorized C. PAP
to possess them. D. Kerberos
A. Availability E. CHAP
B. Confidentiality 253. If Alice wishes to digitally sign the mes-
C. Cryptography sage that she is sending to Bob, what key
D. Integrity would she use to create the digital signa-
ture?
248. The fundamental problem in cryptogra- A. Alice’s private key
phy is:
B. Alice’s public key
A. Message secrecy
C. Bob’s private key
B. Key exchange
D. Bob’s public key
C. Lock exchange
254. A string of text that has been converted
D. Algorithm complexity
to a secure form using encryption.
249. Encrypt the word alphabet using a Caesar A. encryption
cipher with a shift of 3
B. decryption
A. DVSDULQV
C. ciphertext
B. DOOFOHDU
D. plaintext
C. DOSKDEHW
255. Ensures that information is correct and no
D. DORQHBHV
authorized person or malicious software
250. Which of the following are hashing algo- has altered that data
rithms? Choose all that apply. A. Integrity
A. MD5 B. Confidentiality
B. RIPEMD C. Availability
C. Bcrypt D. Authenticity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 866

256. What was one of the first, well known 261. Who is the mathematician responsible for
encryption methods? inventing the machine that helped break
A. Caesar’s Cypher the German enigma code?

B. Cleopatra’s Cypher A. Alan Turing

C. Napoleon’s Cypher B. Addleman


D. Augustus’ Cypher C. Rivest
D. Richard Hamming

NARAYAN CHANGDER
257. Encryption used by RADIUS is BEST de-
scribed as: E. Mimiyuuuh
A. Quantum
262. A(n) is a keyless substitution cipher
B. Elliptical curve with N inputs and M outputs that uses a
C. Asymmetric table to define the relationship between
the input
D. Symmetric
A. S-box
258. This is a tool used to change normal or
plain text into something that is unread- B. P-box
able and then back into readable text. C. T-box
A. Encryption D. None of the ementioned
B. Translation tool
263. What is the problem with the following
C. Watermark plain text to encrypt with a Caesar Cipher?
D. Cipher Is your birthday 9/30/1998?

259. Choose the True statement that define ci- A. Numbers cannot be encrypted
pher text. B. It would be relatively easy to decipher
A. converting encoded/encrypted data in after encryption
a form that is readable and understood by C. Symbols cannot be encrypted
a human or a computer.
D. all of the above
B. study of ciphertext, ciphers and cryp-
tosystems 264. Which one of the following statements is
C. unreadable output of an encryption al- FALSE?
gorithm. A. Cracking the Enigma Code shortened
D. uses algorithms to scramble your in- WW2 by at least two years and saved mil-
formation lions of lives

260. This person discovers weaknesses and B. Alan Turing was the first person to
vulnerabilities in solutions. come up with the idea of a programmable
machine
A. Cartographer
C. Alan Turing was one of the pioneers of
B. Computer forensic analyst modern computing
C. Cryptanalyst D. Polish mathematicians were the first
D. Cryptographer ones to crack the Enigma Code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 867

265. What encryption algorithm uses one key B. Ensure message is not altered while in
to encrypt data and a different key to de- transit between communicating partners
crypt data?

PRACTICE BOOK» NOT FOR SALE


C. Verifies sender is who she says she is
A. symmetric D. Proves that nobody but on sender
B. transposition could have sent a particular message
C. one-time pad 271. Which of the following cryptographic al-
D. asymmetric gorithms is the least vulnerable to at-
tacks?
266. What is the term used to describe the
A. AES
science of making and breaking secret
codes? B. DES
A. impersonation C. RC4
B. factorization D. 3DES
C. jamming 272. Which of the following protocols uses an
D. cryptology asymmetric key to open a session and then
establishes a symmetric key for the re-
E. spoofing mainder of the session?
267. is used to conceal the contents of A. SFTP
blocks or streams of data of any size. B. HTTPS
A. Ciphers C. TFTP
B. Asymmetric Encryption D. TLS
C. Symmetric Encryption
273. What sort of messages do computers en-
D. Encryption crypt in today’s world?
268. It disguises as useful software. A. Word Documents
A. Worm B. Letters

B. Virus C. Games

C. Trojan Horse D. Emails and Texts

D. none of above 274. Information that is readable without per-


forming any cryptographic operations.
269. During asymmetric encryption, Nicholas
A. cryptography
will use to open a message from Allie.
B. plaintext
A. His public key
C. encryption
B. His private key
D. decryption
C. Allie’s public key
D. Allie’s private key 275. is the method of recovering original
data that has been encrypted without hav-
270. Non-repudiation ing access to the key used in the encryption
A. Ensure message remains secret dur- process.
ing transmission between parties A. Cryptanalysis

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 868

B. Cryptology C. Hiding data within another piece of


C. Cryptosystem data

D. none of above D. Encrypting data

276. Which term describes the technology that 281. What term is used to describe the tech-
protects software from unauthorized ac- nology that replaces sensitive information
cess or modification? with a nonsensitive version?

A. access control A. blanking

NARAYAN CHANGDER
B. copyright B. masking
C. watermarking C. retracting
D. trademark D. hiding
E. whiteout
277. DES is a(n) method adopted by the
US government. 282. When confidentiality is the primary con-
A. symmetric-key cern, and a secure channel for key ex-
change is not available, which of the fol-
B. asymmetric-key
lowing should be used for transmitting
C. Nither symmetric-key nor asymmetric- company documents?
key
A. Digital Signature
D. Both symmetric-key and asymmetric-
B. Symmetric
key
C. Asymmetric
278. Sara, a security engineer, is testing en-
D. Hashing
cryption ciphers for performance. Which
of the following ciphers offers strong en- 283. What is the name of the method in which
cryption with the FASTEST speed? letters are rearranged to create the cipher-
A. 3DES text?
B. Blowfish A. enigma
C. Serpent B. transposition
D. AES256 C. substitution

279. Which of the following is a certificate D. one-time pad


backed by a stricter identity validation pro- 284. You’ve received an assortment of files
cess than the CA’s default? along with accompanying hashes to guar-
A. Domain validation antee integrity. Some of the hash values
B. Email are 256-bit and some are 512-bit. Assum-
ing they all use the same basic algorithm,
C. Extended Validation what might it be?
D. Machine authentication A. MD5
280. What is the purpose of steganography? B. RIPEMD
A. Checking data integrity C. SHA-1
B. Verifying hash values D. SHA-2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 869

285. The DES Algorithm Cipher System con- 290. During asymmetric encryption, if Allie
sists of rounds (iterations) each with sends a message to Nicholas, she will use:
a round key

PRACTICE BOOK» NOT FOR SALE


A. Nicholas’s public key
A. 12 B. Nicholas’s private key
B. 18 C. Her public key
C. 9 D. Her private key
D. 16 291. The best technique for cracking a random
substitution cipher is known as
286. Which of the following refer to the
Advanced Encryption Standard (AES)? A. Encryption
Choose all that apply. B. Frequency Analysis
A. Symmetric-key algorithm C. Caesar Cipher
B. 128-, 192, and 256-key bits D. Substitution shift
C. Asymmetric-key algorithm 292. assures that information and pro-
D. 56-, 112-, and 168-bit keys grams are changed only in a specified and
authorized manner.
E. Block cipher algorithm
A. Integrity
287. How do you say A B. Data integrity
A. -. C. System integrity
B. . D. Availability
C. .- 293. Valuable content is encrypted to prevent
D. -. unauthorized usage and copying.
A. Authentication
288. Which cryptographic solution would be
B. Encryption
best suited for low-power devices?
C. Governance
A. ECC
D. Enforcement
B. EFS
C. SED 294. Both parties use the different key to
encrypt and decrypt the messages which
D. FDE each person has two keys

289. “CAESAR CIPHER” has been encrypted A. Symmetric key Cryptography


with Caesar cipher to “SQUIQH SYFXUH”. B. Asymmetric key Cryptography
The key used was: C. Hashing Cryptography
A. 16 D. none of above
B. 14
295. Integrity
C. 13
A. Ensure message remains secret dur-
D. 12 ing transmission between parties

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 870

B. Ensure message is not altered while in B. wigvix


transit between communicating partners C. kwujwl
C. Verifies sender is who she says she is D. oaynap
D. Proves that nobody but on sender
300. Calculate the binary addition:0111Use bi-
could have sent a particular message
nary addition rules + whiteboards!
296. Which of the following refers to a com- A. 101
monly used asymmetric algorithm for se- B. 11

NARAYAN CHANGDER
cure exchange of symmetric keys?
C. 111
A. RC4
D. 100
B. Bcrypt
301. Which of the following is the private key
C. Diffie-Hellman of an RSA cryptosystem with public key (n,
D. RIPEMD e) = (55, 7)? Suppose p = 5 and q = 11.

297. A cipher system that uses a repeating A. None of the Choices


word or phrase as part of the encryption B. (55, 23)
scheme C. (55, 39)
A. Caesar D. (55, 15)
B. Vigenere E. (55, 27)
C. Code Book 302. Of the following, which is a collection of
D. Block servers that was set up to attract hack-
ers?
298. Which three protocols use asymmetric
A. DMZ
key algorithms? (Choose three.)
B. Honeypot
A. Secure Sockets Layer (SSL)
C. Honeynet
B. Secure File Transfer Protocol (SFTP)
D. VLAN
C. Pretty Good Privacy (PGP)
303. Select below the term that is used to de-
D. Advanced Encryption Standard (AES)
scribe a trusted third-party agency that is
E. Secure Shell (SSH) responsible for issuing digital certificates:
299. Consider the process of encoding and A. Registration Authority
decoding a message using the following B. Delegation Authority
Caesar cipher encoding scheme in which C. Certification Authority
the plaintext and ciphertext alphabets are
offset by four positions, as shown be- D. Participation Authority
low:Plaintext: a b c d e f g h i j k l m n 304. Which of the following are restricted to
o p q r s t u v w x y z Ciphertext: w x 64 bit block sizes?
yzabcdefghijklmnopqrst
A. PGP
u v Which of the following encoded cipher-
text strings decodes to an original plain- B. DES
text message of “secret”? C. RSA
A. etsecr D. AES

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 871

305. How do you say C 310. Pseudo-random data used in combination


A. -.-. with a secret key in WEP and SSL encryp-
tion schemes is known as:

PRACTICE BOOK» NOT FOR SALE


B.
A. Salt
C. .
B. Shim
D. .-.
C. IV
306. Process which transforms the original D. Seed
information into an unrecognizable form.
The statement describe the term 311. When physics is used instead of math-
ematics in a cipher process, it is called
A. cipher text
what?
B. encryption
A. Biometric cryptology
C. decryption
B. Physical cryptology
D. cryptanalysis
C. Quantum cryptology
307. Which of the algorithms listed below D. Physical encryption
does not belong to the category of sym-
metric ciphers? 312. Suppose an RSA cryptosystem is used to
send the plaintext “4” with public key (n,
A. RC4 e) = (33, 3). What is the cipher text that
B. 3DES corresponds to the message “4”?
C. RSA A. 43mod33
D. AES B. 31
E. Blowfish C. 34mod33
D. 28
308. A (also called an anagram) changes
the position of characters in the plain text E. 34mod31
message.
313. Which of the following is the correct
A. transposition cipher sequence of encryption ciphers from the
B. One time pad weakest to the strongest?
C. substitution cipher A. DES > 3DES > Blowfish > AES
D. none of above B. 3DES > DES > Blowfish > AES
C. 3DES > DES > AES > Blowfish
309. What are the characteristic features of El-
liptic Curve Cryptography (ECC)? (Select 3 D. DES > Blowfish > AES > 3DES
answers)
314. A method of protecting information and
A. Asymmetric encryption communications through the use of codes.
B. Low processing power requirements A. Cryptography
C. Suitable for small wireless devices B. Confidentiality
D. High processing power requirements C. Integrity
E. Symmetric encryption D. Authentication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 872

315. This type of symmetric encryption is 320. It is a value that is known to the sender.
faster and usually implemented in soft-
A. Decryption Key
ware for larger amounts of traffic.
A. stream cipher B. Encryption Key
B. stream chain C. PKI
C. block chain D. none of above
D. chain surge

NARAYAN CHANGDER
321. What are the objectives of encryption?
316. Agnes is sending a secure message to
Barry. Which key should she use to en- A. Non-repudation
crypt the message so that only Barry can B. Authenticity
decrypt it?
C. Confidentiality
A. Agnes’s Public Key
B. Agnes’s Private Key D. Error-detection
C. Barry’s Public Key E. Error-correction
D. Barry’s Private Key
322. A cryptographic standard for digital sig-
317. This is the creator/sender of the informa- natures is known as:
tion cannot deny at a later stage his or her
A. DSA
intentions in the creation or transmission
of the information. B. PFS
A. Authentication C. DES
B. Non-repudiation
D. RSA
C. Integrity
D. Confidentiality 323. Joe must send Ann a message and pro-
vide Ann with assurance that he was the
318. The following letter as encrypted using a actual sender. Which of the following will
Caesar cipher with a shift of 2:e. What Joe need to use to BEST accomplish the ob-
would this letter be in plain text? jective?
A. j
A. A pre-shared private key
B. c
B. His private key
C. y
C. Ann’s public key
D. b
D. His public key
319. Which of the following algorithms do not
fall into the category of asymmetric en-
324. What are the characteristics of a session
cryption?
key? Choose all that apply.
A. RSA
A. Used during a single session
B. GPG
C. DSA B. Asymmetric key

D. AES C. Reused during multiple sessions


E. PGP D. Symmetric key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 873

325. A is a function that takes a variable- 330. Confidentiality


length string (message) and compresses A. Ensure message remains secret dur-
and transforms it into a fixed-length ing transmission between parties

PRACTICE BOOK» NOT FOR SALE


value.
B. Ensure message is not altered while in
A. hash transit between communicating partners
B. cipher C. Verifies sender is who she says she is
C. collision D. Proves that nobody but on sender
D. key could have sent a particular message
331. The Internet is an open and system
326. Joe, a user, wants to send an encrypted
email to Ann. Which of the following will A. closed
Ann need to use to verify the validity’s of B. private
Joe’s certificate? C. public
A. Joe’s public key D. pizza based
B. Ann’s private key 332. Which of the following was initially de-
C. Ann’s public key signed as a stream cipher?
D. Joe’s private key A. AES
B. Blowfish
327. A man-in-the-middle attack can endanger
the security of the Diffie-Hellman method C. RC4
if the two parties are not D. Twofish
A. authenticated 333. Which of the following types of cryptog-
B. available raphy should be used when minimal over-
head is necessary for a mobile device?
C. joined
A. Block cipher
D. paired
B. ECC
328. Which of the following cryptographic C. Diffie-Hellman
hash functions is the least vulnerable to D. Stream cipher
attacks?
334. The DES algorithm has a key length of
A. SHA-1
A. 128 Bits
B. RIPEMD
B. 32 Bits
C. SHA-512
C. 64 Bits
D. MD5
D. 16 Bits
329. Taking a secret message and reproducing 335. SSL and TLS keys of what length are gen-
the original plain text is known as? erally considered to be strong?
A. Caesar Cipher A. 128
B. Encryption B. 1024
C. Cipher Text C. 2048
D. Decryption D. 4096

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 874

336. In asymmetric key cryptography, the pri- D. Any change in the message will invali-
vate key is kept by date the digital signature.
A. Sender 341. Stream ciphers means
B. Receiver A. Encrypt digits
C. Sender & Receiver
B. Encrypt letters
D. All connected devices to the network
C. Encrypt digits or letters
337. Protecting data by hashing the data with

NARAYAN CHANGDER
D. none of above
a hashing function addresses which part(s)
of the CIA triad? 342. Which three processes are examples of
logical access controls? (Choose three.)
A. Confidentiality only
B. Integrity only A. swipe cards to allow access to a re-
stricted area
C. Availability only
B. biometrics to validate physical charac-
D. Confidentiality and Integrity teristics
338. Suppose (n, d) = (55, 3) is the private C. firewalls to monitor traffic
key of an RSA cryptosystem. If the re-
D. intrusion detection system (IDS) to
ceived ciphertext is C = 49, what is the
watch for suspicious network activity
corresponding plaintext?
E. fences to protect the perimeter of a
A. 4
building
B. 3
343. Which of the following refer to obfusca-
C. 10
tion methods? Choose all that apply.
D. 14
A. Encryption
E. 6
B. Steganography
339. (also known as secret-key encryp- C. XOR cipher
tion, pre-shared key, or private-key en-
cryption) uses only one key to encrypt and D. Password salting
decrypt data. E. ROT13
A. Symmetric-key encryption 344. What was the code name for Bletchley
B. Asymmetric-key encryption Park?
C. Hashing A. Station A
D. none of above B. Bletch
340. Why use digital signature? C. Station Z
A. Private key is unique to the sender so D. Station X
that recipients can be sure of the source
of messages. 345. Which of the following terms applies to
the concept of non-repudiation?
B. Signature can be forged easily
A. Security through obscurity
C. Sender cannot deny that he sent the
message if he had signed with his private B. Digital certificate
key. C. MFA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 875

D. Hashing B. Plain Text


E. Encryption C. Message Digest

PRACTICE BOOK» NOT FOR SALE


346. ensures that information are in a for- D. none of above
mat that is true and correct to its original
351. Which of the following uses both a public
purposes.
and private key?
A. Availabitlity
A. RSA
B. Confidentiality
B. AES
C. Cryptography
C. MD5
D. Integrity
D. SHA
347. A type of encryption scheme where the
same key is used to encrypt and decrypt 352. A is the process or formula used to
data is referred to as: convert a message or otherwise hide its
meaning.
A. Session-key encryption
A. Algorithm
B. Public-key encryption
B. Cipher Text
C. Symmetric-key encryption
C. Plain Text
D. Asymmetric-key encryption
D. Cryptosystem
E. Secret-key encryption
353. Which of the following refers to a cryp-
348. Which is the largest disadvantage of sym-
tographic attack where the attacker has
metric encryption?
access to both the plaintext and its en-
A. It is not used any more. crypted version?
B. It is more complex and more time- A. KEK
consuming.
B. POODLE
C. It is difficult to securely transmit the
secret key. C. KPA

D. It is less secure when compared to D. CSRF


asymmetric encryption.
354. Which of the following refers to a type of
349. Encrypting messages through movement additional input that increases password
of each letter a certain number of places to complexity and provides better protection
the left in the alphabet against brute-force, dictionary, and rain-
bow table attacks?
A. Cipher
A. Seed
B. Key
B. IV
C. Policies
C. Salt
D. Strong Passwords
D. Shim
350. is the message in a form that makes it
unreadable to all but those for whom the 355. Which of the following can be imple-
message was intended. mented with multiple bit strength?
A. Cipher Text A. AES

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 876

B. DES C. Data-in-use
C. SHA D. none of above
D. MD5
361. Name for when both peers agree that the
356. Which type of cipher is able to encrypt a other is who they claim to be.
fixed-length block of plaintext into a 128- A. Multifactor authentication
bit block of ciphertext at any one time?
B. Mutual authentication
A. transform

NARAYAN CHANGDER
C. Twofish authentication
B. hash
C. block D. Access authorization

D. stream 362. Choose 2 types of operations used for


E. symmetric transformingplaintext to ciphertext:

357. Which of these sites is the least likely to A. Substitution


use encryption? B. Transposition
A. A weather forecasting website C. Symmetric
B. An online-shopping site D. Asymmetric
C. A social networking site
363. Which of the following block cipher
D. An online music streaming site modes is the simplest/weakest and there-
358. Which asymmetric algorithm provides an fore not recommended for use?
electronic key exchange method to share A. CBC
the secret key?
B. GCM
A. Diffie-Hellman
C. ECB
B. hashing
D. CTR
C. RSA
D. DES 364. According to predictions, the most future-
E. WEP proof cryptographic solution should be:
A. Quantum cryptography
359. is that compromise the security of in-
formation owned by an organisation. B. Symmetric-key cryptography
A. Security Mechanism C. Post-quantum cryptography
B. Security Services D. Asymmetric-key cryptography
C. Security Attacks E. Public-key cryptography
D. none of above
365. ‘Is the button pressed? ’ is a
360. Which of these three states of digital A. Process
data requires data to be processed in an
unencrypted form? B. Delay
A. Data-in-transit C. Terminator
B. Data-at-rest D. Decision

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 877

366. cipher B. Configure access points so that MAC


A. *study of principles/methods of deci- filtering is not used

PRACTICE BOOK» NOT FOR SALE


phering ciphertext without knowing key C. Implement WEP encryption to access
B. *converting plaintext to ciphertext point
D. Lower the power for office coverage
C. *coded message
D. algorithm for transforming plaintext to 371. How many levels were in the Minecraft
ciphertext Encryption World?
A. 2
367. The process of converting plaintext to ci-
phertext. B. 3
A. cryptography C. 4
B. cyphertext D. 5
C. decryption 372. What encryption algorithm uses the same
D. encryption pre-shared key to encrypt and decrypt
data?
368. What is the algorithm of ceasar’s ci- A. hash
pher?
B. one-time pad
A. Each letter is replaced with a particu-
lar symbol C. symmetric
B. Each letter is replaced with a letter a D. asymmetric
certain number of steps down the alpha-
373. With regard to the PKI, assurance that
bet
you have certainty of what you are con-
C. Each letter is replaced with a particu- necting to, or evidencing your legitimacy
lar number from 0 to 26, and numbers are when connecting to a protected service is
replaced with letters. part of:
D. Each letter is replaced with a com- A. confidentiality
pletely random number
B. integrity
369. Which password attack takes advantage C. authentication
of a predefined list of words? D. audit
A. Birthday attack
374. Evaluate the following modulo math prob-
B. Dictionary attack lem.20 + (35 mod 11)
C. Brute-force attack A. 3
D. Replay attack B. 20
370. The IT department has installed new C. 22
wireless access points but discovers that D. 26
the signal extends far into the parking lot.
Which of the following actions should be 375. Give the three types of cryptographic
taken to correct this? hash functions.
A. Disable SSID broadcasting A. SHA-2 (Secure Hash Algorithm 2)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Cryptography and Encryption 878

B. SHA-4 (Secure Hash Algorithm 4) B. GCM


C. SHA-1 (Secure Hash Algorithm 1) C. ECB
D. SHA-3 (Secure Hash Algorithm 3) D. CTR
376. It is a method used in telecommunication 381. Which of the following properties must a
to encode text characters as standardized cryptographic hash function provide?
sequences of two different signal dura-
A. Key revocation
tions, called dots and dashes or dits and

NARAYAN CHANGDER
dahs. B. Collision resistance
A. Caesar Cipher C. One-to-one mapping of input to output
B. Morse Code D. None of the above
C. Venn Diagram 382. Pseudo-random data added to a pass-
D. none of above word before hashing is called:

377. Which of the following ciphers uses asym- A. Shim


metric encryption? B. Salt
A. AES C. IV
B. Caesar Cipher D. Seed
C. DES
383. In the chain of trust, what is the name of
D. RSA the certificate that belongs to the issuer of
the certificate?
378. Why do computers encrypt messages?
A. The server certificate
A. To prevent them from being read by
the wrong person. B. The root certificate
B. To make it harder for the person who C. The primary certificate
receives the message to read it D. The intermediate certificate
C. It is how computers need to send the
message 384. Confidentiality service is achieved by
and Mechanism.
D. There is no reason
A. Encipherment, Authentication Ex-
379. Which of the following concepts is used change
by digital signatures to ensure integrity of
B. Digital Signature, Routing control
the data?
C. Data Integrity, Traffic Padding
A. Non-repudiation
D. Encipherment, Routing control
B. Hashing
C. Transport encryption 385. Those are Asymmetric-Key Algorithm ex-
cept:
D. Key escrow
A. Diffie Hellman Key Exchange
380. Which of the following block cipher
modes provides both integrity and confi- B. Rivest-Shamir-Adleman (RSA)
dentiality? C. Elliptic Curve Cryptography
A. CBC D. Data Encryption Standard (DES)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 Firewalls and Antivirus Software 879

386. What cipher system did the Germans use C. The receiver’s private key
to transmit Enigma encoded messages? D. Receiver’s public key

PRACTICE BOOK» NOT FOR SALE


A. Caesar Cipher
389. , invented around 400 B.C., is an en-
B. Morse code cryption system in which a piece of paper
C. Keypad Cipher was wrapped around a rod of a specific di-
D. Telephone ameter. The diameter of the rod was the
key.
387. Choose 2 way in which the plaintext is
A. Scytale
processed:
B. Running key
A. Symmetric
C. Vernam
B. Asymmetric
D. Enigma
C. Block
D. Stream 390. DES has an initial and final permutation
block and rounds.
388. In the digital signature technique, the
sender of the message uses to create ci- A. 14
pher text: B. 15
A. Own symmetric key C. 16
B. Own private key D. None of the mentioned

10.4 Firewalls and Antivirus Software


1. What is another name for Internet Filter- C. Trap No packets of data
ing? D. Trap SD cards
A. Net Nanny
4. Similar to a virus except that a worm does
B. Web Widow not need a human to spread, rather it can
C. Secure Stepmom replicate on its own to infect other comput-
D. Secure Sibling ers.
A. virus
2. Determines the direction in which particu-
lar service requests may be initiated and B. worm
allowed to flow through the firewall is C. backdoor
known as service.
D. spyware
A. Malware attacks
5. Choose ALL the answers for “good ways
B. IDS
to avoid malware are”
C. direction control
A. Use a different web browser
D. network mapping
B. Don’t visit questionable sites
3. Which of the following does Firewall Do? C. Check that sites are secure (https)
A. Trap every packet of data. D. Delete tracking cookies and your
B. Trap every other packet of data. search histories

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 Firewalls and Antivirus Software 880

6. Advertising software that can automati- 11. A new dialog box that appears on your
cally download files or link to websites. It screen, sometimes without you requesting
is often unasked-for and can contain mal- it.
ware.
A. virus
A. network topology
B. adware
B. trojan horse
C. popup
C. adware
D. operating system

NARAYAN CHANGDER
D. WAN
12. In cybersecurity terms, a vulnerability is a
7. does not remember information about weakness in a system that allows an at-
previously passed packets through fire- tacker to gain unauthorized access.
wall.
A. WAN
A. stateful firewalls
B. vulnerabilities
B. stateless firewall
C. worm
C. antivirus
D. backdoor
D. IDS
13. An agreed-upon method for communica-
8. What is ‘Phishing’ tion.
A. Using spoof emails to get information A. firewall
B. A strong Password B. router
C. A type of Virus C. server
D. A way to get free SD Cards D. protocol

9. A network device that controls and filters 14. A way for a computer to identify specific
data between networks, either wired or programs and manage their activity.
wireless. It is a specific type of “gate-
A. port
way”, a device that acts as a gate be-
tween two networks. B. router
A. backdoor C. server
B. server D. network topology
C. router 15. Anti virus software generally uses two
D. protocol techniques to help identify malware.
Which one of the following is not one of
10. What does Firewall Do? those methods?
A. Prevents Hackers A. Virus Signature
B. Install Viruses B. Heuristics
C. Give you SD cards C. Hash Functions
D. Blocks all content D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 Firewalls and Antivirus Software 881

16. Hyper-text transfer protocol; the rules of 21. A small local area network of computers
communication that web sites use to ex- and devices.
change data. A. LAN

PRACTICE BOOK» NOT FOR SALE


A. HTTP B. WAN
B. TCP/IP C. network topology
C. protocol D. short message service (SMS)
D. web server 22. What type of network can you set up that
is another company’s internal network?
17. carefully screen all incoming and out-
going messages. A. intranet

A. Router B. extranet
C. internet
B. Network
D. DMZ
C. Proxy Server
D. File Server 23. Firewalls focused primarily on
A. antivirus
18. Software that is spread by people, specif- B. data control
ically user actions, usually through emails,
websites, and chats. A virus infects your C. service control
computer, causing a wide variety of prob- D. system software
lems.
24. Which of the following filters based on ap-
A. backdoor plication, program or service?
B. services A. Context Aware Application Firewall
C. worm B. Application Level Firewall
D. virus C. Host-based Firewall
D. Network Level Firewall
19. A computer shared by multiple users
across a network. It usually contains re- 25. The arrangement of the various elements
sources such as files, computer applica- (computers, routers, switches, etc) of a
tions, or large databases. network.
A. router A. services
B. server B. LAN
C. LAN C. WAN
D. network topology
D. firewall
26. A computer that delivers files forming
20. Enhancements, improvements, and prob- web pages across a network to requesting
lem fixes for software. clients.
A. operating software A. router
B. updated B. server
C. worm C. web server
D. services D. encrypted

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 Firewalls and Antivirus Software 882

27. Software that can stop malware from en- 32. Software that secretly collects information
tering a network, computer, or device. about you. It usually resides on a website
A. network topology or in a service such as your email program.
B. virus A. spyware
C. malware B. trojan horse
D. firewall
C. worm
28. Where is the optimal place to have a proxy

NARAYAN CHANGDER
D. virus
server?
A. In between two private networks 33. What technology can you use temporarily
B. In between a private network and a to connect networks from two different
public network companies?
C. In between two public networks A. VPN
D. On all of the servers B. HTTP
29. Malicious software that bypasses the nor- C. DHCP
mal, secure, or restricted access.
D. passive router
A. worm
B. backdoor 34. Can spyware be seen on your computer?
C. trojan horse
A. Yes
D. spyware
B. No
30. Service can have two meanings in com-
puter terminology:a) A service can be a C. Sometimes
specific application or function such as D. With specialist software
email, chat, etc. b) A service can refer to
a specific part of an application, such as
35. Firewall protect your computer from
transmitting the data of a web page
A. network topology A. Hacker
B. LAN B. Viures
C. services C. Hacker and Viures
D. short message service (SMS)
D. none of above
31. Choose ALL the answers for “what is the
best description of what tracking cookies 36. What Can’t a Firewall Do?
do? ”
A. Can’t protect against viruses.
A. can slow down your computer’s func-
tion B. Stop hackers from accessing your com-
puter.
B. they are a virus and can be destructive
C. keep track of your searches and web- C. Determines which programs can ac-
sites visited cess the Internet.
D. help target ads for your interests D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 Firewalls and Antivirus Software 883

37. A process that converts human-readable pages so that it can provide those more
text or data into a coded from. It is usu- quickly in the future?
ally used to protect data from being easily

PRACTICE BOOK» NOT FOR SALE


A. NAT server
seen or accessed.
A. HTTP B. stateful packet inspector

B. server C. proxy server


C. encrypted D. NIDS
D. port 43. Which of the following is not a method
38. What can spyware monitor? that a firewall uses to filter the data en-
tering and leaving a network?
A. Websites and Keystrokes
A. Packet filtering
B. How many dogs/cats you have
B. Application Layer Filtering
C. Network Devices
D. Your window C. Network Address Translation
D. DMZ
39. Software or a hardware device that filters
information coming in to your computer. E. None of the above
A. Antivirus
44. Should you use internet filtering?
B. Firewall
A. YES
C. Phishing
B. No
D. Spyware
C. Waste of time
40. Software that is installed on a computing
device to prevent viruses from infecting D. Don’t know how to set it up
the device.
45. combine traditional firewall technol-
A. Antivirus ogy with additional functionality, such as
B. Firewall encrypted traffic inspection, intrusion pre-
vention systems, anti-virus, and more.
C. Phishing
D. Spyware A. Next-generation firewalls (NGFW)
B. New general firewall
41. What is a Blacklist?
C. Natural gentle firewall
A. A list of blocked Websites, email ad-
dresses or IP addresses D. None
B. A Chalk board
46. allow or blocks the incoming packets it
C. Another word for internet filtering will not verify the payload.
D. A blackmarket where you can buy and A. Stateful firewall
sell SD cards for really good prices
B. Stateless firewalls
42. What acts as a middleman that translates
C. Packet filtering firewall
between internal and external addresses
and that caches previously accessed web D. IDS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 Firewalls and Antivirus Software 884

47. Which of the following is a key function of C. Amiti


a firewall? D. Panda
A. Monitoring E. Massive Attack
B. Copying
53. Which of the following is NOT true?
C. Moving
A. Firewall can protect computer against
D. Deleting viruses.
48. What can cookie theft be used for? B. Firewall can stop hackers from access-

NARAYAN CHANGDER
A. Gain access to accounts ing your computer.
B. Steal your money C. Firewall determines which programs
C. See what you are typing can access the Internet.
D. Insert Malware onto your computer D. none of above

49. A malicious program disguised as legiti- 54. Which type of firewall blocks packets
mate software. Users intentionally install based on rules that are based on IP ad-
a Trojan horse, thinking they are installing dresses or ports?
valid software. A. packet filtering
A. LAN B. stateful packet inspection
B. backdoor C. NAT filtering
C. worm D. Application-level gateway
D. trojan horse
55. Software that runs on your computer,
50. A file that contains an official record of ac- looking for many different types of mal-
tivities that occur on a computer. ware from many different sources.
A. log files A. router
B. My Documents files B. port
C. Google files C. log files
D. Network files D. antivirus
51. You have a router that is configured as 56. Protect an internal network from external
a firewall. The router is a layer 3 de- attacks
vice only. Which of the following does the A. Antivirus
router use for identifying allowed or de-
nied packets? B. VPN
A. IP ADDRESS C. Firewall
B. VPN D. AVIRA
C. TUNNEL 57. Software that supports a computer’s basic
D. HTTP functioning.
A. operating system
52. The following are anti virus software ex-
cept B. backdoor
A. Comodo C. network topology
B. Bit Defender D. update

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 885

10.5 Ethics in Computing

PRACTICE BOOK» NOT FOR SALE


1. Which of the following is NOT an appropri- A. educate Jeffrey about Internet dan-
ate prevention from cyberbullying? gers
A. conducting research about cyberbully- B. use parental control software
ing
C. post her private information on social
B. blocking access to bullies networking sites
C. calling the police
D. limit Jeffrey’s online access
D. being careful about posting personal
information 6. What is meant by the term ‘stakeholder’?
2. This legislation is intended to prevent (1-4)
unauthorised access and modification of A. A stakeholder is the person who owns
electronic data. a product or organisation
A. Data Protection Act B. A stakeholder is anyone who has an in-
B. Computer Misuse Act terest in or concern about a product or or-
C. Copyright and Patents Act ganisation
D. Regulation of Investigatory Powers C. A stakeholder is the person who buys
Act products from an organisation

3. Here are five ways to reduce the environ- D. A stakeholder is the person who cre-
mental impact of your use of technology 1. ates the legislation that governs the buy-
Cut down on Content delivered to your ing and selling of products
device over the internet consumes a lot of
electricity. 7. A software is any error that, if not re-
moved, could cause a software system to
A. upload
fail to meet its users’ needs.
B. streaming
A. version
C. recycle
B. defect
D. time
C. quality
4. NORMATIVE, FACTUAL and CONCEPTUAL
are the 3 types of D. liability
A. Moral issues
8. Why should you ask yourself how your be-
B. Legal issues havior would look in the real world?
C. Enquiries
A. We live in the real world.
D. Inquiries
B. I may be asked to be on The Real World
5. Allison has noticed her 16-year-old son, TV show.
Jeffrey, has been spending a lot of time on
C. It will help me recognize unethical or
the Internet recently. Which of the follow-
criminal behavior.
ing should Allison NOT do in order to pro-
tect Jeffrey from potential Internet dan- D. While I wouldn’t do it face-to-face, I
gers? have the freedom to do it online.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 886

9. A thing is safe if its risks are judged to be 13. is a software a user can download
with in from the internet free of charge. No fees
is associated.
A. appreciable levels
A. Free Software
B. acceptable levels
B. freeware
C. measurable levels
C. shareware
D. realisable levels
D. none of above

NARAYAN CHANGDER
10. Which is the correct definition of the 14. STATE THE AREA OF COMPUTER
term:Ergonomics ETHICS:DUMPING OLD COMPUTER IN AT
A. Environmentally sound policies that DESIGNATED RECYCLING PREMISES.
prescribe energy efficiency, recycling, A. CODE OF CONDUCT
and eco-friendly disposal of electronic
equipment. B. INTELECTUAL PROPERTY RIGHTS
C. GREEN COMPUTING
B. Employees using their company’s inter-
net connection for personal use on com- D. INFORMATION PRIVACY
pany time.
15. Below are some of the ethics in computing.
C. The study of how people function most EXCEPT
effectively in their work environment.
A. Employee monitoring
D. Publishing the private contract infor-
B. Hackers defaced website
mation of one’s political opponents online.
C. DoubleClick sued for planning reveal
11. This is copyrighted software available for web users identities
purchase. D. Watching movie in certified cinema
A. Site License
16. The term used to descibe when a person
B. Commercial Software does not have legal rights to copy some-
one else’s work is called?
C. Share Ware
A. Privacy Invasion
D. Adware
B. Copyright
12. Entering a computer system or obtaining C. Intellectual Property
data from it to be able to commit another
crime. D. Trolling

A. Unauthorised access to computer ma- 17. Which of the following security threats
terial secretly accesses a user’s computer, acts
without a user’s knowledge and changes
B. Unauthorised access with the intent to
the operations for malicious intents
commit a further crime
A. Cyber attack
C. Unauthorised modification of data
B. Malware
D. Making, supplying or obtaining any-
thing which can be used for computer mis- C. Online scams and frauds
use D. Botnets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 887

18. Typing in all capitals in electronic communi- as the Internet, that is used to attack other
cation means: networks, usually for nefarious purposes

PRACTICE BOOK» NOT FOR SALE


A. You are shouting. A. Backdoor
B. This message is very important. B. Botnet
C. It is okay to forward this message to C. Firewall
others.
D. Spoofing
D. none of above
23. The term PII refers to
19. Which of these is not an issue relating to
technology and the environment A. Personal Identifiable Information
A. mobile devices which contain batteries B. Privacy Intelligece Information
full of harmful chemicals. C. Personal Identity Intelligence
B. after a few years, devices become ob- D. none of above
solete and are taken to landfill
C. the manufacture of components pro- 24. A STUDENT FIND INFORMATION FOR
duces waste products which can ad- HIS COMPUTER SCIENCE ASSIGNMENT
versely affect the environment. SOLELY ON WIKIPEDIA.
D. electricity production is not harmful A. INTELLECTUAL PROPERTY RIGHTS
and most electricity is created from the B. CODE OF CONDUCT
burning of fossil fuels which is good for
the environment. C. INFORMATION ACCURACY
D. none of above
20. Which of the following is the correct reac-
tion when someone you do not know asks 25. Which of these statements is true about
you to add him or her as a friend on social the Freedom of Information Act?
media?
A. An individual has the right to have any
A. Politely reject the request of their personal data corrected that is in-
B. Accept this person as a friend accurate or out of date
C. Ask how this person knows you B. An individual has the right to compen-
D. Ask your friends whether any of them sation if their personal data is stolen
know this person C. An individual has right of access to in-
formation held by public authorities
21. your old devices so they do not end up
in landfill. D. An individual has the right to share any
intellectual property they have
A. time
B. streaming 26. A is a habit of unacceptable behavior.
C. recycle A. moral
D. upload B. virtue
C. ethic
22. Group of compromised computers or mo-
bile devices connected to a network, such D. vice

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 888

27. Which of the following actions is NOT 32. Parcel scam, love scam, black money scam
a parent’s responsibility to prevent their are examples of
children from being victims of online preda-
A. botnet
tors?
B. online scams and frauds
A. educate children about online preda-
tors C. Hacking and cracking
B. ask for police protection D. Cyberextortion

NARAYAN CHANGDER
C. limit children’s online activity
33. Which of the following is the correct reac-
D. be a good role model tion when someone you do not know asks
you to add him or her as a friend on Face-
28. What is the main purpose of a copyright?
book?
A. To protect the user of a copyright?
A. politely reject the request
B. To protect the buyer of a creative
work. B. accept this person as a friend
C. To protect the creator of a creative C. Ask how this person knows you
work. D. Ask your friends whether any of them
D. To protect the copier of a creative know this person
work.
34. “Law enforcement agencies take advan-
29. System that captures a live face image and tage of the vast amount of data available
compares it with a stored image to deter- from traffic cameras, surveillance footage,
mine if the person is a legitimate user and social media postings. By analyzing
A. Face recognition system this data, they can engage in “predictive
policing” to prevent crimes before they are
B. Hand geometry system
actually committed. Critics argue, how-
C. Signature verification system ever, that using technology in this way
D. Voice verification system leads to more racial profiling and invasive
government surveillance.” Which area of
30. Two of the most pressing concerns in com- concern is this?
puter ethics today are questions of
A. Health and Productivity
A. Intellectual Property & Privacy
B. Social Justice
B. Demographics & Copyright
C. Green Computing
C. Privacy & Ethics
D. Net Neutrality
D. Copy Right & Privacy

31. According to this segment, approximately 35. When a paper is already submitted to
how many sex offenders are there in the a publication, no submission to another
United States? should be done.

A. 271, 000 A. Objectivity


B. 389, 000 B. Legality
C. 532, 000 C. Care
D. 645, 000 D. Responsible Publication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 889

36. Which legislation governs the act of hack- C. Plagiarism


ing? D. none of above

PRACTICE BOOK» NOT FOR SALE


A. The Freedom of Information Act
42. Ali uses his friend’s computer without his
B. The Data Protection Act permission.Which of the following area of
C. The Creative Commons License computer ethics involved in the situation
D. The Computer Misuse Act above?
A. Codes of conduct
37. What is the function of Ethics in engineer-
B. Information privacy
ing?
C. Information theft
A. Maintain personal integrity
D. Hardware theft.
B. Maintain public respect and trust
C. Avoid legal problems (criminal and civil 43. Which is a statement you should include in
rights) your personal code of ethics?
D. All three options A. I will only tell my close friends when I
find out something private about a class-
38. What does it mean to have confidential- mate.
ity? B. I will honor the privacy of others by
A. to publish someones private informa- keeping their data and information se-
tion cure.
B. to follow the code of ethics C. It is ok if I tell others exactly what I
C. to protect data that can’t be shared. think about them when I am online be-
cause we will probably never meet each
D. to respect others privacy. other.
39. Computer intelligence in one specific area D. I can use all music I download from the
is called: internet.
A. Narrow AI 44. Which of the following terms describes a
B. General/Human Level AI “granted legal right which gives the cre-
C. Super AI ator of an original work exclusive rights
to reproduce, publish, sell or distribute his
D. none of above or her production”?
40. Protects and removes any known viruses A. Intellectual Property
from your computer. B. Trademark
A. Hardware-virus C. Copyright
B. Virus-software D. Patent
C. Anti-virus
45. Belief that the privacy of others must al-
D. Anti-worm virus ways be maintained.
41. Use of other people’s words, thoughts or A. confidentiality
ideas without crediting the source B. empathy
A. Sexting C. ethics
B. Fair Use D. work ethics

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 890

46. Sometimes, the managements have not 50. Which of the following is not a contribu-
been willing to disseminate the full infor- tory factor in the digital divide
mation about the project or product be- A. Income
yond the legal requirements, because of
the fear of B. Location

A. market demand C. Weight

B. Government policies D. Age

NARAYAN CHANGDER
C. potential competitors 51. is the failure to do what a reasonable
person would do, or doing something that
D. societal views
a reasonable person would not do.
47. Copyrighted computer software which is A. Whistle Blowing
made available for use free of charge. B. Negligence
A. Fair Use C. Green Computing
B. Shareware D. Fraud
C. Freeware
52. Whether something is right or wrong in so-
D. none of above ciety or the workplace

48. How does green computing impacted the A. Ethical Issue


world? B. Cultural Issue
A. Greenhouse effect increases. C. Environmental Issue
B. The earth is preserved. D. none of above
C. The emission of carbon dioxide is min- 53. What does copyright mean?
imised.
A. You can buy any video, as long as it has
D. Wastage of energy increases. an official logo on it

49. What is a ‘Patent’? B. You are not allowed to watch a film


with anyone else present in the room
A. The use or performance of original
works in litera ture, art, music, drama or C. The person or organisation who cre-
any other form of expression ates an original work has the right to pro-
tect it and exclusively make a profit by us-
B. The use, manufacture or the sale of in- ing it
ventions, product ideas or technological
development D. none of above

C. The use of symbols, phrase, image, 54. Process of converting data that is readable
logo, identity, designs or combination of by humans into encoded characters to pre-
any used by firms to identify particular vent unauthorized access
products, brands or services. A. Encryption
D. unique and original works such as B. Technology ethics
ideas, inventions, art, writings, pro-
cesses, company and product names and C. Plaintext
logos D. Cypher

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 891

55. The ACM/IEEE Software Engineering Code your actions as you work with computers
of Ethics aims to: and interact with others

PRACTICE BOOK» NOT FOR SALE


A. Restrict the use of shareware D. Observing and recording activities of
employees, sometimes without their di-
B. Encourage the free use of software
rect consent
C. provide professional standards for
software developers 60. The people at level want to live by gen-
eral principles that are universally applied
D. none of above
to all people. They always desire to main-
56. The use of computers, cell phones or other tain their moral integrity.
electronic devices to deliberately and re- A. pre-conventional level
peatedly harm another person through the B. conventional level
Internet
C. post-conventional level
A. Fair Use
D. corrective Level
B. Cyberbullying
61. To avoid online predators, which of the fol-
C. Piracy
lowing should you NEVER do under any cir-
D. none of above cumstance?
57. The practice of taking someone else work A. add friends to your Facebook account
or ideas & passing them off as one’s own. B. meet with a stranger from the Internet
A. Fair Use C. post your political opinions online
B. Piracy D. post your friends’ information online
C. Plagiarism 62. Associated issues of ‘Computer crime’ is
D. none of above since phase what until what phase?
A. Since phase 1
58. The researchers should accept all com-
ments and give considerations B. from phase 2 until phase 3 only
A. Openness C. from phase 2 until phase 4

B. Respect for Intellectual property D. none of above

C. Non discrimination 63. A assures buyers or lessees that a


product meets certain standards of qual-
D. Responsible mentoring
ity.
59. what is doxing? A. warranty
A. the fundamental truths or rules that B. quality
support your personal values. Principles C. defect
should be focused on honesty, integrity,
and respect for others. D. brand label
B. Publishing the private contact informa- 64. Based on the Ten Commandments of Com-
tion of one’s political opponents online. puter Ethic, the law actually codify these
C. the basis for your code of ethics. They ethics in the manner of EXCEPT
identify the beliefs and ideals that guide A. Reputation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 892

B. Privacy C. writing him or her a letter


C. Copyright D. using a padrino system
D. Personal rights 69. You cannot access a file in a computer that
65. Security measures that defines who can belongs to your friend. What prevents you
access a computer, device or networks, from accessing the file?
when they can access it, and what action A. Spyware
they can take while accessing it
B. Firewall

NARAYAN CHANGDER
A. Access control
C. Antivirus
B. Passphrase
D. Uninterruptable Power Supply (UPS)
C. Password
70. What year was the copyright and patents
D. Username
act released?
66. Network controller which connects net- A. 1998
work devices and allows effective commu-
nication between these devices B. 1990

A. Router C. 1988

B. Network Switch D. 2000


C. Firewall 71. Choose the correct definition for trade-
D. none of above mark
A. Exclusive rights given to authors,
67. Choose the correct definition of Patent:
artists and other creators of original work
A. A patent is an exclusive right granted to duplicate, publish and sell their materi-
for an invention, which is a product or a als
process that provides, in general, a new
B. Exclusive right granted for an inven-
way of doing something, or offers a new
tion, which is a product or process that
technical solution to a problem.
provides a new way of doing something,
B. Permit the owner to “include” others or offers a new technical solution to a
from making, using, selling, offering for problem
sale, and importing a product or service
C. Word, phrase, symbol, or design that
embodying the invention.
distinguishes the goods or services of one
C. Permit the owner to “exclude” others trader from its competitors. It includes
from making, using, selling, offering for words, logos, pictures, names, letters,
sale, and importing a product or service numbers or a combination of these
embodying the invention.
D. none of above
D. none of above
72. Ethics means knowing the difference be-
68. Informed consent for a participant is best tween
exmplefied in which of the following ac-
tions? A. high and low

A. talking to him or her privately B. disagree and agree

B. surprising him or her with a question- C. right and wrong


naire D. Do or Dont

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 893

73. Choose the best e-commerce category 78. There are 3 steps in strategy for Approach-
which belongs to non-commercial transac- ing Cyberethics Issues. which one is true?
tions

PRACTICE BOOK» NOT FOR SALE


A. Step 1:Identify, Step 2:Analyze, Step
A. B2C 3:Deliberate
B. C2B B. Step 1:Research, Step 2:Analyze, Step
C. G2B 3:Elobrate

D. B2E C. Step 1:Identify, Step 2:Marking, Step


3:Apply
74. Which of the following is NOT a discussion D. Step 1:Assess, Step 2:Clarifying, Step
prevention method from identity theft? 3:Deliberate
A. avoid e-mail scams
79. Private combination of characters associ-
B. protect personal information ated with the user name that allows ac-
C. install anti-virus software cess to certain computer resources
D. set up strong passwords A. Passphrase

75. This legislation is intended to control how B. Password


personal data is used by organisations and C. Possesses objects
give data subjects rights to their data. D. Username
A. Data Protection Act
80. Someone who uses technology to harm or
B. Computer Misuse Act harass other people.
C. Copyright and Patents Act A. Cyber Predator
D. Regulation of Investigatory Powers B. Open Source
Act
C. Cyber Bullying
76. Protected property:original literary, dra- D. none of above
matic, musical and artistic works, pub-
lished editions of works, sound recordings 81. Josh has been sending malicious text mes-
(including CDs), films (including videos and sages to one of his classmates & writing
DVDs) and broadcasts negative comments on Facebook about this
A. Computer Misuse Act person. Which of the following describes
Josh’s behavior?
B. Information Commissioners Office
A. sexting
C. Copyright, Designs and Patents Act
B. cyberbullying
D. Equality Act
C. piracy
E. Freedom of Information Act
D. plagiarism
77. Which of the following is NOT a discussed
safe computing practice? 82. A program or set of instructions in a pro-
gram that allows users to bypass security
A. installing anti-virus software controls when accessing a program, com-
B. conducting defragmentation puter, or a network.
C. updating anti-virus software A. Botnet
D. scanning your computer for viruses B. Back door

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 894

C. Spoofing D. none of above


D. DDoS 88. Grants exclusive monopoly for 20 years
83. Legal agreement that permits users to in- A. Ethical dilemma
stall the software on multiple computers B. Patent
usually at a volume discount
C. Intellectual Property
A. Site license
D. Copyright
B. Digital certificate

NARAYAN CHANGDER
C. Digital signature 89. An important network security tips is to
always set up a on your WiFi.
D. Encryption
A. switch
84. AN exclusive right granted for an inven- B. password
tion, which is a product or a process that
provides a new way of doing something. C. hacker

A. Copyright D. security

B. Trademark 90. Which of the following is not a computer


C. Copyleft health related challenges?
D. Patent A. Headache
B. Vision Problem
85. State of not being identified (this is nearly
impossible online) C. Musculoskeletal Problems
A. Anomity D. Groin Injury
B. Software Piracy 91. The encryption keys are often generated
C. Plagiarism in asymmetric encryption by using a
D. Fair Use A. cypher text
B. hashing algorithm
86. The exclusive right to publish, distribute,
and use an author’s work. C. encryption algorithm
A. Shareware D. denial of service
B. Hacking 92. Whatever agreed upon with the partici-
C. Copy Right pants must be actualized
D. none of above A. Integrity
B. Legality
87. Choose 1 examples of IT codes of conduct
C. Social Responsibility
A. Avoid sending or posting flames, which
are abusive or insulting messages. Do not D. Responsible Publication
participate in flame wars, which are ex- 93. Code of conduct is require to inculcate
change of flames
A. discipline
B. Use emoticons and emojis to express
emotion B. sense of responsibility
C. Employees may not meddle in other’s C. accountability
files D. All of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 895

94. is an effort to attract public attention 99. The principle of means respecting and
to a negligent, illegal, unethical, abusive, honoring the inherent worth and right to
or dangerous act by a company or some privacy of other people.

PRACTICE BOOK» NOT FOR SALE


other organization. A. human dignity
A. Fraud B. civility
B. Whistle-blowing C. confidentiality
C. Misrepresentation D. digital property rights
D. Green Computing 100. What is the biggest concern with Green
Computing?
95. If you buy a music CD or download a piece
of music, software or a video, it is illegal A. An area of computer science that fo-
to:(pick 3) cuses on intelligent machines

A. Make a copy and sell it B. Malicious attacks on networks and


websites for the purpose of promoting so-
B. pass a copy to a friend cial change, regarded by some as civil dis-
C. make a backup copy obedience and others as cyberterrorism.

D. use the software on a network, unless C. How to be eco-friendly when us-


the licence allows it ing/disposing electronic devices.
D. Businesses and organizations that
96. The ability to make informed guesses from store personal information battle with the
a set of facts about the subject is known hackers that try to steal them
as a
101. Computer device which forwards data
A. Theory base packets from one network to another
B. Knowledge base A. Firewall
C. Bada base B. Network Switch
D. none of above C. Router
D. none of above
97. is personal behavior that build respon-
sibility and trust. 102. Which one is definition of Cyber?
A. Doxing A. whole global space of virtual reality
(physical world))
B. Ethics
B. virtual that created by computer tech-
C. Green Computing
nologies in the large sense
D. Ergonomics C. modern society in the cyber world
98. Global warming is due to D. is study of the moral, legal, and social
issues involving cybertechnology
A. Greenhouse gases
103. What was the name of the Computer pro-
B. Nitric and sulfuric acids
gram that beat the Chess World Champion-
C. CFCs Gary Kasparov in 19997
D. Ozone depletion A. Deep Blue

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 896

B. Deep Sea 109. Someone who uses the Internet or net-


C. Deep Thought work to destroy or damage computer for
political reasons
D. Deep Sight
A. cyberterrorist
104. What year was the regulation of investi-
B. cyberwarfare
gatory powers act released?
A. 1998 C. cybercrime

B. 1990 D. cyberextortionist

NARAYAN CHANGDER
C. 1988 110. Which of the following are ways of steal-
D. 2000 ing information? I. phishingII. plagiaris-
mIII. plottingIV. pharming
105. Online or internet based illegal acts such
A. II and III
as distributing malicious software or com-
mitting identity theft B. I and IV
A. Cybercrime C. I and II
B. Hacker D. All of the above.
C. Online perpetrator
111. No copying, reselling, lending, etc. is le-
D. Script kiddie gal without the owner’s permission refers
106. refers to any work that is a result of to
a person’s creativity and is unique to that A. public domain
person B. shareware
A. copyright
C. copyright laws
B. Trademark
D. none of above
C. Intellectual Property
D. none of above 112. Changing or deleting data.
A. Unauthorised access to computer ma-
107. refers to a company selling or buying
terial
products or services to/from other compa-
nies. B. Unauthorised access with the intent to
commit a further crime
A. B2B
C. Unauthorised modification of data
B. B2C
C. C2C D. Making, supplying or obtaining any-
thing which can be used for computer mis-
D. Digital Middleperson use
108. The author (owner) will let you download
113. Which of the following is NOT one of the
it, and if you like it and want to use it, you
possible results of inappropriate Internet
are expected to pay a fair price for it
use?
A. Software Licence
A. Your computer can be attached by
B. Free ware viruses
C. Shareware B. your personal information can be used
D. open source software by hackers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 897

C. your identity can be stolen 119. The encryption process, the unencrypted,
D. your computer can have hardware readable data is called

PRACTICE BOOK» NOT FOR SALE


problems A. Plaintext

114. What is AI? B. Cypher


A. Short for Alan C. Encryption
B. Artificial Intelligence D. Off-site
C. is the simulation of human intelligence 120. What are the main sources of water pol-
processes by machines, especially com- lution?
puter systems.
A. Plastic, Paper, and Metal
D. none of above
B. Snails in water
115. The word AI coined in the year C. Help, there is a boot with a snake in-
A. 1969 side of it that somehow in the nearby lake.
B. 1956 D. Agriculture, Industry, and Community
C. 1959 121. Issue is tracing who was actually respon-
D. 1996 sible for the offence. Many people put
the blame on others saying that it wasn’t
116. What does AIs’ lack? them logged on and that someone must
A. Creativity have gotten hold of their password and
user name.
B. Common sense
C. Human touch A. Computer Misuse Act

D. All of the above B. Information Commissioners Office


C. Copyright, Designs and Patents Act
117. What is ‘Client-Server Overuse’?
D. Equality Act
A. Duplicating and selling copyrighted
programs. E. Freedom of Information Act

B. Borrowing and installing a copy of 122. An often used prewritten hacking and
unauthorized software from a colleague. cracking programs
C. Installing and selling unauthorized A. hacker
copies of software on new computers.
B. cracker
D. Installing more copies of a software
C. script kiddie
than you have licenses for.
D. cybrextortionist
118. In testing, special software programs
called static analyzers are run against the 123. An has a goal of destroying data or
new code stealing information.
A. Static A. hacker
B. Dynamic B. cracker
C. Black Box C. script kiddie
D. White box D. cyber extortionist

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 898

124. Objective of Code of conducts could be 129. Originally refers to someone who is an
expert at computer programming and who
A. Aspirational is able to solve computer problems, but
also means someone who illegally gains
B. Advisory access to others’ computer for their own
C. Disciplinary profits
D. All of these A. Hacker
125. CFC’s once used in many household prod- B. Firewall

NARAYAN CHANGDER
ucts contributed to the creation of a(n) C. Cyberbullying
A. Acid rain D. none of above
B. temperature inversion
130. What is the name of the game that
C. smog cloud Alan Turing invented to test machine intel-
D. hole in the ozone layer ligence by seeing if a human can be con-
vinced he is talking to a human and not a
126. Security tools that can be used include computer?
A. Spyware remover A. Limitation Game
B. Firewall B. Imitation Game
C. Honeypot C. Mutation Game
D. All of the above D. Manipulation Game
127. It occurs when an intruder computer fools
131. In DOS the attacker may be able to pre-
a network into believing its IP address is
vent a user from
associated with a trusted source.
A. accessing their emails
A. IP Spoofing
B. accessing websites
B. Email Spoofing
C. accessing social networking forums
C. IP Stealing
D. encrypting data encrypting data
D. Phishing
132. The use of a computer or network with-
128. Ethics and morals relate to “right” and
out permission
“wrong” conduct. While they are some-
times used interchangeably, they are dif- A. Access controls
ferent. Which of these TWO are correct? B. Software piracy
A. Morals refer to an individual’s own C. Unauthorized access
principles regarding right and wrong
D. Unauthorized use
B. Ethics refer to rules provided by an ex-
ternal source, e.g., codes of conduct in 133. Choose the correct definition of Copy-
workplaces or principles in religions right:
C. Morals refer to rules provided by an A. To copy the information the right way.
external source, e.g., codes of conduct in B. Copyright is a protection given to au-
workplaces or principles in religions thors, copyright owner and performer of
D. Ethics refer to an individual’s own prin- their copyright work and performances as
ciples regarding right and wrong prescribe under the Copyright Act 1987.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 899

C. Permit the owner to “include” others 138. Engineers have to show the to obtain
from making, using, selling, offering for and properly gauge all the information re-
sale, and importing a product or service lated to meeting one‘s moral obligations.

PRACTICE BOOK» NOT FOR SALE


embodying the invention.
A. condition
D. none of above
B. consent
134. Cybersecurity is the use of various C. commitment
to protect computers, computing systems,
D. cooperation
networks, programs and data from at-
tacks, damages, thefts, disruptions, mis-
139. A hacker is mostly concerned with
uses and unauthorized access.
A. Being somewhat friendly
A. Tools and equipment
B. Badly damaging an operating system
B. Technologies and processes
C. Stealing information electronically
C. Hardware and software
D. Shutting down your company
D. Programmes and networks
140. The legal protection afforded an expres-
135. A group or society that become a part
sion of an idea, song, video and or game
of communities such as electronic gov-
ernment, website health care, electronic A. Ethical dilemma
learning and participate in online business. B. Patent
Statement above TRUE for
C. Intellectual Property
A. e-user
D. Copyright
B. e-society
C. e-community 141. They investigate and prosecute individu-
als and organisations that breach a whole
D. e-participation
range of legislation
136. Which is content that is owned by a copy- A. Computer Misuse Act
right holder.
B. Information Commissioners Office
A. A. Intellectual Property
C. Copyright, Designs and Patents Act
B. B Legal Compliance
D. Equality Act
C. C. Predictive Policing
E. Freedom of Information Act
D. Ethics
142. Involve right and wrong; relates to is-
137. Morals and standards governing ethical sues of right and wrong and how individ-
behavior on electronic devices ual people should behave
A. Digital Ethics A. Behavior
B. Computer Ethics B. Morals
C. Moral Ethics C. Ethics
D. Literacy Ethics D. Etiquette

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 900

143. Creation, distribution or forwarding of a B. Values


message which includes sexually explicit C. Principles
material through a computer, cell phone or
other electronic device D. Legal Compliance
A. Plagiarism 149. Lloyds TSB potentially faced a legalchal-
B. Sexting lenge over the use of sensitivepersonal in-
formation to processingcall centres in In-
C. Online Predator dia.

NARAYAN CHANGDER
D. none of above
A. Data Protection Act
144. The act of Computer Ethics boils down to B. Computer Misuse Act
for others.
C. Copyright and Patents Act
A. Respect
D. Regulation of Investigatory Powers
B. Service Act
C. Contempt
150. A friend offers to share a video stream-
D. Sympathy ing service with you if you’ll split the
cost of the annual subscription. You know
145. System that compares live speech with
the service contract forbids people in dif-
their stored voice pattern
ferent households from sharing one ac-
A. Digital forensic count.What question should you ask your-
B. Hand geometry self before responding ethically to your
friend’s offer?
C. Signature verification system
A. How much will it cost me?
D. Voice verification system
B. Is my friend making money on this
146. When did the Computer Ethics Institute scheme by making the same offer to oth-
publish a code of ethics for computer ers?
users?
C. Could I explain my actions to a court?
A. 1995
D. What happens if my friend gets mad at
B. 1999 me and changes the login?
C. 1988
151. The standards of right and wrong that ap-
D. 1998 ply to your professional behavior.
147. Ideas of behavior that are commonly ac- A. resume
ceptable to society is B. dress codes
A. ethics C. professional ethics
B. cyber society D. networking
C. computer ethics
152. In the , right conduct for an individual
D. ethical principles is regarded as whatever directly benefits
148. Which term is not used when creating oneself.
your personal code of ethics? A. pre-conventional level
A. Net Neutrality B. conventional level

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 901

C. post-conventional level C. Ethics


D. Final Level D. Etiquette

PRACTICE BOOK» NOT FOR SALE


153. These are some of the components of an 158. Which pair below are the two main
ideal computer laboratory except sources of air pollution in urban (popu-
A. white marker board lated) areas?
B. printers A. vehicles, volcanoes
C. chairs and computer systems B. vehicles, industries
D. washing machines C. Industries, agriculture
D. All of the above
154. These are ideas put into action, such as
writing, music, art, computer code, and in- 159. Which of the following is a consequence
ventions that can be protected under copy- of plagiarism?
right or patent laws.
A. Damaged reputation among friends,
A. Intellectual Property professionals, and academics
B. Copy Protect B. You can be required to pay penalties
C. Share Ware C. You can get in trouble with the law
D. Public Domain Software
D. All of the above
155. attaches itself to files and programs
160. A is termed as the exclusionary rights
but is not capable of sending itself.
given by the government or the authorized
A. Worms authority to its inventor for a particular du-
B. Virus ration of time, in respect of his invention.
C. Spyware A. copyright
D. Trojan B. patent

156. Engineers normally learn from their own C. patient


prior designs and infer from the analysis D. trademark
of operation and results, and sometimes
from the reports of other engineers. this 161. A network of encrypted content that al-
relates to lows users to engage in untraceable activ-
ity
A. Learning from experts
A. Cyberloafing
B. self learning
B. Net neutrality
C. predictive analysis
C. Dark Web
D. Learning from the past
D. Hacktivism
157. The way in which somebody behaves
(acts in a particular way); the way a per- 162. what is confidentiality?
son or group responds to a certain set of A. respecting the privacy and dignity of
conditions other human beings
A. Behavior B. refusing to violate the intellectual
B. Morals property rights of others

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 902

C. observing rules of “netiquette” that C. Artwork


promote online courtesy and respect. D. All of the above
D. protecting confidential data and infor-
mation 168. The rights of an author or artist with re-
spect to his or her creation are governed
163. Set of steps that can convert readable by the law of:
plaintext into unreadable ciphertext
A. Patent
A. Cypher
B. copyrights

NARAYAN CHANGDER
B. Off-site
C. trademark
C. Offline
D. industrial design
D. Online
169. Sabrina sent a video to her friend; Har-
164. A code of conduct for computers is: vey. However, he uses the video to
A. a law restricting the circumstances in spread false rumours about Sabrina by
which a computer may be used posted it online.Based on the above situa-
tion, what is the code of conduct that Har-
B. a set of rules defining what can and
vey has violated?
cannot be done with computers*
C. a set of rules defining how software A. User may not interfere with others’
may be distributed computers

D. none of above B. User may not used computers to harm


other people.
165. Which of the following is not an example C. User may not use the computers to
of malicious software? bear false witness.
A. Worms D. User may not use others’ resources
B. Trojans without authorization.
C. Viruses
170. Which of the following are valid princi-
D. Infections ples of the data protection act?
166. This is copyrighted software that is given A. Not be kept for longer than is neces-
away free of charge but is still the prop- sary.
erty of the owner and the user doesn’t B. Be adequate, relevant and not exces-
have the right to distribute copies, just the sive.
owner.
C. Be used for the purpose it was col-
A. Free Ware lected for.
B. Adware D. Be kept secure.
C. Share Ware E. Be shared with other countries for
D. Public Domain Software backing up.

167. Which of the following is an example of 171. respecting the privacy and dignity of
intellectual property? other human beings is
A. Inventions A. civility
B. Ideas B. Confidentiality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 903

C. Human dignity B. I, II and III


D. Digital property rights C. II, III and IV

PRACTICE BOOK» NOT FOR SALE


172. When using computers you should: D. I, III and IV

A. Avoid harming others. 177. David’s friend told him she was cyberbul-
B. Protect yourself. lied. What should David NOT do?

C. Harm others A. tell a trusted adult

D. Avoid breaking the law. B. post mean comments to attack the


bully
E. break the law.
C. offer help to his friend
173. is the study of moral issues con- D. encourage his friend to defend herself
cerning the environment, and moral per-
spectives, beliefs, or attitudes concerning 178. What happens when your digital informa-
those issues. tion gets into the wrong hands?
A. Environmental ethics A. You can get special offers and freebies
B. Essential ethics B. You can be a victim of hacks, viruses
and phishing scams
C. Engineering ethics
C. You can use your digital footprint to
D. Economic ethics
get a good job
174. requires the presence of patients and D. none of above
healthcare providers at thesame time and
often involves a video conference link be- 179. You signed up for an hour on the com-
tween the two sites puter at the library. While you are playing
an online game, a classmate asks if you
A. Live telemedicine
would mind logging off and allowing him
B. Store and Forward telemedicine to do some research for a class assignment.
C. EHR You:
D. Telework A. Agree to give up your remaining com-
puter time
175. STATE THE AREA OF COMPUTER B. Make a vulgar gesture and turn back
ETHICS:SOMEONE COPIES A WELL to your game
KNOWN NOVEL TO THE WEB AND EN-
COURAGES OTHERS TO READ IT. C. Tell him to wait his turn like everybody
else
A. GREEN COMPUTING
D. Tell him that you are in the middle of
B. INTELECTUAL PROPERTY RIGHTS doing research on games
C. CODE OF CONDUCT
180. This is someone who uses a computer to
D. none of above gain illegal access to other computer sys-
176. Which of the following are the types of tems, and files, usually through the use of
intellectual property? I. PatentII. Trade- telecommunications
markIII. CopyrightIV. Pattern A. Site license
A. I only B. Trojan Horse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 904

C. Spyware B. Businesses and organizations that


D. Computer Hacker store personal information.
C. Law enforcement practice that in-
181. Your social network contact list should volves analysing data from traffic cam-
NOT HAVE which of the following? eras, surveillance footage, and social me-
A. a family member dia posting for the purpose of preventing
crimes before they are actually commit-
B. a stranger
ted.

NARAYAN CHANGDER
C. a classmate D. Having knowledge about computers.
D. a friend from summer camp
186. According to Sharron Davis, how long af-
182. Which of the following can provide pro- ter losing a child can the parents start to
tections to Nike®’s slogan “Just Do It”? find a new normal?
A. Copyright A. five years
B. Trademark B. seven years
C. Patent C. eight years
D. ten years
D. Industry design right
187. Any software that covertly gathers user
183. Without it would be easy to design
information through the user’s internet
a bot that could register a billion different
connection without his or her knowl-
online email addresses that could be used
edge:usually for advertising purposes.
to send spam, for instance.
A. Trojan Horse
A. CATCHA
B. Free Ware
B. CAPTCHA
C. Computer Cookie
C. CAPCHA
D. Spyware
D. CATCH
188. Service Learning refers to
184. Used fairly, lawfully and transparently A. learning the service policies, proce-
(openly). dures, norms, and conditions, other than
A. Data Protection Act the trade practices
B. Regulation of Investigatory Powers B. knowledge on online trading
Act C. knowledge on insurance policies
C. Freedom of Information Act D. knowledge about social services
D. Protection of Freedoms Act 189. As a child, you may have been taught a
E. Privacy and Electronic Communica- principle along the lines of “don’t lie, cheat
tions Regulations or steal or have anything to do with those
who do”.This is the example of
185. What is Values?
A. Integrity
A. Provides the basis for your code of B. Generosity
ethics. They identify the beliefs and ideals
that guide your actions as you work with C. Honesty
computers and interact with others. D. Loyalty

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 905

190. An engineer wants to know things C. Potential for loss of jobs in the local
work. high street due to less footfall

PRACTICE BOOK» NOT FOR SALE


A. how and why D. Local stores close due to higher rents
B. what and why in towns
C. when and why
195. Which of the following are related to
D. how and who software piracy? I. Internet piracyII. End
191. A is any event or action that could user piracyIII. Illegal duplicationIV. Usage
cause a loss of or damage to a computer or of software
mobile device hardware, software, data, A. I, II and III
information, or processing capability
B. I and IV
A. data risk
B. digital security risk C. II, III and IV

C. information risk D. III and IV


D. health risk
196. Identify this trademark slogan with its
192. According to Greg Bazar, which of the appropriate company:”I’m Lovin’ It”
following types of passwords can hackers
A. Burger King
break through within one minute?
A. passwords less than six characters in B. Wendy’s
length C. McDonalds
B. passwords less than four characters in
D. Hardee’s
length
C. passwords less than eight characters 197. Before using commercial software bought
in length from a store, one must first have to
D. passwords less than ten characters in use it.
length A. Copy
193. Jaywalking across a street in order to B. Permit
save a kid from being hit by a bus.
C. License
A. Legal/Unethical
B. Legal/Ethical D. Subcopy
C. Illegal/Unethical
198. Each of the following is a form of intellec-
D. Illegal/Ethical tual property EXCEPT
194. Which two of the following statements A. a patent on a business process
are a potentially a negative impact of e-
B. a website design
commerce?
A. Shoppers can compare prices online C. the recipe for apple pie that has been
and get a better price passed down through your family for sev-
eral generations
B. Smaller, local shops my lose income
due to the competition D. the name of the website “Google”

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 906

199. Names, titles, short phrases and colours a photograph from the internet, a quote
are not generally considered unique or sub- from a book)
stantial enough to be covered, but a cre- A. Unauthorized Use
ation, such as a logo, that combines these
elements may be B. Software Piracy

A. Computer Misuse Act C. Plagiarism


D. Fair Use
B. Information Commissioners Office
204. Any persons or groups who will be af-

NARAYAN CHANGDER
C. Copyright, Designs and Patents Act
fected by an action or issue
D. Equality Act
A. Stakeholders
E. Freedom of Information Act
B. Benefactors
200. Parents are powerful role models for chil- C. Sponsors
dren. If parents are engaging in com-
puter practices themselves, they will have D. Shareholders
a hard time convincing their children to 205. Annette has downloaded “Doctor
stay out of trouble. Strange” from a website to watch it with
A. respectful her friends later .Which of the following
area of computer ethics involved in the
B. unlawful
situation above?
C. common
A. Codes of conduct
D. unsafe B. Information privacy
201. CAPTCHA, biometric devices, Usernames C. Software piracy
and passwords/passphrases are exam- D. Green computing
ples of
A. Back up 206. Disciplinary code of conducts are
A. Advisory
B. Encryption
B. legaly binding
C. Access control
C. Imaginary
D. Digital signatures and certificates
D. non mandatory
202. In the world of computing, the good val-
ues and practices while we work on the 207. Malware is short for software
internet is called is? A. malignant
A. Internet ethics B. malicious
B. legal law C. malevolent
C. security requirement D. malady
D. business demand 208. Computer program which replicates and
spreads itself from one computer to an-
203. If you use copyrighted material in a re- other
port or project you should always give
credit to the author or illustrator of work A. Hacker
you are using (examples-when you use B. Botnet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 907

C. Computer virus 213. making a personal can help you to


identify values, principles, and rules of be-
D. none of above
havior to keep you, your family, and your

PRACTICE BOOK» NOT FOR SALE


209. As AI machines can think logically with- colleagues safe.
out emotions, how do they make deci- A. ergonomics
sions? (Pick 2) B. values
A. By learning from past experiences C. principles
B. By solely depending on the data anal- D. code of ethics
ysed
214. is the concept that an organization
C. By looking at their program parame- should act ethically by taking accountabil-
ters ity for the impact of its actions on the envi-
D. By detecting changes in the environ- ronment, the community, and the welfare
ment of its employees.
A. Corporate social responsibility
210. According to Gilligan, have tendency
to over-ride the importance of moral rules B. Corporate governance
and convictions while resolving moral C. Corporate social entrepreneurship
dilemmas; D. Corporate sustainability
A. male
215. Which of the following is not a good com-
B. female puter maintenance practice
C. adults A. Blowing the system unit with a blower
D. children B. Blowing the keyboard with a blower
C. Cleaning the screen with a wet cloth
211. Someone who accesses a computer or a
D. Cleaning the CD ROM drive with a lens
network illegally but has the intent of im-
cleaner
proving security.
A. hacker 216. The process of coding information to
make it unreadable except to those who
B. cracker have a special piece of information known
C. script kiddie as a key.
D. cyber extortionist A. Restriction
B. Protection
212. According to the Cyberbullying Research
C. Encryption
Center, how many more times are cyber-
bullying victims likely to have attempted D. Prevention
suicide than those who were not cyberbul-
217. You need to create a password for an app.
lied?
What advice should you follow?
A. two times A. Use only numbers
B. three times B. Include your name
C. four times C. Use your email password
D. five times D. Make it hard to guess.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 908

218. The UK’s independent authority uphold- A. one-sixth


ing information rights in the public inter-
B. one-fifth
est.
C. one-fourth
A. Personal data
B. Data subject D. one-third

C. Information commissioner 224. Breaking a problem down into multiple


D. Data protection officer pieces to make it easier to understand.

NARAYAN CHANGDER
219. A legal agreement that allows multiple A. Decomposition
users to access the software on the server B. Algorithm
simultaneously
C. Abstraction
A. Network license
D. Pattern Matching
B. Program activation
C. Digital signature 225. Colby spent a lot of his free time in a lo-
D. Plaintext cal coffee shop, where the Internet access
is free. However, the coffee shop owner
220. Which legislation governs the act of hack- has not set up a password for the Wi-Fi
ing? (1-4) network. Which of the following online ac-
tivities is safe for Colby to do at the coffee
A. The Freedom of Information Act
shop?
B. The Data Protection Act
A. buy textbooks using his credit card
C. The Creative Commons License
B. check one of this social media sites
D. The Computer Misuse Act
C. conduct academic research
221. An area of computer science dedicated to
creating software that can be taught to D. check his online bank account
perform complex procedures
226. The principle of means observing
A. Information Technology rules of “netiquette” that promote cour-
B. Artificial Intelligence tesy and respect in online settings.
C. Robotics A. human dignity
D. none of above B. civility
222. Which of these special characters are C. confidentiality
valid in a Password? D. digital property rights
A. Tilde
227. A program that replicates itself and clogs
B. Underscore
computers and networks.
C. Ampersand
A. Virus
D. All of these
B. Worm
223. According to Stephanie Winters, how
C. Trojan horse
many students ages 13 to 19 are engag-
ing in sexting? D. Denial-of-service attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 909

228. Which of these is NOT an AI technology 233. When you follow the fair use principle
and you do not need to get permission
A. Facial recognition
from the copyright holder, you should al-

PRACTICE BOOK» NOT FOR SALE


B. Image recognition ways the sources of all materials to
C. Robotics avoid plagiarism.
A. e-mail
D. Animation
B. attack
229. Small data files that are deposited on a C. cite
user’s hard disk when they visit a website
are called D. password

A. proxies 234. Entering a computer system without per-


B. cache mission.
A. Unauthorised access to computer ma-
C. cookies
terial
D. files
B. Unauthorised access with the intent to
commit a further crime
230. Green computing involves reducing the
electricity and environmental waste while C. Unauthorised modification of data
using a computer. Which of the follow- D. Making, supplying or obtaining any-
ing are the practices of green computing? thing which can be used for computer mis-
I. leave the computer running overnight.II. use
telecommute.III. throw away toner car-
tridgeIV. use Skype for meetings. 235. If work is produced as part of employ-
ment then normally the work belongs to
A. I and II
the person/company who hired the indi-
B. II and III vidual.
C. II and IV A. Computer Misuse Act
D. III and IV B. Information Commissioners Office
C. Copyright, Designs and Patents Act
231. This is the unwanted and illegal copying
and use of software. D. Equality Act
A. Commercial Software E. Freedom of Information Act

B. Public domain software 236. These are some of the ethic in computing.
EXCEPT
C. Software Policy
A. Employee monitoring
D. Site License
B. Plagiarism
232. The ozone layer is damaged by C. Hacker
A. CFCs D. Retrieve data
B. Increase in greenhouse gases
237. Go to regularly used websites directly
C. Increased global temperatures rather than for them using Google.
D. Sulfuric and nitric acids A. communicating

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 910

B. searching 242. Regulates the powers of public bodies


C. time to carry out surveillance and investigation,
and covering the interception of communi-
D. filtering cations. It was mainly introduced to take
account of technological change such as the
238. In standard experiments, members for growth of the Internet and strong encryp-
study are selected into two groups namely tion.
A and B at random. Group A are given
special treatment. The group B is given A. Data Protection Act

NARAYAN CHANGDER
no treatment and is called the ‘controlled B. Regulation of Investigatory Powers
group’. But they are placed in the same Act
environment as the other group A. this is C. Freedom of Information Act
known as
D. Protection of Freedoms Act
A. process control
E. Privacy and Electronic Communica-
B. engineering control tions Regulations
C. experimental control
243. The golden rule of Netiquette is:
D. management control A. Remember the human!
239. Any event or action that could cause loss B. A smiley face in every message.
or damage to computer mobile device hard- C. Don’t follow the rules of netiquette.
ware, software, or data
D. none of above
A. computer crime
244. Which of these is considered a digital se-
B. DDoS curity risk?
C. DOS A. hardware theft
D. digital security risk B. software theft
240. An experienced researcher should impart C. virus attack
knowledge to his or her students D. all of the above
A. Responsible Publication 245. Simon Vallor, 22 created a programthat
B. Non-Discrimination copied itself to everyone in youremail con-
tacts list. The programwould then corrupt
C. Respect for Colleagues
data on yourhard drive.
D. Responsible Mentoring
A. Data Protection Act
241. The is a trade group that represents B. Computer Misuse Act
the world’s largest software and hard- C. Copyright and Patents Act
ware manufacturers.
D. Regulation of Investigatory Powers
A. Business Software Association (BSA) Act
B. Business Software Alliance (BSA)
246. is a process of moving technology to
C. International Business Software (IBS) a new setting and implementing it wher-
D. International Software Association ever required.
(ISA) A. Technology Transfer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 911

B. Resource Transfer B. The Data Protection Act


C. Machine Transfer C. The Freedom of Information Act

PRACTICE BOOK» NOT FOR SALE


D. Money Transfer D. The Computer Misuse Act
247. means that the defendant is held re-
252. Choose TWO examples of Malware
sponsible for injuring another person, re-
gardless of negligence or intent A. Denial of Service (DOS)
A. User Liability B. Trojan horse
B. Strict Liability C. internet scams
C. Product Liability D. worm
D. Manufacturer Liability
253. What is the correct definition for the
248. is the code of acceptable behaviours term:Intellectual Property
that users should follow while on the In-
ternet A. Publishing the private contract infor-
mation of one’s political opponents online.
A. Online bullying
B. Content that is owned by a copyright
B. User ethics holder.
C. Netiquette
C. An area of computer science that fo-
D. none of above cuses on intelligent machines.
249. After Google, the next portal/search en- D. Law enforcement policy that involves
gine site with the most unique visitors is: analyzing data from traffic cameras,
A. Yahoo. surveillance footage, and social media
postings for the purpose of preventing
B. Microsoft. crimes before they are actually commit-
C. AOL. ted.
D. Facebook.
254. Written guideline that helps deter-
250. If you want to use one program on thirty mine whether a specification is ethi-
different computers, you should cal/unethical or allowed/not allowed is
under
A. Purchase a site license or buy enough
copies for every computer A. Codes of conduct
B. Buy two copies, in case one becomes B. Green computing
damaged, and load it on all the computers
C. Intellectual property rights
C. Buy one copy and put it on all the com-
puters D. Unauthorized access and use

D. Borrow it from another school, copy it, 255. What is a renewable resource?
and send it back promptly
A. one that can be replaced quickly
251. Which legislations governs the act of in-
B. one that is man-made
tellectual property theft?
C. one that comes from the sun
A. The Copyright, Designs and Patents
Act D. one that will never run out

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 912

256. The liability of manufacturers, sellers, A. Pharming


lessors, and others for injuries caused by B. Phishing
defective products is commonly referred to
as C. Plagiarism

A. Software Liability D. Pattern

B. Warranty 261. The end goal of green computing is for


consumers to reduce the amount of and
C. Product Liability
while using a computer.

NARAYAN CHANGDER
D. User Liability
A. hackers and phishers
257. How do you know that a website uses B. electricity and viruses
SSL?
C. environmental waste and spam
A. Your computer shows a message say-
D. electricity and environmental waste
ing it does
B. There is a ‘s’ in the ‘https’ of the URL 262. How do hackers use viruses? (1-3)
C. All websites use SSL by default A. To make a computer unusable
D. It checks for a certificate B. To get someone’s personal informa-
tion
258. You receive an e-mail message. The C. To find out card details
sender of the message claims to be a bank
executive and wants your personal infor- D. All of the above
mation to open an account for you. Which 263. Which of the following is an example of
one of the following terms describes this a positive effect of the computer on the
activity? environment?
A. Phishing A. Computer disposal
B. Pirating B. Energy consumption
C. Spyware C. Allows work from home culture
D. Hacking D. Production of computers
259. The law that allows you to use a limited 264. Their codes of practice advise individuals
amount of copy righted material for educa- and organisation on how to avoid breach-
tional use. ing the law
A. Freeware A. Computer Misuse Act
B. Fair Use B. Information Commissioners Office
C. Vires C. Copyright, Designs and Patents Act
D. none of above D. Equality Act

260. A link created in an email to request E. Freedom of Information Act


that customers to update their personal 265. A set of beliefs about right and wrong
details, at the same time revealing their behavior within a society is called
password/financial information. Which
term below correctly defined the state- A. ethics
ment above? B. moral code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 913

C. law C. AI being used in scanning X-rays to


D. vices and virtues spot problems

PRACTICE BOOK» NOT FOR SALE


D. none of above
266. Identify Trademark, Patent Or Copy-
right:” Lord Of The Rings “. 271. Technology is
A. Patent A. components or items that humans
B. Trademark make that are used to make our lives eas-
ier
C. Copyright
B. the application of knowledge to solve
D. none of above a problem
267. It occurs when someone steals software C. the application of human factors and
media, intentionally erases programs, ille- creativity to make our lives easier
gally registers and or activates a program,
D. the application of the building blocks to
or illegally copies software
solve a practical problem
A. Software theft
272. Which computer term did we learn is de-
B. Piracy
fined as “the practice of taking someone
C. Keygen else’s work or ideas and passing them off
D. Network license as your own is known”?
A. piracy
268. Regulations passed by state and federal
governments protecting against misuse of B. theft
computers are C. plagiarism
A. ethics D. infringement
B. morals
273. What is software piracy?
C. laws
A. Unique and original works such as
D. none of above ideas, inventions, art, writings, pro-
cesses, company and product names and
269. The principle of means that we pro-
logos.
tect data and information we’re not autho-
rized to share. B. A measure of reliability of information
A. human dignity held within an IT system.

B. civility C. The unauthorized and illegal duplica-


tion of copyrighted software.
C. confidentiality
D. Written guideline that helps to deter-
D. digital property rights mine whether a specific computer action
is ethical or unethical.
270. People are concerned with privacy is-
sues with AI-which is NOT something rel- 274. Writing or downloading software that
evant? can be used for unauthorised access or
A. CCTV cameras with facial recognition modification of data.
B. ALEXA etc always “listening” to con- A. Unauthorised access to computer ma-
versations terial

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 914

B. Unauthorised access with the intent to B. Information privacy


commit a further crime
C. Information accuracy
C. Unauthorised modification of data
D. Software theft
D. Making, supplying or obtaining any-
thing which can be used for computer mis- 279. Environmentally sound policies that pre-
use scribe energy efficiency, recycling, and eco-
friendly disposal of electronic equipment.
275. What is Hacktivism?

NARAYAN CHANGDER
A. Intellectual Property
A. A government policy that required In-
ternet Service Providers to allow equal ac- B. Green Computing
cess to all web content. C. Doxing
B. A network of encrypted content that al- D. Principles
lows users to engage in untraceable activ-
ity. 280. Which of the following is not safety
C. Malicious attacks on networks and equipment in a computer laboratory
websites for the purpose of promoting so- A. Surge protector
cial change, regarded by some civil dis-
obedience and others cyberterrorism. B. Metal detector
D. When somebody enters your comput- C. Smoke detector
ers data without permission. D. Fire extinguisher
276. What is Blue Light 281. Imagine a footballer sets up his own
A. a light that comes from space that is company to sell his own range of clothes.
blue What type of intellectual property can he
B. a popular app that old people use use to show that the clothes are made by
his company?
C. a illness from staring at blue stars in
the sky A. copyright
D. visible light spectrum, typically used to B. geographical indications
refer to light emitted from electronic de- C. patents
vices
D. trademarks
277. Jack made copies of a movie that just
came out. He mostly like committed 282. What should be included in your personal
code of ethics?
A. Pirate
A. Values, Principles, Net Neutrality, Blue
B. Piracy
Light.
C. Rights
B. Personal Responsibility, Cyberloafing,
D. Legalities Computers, Values.
278. Do not assume that all the information on C. Legal Compliance, Principles, Per-
the Internet is under which areas of com- sonal Responsability, Values.
puter ethics? D. Legal Compliance, Cyberloafing, Hard
A. Green computing Drive, Internet.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 915

283. The provision of multiple interchangeable C. incentives


components to perform a single function to
D. goodwill
cope with failures and errors is called:

PRACTICE BOOK» NOT FOR SALE


A. Risk 288. Software is the degree to which a
B. Reliability software product meets the needs of its
users.
C. Redundancy
A. version
D. Integrity
B. liability
284. STATE THE AREA OF COMPUTER
ETHICS:SHARING FOR FREE 30 MOVIES C. defect
THAT YOU HAVE DOWNLOADED FROM D. quality
THE INTERNET.
A. INFORMATION ACCURACY 289. Which of the following are the goals of
AI?
B. INFORMATION PRIVACY
A. To Create Express Systems
C. GREEN COMPUTING
B. To Implement Human Intelligence in
D. SOFTWARE PRIVACY
Machines
285. Enables certain public bodies to demand C. To Create machine with emotions
ISPs fit equipment to facilitate surveil-
lance; D. To solve highly complex problems
A. Data Protection Act 290. Private combination of words, often con-
B. Regulation of Investigatory Powers taining mixed capitalization and punctua-
Act tion, associated with a user name that al-
C. Freedom of Information Act lows access to certain computer resources

D. Protection of Freedoms Act A. Biometrics


E. Privacy and Electronic Communica- B. Passphrase
tions Regulations C. Password
286. A company produces an App using only D. PIN
the ASCII character set. What issue may
they not have considered? 291. What type of personal information is it
A. Cultural okay to share with someone you don’t
know?
B. Legal
A. Your name and number only
C. Environmental
B. Your email address only, if it doesn’t
D. Moral/Ethical
include your name.
287. The that socially responsible activities C. Minor details, like the name of your
create can make it easier for corporations school and what your parents do for a liv-
to conduct their business. ing.
A. profits D. You should NEVER share personal in-
B. alliances formation with someone you don’t know!

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 916

292. What is intellectual property? A. Spoofing


A. The ownership and right to make B. Phishing
money from ideas, inventions and creative C. Spam
work
D. Phreaking
B. A place of business where people in-
vent and make things 297. Besides the tests, each engineering
C. Products and inventions made by a project is modified during execution, based
on

NARAYAN CHANGDER
computer company
D. none of above A. the periodical feedback on the
progress and the lessons from other
293. Confidentiality of a participant is best sources.
exemplified in which of the following ac- B. expert’s opinion
tions?
C. engineer’s wish
A. Asking the participant to write his or
her name in the questionnaire D. Government’s policy

B. Not mentioning his or her name in the 298. When harmful substances build up in the
Participants of the Study section air to unhealthy levels it is known as
C. Introducing himself or herself in an in- A. unfortunate
terview B. air pollution
D. Taking his or her picture and placing it C. chemicalization
in the appendix
D. water pollution
294. What does the acronym VIRUS stands
for? 299. observing rules of “netiquette” that pro-
mote online courtesy and respect.
A. Viral Information Research Under
Siege A. Confidentiality

B. Vital Information Resource Under Spy B. Human dignity

C. Vital Information Resource Under C. civility


Siege D. Digital property rights
D. Very Important Register Under Surveil- 300. A program that hides within or looks like
lance a legitimate program
295. Hardware or software that protects net- A. Adware
work resources from intrusion by users on B. Spoofing
another network, such as the Internet
C. Spyware
A. Access control
D. Trojan horse
B. Firewall
C. Password 301. Which of the following terms describes
a “collection of computers controlled by
D. Unauthorized access users other than their owners to perform
296. “The attacker impersonates a legitimate automated tasks over the Internet”?
source to the user” is referred to as: A. Botnet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 917

B. Virtual Private Network 306. Cybercriminals use Internet services or


C. Social Engineering software with Internet access to:

PRACTICE BOOK» NOT FOR SALE


A. Obtain confidential and sensitive infor-
D. Intrusion Detection System
mation
302. Grants the user the right to make a spec- B. Illegally obtain money from victims by
ified number of copies of a software pro- deception
gram for the use on multiple computers.
C. Take advantage of victims for mali-
A. Share Ware cious intent
B. Public Domain Software D. All of the above
C. Commercial Software
307. Malicious attacks on networks and web-
D. Site License sites for the purpose of promoting social
change, regarding by some as civil disobe-
303. Flooding a network or server with use- dience and others as cyberterrorism
less traffic to prevent legitimate users
from using it or disrupting services A. hacktivism
B. the dark web
A. Drive-by downloads
C. doxing
B. Denial of service (DoS)
D. green computing
C. SQL injection
D. Distributed denial of service (DDoS) 308. Applies to work if it is regarded as orig-
inal, and exhibits a degree of labour, skill
304. I. Employees shall consider the social or judgement
impact of programs and systems they
A. Computer Misuse Act
design.II. Employees may not copy or
use software illegally.III. Employees clear B. Information Commissioners Office
their history file when finished browsin- C. Copyright, Designs and Patents Act
gIV. Employees fill in necessary informa-
tion on registration formWhich of the ac- D. Equality Act
tivities above considered as codes of con- E. Freedom of Information Act
duct?
309. According to summary of Cyberethics per-
A. I only spectives, there are 3 type of perspective.
B. I and II choose the correct answer
C. I and III A. Professional, Adjective, Descriptive
D. III and IV B. Professional, Philosophical, Descrip-
tive
305. Aiming abusive and insulting messages at
C. Sociology, Professional, Legacy
another person online is called
D. Technological, Professional, Descrip-
A. Targeting
tive
B. Flaming
310. If you borrow and copy a friend’s soft-
C. Spewing ware in violation of the licensing agree-
D. Arguing ment, what kind of computer ethics that

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 918

you have failed to adhere? What law has A. A right to request the data an organi-
been broken? sation holds about them without paying a
A. Data Protection Act fee
B. A right to request the data an organi-
B. Copyright, Designs and Patents Act
sation holds on them for a fee
C. Computer Misuse Act
C. A right to request the data an organi-
D. none of above sation holds about anyone without paying
a fee

NARAYAN CHANGDER
311. Brendan had installed a pirated version
of a software into his laptop as he could D. A right to request the data an organi-
not afford to purchase the original version. sation holds about anyone for a fee
What kind of threat that his action is asso- 315. The following are ways to secure per-
ciated with? sonal data except by
A. Physical theft A. installing personal firewall
B. Human error B. using Virtual Private Network to surf
C. Malware the web
D. Virtual theft C. filling in any information on warranty
and registration form.
312. What are the suggestions for green com- D. having unlisted telephone number.
puting? I. install personal firewall.II. do
not leave the laptop running overnight.III. 316. TLS is a more recent security system than
use video conference and VoIP for meet- SSL. It has
ing.IV. use LCD monitors instead of CRT A. three layers
monitors.
B. two layers
A. I, II and III
C. five layers
B. II, III and IV
D. four layers
C. I, II and IV
317. The protects people from the effects
D. I, III and IV
of too much ultraviolet radiation.
313. Which of the following is NOT one of the A. ozone layer
Ten Commandments of Computer Ethics? B. smog layer
A. Thou shalt not use or copy software for C. cloud cover
which you have not paid.
D. temperature inversion
B. Thous shalt think about the social con-
sequences of the program you write. 318. Which of the following is not considered
as personal information?
C. Thou shalt not interfere with other peo-
ple’s computer work. A. Full Name
D. Thou shalt not use a computer to do B. Date of birth
something fun. C. Both

314. What does the Data Protection Act give D. None of the above
an individual the right to do? E. Nothing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 919

319. Which of these is an example of spam? B. Virtue Theory


A. A downloadable game that contains C. Rights Theory

PRACTICE BOOK» NOT FOR SALE


hidden software. D. Utilitarion Theory
B. An email message advertising prod-
ucts you don’t want. 324. Try it before you buy it.
C. A harmful program that destroys your A. Copy Right
hardware. B. Shareware
D. An email joke forwarded to you by your C. Hacking
Aunt Gladys.
D. none of above
320. STATE THE AREA OF COMPUTER
325. Nearly all students who behave dishon-
ETHICS:NOT USING YOUR OFFICE BAND-
estly say that they prefer others to be hon-
WITDH TO PERFORM ONLINE SHOPPING.
est! If that’s so, why don’t they abide by
A. GREEN COMPUTING the Golden Rule?
B. CODE OF CONDUCT A. They don’t think that a little dishonesty
C. INFORMATION PRIVACY really matters.
D. none of above B. They probably think that they are.

321. involves viewing the software unit C. They don’t know that what they are do-
as a device that has expected input and ing is wrong.
output behaviors but whose internal work- D. They think that they are better than ev-
ings are unknown eryone else.
A. White box testing 326. Stealing is as good as robbery
B. Black-box testing A. sensitive information
C. Integrated testing B. equipments
D. Block testing
C. food
322. The rights cover:Broadcast and public per- D. none of above
formance, copying, adapting, issuing, rent-
ing and lending copies to the public. In 327. A person who uses existing computer
many cases, the creator will also have the scripts or codes to hack into computers,
right to be identified as the author and to lacking the expertise to write their own
object to distortions of his work. code.
A. Computer Misuse Act A. Black hat hackers
B. Information Commissioners Office B. White hat hackers
C. Copyright, Designs and Patents Act C. script kiddie
D. Equality Act D. Grey hat hackers
E. Freedom of Information Act 328. Cut down on the amount of you use
323. theory emphasizes on the character your devices.
rather than the rights or duties A. upload
A. Duty Ethics B. communication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 920

C. target B. opening of the computer by unautho-


D. time rised persons
C. Poor ventilation in the computer labo-
329. Choose the correct definition of trade- ratory
marks:
D. Eating in the computer laboratory
A. A trade mark is a sign which distin-
guishes the goods and services of one 333. A group of compromised computers con-
trader from those of another. A mark in- nected to a network

NARAYAN CHANGDER
cludes words, logos, pictures, names, let- A. zombie
ters, numbers or a combination of these. B. zonbie army
B. The ornamentation or shape of a func- C. bot
tional object, such as a chair
D. malward
C. The right to prevent others from copy-
ing or modifying certain works 334. What is the definition of intellectual prop-
erty right?
D. A monopoly to make, use, or sell an in-
vention A. unique and original property such as
ideas and inventions.
330. Which of the following is NOT the im- B. unique and original works such as
portant reason for a business to recognize ideas and inventions.
what is intellectual property?
C. unique and original intellectual rights
A. Because of its tangible nature, intel- such as ideas and inventions.
lectual property is an attractive target for
D. none of above
theft and resale
B. The intellectual property of a business 335. Using a source without giving credit to
often represents its most valuable asset the original author is known as
C. To avoid unintentional violations of in- A. Plagiarism
tellectual property laws. B. Cheating
D. Intellectual property can be licensed C. Copying/Pasting
or sold, providing valuable licensing in- D. Paraphrasing
come
336. Viruses that pretend to be helpful pro-
331. is defined as the amount of output grams but destroy your data are
produced per unit of input
A. Spyware
A. Reliability
B. Trojan Horses
B. Productivity C. Worms
C. Quality D. Adware
D. Liability
337. Used in a way that is adequate, relevant
332. Which of the following is a safety mea- and limited to only what is necessary.
sure in the computer laboratory A. Data Protection Act
A. Illumination in the computer labora- B. Regulation of Investigatory Powers
tory Act

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 921

C. Freedom of Information Act 342. What is the name given to the test to see
D. Protection of Freedoms Act whether a computer system could be de-
scribed as intelligent?

PRACTICE BOOK» NOT FOR SALE


E. Privacy and Electronic Communica-
tions Regulations A. Turning
B. Adil
338. What makes phishing attacks so easy to
fall for? C. Turing

A. They happen infrequently. D. Yuliya

B. They only target adults. 343. This crime usually involves online or Inter-
C. They are relatively harmless. net banking whereby the fraudsters will
send dubious e-mails or create spoof web-
D. They use messages that look official. sites hoping to entice users to hand over
339. what are the different types of e com- their credit card or banking details.Above
merce transactions? statement TRUE for

A. B2C A. Blogging, Online Criminal Defamation


and sedition
B. C2C
B. Online child pornography
C. C2B
C. Identity theft or Phishing
D. A2A
D. Computer fraud
340. The 3 terms of this law are:Unauthorised
access to computer material, Unautho- 344. What is open source software?
rised modification of computer material A. Software you can change the source
and Unauthorised access to computer sys- code
tem with intent to commit another offence.
B. Software you need a licence for
A. Computer Misuse Act
C. Software with a Brand name
B. Information Commissioners Office
D. Software only for use on a computer
C. Copyright, Designs and Patents Act
345. The clarity to identify the relevant moral
D. Equality Act
values from among duties, rights, goods
E. Freedom of Information Act and obligations is obtained by self ques-
tioning. This relates to
341. Which of the following is a question you
should ask yourself before you make a A. Normative inquiry
move to do something questionable? B. Conceptual inquiry
A. How would you feel if your behavior C. Descriptive inquiry
made front-page news?
D. Factual inquiry
B. How would you feel if your parents
found out? 346. Which of the following components of Se-
C. How would you feel about this next curity pertains about the who is autho-
week? rized to use data?

D. How would you feel if your behavior A. Integrity


was different? B. Availability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 922

C. Confidentiality 352. What is an area of computer science that


D. Authenticity focuses on intelligent machines
A. Technology
347. A global computer network that links
computer net workers all over the world. B. Doaxing

A. Internet C. Artificial Intelligence


B. Internet Cyber D. Cyberloafing

NARAYAN CHANGDER
C. Intranet 353. is determined by currently available
D. none of above data, as measured actuarially for insur-
ance premiums.
348. Which of the following is NOT a network
A. Projected risk
security device?
B. Statistical risk
A. router
B. ethernet cable C. Perceived risk

C. firewall D. none of above

D. switch 354. While reading a novel, you realize that


the author has copied material from an-
349. Why does software needs a license? other author. What type of violation is
A. This is how it is bought and sold. this?
B. To protect the intellectual property of A. Phishing
its creator(s).
B. Plagiarism
C. To make it more difficult to buy.
C. Piracy
D. So that it doesn’t break privacy laws.
D. Slander
350. An approach to ethical decision making
that is based on a vision of society as 355. Unauthorized reproduction or distribu-
a community whose members work to- tion of copyrighted materials, information
gether to achieve a general set of values or production
and goals is the approach. A. Piracy
A. common good B. Cyberbullying
B. fairness C. Identity Theft
C. virtue ethics D. none of above
D. utilitarian
356. Hacker that uses prewritten hacking and
351. Which of the following cases did Sharron cracking programs to break into computers
Davis use to explain the harm of sexting? and networks
A. Tonya Underwood’s story A. Corporate spy
B. Ryan Halligan’s story B. Cracker
C. Jessica Logan’s story C. Hacker
D. Shirley Baker’s story D. Script kiddie

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 923

357. Which of the following terms describes a D. Regulation of Investigatory Powers


“security component which encrypts data Act
& keeps it private within a public net-

PRACTICE BOOK» NOT FOR SALE


work:? 362. Which one of Associated Disciplines are
A. transport layer security true based on their perspective?

B. point-to-point tunneling protocol A. Professional:Computer science,


2)Philosophical:information law3)Descriptive:science
C. intrusion detection system behavior
D. virtual private network
B. Professional:Safety codes of Con-
358. Which is not a type of renewable en- duct2)Philosophical:privacy 3)Descrip-
ergy? tive:impact of cybertechnology on govern-
mental
A. Solar Panel
C. Professional:Computer Science,
B. Wind Turbine
Engineering, Library/information,
C. Coal Burning sciences2)Philosophical:Philosophy
D. Hydroelectric Law3)Descriptive:Sociology Behavioral
sciences
359. Viruses can also allow hackers to enter
your computer and steal information D. none of above
such as passwords, social security num-
bers and bank account information. 363. In computer ethic, these are the example
of virtues that help person interpretation.
A. illegal Except.
B. confidential A. Fairness
C. personal
B. Punctuality
D. replicated
C. Generosity
360. If a company develops a new technology D. loyalty
that improves its main product, what type
of intellectual property can they use to 364. Which human action can cause pollution?
stop others from copying their invention?
A. Walking
A. copyright
B. geographical indications B. Biking

C. patents C. Mining
D. trademarks D. Recycling

361. This legislation is intended to give cre- 365. provides the framework through
ators of a wide range of material economic which learning attitudes are encouraged.
rights, enabling them to control the use of
their material in several ways. A. Authority

A. Data Protection Act B. Autonomy


B. Computer Misuse Act C. Agriculture
C. Copyright and Patents Act D. Aptitude

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 924

366. Turn your devices when you are not 371. Which of the following did Greg Bazar
using them. use as a analogy to describe a router?
A. on A. dock
B. off B. island
C. pause C. traffic light
D. communication
D. street

NARAYAN CHANGDER
367. Victoria received a semi-nude picture of
someone she knows through her cell phone. 372. is publishing the private contact infor-
Which of the following is an appropriate mation of one’s political opponents online.
reaction? A. Doxing
A. post it on Facebook B. Cyberloafing
B. tell others about it C. Hacktivism
C. forward it to other friends
D. Ethics
D. delete it immediately
373. SPAM refers to
368. A backup is a of a file, program, or
media that can be used if the original is A. Unsolicited emails or messages; may
lost, damaged, or destroyed contain links or attachment with malware
A. encasing B. Official-looking emails sent to try to ob-
tain personal or financial information
B. duplicate
C. delition C. Hacking phone networks for free calls
or have calls charged to another account
D. scanning
D. None of the above
369. is referred to as unique and origi-
nal works such as ideas, inventions, art, 374. refers to methods within the develop-
writings, processes, company and product ment cycle designed to guarantee reliable
names, logos operation of the product
A. copyright A. Cost Factor
B. Intellectual property B. Flexibility
C. piracy C. Quality assurance (QA)
D. none of above D. Liability
370. employs modern telecommunications
375. Copying or downloading music, games
and information technologies to provide
and movies that you haven’t paid for is
medical care to people who live far away
called
from healthcare providers
A. Telework A. a good idea

B. Telemedicine B. piracy
C. EHR C. free
D. OLPC D. Robbery

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 925

376. Organisations who have established busi- C. Values


ness in more than one country, are called D. Honesty

PRACTICE BOOK» NOT FOR SALE


A. Multi lingual Corporations 381. An item that you must possess, or carry
with you, in order to gain access to a com-
B. Multiple Economy Concerns puter or computer facility
C. Multi National Corporations
A. Encryption
D. Multiple Revenue Organizations
B. Possessed objects
377. Please choose the importance of intellec- C. Software piracy
tual property right for patent.
D. Software theft
A. to protect any material form of expres-
sions if an infringement occurs. 382. When using computers you should:(answer
more than 1)
B. to protect exclusive rights, preventing
others from using the same brand iden- A. Avoid harming others.
tity. B. Protect yourself.
C. to protect product ideas, manufactur- C. Harm others
ing process improvements and technolog-
ical developments. D. Avoid breaking the law.

D. none of above E. break the law.

378. This is a destructive code that gains ac- 383. This is copyrighted software that is dis-
cess to a computer disguised as some- tributed free of charge on a trial basis. A
thing such as a desirable software pro- normal fee is charged if the user decides
gram. Once inside the computer, it can do to keep it.
damage but it cannot spread from disk to A. Share Ware
disk or computer to computer. B. Site License
A. Computer worm
C. Adware
B. Adware
D. Free Ware
C. Trojan Horse
384. Reducing Electricity use and environmen-
D. Computer Bomb
tal while using computer known as?
379. This is destructive code that is set to ac- A. ECO-freindly user
tivate at a certain time or when a specific
B. Tech Conservation
action is taken.
C. Environmental Computing
A. Spyware
D. Green Computing
B. Adware
C. Computer Bomb 385. Which is the correct scenario to describe
D. Computer Virus information accuracy?
A. Carol fills in only necessary informa-
380. What is another word for ethics? tion on a registration form.
A. Loyal B. Ben clears her history file when she
B. Character finished browsing.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 926

C. George checks whether the web page 391. The engineer recognizes that the greatest
is trustworthy or not. merit is the work and exercises his profes-
sion committed to
D. none of above
A. a business
386. Turning characters into readable data
B. work hard
A. Upcryption
C. be physically fit
B. Decryption D. serving society

NARAYAN CHANGDER
C. Encryption
392. In the world of computing, the essential
D. Noncryption elements that controls how computer are
used is?
387. These are computer related morals, prin-
cipals, and values. A. ethic
A. Computer Abuse B. legal law
B. Computer Ethics C. security requirement

C. Intellectual Property D. business demand

D. Copyright 393. Which of the following is NOT a reason


why copyright law exists?
388. A right granted for an invention is known
as a: A. Because intellectual property is pro-
tected.
A. Patent
B. To prevent unauthorised copying of
B. Trademark work.
C. Copyright C. To ensure personal information and
D. none of above data is secured.
D. To allow others to have fair dealing
389. The exclusive privilege that allows an au- over copyrighted material.
thor or owner to print or sell his/her own
work 394. Arrests were made by police takingpart
in a massive investigation intogroups ac-
A. Fair Use
cused of copying anddistributing billions
B. Copyright of dollars worthof software, music and
C. Shareware videos.

D. Unathorized Use A. Data Protection Act


B. Computer Misuse Act
390. Any information relating to an identified
C. Copyright and Patents Act
or identifiable person.
D. Regulation of Investigatory Powers
A. Personal data
Act
B. Data subject
395. “Businesses and other organizations that
C. Information commissioner
store personal data have ethical responsi-
D. Data protection officer bilities to do everything in their power to

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 927

keep the data secure. Hackers are con- a decision, HOW should he/she make a
stantly searching for system vulnerabili- good ethical decision?
ties that allow them to steal credit card

PRACTICE BOOK» NOT FOR SALE


A. Get the facts
numbers, email addresses, and confiden-
tial business information. “ which area of B. Think for critically and make decision
concern is this? C. Identify the stakeholders and their po-
A. Artificial Intelligence sitions
D. Consider the consequences of your de-
B. Net Neutrality
cision
C. Personal Privacy
400. Information technology has divers of eth-
D. Data Security
ical issue on (below). Except?
396. What is the global average C02 emis- A. Hardware piracy
sions per person in tonnes? B. Inappropriate use of computing re-
A. 4.5 sources
B. 4.6 C. Inappropriate sharing of information
C. 4.7 D. Program piracy
D. 4.8 401. Which of the following is the Golden Rule
discussed in this segment?
397. Which of the following is NOT an appro-
priate response to cyberbullying? A. The best thing to give to your enemy is
forgiveness.
A. Telling a trusted teacher you are being
bullied. B. The only true wisdom is knowing you
know nothing.
B. Retaliating against the bully.
C. Honesty is the best policy.
C. Collecting information and use it as ev-
D. Treat others how you would want to be
idence.
treated.
D. Asking the content provider to delete
the malicious comments about you. 402. How does the Copyright Act apply to soft-
ware developers?
398. These programs record virtually every- A. Ensuring respect and credit is given for
thing you do on your computer and are the intellectual work and property of oth-
used by employers to search employee e- ers.
mail and computer files.
B. Software can be copied if it is open
A. Spyware source.
B. Freeware C. Developers have to respect the privacy
C. Employee-monitoring software of others in the system.
D. Cookies D. Developers have to keep information
confidential.
399. Vice president of Student Representative
Council (SRC) of MSU College Johor have 403. Why does chemical waste need to be dis-
to make a quick decision after the presi- posed of carefully?
dent left for official trip. When making A. It encourages excessive plant growth

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 928

B. It contains heavy metals which build 407. is the probability of a component or


up in the tissues of living organisms. system performing without failure over its
C. It is not biodegradable product life.

D. It depletes the oxygen levels in the wa- A. Risk


ter B. Reliability

404. Which of the following offences are cov- C. Redundancy


ered by the Computer Misuse Act 1990? D. Quality

NARAYAN CHANGDER
(choose 4)
408. Software you can download and use for
A. data must be processed fairly and law-
free
fully
A. Software Licence
B. Unauthorised access of computer ma-
terial B. Site Licence
C. Unauthorised access with intent to C. Shareware
commit a crime D. Free ware
D. Unauthorised modification of com-
puter material 409. According to the Cyberbullying Research
Center, how many students ages 11 to 18
E. Making or supplying or obtaining any- admitted they have bullied others through
thing which could be used in computer the Internet?
misuse acts
A. 20.1 percent
405. Eric just purchased a new computer & B. 18.9 percent
would like to protect his computer from
viruses. Which of the following actions C. 22.3 percent
should Eric take? D. 21.2 percent
A. install an anti-virus software
410. Any participants to any research activ-
B. open attachments through an un- ity must not be forced to take part in the
known e-mail study.
C. visit an unknown website A. Voluntary Participation
D. start defragmentation on the com- B. Informed Consent
puter
C. Risk of Harm
406. Which of the following terms can be de- D. Social Responsibility
fined as “crime which occurs when some-
one’s personal & financial information is 411. is the process of converting data that
stolen in order to impersonate him or her is readable by human into encoded charac-
for financial gain? ” ters
A. advanced fee scheme A. CAPTCHA
B. identity theft B. Honeypot
C. Internet auction fraud C. Encryption
D. investment fraud D. Transcription

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 929

412. The study usually covers risk identifica- to demonstrate the net benefits of a pro-
tion, risk analysis, risk assessment, risk cess to an user
rating, suggestions on risk control and risk

PRACTICE BOOK» NOT FOR SALE


A. Risk-Benefit Modeling
mitigation. this study is known as
B. Risk-Benefit Tradeoffs
A. risk evaluation
C. Risk selling
B. risk measurement
C. risk analysis D. none of above

D. risk science 418. According to a recent survey conducted


by The National Campaign, how many
413. Illegal or improper use of software-no li- teenagers reported they have received
cense to use it nude or semi-nude pictures?
A. Unauthorized Use
A. 33 percent
B. Software Piracy
B. 25 percent
C. Plagiarism
C. 48 percent
D. Fair Use
D. 52 percent
414. In 1966, Joseph Weizenbaum created
that appeared to pass the Turing test. 419. Engineering is a profession that uses
A. ELSA A. fun, honesty, safety and creativity
B. ELLIE B. cool math, fun, safety and creativity
C. ELIZA C. creativity, math, science and er-
gonomics
D. ELLA
D. ergonomics, math, science and safety
415. Which of the following describes an at-
tack whose goal is to disabling a govern- 420. This is a program used to search for
ment network to crippling a country? viruses that may be established on a hard
A. cyberterrorism drive. (Doesn’t automatically search)
B. cyberextortionist A. Virus Disinfectant Program
C. cyberwarfare B. Free Ware
D. none of above C. Computer Worm

416. How much of the information that we D. Spyware


post online can be 100% secure?
421. are the welfare principles enunciated
A. None by the wise people, based on their experi-
B. About half ence and wisdom
C. Nearly all A. Values
D. none of above B. Morals
C. Rules
417. means systematically quantifying the
relative importance of risks and benefits D. Ethics

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 930

422. Which of the following statements de- 426. Malware is a software used for com-
fines sexting? puter and computer systems.A. B. C. D.
A. Creation, distribution or forwarding of A. Damaging
a message which includes sexually ex- B. Disrupting
plicit materials through a computer, cell
phone or other electronic devices C. Disabling
D. All of the above
B. Fraud which involves stealing personal
information for financial gain through e-

NARAYAN CHANGDER
427. The term emphasizes on the invest-
mail ment, orientation of technology, develop-
C. Use of computers, cell phones or other ment and functioning of organizations to
electronic devices to deliberately & re- meet the present needs of people and at
peatedly harm another person through the same time ensuring the future genera-
the Internet tions to meet their needs.

D. Use of other people’s words, thoughts A. sustainable development


or ideas without crediting the source B. synergestic development
C. symbiotic development
423. All are computer room management
ethics EXCEPT D. surgical development
A. Maintaining dust 428. A link created in an email to request
B. Appropriate kitchen cabinet that customers to update their personal
details, at the same time revealing their
C. Appropriate ventilation password/financial information.What law
D. Appropriate lighting system has been broken?
A. Data Protection Act
424. Fraud which involves stealing personal in-
B. Copyright, Designs and Patents Act
formation for financial gain through e-mail
C. Computer Misuse Act
A. Piracy
D. none of above
B. Network Switch
C. E-mail Scam 429. Which of the following would be a cre-
ative work protected by copyright?
D. none of above
A. A list of all the U.S. zip codes
425. What is a code of ethics? B. A portrait of your family
A. set of rules that tells you what is right C. A song you wrote
and wrong to do in your workplace. D. The name of your pet dog
B. Content that is owned by a copyright
430. Shaffika is submitting her assignment
holder.
without acknowledge the original author
C. A government policy that required In- of her work. She also copied all state-
ternet Service Providers to allow equal ac- ment from other authors and not cite the
cess to all web content. source of its information.What is the ac-
D. The study of how people function most tion of Shaffika does?
effectively in their work environment. A. Cheating

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 931

B. Plagiarism A. Software Licence


C. Paraphrasing B. Site Licence

PRACTICE BOOK» NOT FOR SALE


D. Collusion C. Shareware

431. From a legal perspective, IT workers are D. Free ware


not recognized as professionals because 436. Ethics is address as a
they are not by the state or federal
government. A. behavior

A. licensed B. value

B. sponsored C. rules

C. associated D. act

D. graded 437. Intangible creative work that is embod-


ied in a physical form
432. What does Green Computing mean?
A. Ethical dilemma
A. economically responsible and eco-
friendly use of computers and their re- B. Patent
sources. C. Intellectual Property
B. environmentally responsible and eco- D. Copyright
friendly use of computers and their re-
sources. 438. It creates software registration numbers
and sometimes activation codes
C. business responsible and user-
friendly use of computers and their re- A. Keygen
sources. B. Piracy
D. none of above C. Cypher

433. A firewall blocks D. Backup

A. Mexicans (According to Trump) 439. A company has created drones to deliver


B. Unauthorized Connections to your LAN takeaway food that have security cameras
on them. What issues do you think the
C. from checking if you saved your work company might have?
D. disgruntled employees A. Moral
434. RIPA stands for B. Ethical
A. Regulation of Internet Providers Act C. Cultural
B. Rights of Individuals and Profession- D. Legal
als E. Environmental
C. Regulation of Investigatory Powers
Act 440. Which one of these is not an area of AI?

D. none of above A. computer vision/image recognition


B. voice recognition
435. This is free software on a trial basis and
then a fee is needed to continue to use the C. web design
software. D. robotics

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 932

441. Technique intruders use to make their net- D. All of the above
work or Internet transmission appear le-
gitimate to a victim computer or network 446. Which of the following statements about
hackers is NOT correct?
A. Botnet
B. Firewall A. a hacker can refer to someone who is
good at solving computer problems
C. Password
B. there are white hat hackers & black hat
D. Spoofing
hackers

NARAYAN CHANGDER
442. are guidelines for specific group of C. a hacker can refer to someone who
professionalism to help them perform their illegally accesses someone else’s com-
roles; to know how to conduct themselves; puter
and to know how to resolve around vari-
ous ethical issues. D. all hackers are trying to break into oth-
ers’ computers for their financial benefit
A. The codes of ethics
B. The codes of physics 447. Adult Internet user who uses social net-
C. The codes of laws working sites, chat rooms or other cy-
berspace to approach and eventually hurt
D. The codes of banks other people, usually for sexual or other
443. or is the discovery, collection, abusive purposes
and analysis of evidence found on comput- A. Online Predator
ers and networksI. cyber forensicsII. evi-
dence forensicsIII. web forensicsiV. digital B. Piracy
forescis C. Computer Virus
A. I only D. none of above
B. I and II
448. Potentially damaging program that af-
C. I, II and III fects, or infects, a computer or mobile
D. I and IV devices negatively by altering the way
the computer or device works without the
444. Only add friends to your social media
user’s knowledge or permission
accounts and restrict access to your online
profiles. A. Botnet
A. secret B. Spyware
B. school C. Virus
C. respected D. Worms
D. trusted
449. All the data to be reported should include
445. are good security practices. all facts with accuracy.
A. Scan files and media for malware A. Honesty
B. Keep antivirus and computer software
B. Objectivity
updated
C. Competence
C. Be careful of unsolicited emails and
text messages D. Care

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 933

450. focuses on defining, measuring, and B. It provides better image quality than
refining the quality of the development real life.
process and the products developed during

PRACTICE BOOK» NOT FOR SALE


C. Google donate money to good causes
its various stages. every time video conferencing is used.
A. Quality Management D. Video conferencing can take place at
B. Warranty any time of the day so it saves electric
lights being on during daylight.
C. Green Computing
D. Software Defect 455. Independent person responsible for the
implementation of data protection in an or-
451. The maximum penalty for online piracy is ganisation.
which of the following?
A. Personal data
A. Prison for up to ten years OR a fine of
B. Data subject
$250, 000
C. Information commissioner
B. Prison for up to five years OR a fine of
$50, 000 D. Data protection officer
C. Prison for up to ten years AND a fine 456. Which of the following statements is true
of $250, 000 about open source software?
D. Prison for up to five years AND a fine A. The software cannot be copied, modi-
of $50, 000 fied or shared
452. Device that authenticates a person’s iden- B. The software can be copied, modified
tity by translating a personal characteris- or shared
tic, such as a fingerprint, into a digital code C. There is normally a cost to pay for a
that is compared with a digital code stored license to use the software
in a computer verifying a physical or be-
D. The software is not available for public
havioral characteristic
use
A. Biometrics
457. Refusing to violate the intellectual prop-
B. Face recognition system
erty rights of others
C. Software piracy
A. Digital property rights
D. Voice verification system
B. Human dignity
453. Behaving properly online is known as C. Civility
A. copyright D. Confidentiality
B. netiquette
458. is a place where the teaching
C. BehavePeople and learning of data processing/computer
D. boring takes place
A. Computer factory
454. Why is video conferencing likely to be en-
vironmentally friendly? B. Computer shop

A. It reduces the need for people to travel C. Computer laboratory


to meet up, reducing pollution. D. Computer house

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 934

459. This is to protect software against un- 463. Which of the following statements is
wanted or illegal duplication by writing false about proprietarysoftware?
computer code within the programs that A. The software cannot be copied, modi-
prevents simple copying. fied or shared
A. Intellectual Property B. The software can be copied, modified
B. Share Ware or shared
C. Copy Protect C. A fee is usually required to purchase a

NARAYAN CHANGDER
software license
D. Trojan Horse
D. An example of the software is the Mi-
460. Green computing is one of the areas of crosoft Office suite
computer ethics that involves reducing the
electricity and environmental waste while 464. How you act when no one is looking.
using a computer. What are the reasons to A. Cute
go green? I. to reduce electricity consump- B. Open Source
tion.II. to change the we work into being
eco-friendly.III. to recycle computer parts C. Ethics
and components.IV. to stop destroying en- D. none of above
vironment or creating global warming.
465. Who wrote the following:A robot may
A. only I not injure a human being or, through in-
B. II and IV action, allow a human being to come to
C. I and IV harm.A robot must obey orders given it
by human beings except where such orders
D. II and III would conflict with the First Law.A robot
must protect its own existence as long as
461. Hackers are unethical people who
such protection does not conflict with the
A. Access databases that they have no First or Second Law
right to be in.
A. Gary Kasporov
B. Create programs intending to destroy B. Rimsky Korsakov
other computer systems
C. Isaac Asimov
C. Do not respect the rights or privacy of
others. D. Nikola Tesla

D. Are out to destroy other people’s com- 466. What year was the computer misuse act
puter systems. released?
E. All the listed A. 1998
B. 1990
462. What is Netiquette?
C. 1988
A. Rules for face-to-face conversation.
D. 2000
B. Responsibility for the actions of others
on the internet. 467. Which Do you think is worst, cyber ter-
C. The correct or acceptable way of com- rorism or cyber warfare.
municating on and using the internet. A. Cyber terrorism
D. none of above B. Cyber warfare

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 935

C. They are both good actually. 472. Ethics come from all of the following EX-
D. They are equally bad. CEPT

PRACTICE BOOK» NOT FOR SALE


A. values of the individual
468. Server outside the organization network
that controls which communications pass B. written laws
in and out of the organization network C. values of the society
A. Passphrase D. values of the family
B. Personal firewall
473. Reducing information and detail to focus
C. Possessed objects on essential characteristics.
D. Proxy firewall A. Computational Logic
469. Programs that act without a user’s B. Abstraction
knowledge and deliberately alter the op- C. Decomposition
erations of computers and mobile devices
D. Algorithm
A. Adware
B. Malware 474. Standards of right and wrong behavior
that shows a person’s personal integrity
C. Virus and helps create relationships with others
D. Worms based on trust
A. Behavior
470. Computer ethics are:
A. a set of moral principles that govern B. Morals
the design, building, implementation and C. Ethics
use of computers D. Etiquette
B. a set of legal rules defining how a com-
puter must be used 475. A complication of the approach to de-
cision making is that measuring and com-
C. laws defining ownership of intellectual paring the values of certain benefits and
property costs is often difficult, if not impossible.
D. none of above A. fairness
471. What does the principle of civility mean? B. virtue ethics
A. It means observing rules of “neti- C. virtue ethics
quette” that promote courtesy and re-
D. utilitarian
spect in online settings.
B. It means respecting and honoring the 476. A type of ‘intellectual property’ and, like
inherent worth and right to privacy of physical property, cannot usually be used
other people. without the owner’s permission
C. It means that we protect data and in- A. Computer Misuse Act
formation we are not authorized to share. B. Information Commissioners Office
D. It means recognizing and respecting C. Copyright, Designs and Patents Act
the intellectual property of others, includ-
ing online data, login information, creative D. Equality Act
works, and other digital assets. E. Freedom of Information Act

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 936

477. Those works below have been taken to A. Digital signature


be copied by one of the famous smart- B. Digital certificate
phone company in Malaysia.*logo*the
function of particular smartphone brand- C. Differential backup
Based on the statement above, which are D. Selective backup
the IP that have been infringed?
482. The objectives of Professional Ethics in
A. copyright & patent
Engineering are
B. patent & trademark

NARAYAN CHANGDER
A. To understand the moral values that
C. copyright & trademark ought to guide the Engineering profession,
D. trademark
B. To resolve the moral issues in the pro-
478. What is Confidentiality?
fession, and
A. Observing rules of “netiquette” that
C. To justify the moral judgment concern-
promote online civility.
ing the profession
B. Protecting confidential data and infor-
D. All the above
mation.
C. Respecting the privacy and dignity of 483. Which of the following did Greg Bazar
other human beings. use as a analogy to describe a switch?
D. Refusing to violate the intellectual A. dock
property rights of others. B. island
479. A preventive measure for protecting your C. traffic light
computer is: D. street
A. Backing up your data
484. All of the following are protected by
B. Installing anti-virus software
trademarks EXCEPT
C. Using firewall protection
A. Logos such as the Apple on Apple’s
D. All of the above product
480. The following are ways of taking care of B. A video of a play created and per-
computer except formed by a college drama class
A. Computer should be covered when not C. Number and letter combinations like
in use 3M
B. Computer should be kept in a cool dry D. Unique product shapes as long as they
place have no bearing on the product function,
such as the famous curved bottle of Coca
C. Used contaminated devices such as
Cola
flash drive
D. The repair man should be called to re- 485. According to Sharron Davis, which of the
pair any faulty parts following is a parent’s responsibility to cy-
berbullying?
481. Encrypted code that a person, website, or
organization attaches to an electronic mes- A. Educate children about the conse-
sage to verify the identity of the message quences of cyberbullying.
sender B. Contact the parents of the cyberbully.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 937

C. Forbid children to use computers at B. Don’t spy on another person’s data


home. C. Don’t use computer to steal informa-

PRACTICE BOOK» NOT FOR SALE


D. Install software on the home computer tion
to monitor children’s online behavior.
D. none of above
486. What should you consider when creating
490. What is meant by the term ‘stake-
your code of ethics?
holder’?
A. don’t violate the digital property rights
A. A stakeholder is the person who owns
of those I encounter online.
a product or organisation
B. honor the privacy of others by keeping
B. A stakeholder is anyone who has an in-
their data and information secure.
terest in or concern about a product or or-
C. In communicating with others online, I ganisation
will promote courtesy, respect, and under-
standing. C. A stakeholder is the person who buys
products from an organisation
D. all of the above
D. A stakeholder is the person who cre-
E. none ates the legislation that governs the
buying andselling of productsQuestion
487. Which of the following statements de-
2:Which
fines cyberbullying?
A. Creation, distribution or forwarding of 491. Identify the correct type of software
a message which includes sexually ex- piracy.
plicit materials through a computer, cell A. Electricity resources.
phone or other electronic devices
B. Softlifting.
B. Fraud which involves stealing personal
information for financial through e-mail C. Trademark
C. Use of computers, cell phones or other D. Financial informaton.
electronic devices to deliberately & re-
peatedly harm another person through 492. are required to evaluate a given situ-
the Internet ation, its implication and to determine who
are involved or affected.
D. Use of other people’s words, thoughts
or ideas without crediting the source A. Open eyes and an open mind
B. Big house and good food
488. Who is responsible for making sure the
requirements of the Data Protection Act C. Rich dress and costly accessories
are upheld in an organisation? D. Luxary car and a wealthy living
A. The Individual
493. A person who uses the internet to hunt
B. The Data Controller for victims.
C. The Stakeholder A. Cyber Bullying
D. The Computer Network B. cyber Investigator
489. Which is the 3rd ethic of computer? C. Cyber Predator
A. Refrain from buying pirated copies D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 938

494. A student accesses a school network and 499. This is a program that contains destruc-
changes their exam score. Which laws tive code with copies itself onto other com-
have been broken? puter files.
A. Data Protection Act 1998 A. Computer Bomb
B. Creative Commons License B. Computer Virus
C. Computer Misuse Act 1990 C. Spyware
D. Copyright, Designs and Patents Act D. Computer Cookie

NARAYAN CHANGDER
1988
500. The followings are among the categories
495. means integration of countries of security threat, EXCEPT:
through commerce, transfer of technology, A. Interruption
and exchange of information and culture. B. Interpretation
A. Digitization C. Interception
B. Communalisation D. Modification
C. Nationalisation
501. Which of the following can be protected
D. Globalization by copyright law?

496. This is a destructive code that bores it A. A title


way through a computer’s files. It can B. A name
move from computer to computer, drop- C. A slogan
ping off segments of itself as it goes.
D. An original score of music
A. Trojan Horse
B. Computer Worm 502. A street vendor on Bloor Street is sell-
ing fake “TAGG” watches. Under which
C. Spyware area of intellectual property would the
D. Computer Virus TAG Company likely seek a remedy?
A. Copyrights
497. A network or encrypted content that al-
lows users to engage in untraceable activ- B. Trademarks
ity is called C. Patent
A. doxing D. Industrial Design
B. blue light 503. Which of the following statements de-
C. the dark web fines a computer virus?
D. cyberloafing A. Security component which encrypts
data & keeps it private within a public net-
498. Areas of computer ethics work
A. Information Accuracy B. Computer program which replicates &
spreads itself from one computer to an-
B. Codes of Conduct
other
C. Intellectual Property Rights
C. Computer device which forwards data
D. Computing packets from one network to another

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 939

D. Device which monitors network activi- 508. Which is not a basic rule of Netiquette?
ties for malicious attacks & produces re-
A. Do not use all caps.
ports to a management station

PRACTICE BOOK» NOT FOR SALE


B. Be respectful when communicating
504. An example for Artificial Intelligence is with others.
C. Use abbreviations and acronyms in the
A. Animals online chat with other not understand
B. Clothes D. none of above
C. Robots
509. Importance of Cyber Ethics. (choose 2 an-
D. People
swer)
505. Ownership of any creative work or inven- A. Protection of data
tion
B. Free speech
A. Fair Use
C. Disclose hidden issues
B. Intellectual Property
D. To minimize the irresponsibility behav-
C. Piracy
ior among internet users.
D. none of above
510. Shareware entitles a user to
506. Tees, Esk and Wear Valleys NHSFounda-
tion Trust had a case toanswer when a A. Use source software for free
memory stick, containing details of 200 B. Free modify the software
mentalhealth patients, was found on as-
treet in Barnard Castle. C. Use software for free for a limited pe-
riod
A. Data Protection Act
D. none of above
B. Computer Misuse Act
C. Copyright and Patents Act 511. STATE THE AREA OF COMPUTER
ETHICS:NOT EATING IN A COMPUTER LAB
D. Regulation of Investigatory Powers
ACCORDING TO THE SCHOOL RULES.
Act
A. GREEN COMPUTING
507. Codes of conduct is
B. CODE OF CONDUCT
A. A written guideline that helps to deter-
mine whether a specific computer action C. INTELECTUAL PROPERTY RIGHTS
is ethical. D. INFORMATION PRIVACY
B. A written guideline that helps to deter-
mine whether a specific computer action 512. Software designed to protect computers
is unethical. from viruses
C. A written guideline that helps to deter- A. Firewall
mine whether a specific computer action.
B. Network Switch
D. A written guideline that helps to deter-
C. Router
mine whether a specific computer action
is ethical or unethical. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 940

513. What is the biggest concern with our D. All of the above
health?
517. are software programs designed to
A. Observing and recording the activities invade your computer and damage your
of employees, sometimes without their di- data.
rect consent.
A. Spyware
B. The use of electronic devices for a long
B. Trojans
period of time can be bad for your health.
C. Worms
C. Light emitted from electronic devices,

NARAYAN CHANGDER
which can lead to eyestrain, headaches, D. Adware
fatigue, and long-term vision problems. 518. hides within a program that looks le-
D. A network of encrypted content that al- gitimate; not capable of replicating itself.
lows users to engage in untraceable activ- A. Worms
ity.
B. Virus
514. Which of the following statements is C. Spyware
false about privacy and the internet?
D. Trojan
A. An organisation must make their pri-
vacy settings easy to find and manage 519. Technology can damage the environment
and it is important to understand the
B. An individual has the right to use en-
environmental impacts so that we can each
cryption technology to encrypt their per-
take steps to them.
sonal data
A. minimise/negative
C. An individual has the right to freedom
from deformation of their character B. time/minimise
D. When an individual deletes data from C. negative/minimise
their social media account the data must D. recycle/negative
be permanently removed from the servers
of the organisation 520. This legislation is intended to give certain
groups the legal right to carry out digital
515. Someone who stands to gain or lose, de- surveillance and access digital communica-
pending on how a situation is resolved is tion held by a person or organisation.
called a . A. Data Protection Act
A. negotiator B. Computer Misuse Act
B. figurehead C. Copyright and Patents Act
C. stakeholder D. Regulation of Investigatory Powers
D. philanthropist Act

516. Cybersecurity is important because it 521. uline.5cm is defined as a set of attitudes


helps: concerned with the value of work, which
forms the motivational orientation.
A. Prevent data and identity theft
A. Integrity
B. Support critical business’s or organiza-
tion’s processes B. Work ethics
C. Avoid compromise or infection of com- C. Personal Values
puters and computing systems D. Professional values

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 941

522. Any event or action that could cause a 527. What should be the first step taken by a
loss of or damage to computer or mobile user when s/he receives information from
device hardware or software the Internet?

PRACTICE BOOK» NOT FOR SALE


A. Cybercriminal A. Provide proper citations for the origi-
B. Digital security risk nal author(s)

C. Green computing B. Evaluate the value of the web page

D. Online perpetrators C. Share the information with others


D. Rely on its content without hesitation
523. Everyone responsible for using personal
data has to follow strict rules called ‘prin- 528. According to the Federal Trade Commis-
ciples’. sion, how many Americans have their iden-
A. Data Protection Act tity stolen each year?
B. Regulation of Investigatory Powers A. six million
Act B. seven million
C. Freedom of Information Act C. eight million
D. Protection of Freedoms Act D. nine million
E. Privacy and Electronic Communica-
tions Regulations 529. An example of a security risk or threat to
a computer is:
524. Collection of computers controlled by A. Malicious Code
users other than their owners to perform
automated tasks over the Internet B. Authorized Access
A. Router C. Theft
B. Botnet D. System Failure
C. Firewall 530. Computer ethics is:
D. none of above A. The act of damaging computer soft-
ware deliberately.
525. Employees using their companies internet
connection for personal use on company B. The rules governing the use of technol-
time is called ogy.
A. Net Neutrality C. Using computers without permission
B. Employee Monitoring D. none of above
C. Cyberloafing 531. Example of an unethical behavior regard-
D. Predictive Policing ing technology.

526. Ethics are NOT A. George sees someone’s phone un-


locked and decides to lock it.
A. standards of right and wrong
B. Lizzy is using her phone during her
B. a list of detailed instructions lunch break.
C. values of an individual C. A student tells his teacher that his
D. none of above friend is cheating on the test.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 942

D. A college student decides to humiliate 536. software can overload computer


a former friend by posting embarrassing memory and it can slow its functioning.
photos on social media. A. Computer
532. Refers to online or Internet-based illegal B. Malicious
acts such as distribution of malware or C. Application
identify theft
D. none of above
A. crime ware

NARAYAN CHANGDER
537. The discovery, collection, and analysis
B. cyberterriost
of evidence found on computers and net-
C. cybercrime works
D. cyberwarfare A. Digital forensic
B. Network license
533. Someone who demand payment to stop
an attack on an organization’s technology C. Software piracy
ifrastructure D. Software theft
A. cybercrime
538. Someone who access a computer or net-
B. cyberterrorist work illegally
C. cyperextorinoist A. Cybercriminals
D. cyberwarfare B. Cyberextortionist
C. Hacker
534. Hayley has designed a new web app. She
thinks another company is changing her D. Trojan horse
idea. Which act would Hayley use to stop
this person from doing this? 539. Which is true about information accu-
racy?
A. Creative Commons Licence
A. Do not assume that the information
B. Computer Misuse Act provided on the web page is correct.
C. Copyright designs and Patents Act B. User relies on the web page to get in-
D. Freedom of Information Act stant information.
C. Assume the news on the social media
535. Sharron’s computer was infected by is posted by a valid party.
viruses. Which of the following could be
D. Use other’s computer resources with-
a possible cause?
out authorisation.
A. Sharron scanned her computer for
virus 540. Safety measures to be observed when us-
ing the computer includes all of the follow-
B. Sharron copied a file from her com- ing except
puter to an external hard drive
A. use of antiglare protector
C. Sharron connected her computer to a
printer B. sitting posture

D. Sharron downloaded free movie from C. maintaining a dust free environment


the Internet D. dropping liquid in the computer room

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 943

541. She is considered to be the first computer B. The Italian Room


programmer. She wrote a computer lan- C. The Japanese Room
guage for the Analytical Engine.

PRACTICE BOOK» NOT FOR SALE


D. The French Room
A. Grace Hopper
546. “Flooding a single network or server
B. Radia Perlman
with useless traffic using multiple compro-
C. Ada Lovelace mised systems” is known as
D. Sister Mary Kenneth Keller A. Cross-site scripting
542. Mahawangsa Corporation have prepare B. SQL injection
a full document of do’s and dont’s when it C. Distributed denial of service (DDoS)
comes to make decision on business. Why D. Denial of service (DoS)
is so important to foster he good business
ethic? 547. What is Human Dignity?
A. To protect the organization from legal A. Respecting the privacy of other hu-
action mans beings.
B. To produce good business B. Refusing to violate the intellectual
property rights of others.
C. To avoid unethical decision making
C. Observing rules of “netiquette “ that
D. To gain goodwill of the community
promote online civility.
543. Which of the following statements de- D. Protecting confidential data and infor-
fines an Intrusion Detection System? mation.
A. Computer device which forwards data 548. Using a portion or piece of writing that
packets from one network to another has been copied from someone else and
B. software designed to protect comput- presenting it as your own work
ers from viruses A. Unauthorized Use
C. device which monitors network activi- B. Software Piracy
ties for malicious attacks & produces re-
C. Plagiarism
ports to a management station
D. Fair Use
D. network controller which connects net-
work devices & allows effective communi- 549. Exception to copyright infringement
cation between these devices A. Firewall
544. Which of the following is NOT one of the B. Identity Theft
six areas of computer ethics? C. Fair Use
A. Information Systems D. none of above
B. Green Computing
550. Which Devices are usually hacked by ter-
C. Codes of Conduct rorist?
D. Information Privacy A. Phones
545. Thought experiment dealing with the B. Computer
idea of knowledge. C. iPads
A. The Chinese Room D. All of the above!

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 944

551. What year was the data protection act 556. A computer room contains the following
released? except
A. 1998 A. monitor
B. 1990 B. printer
C. 1988 C. Sewing machine
D. 2000 D. UPS

NARAYAN CHANGDER
552. Maximum penalty for being found guilty 557. When you see a malicious comment about
increasing to a prison sentence of 14 years yourself, but do not know who sent it, re-
and the possibility of a fine. port it to the content , such as Face-
A. Computer Misuse Act book, YouTube, and ask them to delete the
comment.
B. Information Commissioners Office
A. restriction
C. Copyright, Designs and Patents Act
B. service
D. Equality Act
C. provider
E. Freedom of Information Act
D. creator
553. telemedicine involves acquiring data,
sound, images, and video from a patient 558. In 1770, at Schaunbrunn Palace, the
and then transmitting everything to a med- world was introduced to the first Artifi-
ical specialist for later evaluation cially Intelligent machine, it was a hoax,
but tricked people by playing
A. Live
A. Scrabble
B. EHR
B. Checkers
C. Store-and-forward
C. Draughts
D. OLPC
D. Chess
554. Etiquette on the Internet is known as
559. Which of the following statements de-
A. Intiquette fines plagiarism?
B. Netiquette A. Use of computers, cell phones or other
C. Etiquette electronic devices to deliberately and re-
peatedly harm another person through
D. Webiquette the Internet
555. Turning unreadable characters into read- B. Use of other people’s words, thoughts
able information or ideas without crediting the source
A. Decryption C. Unauthorized reproduction or distribu-
tion of copyrighted materials
B. Uncryption
D. Fraud which involves stealing personal
C. Noncryption
information for financial gain through e-
D. Encryption mail

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 945

560. treats the software unit as a device 565. is group of compromised computers
that has expected input and output behav- or mobile devices connected to a network.
iors but whose internal workings, unlike

PRACTICE BOOK» NOT FOR SALE


A. Cyberterrorism
the unit in black-boxtesting, are known.
B. Botnet
A. Black box testing
C. Information system
B. Static Testing
D. Computer system
C. Dynamic Testing
566. The following statement is the correct
D. White-box testing
codes of conduct except
561. Sexting is unethical and can be A. computers may not be used to harm
A. illegal others.
B. computers may not be used to steal.
B. confidential
C. employees may use the software given
C. detected
by employers for personal benefit.
D. damaged
D. employees shall consider the social im-
562. Anyone can use this type of information, pact of programs and systems they design
but no person can own it 567. Ada Lovelace that one day machines must
A. public domain be able to create original ideas beyond
their original programming. What is linked
B. shareware
with this idea?
C. freeware
A. Art
D. none of above B. Music
563. Examples of online piracy: C. Logic
A. Download music D. Maths
B. Download movies 568. If you write an original story, what type
C. Download software of intellectual property gives you the right
to decide who can make and sell copies of
D. Download pictures your work?
E. Download e-mail A. copyright
564. What is the definition of information ac- B. geographical indications
curacy? C. patents
A. An accuracy tool that user uses to get D. trademarks
information.
569. This is software, donated for public use
B. A measure of the reliability of informa-
that can be freely copied and distributed.
tion held within an IT system.
A. Share Ware
C. A measure of the reliability of guide-
lines held within an information technol- B. Commercial Software
ogy system. C. Copyright
D. none of above D. Public Domain Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 946

570. Rules which one must agree to abide by C. crime ware


in order to use service. D. none of above
A. Terms of use
575. Which of the following situations CAN-
B. Copy Right
NOT cause a computer to become in-
C. Ethics fected?
D. none of above A. Copying a file from a computer to a
flash drive
571. The principle of means recognizing

NARAYAN CHANGDER
and respecting the intellectual property of B. copying a file from a flash drive to a
others, including online data, login infor- computer
mation, creative works, and other digital C. visiting an unknown website
assets.
D. clicking a link through an unknown e-
A. human dignity mail
B. civility
576. Advisory code of conducts are
C. confidentiality
A. Mandatory
D. digital property rights
B. Self binding
572. Your father left the room without logging
off his bank’s website. What should you C. Imaginary
do? D. Legal
A. Ignore the temptation to peek at those
577. What is information privacy?
financial records.
A. The right of individuals and companies
B. Find out if there is enough money in
to let the government access all of your
there to cover a DVD player.
personal information
C. Peek at his bank balance, and then
B. The right of individuals and companies
share the news with my friends.
to deny or restrict the collection and use
D. Slip over to the computer and see how of information about them
much money he has. As a member of the
family, I have a right to know. C. The right of individuals and companies
to censor others for expressing their own
573. Which of these does NOT use machine opinions about them
learning/AI? D. The right of individuals and companies
A. driverless cars to deny or restrict their First amendment
B. SIRI/Alexa rights.
C. Sonos wireless speakers 578. is the crime of obtaining goods, ser-
D. facial recognition on your phone vices, or property through deception or
trickery.
574. Any illegal activity involving the use of a
A. Conflict of interest
computer or related device is referred to
as a B. Breach of contract
A. cybercrime C. Fraud
B. computer crime D. Misrepresentation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 947

579. Software firewall that detects and pro- 584. I.A.B. stands for
tects a computer and its data from unau- A. Interactive Advertising Bureau
thorized intrusions

PRACTICE BOOK» NOT FOR SALE


B. Internet Architecture Board
A. Personal firewall
C. Interactive Advertising Board
B. Proxy firewall
D. Internet Architecture Bureau
C. Unauthorized access
D. Unauthorized use 585. According to a recent study by the Cyber-
bullying Research Center, how many stu-
580. A person who can be identified, directly dents ages 11 to 18 have been cyberbul-
or indirectly from a data set. lied?
A. Personal data A. 20.1 percent
B. Data subject B. 18.9 percent
C. Information commissioner C. 22.3 percent
D. Data protection officer D. 21.2 percent
581. Which is an example of plagiarism? 586. Which of the following is NOT a possi-
A. Reading a paragraph online and retyp- ble result of plagiarism as discussed in this
ing it in your own words. segment?
B. Copying and pasting someone else A. Receiving a failing grade
work into your paper using qoutation B. Being expelled from school
marks and citing the author C. Failing to learn knowledge
C. Typing a paper in your own words D. Receiving a fine
D. Copying and pasting a sentence from
the Internet into your paper. 587. Charlie uses social media regularly. What
step would yourecommend to be more se-
582. You want a new computer. What can you cure online?
do to prevent others from accessing your A. Always use the same password
confidential data in this computer?
B. Only post non-private data/pictures
A. Set a user name and password
C. Always use a mobile phone for secu-
B. Use an uninterruptible power supply rity
(UPS) and a surge protector
D. Share other people’s pictures as much
C. Back up data and save it in a different as possible
location
D. Install a spyware program and an an- 588. A form of software that collects infor-
tivirus program mation about the user in order to display
advertisements in the browser based on
583. Free computer games and free screen the information it collects from the user’s
saver programs are typical carriers of browsing patterns.
A. DoS attacks A. Adware
B. worms B. Free ware
C. viruses C. Share ware
D. trojan horses D. Public domain Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 948

589. Through which of the following channels C. Internet etiquette


do 82 percent of sex offenders gain infor- D. none of above
mation about their target?
A. victim’s friend 594. A license to use software on multiple com-
puters (like in a school lab or a business)
B. text messages
A. Software Licence
C. social media sites
D. victims’ schools B. Site Licence

NARAYAN CHANGDER
C. Shareware
590. In general terms of information this al-
lows certain bodies to share with the gov- D. Free ware
ernment.
595. Why do students need to learn about dig-
A. Data Protection Act ital security?
B. Regulation of Investigatory Powers A. To learn how to protect themselves
Act from online threats
C. Freedom of Information Act B. Because it is required for them
D. Protection of Freedoms Act C. To learn how to give personal informa-
E. Privacy and Electronic Communica- tion out to online users
tions Regulations D. none of above
591. According to the Online Predators and
596. Law that protects an author’s work
Safety segment, approximately how many
sex offenders are there in the United A. License Agreement
States? B. Copyright Laws
A. 271, 000 C. Civil Rights Laws
B. 645, 000 D. License Laws
C. 389, 000
597. Which of the following is not a natural
D. 532, 000
cause of water pollution?
592. The main job of the central processing A. Volcanoes
unit (CPU) in a computer?
B. Animal waste
A. It stores data and instructions that the
computer will need C. Oil spills

B. It transfers data between the various D. Silt from storms and floods
components of the computer
598. A numeric password, either assigned by
C. It executes the instructions from a pro- a company or selected by a user that pro-
gram stored in memory vide security
D. none of above A. Biometrics
593. What is the full name for netiquette? B. Keygen
A. Network etiquette C. Password
B. Computer etiquette D. PIN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 949

599. What are Ethics? C. study of ethical issue


A. The study of how people function most D. none of above

PRACTICE BOOK» NOT FOR SALE


effectively in their work environment.
604. “The moral guidelines that govern the
B. Avoiding unlawful acts but also uphold- use of computers, mobile devices and infor-
ing standards such as confidentiality, hu- mation systems, and related technology”.
man dignity, civility, and property rights. The statements is refer to
C. An area of computer science that fo- A. Computer networks
cuses on intelligent machines.
B. Computer ethics
D. obeying laws that regulate how com-
puters are used. C. Computers system
D. Computer netiquette
600. The researcher should ensure that the
participants will not be adversely affected 605. Governs the usage or redistribution of
by the research and its results. copyright protected software
A. Care A. Software Licence
B. Human Subjects Protection B. Site Licence
C. Respect for Colleagues C. Shareware
D. Social Responsibility D. Free ware

601. Unique combination of characters, such as 606. Risk management in an IT industry is re-
letters of the alphabet or numbers, that sponsibility of the
identifies one specific users A. Client
A. Passphrase B. Investor
B. Password C. Developer
C. PIN D. Project Team
D. Username E. Production Team
602. The Act aims to provide security protec- 607. All of the following are ways of making
tion to online transactions. . It only legal- personal data more private, except
izes on one technology namely private key-
A. clear your history file when you have
public key Cryptography (PKP). Above is
finished browsing.
TRUE about
B. fill in only necessary information on
A. Communication and Multimedia Act
warranty and registration form.
1998
C. have unlisted telephone number.
B. Copyright (Amendment) Act 1997
D. purchase goods through online plat-
C. Computer Crimes Act 1997
forms.
D. Digital Signature Act 1997
608. Resource Crunch, Opportunities and Atti-
603. Which one is a term of cyberethics tude relates to
A. communication device A. Variety of moral issues
B. interactions with the physical world B. Variety of legal issues

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 950

C. Variety of technical issues B. letters


D. Variety of business issues C. logos
609. what is Digital property rights? D. pictures
A. protecting confidential data and infor- 614. Why would an author obtain a Creative
mation Commons License? (
B. refusing to violate the intellectual A. To stop the public sharing their work
property rights of others

NARAYAN CHANGDER
B. To make sure their work has a patent
C. observing rules of “netiquette” that
promote online courtesy and respect. C. To make sure they are able to legally
sell their work
D. respecting the privacy and dignity of
other human beings D. To give the public the right to share,
use and build upon work they have cre-
610. A provides an organization with vi- ated
sion and leadership in the area of business
conduct. 615. Which of the following is NOT an offence
under the Computer Misuse Act?
A. spiritual leader
A. unauthorised access to someone
B. corporate ethics officer
else’s files
C. disseminator
B. unauthorised access to someone
D. disturbance handler else’s files with intent to commit further
criminal offences
611. Code of morals of a particular person,
group, or profession C. copying software and trying to sell it to
A. Behavior someone for a profit

B. Morals D. writing and distributing a virus

C. Ethics 616. Continuing Professional Development is


D. Etiquette defined as
A. systematic maintenance of knowledge
612. This is a program that automatically
and skill
checks each disk as it is inserted into
the disk drive and scans all data from B. improvement and broadening of knowl-
telecommunication devices to locate and edge and skill
give warning of nay virus that may be C. development of personal qualities for
likely to enter a computer. execution of professional and technical
A. Anti Virus Program duties throughout the engineers’ working
life.
B. Computer bomb
C. Computer worm D. All of the above

D. Trojan Horse 617. The Patents(Amendment) Act, 1999


which was passed on 10th March, 1999
613. which of the following is NOT a trade- in the Indian Parliament for amending the
mark? Patents Act of 1970 which in turns fa-
A. business name or domain name cilitate to establish for filing patents

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 951

and accords with the exclusive marketing 622. Which of the following are ways of mak-
rights for the time period of 5 years ing personal data more private except

PRACTICE BOOK» NOT FOR SALE


A. the mail box system A. making payments using cash
B. the tender system B. installing firewall

C. the voting/polling system C. checking in current location in the so-


cial media
D. the First claim system
D. using unlisted phone number
618. An individual who are breaking into a 623. According to Greg Bazar, which of the
computer or a network system following is NOT an example of individual
A. Ethical hacker loss caused by viruses?
B. cracker A. stolen identity

C. scammers B. blacklisted by credit bureau


C. more fraud fees
D. Dynamic Denial of Service
D. more late fees
619. What are fundamental truths or rules
that support your personal values. 624. The unauthorized and illegal duplication
of copyrighted software
A. Principles
A. Piracy
B. Intellectual Property
B. Site license
C. Blue Light C. Encryption
D. Values D. Off site
620. Is a small text file which contains an ID 625. Below are core of human value. EX-
tag, placed on computer by a website. The CEPT?
website saves a complementary file with
A. Right conduct
a matching ID tag.
B. Peace
A. Spyware
C. Love
B. Computer Worm
D. Decision maker
C. Computer Cookie
626. Cathy is a high school science teacher and
D. Computer Bomb she would like to copy some online edu-
cational materials to distribute to her stu-
621. Crime which occurs when someone’s per-
dents. Which of the following materials
sonal and financial information is stolen in
can Cathy NOT make copies of?
order to impersonate him or her for finan-
cial gain A. The entire Astronomy Today book

A. Cyberbullying B. An article from the National Geo-


graphic magazine
B. Fair Use
C. A graph from the American Scientist
C. Identity Theft magazine
D. none of above D. A chapter from the Cosmos book

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 952

627. is a term applied to a variety of ef- 631. Government organisations block content
forts directed toward the efficient design, related to extreme politics. This is an ex-
manufacture, operation, and disposal of IT- ample of
related products A. Privacy issues
A. Whistle Blowing B. Censorship
B. Misrepresentation C. Monitoring
C. Green computing D. Legal issues

NARAYAN CHANGDER
D. Quality Factor
632. The subject under test/experiment
should be given all relevant information
628. Some important network security devices
needed to make the decision to participate.
include (three):
this is known as
A. Router
A. Informed arguement
B. Botnet B. Informed consent
C. Firewall C. proposed consent
D. Anti-virus D. classified consent
E. Switch
633. The following are some of the conditions
629. Choose the correct importance of intel- required for registration as a Professional
lectual property right.I. To protect exclu- Engineer except
sive rights, preventing others from using A. A citizen or permanent resident of
the same brand identity.II. To protect any Malaysia;
original work that created by individual B. Graduated with a CGPA of 2.0 or
person or companyIII. To protect programs higher.
containing confidential data from unautho-
rized intrusion. IV. To protect any material C. Registered as a Graduate Engineer
form of expression, if a copyright infringe- with BEM
ment occur. D. Achieved the training requirements of
A. I, II and III BEM;

B. II, III and IV 634. E Commerce mainly encompasses:


C. I, II and IV A. all business activities placed over the
internet
D. All of the above
B. some businesss activities
630. This is a legal concept that gives content C. no business activities
creators the right to control use and distri-
bution of their work. D. all commercial activities

A. Piracy 635. Why should you ask yourself whether


you’d want to see your behavior in the
B. Ethics
news?
C. Privacy
A. If the authorities find me, they will
D. Copyright alert the newspaper.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 953

B. If I wouldn’t want everyone to know B. Software piracy


about it, then I shouldn’t do it. C. Internet piracy

PRACTICE BOOK» NOT FOR SALE


C. I’ll be able to tell how badly I want to D. Impersonation
be a celebrity.
D. I’ll find out whether I’m doing it for the 641. Which of the following 3 principles are
attention it brings me. part of the Data Protection Act 1998
A. data must be processed fairly and law-
636. Copying and using commercial software
fully
purchased by someone else
B. data must be kept up to date
A. Unauthorized Use
C. data must be kept secure
B. Software Piracy
D. data can be transferred outside the EU
C. Plagiarism
D. Fair Use 642. is a term referring to a number of
distinct types of creations of the mind for
637. If you borrow and copy a friend’s soft- which property rights are recognized and
ware in violation of the licensing agree- the corresponding fields of law.
ment, what kind of computer ethics that
A. Intellectual property
you have failed to adhere? (2 answers)
A. Information privacy. B. Identified Property

B. Software piracy. C. Internet Property

C. Information accuracy D. Inernational Property

D. Intellectual property right 643. This is misusing computer equipment to


intentionally damage it.
638. communicate & cooperate with each
other like humans in real time A. Computer bomb
A. Interactive multimedia B. Computer Virus
B. Cyber-physical systems C. Anti Virus Program
C. Cyber critical systems D. Computer Abuse
D. Voice Control System 644. encourages individuals to pass along
a marketing message to others, thus cre-
639. is the current trend of automation and
ating the potential for exponential growth
data exchange in manufacturing technolo-
in the message’s exposure and influence.
gies.
A. Social Networking
A. Industry 4.0
B. Direct Advertising
B. Social Networking
C. Viral marketing
C. Data Analytics
D. Indirect Advertising
D. Cyber Space

640. The illegal use, copying or distributing 645. What law makes organisations look after
of software without ownership or legal your personal data properly?
rights. A. Data Privacy Act
A. Counterfeiting B. Data Protection Act

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.5 Ethics in Computing 954

C. Data Protection Law 651. A network is hacked and a new movie


D. Data Privacy Law is downloaded. The movie is then up-
loaded to the internet for free download-
646. is the probability of an undesir- ing. Whilst on the network potentially
ableevent occurring times the magnitude user data was accessed too. What laws
of the event’s consequences if it does hap- have been broken?
pen
A. Data Protection Act
A. Risk

NARAYAN CHANGDER
B. Reliability B. Computer Misuse Act
C. Redundancy C. Copyright Designs and Patents Act
D. Critical Quality D. Creative Commons License
647. The researcher should be fully equipped
with research skills when conducting the 652. which is not one of the basic ethical prin-
study. ciples discussed in the video
A. competence A. Digital property rights
B. confidentiality
B. Human dignity
C. legality
C. Confidentiality
D. openness
D. Ergonomics
648. is an effort by an employee to attract
attention to a negligent, illegal, unethical,
abusive, or dangerous act by a company 653. According to Stephanie Winters, which of
that threatens the public interest. the following is true?
A. Professional malpractice A. More boys than girls are sending sexts
B. Conflict of interest B. Sexts cannot be distributed to other
C. Whistle-blowing schools or other cities
D. Business intelligence C. Sexting can result in fines from you cell
649. Step by step instructions for solving a phone company
problem. D. Most sexts are sent between
A. Decomposition boyfriends & girlfriends
B. Algorithm
C. Abstraction 654. Which of the following is not a measure
to protect computer security?
D. Pattern Matching
A. Encrypting data
650. The following are the risks in developing
AI’s EXCEPT B. Restricting access
A. Loss of job C. Copying data and storing it at a remote
B. Fraud detection location
C. Distribution of power D. Keeping the same password on all sys-
D. Cost of maintenance and repair tems consistently

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 955

655. STATE THE AREA OF COMPUTER 658. Which of the following methods is appro-
ETHICS:A BANK WORKER USING OFFICE priate to use to prevent predators from
COMPUTER TO STEAL CUSTOMERS INFOR- finding you online?

PRACTICE BOOK» NOT FOR SALE


MATION.
A. keep private information private
A. GREEN COMPUTING
B. accept strangers as friends on Face-
B. INFORMATION ACCURACY book
C. CODE OF CONDUCT
C. avoid talking about predators
D. none of above
D. arrange a meeting with a stranger
656. The right of a person to disclose informa- from the Internet
tion about themselves to anyone
A. piracy 659. What is Intellectual Property?
B. Privacy A. A network of encrypted content that al-
C. phishing lows users to engage in untraceable activ-
ity.
D. copyright
B. Content is owned by a copyright
657. The use of electronic messaging systems holder.
to send unsolicited bulk messages.
C. Employees using their company’s inter-
A. Cookie net connection for personal use on com-
B. Spam pany time.
C. Honey D. An area of computer science that fo-
D. none of above cused on intelligent machines.

10.6 Intellectual Property Rights and Privacy


1. The following derivative works shall also 3. is the making of one (1) or more copies
be protected by copyright:Which pf them of a work or a sound recording in any man-
is NOT included? ner or form.
A. dramatizations A. Reprinting
B. Reproduction
B. adaptations
C. Recollection
C. muralization
D. reediting
D. translations,
4. How many years is the life span of the
copyright of a book?
2. These things can be copyrighted:(mark all
that apply) A. 1 year
B. 7 years
A. art
C. 25 years after the death of the author
B. music
D. 50 years after the death of the author
C. software
5. Which of the following is not a type of
D. recording patent?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 956

A. Utility patents 10. A patent will be valid if:


B. Copyright A. It is known by public
C. Design patents B. It is not known or sold to people before
D. Plant Patents C. It is used by public
D. None of the above
6. Which of the following is NOT a basis from
which to challenge an intellectualproperty 11. A right which prohibits the copying of an
right?

NARAYAN CHANGDER
original, non-commonplace design of the
A. The intellectual property right was shape of configuration of a product.
registered bysomeone who has since A. RIGHT OF FAIR USE
changed their name
B. DESIGN RIGHT
B. The intellectual property right relates
to a writtenwork registered by an author C. COPYRIGHT
dead 70 years D. PATENT
C. The renewal fee on the intellectual 12. One way that humans have attempted to
property rightwas not paid after the initial deal with new technologies, with varying
ten-year period expired success, is by
D. The intellectual property was never A. Passing laws
valid becausethe essential requirements
for registration weren’t met B. Voting
C. Making Laws
7. The process of taking something apart in
D. All the answers
order to understand it, build a copy of it,
or improve it is called 13. Trade Secrets can be protected for how
A. Forward engineering much time?
B. Copy and print A. 10 years
C. Improvement and renovations B. 15 years
D. Reverse engineering C. Unlimited period
D. None of the above
8. The following can be patented
A. Machine 14. Samsung has taken the specification and
features of IPhone. Which of the follow-
B. Process
ing is an example of this statement?
C. Composition of matter
A. Trademark Infringement
D. All of the above
B. Patent Infringement
9. What is the most likely result of having no C. Trade secret Infringement
policy on intellectual property? D. Copyright Infringement
A. Confusion and mistakes.
15. What do you call the intellectual property
B. Increased efficiency. which is created by two (2) or more per-
C. Increased control. son?
D. Loss of business opportunity. A. Collective Work

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 957

B. Teamwork B. A brand name


C. Binary C. A business process

PRACTICE BOOK» NOT FOR SALE


D. Tertiary D. A business slogan

16. Which of the following is Rights of a Copy- 21. Notice of the record shall be published in
right Owner? the (Sec. 19, P.D. No. 49a)
A. Publish their work and Perform their A. IPO Manual
work in public
B. IPO Gazette
B. Translate and Broadcast their work
C. IPO News
C. Prevent others from making unautho-
rized use of copyrighted work D. IPO FB

D. All of these 22. Case Study Based:When did Kashmir Saf-


fron get the GI tag?
17. Distinctive registered mark used by a busi-
ness to identify itself and its products or A. July 2020
services to consumers. B. August 1950
A. INTANGIBLE RIGHTS C. September 1992
B. PATENT D. December 2005
C. RIGHT OF FAIR USE
23. The method of manufacturing coconut
D. TRADE MARK punch needs to be protected by:
18. If two (2) or more persons jointly own a A. a copyright
copyright or any part thereof, shall B. a patent
be entitled to grant licenses without the
prior written consent of the other owner C. trade secrets
or owners. (Sec. 15, P.D. No. 49a) D. a design right
A. no one
24. If Aya invents a new process for recording
B. neither of the owners music, she will likely apply for a:
C. only one owner A. Patent
D. none of the choices B. Trademark
19. Which was the first Indian product to get C. Copyright
the geographical indication (GI) tag? D. Trade secret
A. Aranmula Kannadi
25. The following aspect of a patent specifica-
B. Darjeeling Tea tion clearly specifies the scope of owner-
C. Nagpur Orange ship of a Patent:
D. Madhubani Paintings A. Title of invention
B. Field of invention
20. Which of the following cannot be trade-
marked? C. Claims
A. A logo D. Abstract

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 958

26. John Legend would not be able to copy- A. 14 years


right the birthday song because: B. 30 years
A. Songs can’t be copyrighted C. 20 years
B. John Legend didn’t write it D. none of above
C. It has no creativity 32. A patent related to ball point pen was
D. He actually could granted to
A. Mr. Hunt

NARAYAN CHANGDER
27. Why would you want to license a patent?
B. Ms. Mary Anderson
A. Another group may be able to produce
the product faster than you. C. Ms. Miriam Benjamin
B. Another group may be able to produce D. Mr. John J Loud
the product in a greater quantity than you. 33. What is a trademark?
C. Another group may be able to produce A. A unique symbol, sign, logo or word
a better quality product than you that legally represents a business.
D. All the following B. A sign that represents a trade show in
the conference.
28. Who should assist us with avoiding break-
ing policies of intellectual property? C. A sign sometimes used by the company
to sell goods
A. A friend
D. The signage on numerous different
B. .Senior management & Human re-
products.
sources
C. Security 34. How long do patents usually last for?
A. 40 Years
D. Human resources only
B. 20 Years
29. Which of the following is not an example
C. 15 Years
of a literary work?
D. 10 Years
A. A shopping list
B. A character from a novel or story book 35. A patent related to safety pin was granted
to
C. A textbook
A. Mr. Hunt
D. Computer Program
B. Ms. Mary Anderson
30. A usually lasts for the life of the online C. Ms. Miriam Benjamin
creator plus 70 years. D. Mr.John J Loud
A. Patent
36. Which of the following cannot have a de-
B. Trademark sign right applied?
C. Copyright A. The design of a video game character
D. Trade secret B. Apple’s specific office design
31. A utility patent gives its owner negative C. The unique shape of a brand of furni-
rights that stop anyone from copying, us- ture
ing or selling the defined invention for D. All can have it applied

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 959

37. What are intellectual property rights? 42. Which type of patent would be applicable
to something like “Amazon.com” one-click
A. Patent, trademark, copyright, trade-
ordering system or “Trivago.com” model

PRACTICE BOOK» NOT FOR SALE


mark, trade secret
of purchasing accommodations?
B. patent, trademark, copyright, indus-
A. Trademark
trial design, geographical indication
B. Business method patent
C. Patent, trademark, corporate, trade
secret C. Design patent
D. Dot com patent
D. Patent, trades, copyright, trade secret
43. is the exclusive legal right, given to an
38. A is a word, phrase, symbol, and/or originator or an assignee to print, publish,
design that identifies and distinguishes the perform, film, or record literary, artistic,
source of the goods of one party from or musical material, and to authorize oth-
those of others. ers to do the same.
A. Patent A. Copyright
B. Trademark B. Patent
C. Idea C. Idea
D. Sentence D. Trades

39. Which of the following are considered as 44. There has to be some element of
trade secret? A. Originality
A. Personal information B. Loyalty
B. Negative information C. Novelty
C. Financial information D. Bauble

D. All of the following 45. A symbol, word/s, legally registered or


established by use as representing a com-
40. Thomas Edison invented the light bulb. pany or product.
What document protected this invention?
A. Patent
A. Copyright B. Trade Secrets
B. Patent C. Copyright
C. Trade secret D. Trademark
D. none of above 46. A(n) is a logo, package design, phrase,
sound, or word that enables a consumer
41. Trade secrets in India are protected under
to differentiate one company ‘ s products
which act?
from another ‘ s.
A. Indian Contract Act, 1872 A. Patent
B. Copyright Act, 1957 B. Copyright
C. Patents Act, 1970 C. Trademark
D. None of the above D. Plant breeder’s rights

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 960

47. Semiconductor IC Layout Design Act was C. 20 years


introduced in?
D. 5 years
A. 2000
52. A is an exclusive right granted for an
B. 2011
invention.
C. 1995
A. Patent
D. 1990
B. Trademark

NARAYAN CHANGDER
48. Which is NOT in the intellectual property
C. Copyright
categories?
D. Trade secret
A. PATENT
B. TRADEMARKS 53. In order to protect the name Un-Moja
C. HUMAN RIGHTS Blends should be used.

D. INDUSTRIAL DESIGN A. a patent


B. a copyright
49. Why are intellectual property rights so im-
portant to businesses? C. a design right
A. It makes your original creations more D. a trade mark
valuable.
54. Which is not included in the protection?
B. Without registering your IP, you can- IPR in the Philippines and in other coun-
not sell your products. tries shall protect and secure the exclusive
C. Without them, any successful idea rights of , and other gifted citizens
could be copied by a competitor.
A. scientists
D. They aren’t.
B. inventors,
50. What are some examples of intellectual C. teachers
property, copyright, patents, and trade-
marks that exist just after watching this D. artists
Crash Course video? Try to list at least
55. What is the purpose of the policies and pro-
seven.
cedures?
A. Video, Website, Song, and Instagram
profile A. Making lives miserable

B. Video, Website, Song, and Sculpture B. Adding more complexity


your mom make C. To act and behave professionally
C. Video, Website, Song, and The soft- D. Add more formality and shape to work
ware
D. All Answers 56. This sign ®stands for
A. Patent
51. The protection of IC Layout design is avail-
able for? B. Trade secret
A. 10 years C. Registered copyright
B. 15 years D. Registered trademark

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 961

57. How do you educate you employees about B. Design Patent


intellectual property? C. Utility Patent

PRACTICE BOOK» NOT FOR SALE


A. By providing a list
D. none of above
B. By phone
63. The term “Intellectual Property Rights”
C. By email
covers
D. Training and workshops
A. Copyrights
58. Which item would you be able to patent? B. Know-how
A. A literary, dramatic, musical or artistic C. Trade dress
work
D. All of the above
B. A scientific or mathematical discovery
or theory 64. are Intellectual Property.
C. A technological advancement A. Trademarks
D. All B. Slogans
59. The least common type of patents is C. Fragrances
A. Plants Patent D. Words
B. Utility Patent
65. If you file provisional specification, the
C. Design Patent complete specification is required to be
D. none of above filed within
A. 10 months
60. Which of the following is excluded from an
intellectual property law? B. 12 months
A. Trademark Act, 1999 C. 18 months
B. Patent Act, 1970 D. 24 months
C. Income Tax Act, 1962
66. Practice of registering a trade mark as a
D. Copyright Act, 1957 domain name with the intention of later
selling it to the rightful owner.
61. The or their heirs may designate a so-
ciety of artists, writers or composers to A. DESIGN RIGHT
enforce their economic rights and moral B. INJUNCTION
rights on their behalf. (Sec. 32, P.D. No.
49a) C. CYBERSQUATTING

A. copyright owner D. COPYRIGHT


B. Intellectual Owner 67. An entrepreneur applying for a medicine
C. Business Owner utility patent requires
D. All of the above A. FDA approval
B. DHA Approval
62. An artist who wants to protect his new
painting should apply for C. Police Approval
A. Plant Patent D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 962

68. is the transfer of the possession of the A. 95-120 years


original or a copy of a work or a sound B. 98-120 years
recording for a limited period of time, for
profit-making purposes; C. 100-120 years
A. Rental D. 120 years
B. selling 74. “ a fairly extensive use of the original
C. sharing work is permitted in a parody in order to
“conjure up” the original.” In this phrase,

NARAYAN CHANGDER
D. hosting “conjure up” means:
69. Which of the following is NOT a Literary A. A magic trick
and Artistic Work? B. To make you think of the original
A. Painting C. Slightly refers to the original
B. Book D. None of the following
C. Pamphlet
75. What is in the seal which is not found in
D. Bonsai the logo?
70. What protects the intellectual property A. color
created by inventors? B. line
A. Patents C. name of the company
B. Copyrights D. symbols
C. Trademarks
76. Describe what is widely considered to be
D. Registered Designs the first copyright law.
71. is any word, name, symbol, or de- A. Grant ownership rights to individual
vice used to identify the source or origin authors
of products or services and to distinguish B. Statue of Anne
those products or services from others
C. Publishers or printers
A. Patent
D. All answer
B. Trademark
C. Copyright 77. A logo can be made exclusive property of
a company by registering a
D. Trade secret
A. Trademark
72. The rights of a patentee are B. Copyright
A. Sell C. Patent
B. License D. Industrial Design
C. Assign the IP to others
78. Licensing a patent simply means that the
D. All of these patent owner grants to another indi-
73. For works made for hire, terms last for vidual/organization to make, use, sell etc.
from publication or from the date his/her patented invention
of creation, whichever is shorter. A. Access

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 963

B. Permission 84. The Author of speeches, lectures, sermons,


C. Acceptance addresses, and dissertations mentioned in
the preceding paragraphs shall have the

PRACTICE BOOK» NOT FOR SALE


D. Benefits of making a collection of his works. (n)
79. How long does the term of copyright for A. joint ownership
an author lasts?
B. agreed right
A. Life of the Author plus 70 years
C. agreed fee
B. 20 years from the date of filing
C. Life of the Author D. exclusive right

D. 50 years 85. Which of the intellectual properties does


80. To get a patent, information about the SKSU seal belong?
invention must be disclosed to the public in A. Copyright and Related Rights
a patent application.
B. Trademarks and Service Marks
A. Basic
C. Geographic Indications
B. Technical
D. Industrial Designs
C. Detail
D. No detail 86. After registering a trademark, what sym-
bol should be placed by all protected
81. A patent related to Gong and Signal Chair
marks?
was granted to
A. Mr. Hunt A. R within a circle

B. Ms. Mary Anderson B. RTS within a circle


C. Ms. Miriam Benjamin C. T within a circle
D. Mr.John J Loud D. none of above
82. What is my role at the Department of
87. The Defend Trade Secrets Act amended the
Homeland Security?
EEA to create a federal civil remedy for
A. Attorney-Advisor(Trademarks)
A. Copyright infringement
B. Attorney-Advisor(Patents)
B. Patent infringement
C. TSA
C. Trade secret misappropriation
D. Senior Paralegal
D. Trademark infringement
83. The main tactic used to circumvent is
to register numerous domain name varia- 88. Can a musical composition without words
tions as soon as an organization thinks it be considered artistic work?
might want to develop a web presence.
A. Yes
A. Cyberdomain
B. Cybertransient B. No
C. Cybertenancy C. It depends on a situation
D. Cybersquatting D. It depends on the kind

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 964

89. What kind of material can be covered on 94. A Design Right would be required for
“Copyright”? which of the following:
A. Books and plays A. An app on a new phone
B. photographs and movies B. The brand of the maker of the phone

C. Music and dances C. The unique shape of a new phone


D. The creation of new technology on the
D. All of these can be protected.
phone

NARAYAN CHANGDER
90. What happens after trademarks are regis- 95. Complete Specification contains
tered?
A. Title of invention
A. No one else can use that trademark for B. Description of invention
those products.
C. Claims
B. The business makes a lot of money.
D. All of these
C. Other businesses can still use that
trademark for their products. 96. Coca-Cola and McDonald’s have symbols
that identify their company. What term is
D. The business gets new customers. used to identify their symbols?
91. What is NOT a deciding factor in Trade- A. Patent
mark infringement? B. Service mark
A. The similarity of marketing channels C. Trademark
used D. none of above
B. The similarity of the price 97. A patent related to windshield wiper was
C. The similarity of the marks granted to
D. The strength of the mark; A. Mr. Hunt
B. Ms. Mary Anderson
92. How many years is the protection in-
C. Ms. Miriam Benjamin
tended protection for trademark once you
have submitted the certificate of use? D. Mr. John J Loud

A. 3 years 98. Creating products that imitate other au-


thentic products is known as:
B. 7 years
A. Copying
C. 25 years
B. Creating
D. forever
C. Counterfeiting.
93. The intellectual property of a business D. Counter Stealing.
which it does not want others to know
99. What protects the intellectual property
about.
created by artists?
A. PASSING OFF A. Patents
B. PATENT B. Copyrights
C. TRADE SECRET C. Trademarks
D. INTANGIBLE RIGHTS D. Trade Secrets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 965

100. Amirul has designed a uniquely shaped 104. Assume a company’s marketing Vice
walker for senior citizens, which can be President leaves to become the marketing
collapsed and, with the aid of two levers, Vice President of another company, and

PRACTICE BOOK» NOT FOR SALE


used as a chair. Amirul’s design is in com- creates a marketing plan for the new com-
mercial production under the name of Sup- pany that is virtually identical to one he
portive Stroller. Which types of intellec- has working on at the old company. The
tual property would most likely apply to old company could argue that this a
Amirul’s creation? A. Trade secret dispute
A. Patent; copyright; trademark B. Copyright infringement
B. Copyright; trademark; industrial de- C. Patent infringement
sign
D. Market encroachment
C. Trademark; industrial design; trade
secret 105. A street vendor on Bloor Street is selling
D. Patent; trademark; industrial design fake “Rolex” watches. Under which area
of intellectual property would the Rolex
101. Business name is your original composi- Company likely seek a remedy?
tion of your own company while all the A. Patent
products you produce can have different
brands. The statement is B. Trademark

A. True C. Copyright
D. Trade secret
B. False
C. case to case 106. A patent grants exclusive rights to the
inventor for a period of-
D. no idea
A. 13 years
102. is the transfer of possession of the
B. 15 years
original or a copy of a work or sound
recording for a limited period? C. 20 years
A. Publication D. 5 years
B. Public Performance 107. is an artistic creation with utilitarian func-
C. Published work tions or incorporated in a useful article,
whether made by hand or produced on an
D. Public lending industrial scale.
103. The process of extracting knowledge or A. Original Trainer
design information from anything man- B. Hand made model-
made and re-producing it or reproducing
anything based on the extracted informa- C. work of applied art
tion is known as: D. Work of Music
A. Regular Thinking
108. What is the primary objective of intellec-
B. Reverse Engineering tual property?
C. Regular Engineering A. Increasing our stock of knowledge
D. Reverse Thinking B. Promote the progress of science

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 966

C. Useful arts B. INFRINGEMENT OF RIGHTS


D. All Answer C. RIGHT OF FAIR USE
109. The author is the natural person who has D. MONOPOLY RIGHT
created the work. Which of the following
is NOT considered the author? 114. Physical appearance, form, shape, con-
tour, and aesthetic features are protected
A. Computer programmer
by law. What is it?
B. Robot

NARAYAN CHANGDER
A. invention
C. Designer
B. industrial design
D. Inventor
C. creative work
110. in the case of a work other than an
D. patent
audiovisual work, is the recitation, play-
ing, dancing, acting, or otherwise perform- 115. Which of the following is NOT an exam-
ing the work ple of trade secret?
A. Showmanship
A. A method or technique that would give
B. Collective work an enterprise an edge over its competi-
C. Public Performance tors.
D. Published work B. Manufacturing techniques

111. Intellectual property differs somewhat C. A formula of a sports drink


from real property like cars or houses be- D. A written work of William Shakespeare
cause it’s
A. Limited in time and scope 116. Which is not included in the IPR state-
ment? The State recognizes that an ef-
B. Limited in duration and scope fective intellectual and industrial property
C. Limited in scope system is vital to the development of the
D. Duration domestic and , and ensures market ac-
cess for our products
112. Lucille comes up with an innovative way A. foreign products
to market to her clients. This business se-
cret is likely something that can be pro- B. creative activity
tected by: C. facilitates transfer of technology
A. Patent D. attracts foreign investments
B. Trademark
117. A trademark is a sign capable of the
C. Copyright
goods or services of one enterprise from
D. Trade secret those of other enterprises.
113. Practice of a company illegally trading on A. Displacing
the reputation of another company by mis-
B. Disseminating
representing its goods or services as being
those of the other company. C. Dismantling
A. PASSING OFF D. Distinguishing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 967

118. If a company develops a new technology, 123. Patentability Criteria Includes


what type of intellectual property can they
A. Novelty
use to stop others from copying their in-

PRACTICE BOOK» NOT FOR SALE


vention? B. Inventive Step
A. Patent C. Industrial Applicability
B. Trademark D. All of these
C. Copyright
124. What is the most likely result of non-
D. Trade secret compliance with intellectual property reg-
ulations?
119. Imagine a footballer sets up his own
company to sell his own range of clothes. A. Product improvement
What type of IP can he use? B. Lower profit.
A. Copyright C. Poor reputation.
B. Patents D. .Legal challenge.
C. Trademarks
125. Any that identifies the course of
D. Trade Secrets a specific product (trademark) or service
(service mark) and distinguishes it from
120. What are the four types of intellectual
others in the marketplace. (mark all that
property?
apply)
A. Copyright, Patents, Traders, Apples
A. word
B. Copy, Patents, Trademarks, Scripts
B. symbol
C. Copyrights, Patents, Trademarks, De-
C. slogan
sign Rights/Ideas
D. packaging
D. Copy, Paste, Cut, Hyphen

121. Which of the following is NOT a basic re- 126. A is a form of protection for intellec-
quirement for a patent? tual property that does not require any dis-
closures or the filing of an application.
A. It must be extraordinarily creative
A. Copyright
B. It must have utility
B. Patent
C. It must be novel
C. Trade secret
D. It must be not obvious to a person of
ordinary skill in the field D. Trademark

122. The inventor of smell-o-vision will most 127. Fact based:-When is World Intellectual
likely require this: Property Day observed?
A. Copyright A. July 16th
B. Patent B. December 21st
C. Design Right C. April 26th
D. Trade Secret D. September 30th

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 968

128. Employees should be policies and pro- 133. If the song is protected using the Inter-
cedures to follow them. national Standard Music Number of ISMN,
A. It is known by public what is for magazines and journals?

B. Committed and respect A. ISBN

C. It is used by public B. ISSN

D. None of the above C. ISPN


D. none of these

NARAYAN CHANGDER
129. Sale, licensing, or otherwise dealing, es-
pecially with a view to profit, of a copy- 134. Defence to a claim of copyright infringe-
right that is done without the authority of ment whereby permission from the artist
the person who possesses the copyright. is not required so long as usage of that
artist’s work is reasonable and limited.
A. RIGHT OF FAIR USE
A. DESIGN RIGHTS
B. PASSING OFF
B. INTANGIBLE PROPERTY RIGHTS
C. UNAUTHORISED USE
C. RIGHT OF FAIR USE
D. INFRINGEMENT OF RIGHTS
D. COPYRIGHT
130. How many years is the protection of the
industrial design? 135. UPOV is:-
A. 1 year A. Convention for plant variety
B. 7 years B. United states patent
C. 25 years C. Convention for patent
D. 50 years D. None of the above.

131. In the case of work created by an author 136. In the case of a work commissioned by
during and in the course of his employment, a person other than an employer of the
utilizing the time and facilities, the copy- author and who pays for it and the work
right shall belong to: is made in pursuance of the commission,
the person who so commissioned the work
A. the company
shall have of work, the copyright
B. author thereto shall
C. both A. Commissioned work is owned by the
D. no one person who paid
B. The copyright of the artwork paid by
132. SEC. 180. Rights of Assignee 180.1. The the commissioner goes to the artist
copyright may be assigned in whole or in
part. Within the scope of the assignment, C. None of these
the assignee is entitled to which the as- D. all of these
signor had with respect to the copyright.
137. Exclusive right granted to authors of cre-
A. all priveledges and obligations ative works to control the use of their orig-
B. all financial gains and loans inal works.
C. all the rights and remedies A. COPYRIGHT
D. all the offers and liabilities B. DESIGN RIGHTS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 969

C. RIGHT OF FAIR USE 142. Can works of drawing, painting, architec-


ture, sculpture, engraving, lithography, or
D. PATENT
other works of art; models or designs for

PRACTICE BOOK» NOT FOR SALE


138. NBA and NFL jerseys are sold with a dis- works of art; be rented?
tinctive mark. Which term identifies this A. Yes
mark on the jerseys? B. No
A. Copyright C. Case-to-case
B. Patent D. It depends on the work
C. Trademark 143. The doctrine established four fac-
D. none of above tors for courts to consider when deciding
whether a particular use of copyrighted
139. What is copyright? property is fair and can be allowed with-
out penalty.
A. Freely copying music and songs
A. Fair use
B. Copying work from the internet such B. Copyright
as music and art.
C. Trademark
C. Copy and pasting text from other peo-
D. Plant breeder’s rights
ple’s work.
D. The right to stop others copying your 144. If you write an original story, what type
artistic works/creations, such as music of IP gives you the right to decide who can
and art. make and sell copies of your work?
A. Patents
140. What is the advantage of registering a B. Copyrights
trademark with the United States Patent
and Trademark Office? C. Trademarks
D. Registered Designs
A. Others can mimic and sell a similar
product. 145. In order to register a design, it should
B. It prevents others from enforcing be:-
against DHS and allow DHS to enforce if A. New
necessary. B. Original
C. A product cannot be sold without a reg- C. Distinct
istered trademark. D. All of the above.
D. All of the above.
146. is a grant from the federal govern-
141. In KSA, the Royal Decree for copyright ment conferring the rights to exclude oth-
was made in: ers from making, selling, or using an inven-
tion for a certain term
A. 2001
A. Patent
B. 2002 B. Trademark
C. 2003 C. Copyright
D. 2004 D. Trade secret

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 970

147. What does a trademark protect? 152. Just Do It for Nike is a


A. the look, shape and feel of a product A. Logo, trademark
B. logos, names, shape and brands B. Slogan, Trademark
C. a work of art C. Registered copyright
D. an invention D. Registered trademark
148. Many large software companies have 153. Which form of intellectual property pro-
agreements with each other in which each

NARAYAN CHANGDER
tection is granted to the owner of a work
agrees not to sue the other over patent of authorship, and requires the work to be
infringement. in tangible form?
A. Plant breeder’s rignts A. Patent
B. Copyright B. Trademark
C. Trademark C. Copyright
D. Cross-licensing D. Trade secret
149. When an electrical technology student
154. criminal sanction may be taken against:
wanted to get a business permit, what is
the first IPO requirement? A. An employee who uses a patented in-
vention without right.
A. company name
B. An employee who listens to music at
B. shop location
work.
C. budget
C. An employee who registers an inven-
D. all of these tion that already has a patent
150. Title II of the amends the Copyright D. An employee who sells copies of pro-
Act by adding a new section that enables tected works on company property.
a website operator that allows users to
post content on its website to avoid copy- 155. Where can we register an intellectual
right infringement if certain “ safe harbor property?
“ provisions are followed. A. PESURUHJAYA HAK ASASI MANUSIA
A. Communications Decency Act (CDA) MALAYSIA (SUHAKAM)
B. Digital Millennium Copyright Act B. SURUHANJAYA PILIHAN RAYA (SPR)
(DMCA) C. KEMENTERIAN PENDIDIKAN
C. Child Online Protection Act (COPA) MALAYSIA
D. Children’s Internet Protection Act D. PERBADANAN HARTA INTELEK
(CIPA) MALAYSIA (MYIPO)

151. A translation of a book into another lan- 156. Intellectual property rights protect the
guage is a: use of information and ideas that are of
A. Patent A. Social value
B. Trademark B. Ethical value
C. Copyright C. Commercial value
D. Trade secret D. Moral value

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 971

157. James protects his new invention by ap- 162. This Act shall be known as the Intellectual
plying for which type of protection? Property Code of the Philippines.
A. RA 8192

PRACTICE BOOK» NOT FOR SALE


A. A copyright
B. A patent B. RA 8291
C. RA 8293
C. A trade secret
D. Ra 8391
D. none of above
163. It refers to the ownership of an idea or
158. In the case of audiovisual work, the copy- design by the person who came up with it.
right shall belong to the producer, the au- A. Intellectual Property
thor of the scenario, the composer of the
B. Real Estate Property
music, the film director, and the author of
the work so adapted. C. Private Property
A. True D. Immovable Property

B. False 164. Which intellectual property is suitable to


register your unique glass design?
C. case to case
A. PATENT
D. unless otherwise
B. COPYRIGHT
159. A registered design is protected for:- C. INDUSTRIAL DESIGN
Ans:10+5 years D. TRADEMARKS
A. 20 years 165. In which year did India enact the present
B. 10 years Copyright Act?

C. 10+5 years A. 1999


B. 2010
D. 7 years
C. 2019
160. Patents are critical to DHS’s mission suc- D. 1957
cess because (mark all that apply):
166. How many products have got GI tags till
A. Promotes technology transfer now?
B. Demonstrate effective use of taxpayer A. 361
money B. 729
C. Reduces risk C. 624
D. Reporting requirements D. None of the above

161. Legal interest or claim in things which can 167. If a company develops a new technology
not be touched. that improves its product, what type of IP
they use to stop others from copying?
A. DESIGN RIGHT
A. Patents
B. INTANGIBLE PROPERTY RIGHTS B. Copyrights
C. COPYRIGHT C. Trademarks
D. RIGHT OF FAIR USE D. Trade Secrets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 972

168. Plagiarism can be defined as D. The patent does not disclose the inven-
A. paraphrasing another’s ideas with ex- tion clearlyenough for it to be performed
plicit attribution to the author by a person skilled in the art

B. Encryption 173. Basically Intellectual Property Rights pro-


tect the use of information and ideas that
C. Writing your own concept
are of
D. Representing another person’s work
A. Social Value
their words and/or ideas as your

NARAYAN CHANGDER
own B. Moral Value
C. Commercial Value
169. When trade secrets are improperly ac-
quired, this is called: D. Ethical Value
A. copyright infringment 174. The most visible Intellectual Property
B. unfair competition is
C. misappropriation of trade secrets A. Creative work

D. patent infringment B. Industrial design


C. Trademark
170. An order issued by a court which pro-
D. all of these
hibits a specific action from being carried
out in order to prevent order or injury. 175. What is the IP Group’s Role? (mark all
A. INJUNCTION that apply)
B. PATENT A. IP issues for internal technology devel-
opment
C. COPYRIGHT
B. R & D contract issues
D. INFRINGEMENT OF RIGHTS
C. International agreement IP issues
171. refers to any program whose source D. Commercialization/Licensing IP (OIC)
code is made available for use or modifica-
tion, as users or other developers see fit. 176. means protected by a government
A. Proprietary issued right allowing someone to make
and sell a product or service for a certain
B. Copyleft amount of years without anyone being al-
C. Open source code lowed to copy it.
D. Virus A. Trademark
B. Idea
172. Which of the following is not a valid rea-
son forrevoking a registered intellectual C. script
property right? D. Patent
A. The invention is nor patentable inven-
177. What is IP?
tion
A. INDIVIDUAL PRODUCT
B. The patent was granted to person who
was notentitled to it B. INTELLECTUAL PROPERTY
C. The patent applicant already has a sim- C. INTERNET PROTOCOL
ilar patent intheir name D. INDUSTRIAL PRODUCT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.6 Intellectual Property Rights and Privacy 973

178. How long does a patent last for? C. Intellectual


A. Forever D. Credential

PRACTICE BOOK» NOT FOR SALE


B. 20 years
184. The courts may award up to triple dam-
C. 5 years ages for which of the following?
D. 5 months A. Theft of trade secrets
179. Which of the following is an “intellectual B. Copyright infringement
property” as per IPR Laws in India. C. Trademark infringement
A. Original literary work D. Patent infringement
B. Industrial Design of Maruti800 car
185. Unlicensed software is:
C. Trademark of Tata company
A. Trademark Infringement
D. All of these
B. Patent Infringement
180. A registered trademark is renewable af-
C. Trade secret Infringement
ter how many years?
D. Copyright Infringement
A. 10
B. 20 186. Which of the following is a copyright?
C. 30 A. Television programs
D. 40 B. Musical work
181. No copyright shall subsist in any work of C. Books, novels, and poems
the Government of the Philippines. D. All of the above
A. True
187. As part of the patent application, the
B. False USPTO searches the existing body of
C. Case to case knowledge that is available to a person of
ordinary skill in the art. This existing body
D. No idea
of knowledge is also called
182. What is a patent? A. Prior art
A. A right to include people in using and B. PMBOK
making a new invention.
C. Skills and art
B. An official right to the inventor to stop
others from using, making or copying a D. Skills extraordinaire
new invention.
188. Exclusive right granted by a government
C. A company giving away its rights to to an inventor which prevents others from
other companies. making, using or selling his or her inven-
D. A right to keep persons away from tion.
your business. A. PATENT
183. Benefits of a Copyright are: B. COPYRIGHT
A. Emotional C. TRADEMARK
B. Economic D. DESIGN RIGHT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.7 Computer Viruses, Malware, and Hacking 974

189. What is covered by intellectual prop- 191. Patent law protects inventions, and
erty? law protects authored works.
A. Hardware A. Copyright
B. Equipment. B. Trademark
C. Invention. C. Registered design

D. Buildings D. Plant breeder’s rights

NARAYAN CHANGDER
192. A music business will utilize this form of
190. What protects the intellectual property protection for new music being released by
created by designers? its newest signing
A. Patents A. Copyright
B. Copyrights B. Patent
C. Trademarks C. Trade Secret
D. Registered Designs D. Design Right

10.7 Computer Viruses, Malware, and Hacking


1. What is Adware? D. A good type of malware.
A. software that enables a user to ob-
3. What kind of malware is used to find out
tain covert information about another’s
user browsing habits, keystrokes, or pass-
computer activities by transmitting data
words for the purposes of identity theft?
covertly from their hard drive.
B. Advertisers on online pages. A. Trojan virus

C. malware that is often disguised as le- B. Adware


gitimate software. C. Virus
D. a form of software that downloads or D. Spyware
displays unwanted ads when a user is on-
line, collects marketing data and other in- 4. What is the BEST definition of rootkits?
formation without the user’s knowledge
or redirects search requests to certain ad- A. a set of software tools that enable an
vertising websites. unauthorized user to gain control of a com-
puter system without being detected.
2. What is Trackware? B. Trojan, is any malicious computer pro-
A. malware that is often disguised as le- gram which is used to hack into a com-
gitimate software. puter by misleading users of its true in-
tent.
B. Software that enables a user to obtain
secret information about another com- C. a form of memory storage
puter’s activities. D. a network of private computers in-
C. A software that tracks system activ- fected with malicious software and con-
ity, gathers information, and tracks users trolled as a group without the owners’
habits to send to a third party. knowledge

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.7 Computer Viruses, Malware, and Hacking 975

5. What is DNS poisoning? B. trojan


A. A form of hacking C. virus

PRACTICE BOOK» NOT FOR SALE


B. A software D. spyware
C. A new operating system 10. What is an antivirus?
D. A virus A. A bigger and more dangerous virus.
6. What is Buffer Overflow? B. Software used to duplicate viruses.

A. a form of computer hacking in which C. computer software used to prevent,


corrupt Domain Name System data is in- detect and remove malicious software.
troduced into a DNS resolver’s cache, D. A biological agent that reproduces it-
causing the name server to return an in- self inside the cells of living things.
correct IP address, which results in divert-
11. A piece of code that can copy itself and
ing traffic to the attacker’s computer
damage the system or destroy data.
B. an anomaly where a program, while A. Computer Virus
writing data to a buffer, overruns the
buffer’s boundary and overwrites adja- B. Computer Code
cent memory locations. C. Computer Hacker
C. The overflow of butter on a kitchen D. Computer Worm
counter or other surface.
12. Which statement best describes a worm
D. A type of Adware. virus?
7. What is scareware? A. A virus that is designed to slow down
your computer
A. None are correct
B. A virus that is designed to frighten peo-
B. A virus that uses a disguise, like a safe ple about a nonexistent virus
anti-virus program, to infect a person’s
computer C. A virus that spreads itself, from file to
file and from computer to computer
C. A virus that spreads other malicious
D. A virus that is designed to shut down a
programs
server
D. A virus that groups computers to-
gether to create a network 13. What can spyware do to your computer?
A. steal personal information from you
8. A computer infected with a computer virus
may run than normal. B. steal files
A. Slower C. place undesirable material on your
computer
B. faster
D. All of the above
C. normal
14. What is DNS Spoofing?
D. all of the above
A. a set of instructions secretly incorpo-
9. What type of malware is used to log rated into a program so that if a particular
keystrokes, or steal sensitive information condition is satisfied they will be carried
from your computer? out, usually with harmful effects.
A. worm B. Hacking into people’s DNA’s.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.7 Computer Viruses, Malware, and Hacking 976

C. Hacking into DNS files on hospitals. 19. How can we prevent Malware attacks?
D. a form of computer hacking in which (Select 2)
corrupt Domain Name System data is in- A. Install Anti-Virus
troduced into a DNS resolver’s cache, B. Make sure we have strong passwords
causing the name server to return an in-
correct IP address, which results in divert- C. Run regular scans
ing traffic to the attacker’s computer. D. Don’t access personal info with public
Wi-FI

NARAYAN CHANGDER
15. What’s Email Spoofing?
20. What can malware do to your device? (Se-
A. Adding inappropriate pictures to
lect 3)
emails.
A. Stop from running properly
B. The creation of email messages with a
forged sender address. B. Can crash, reboot or slow down
C. Fact checking emails. C. Ruin the hardware on the device
D. sending emails to people you don’t D. Slow down internet connection
know.
21. What type of malware reproduces itself
16. What is the BEST definition of grayware? and doesn’t need user input to spread to
other computers?
A. Place where undesirable material is
found in the computer A. trojan
B. spyware
B. Place where instant storage is located.
C. scareware
C. Malicious software or code that is con-
sidered to fall in the area between normal D. worm
software and a virus
22. Name An Anti-Virus Software.
D. a set of instructions secretly incorpo-
A. McAfee
rated into a program so that if a particular
condition is satisfied they will be carried B. Gorilla
out, usually with harmful effects. C. Bing
17. What is a buffer overflow? D. none of above
A. A software 23. What is the purpose of trackware?
B. A new operating system A. tracks system activity
C. A computer anomaly B. gathers system information
D. A virus C. tracks user habits then relays this in-
formation to a third party
18. Which virus groups computers together to
D. All of the above
create a network?
A. Trojan 24. What is email spoofing
B. Botnets A. Email spoofing is the forgery of an
email header so that the message ap-
C. Malware pears to have originated from someone or
D. Adware somewhere other than the actual source.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.7 Computer Viruses, Malware, and Hacking 977

B. A virus that is designed to slow down B. Trojan, is any malicious computer pro-
your computer gram which is used to hack into a com-
puter by misleading users of its true in-

PRACTICE BOOK» NOT FOR SALE


C. software that is intended to damage
tent.
or disable computers and computer sys-
tems. C. a form of memory storage
D. a buffer overflow, or bufferoverrun, is D. a network of private computers in-
an anomaly where a program, while writ- fected with malicious software and con-
ing data to a buffer, overruns the buffer’s trolled as a group without the owners’
boundary and overwrites adjacent mem- knowledge
ory locations. This is a special case of the
violation of memory safety. 29. What is a computer worm?
A. A parasite.
25. A computer virus is:
B. An invertebrate animal with long bod-
A. software written with malicious intent ies and no limbs.
to cause annoyance or damage.
C. A despicable virus
B. a process of scrambling a message so
that it cannot be read until it is unscram- D. A malware computer program that
bled again. replicates itself in order to spread to other
computers.
C. a small device that scans the number
from credit cards. 30. This virus is similar to what was used to
D. an ID-checking tool to monitor who is win a war
logged onto a network. A. Worm

26. What is a computer virus? B. Trojan

A. Covid-19 C. DNS poisoning

B. The flu D. greyware

C. An infection of a computer that 31. Trojan Viruses


spreads to other computers.
A. Trick people into downloading mali-
D. A cold cious software

27. What does a computer virus do? B. Put computers in a network to control

A. Post on your instagram. C. Melt down the computer to a point of


no function
B. Damage your computers data.
D. Spread other malicious programs
C. Delete the internet.
D. Give your computer a fever. 32. What type of malware will lock your com-
puter until you pay the hacker money?
28. What is the BEST definition of botnets? A. spyware
A. a set of instructions secretly incorpo- B. trojan
rated into a program so that if a particular
condition is satisfied they will be carried C. ransomware
out, usually with harmful effects. D. worm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.7 Computer Viruses, Malware, and Hacking 978

33. Most viruses stay active until you 38. What is Greyware?
turn the computer. A. Software that enables a user to obtain
A. Off secret information about another com-
puter’s activities.
B. On
B. malicious software or code that is con-
C. None of the above
sidered to fall in the “grey area” between
D. none of above normal software and a virus.

NARAYAN CHANGDER
34. Name a type of malware: C. Grey malware.
A. Caterpillars D. malware that is often disguised as le-
gitimate software.
B. Worms
C. Lions 39. What is the full word for malware

D. Horses A. malicious software


B. mal software
35. Anti virus software can help to protect a
C. malificent software
computer system from:
D. malignant software
A. Speech viruses transmitted through
the sound system. 40. The easiest way to become a victim of mal-
B. Remote access via a network connec- ware, spyware or viruses is through:
tion. A. playing games.
C. Viruses sent over the internet as email B. online chatrooms.
attachments.
C. texting.
D. Worm viruses that can access a com-
D. downloads
puter via the earth connection.
41. Software that enables a user to obtain se-
36. Rootkits are: cret information about another computer’s
A. a set of software tools that enable an activities.
unauthorized user to gain control of a com- A. Malware
puter system without being detected.
B. Adware
B. a network of private computers in-
fected with malicious software and con- C. Spyware
trolled as a group without the owners’ D. Trackware
knowledge, e.g., to send spam messages.
42. Trojan is a virus that
C. Kits used to treat online malware.
A. is easy to detect because the virus has
D. A type of greyware. suspicious symptoms
37. Which ones are types of malware? B. has symptoms that are similar to
viruses in humans
A. Bots, Ransomware, Hackers
C. has the ability to multiply quickly into
B. Spyware, Worms, Ransomware
copies of itself
C. Viruses, Games, Trojans D. is difficult to detect because it repli-
D. Bots, Hackers, Worms cates itself as a safe computer program

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.7 Computer Viruses, Malware, and Hacking 979

43. What is a Logic Bomb? normal software and a virus.


A. Bombs that detonate online when hack-
44. A network of private computers infected
ers play a code.

PRACTICE BOOK» NOT FOR SALE


with malicious software and controlled as
B. a set of instructions secretly incorpo- a group without the owners’ knowledge,
rated into a program so that if a particular e.g., to send spam messages.
condition is satisfied they will be carried
A. Adware.
out, usually with harmful effects.
B. Spyware.
C. An intelligent bomb.
D. malicious software or code that is con- C. Botnets.
sidered to fall in the “grey area” between D. Trackware.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11. Emerging Trends in Computing

NARAYAN CHANGDER
11.1 Cloud Computing
1. SaaS supports multiple users and provides variances-chunk size of 100 MB, block size
a shared data model through model. of 1 MB. A file of size 1 TB needs to be
A. single-tenancy stored on this file system. How many
chunk servers will be needed, if the file is
B. multi-tenancy replicated thrice on chunk servers capable
C. multiple-instance of hosting 200 GB on each?
D. all of the mentioned A. 10

2. Amazon Web Services is an example of B. 15

A. Infrastructure as a Service C. 20

B. Software as a Service D. none of the mentioned

C. Platform as a Service 5. How many service models in cloud comput-


D. None of these ing?
A. 3
3. Which of the following is commonly used
to describe the service interface, how to B. 2
bind information, and the nature of the C. 4
component’s service or endpoint?
D. 5
A. WSDL
B. SCDL 6. Which of the following has many features
of that is now known as cloud computing?
C. XML
A. Web Service
D. None of the mentioned
B. Softwares
4. You have been asked to design a “Open
C. All of the mentioned
File System” which is derived from
GFS / HDFS architecture with following D. Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 981

7. You have been asked to design a “Open 12. What’s the most popular use case for pub-
File System” which is derived from lic cloud computing today?
GFS / HDFS architecture with following

PRACTICE BOOK» NOT FOR SALE


A. Website hosting
variances-chunk size of 100 MB, block size
of 1 MB. A file of size 1 TB needs to be B. Test and development
stored on this file system. <br />a) How C. Disaster recovery
many chunks will be required to store the D. Business analytics
file?
A. 10000 13. Which of the following belongs to the SaaS
mode of Apple CLOUD?
B. 11000
A. Elastic Volume Service (EVS)
C. 9000
B. Elastic cloud server (ECS)
D. none of the mentioned
C. Object Storage Service (OBS)
8. Ransomware is . D. Facial recognition
A. an attack by a remote computer
14. model consists of the particular types
B. a form of malware of services that you can access on a cloud
C. spam messages computing platform.

D. A corrupt piece of code that duplicates A. Service


your data B. Deployment

9. Web Services are C. Application


D. None of the mentioned
A. Application IDE
B. Application Designing Tool 15. Cloud computing shifts capital expendi-
tures into expenditures.
C. None of these
A. operating
D. Application Components
B. service
10. A computer that stores and shares infor- C. local
mation with other computers on a network
is called a D. none of the mentioned

A. Personal Computer (PC) 16. maps input key/value pairs to a set of


B. Network intermediate key/value pairs.

C. Data Center A. Mapper


B. Reducer
D. Server
C. Both Mapper and Reducer
11. Where is data from an application tem-
D. None of the mentioned
porarily stored?
A. ROM 17. Which of the following is not a true state-
ment about using encryption with enter-
B. RAM
prise cloud computing implementations?
C. CPU A. Encryption is required for regulatory
D. GPU compliance.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 982

B. Encryption can be used to solve the B. You pay a company to host your web-
data segregation issue. site on a local computer to you
C. Data being processed is always en- C. Data is saved onto an external com-
crypted. puter for people to access externally
D. Encryption for data in transit has a D. More prone to viruses and hacking
speed/strength tradeoff.
22. An advantage of cloud software is that
18. I have local network and data centre, But A. It is always free

NARAYAN CHANGDER
i like to integrate them into cloud account. B. It cannot be hacked
What type of solution you will prefer for
it? C. It is updated automatically
D. It is only ever stored locally on your
A. Hybrid
computer
B. Private
23. WHICH OF THE FOLLOWING IS NOT A
C. Public PHASE OF KEY MANAGEMENT
D. Local network A. CREATION
19. What is the process of using third party B. VERIFICATION
servers to store data and run online appli- C. MONITORING
cations?
D. DESTRUCTION
A. Data Center Processing
24. Which of the following are correct tech-
B. Cloud Computing nologies working behind the cloud comput-
C. Networking ing platforms?
D. Internet Usage A. Virtualization
B. SOA
20. What is the best explanation about net-
work component? C. Grid Computing

A. this infrastructure includes physical D. All of the above


wiring, switches, load balancers and 25. Which of the following is not a type of
routers that help ensure cloud infrastruc- cloud?
ture is always available for customers
A. Private
when needed.
B. Public
B. In private cloud deployments, orga-
nizations may use dedicated servers to C. Protected
store information. D. Hybrid
C. Server is simply a computer /device 26. Which App Engine environment is based on
that has been programmed to provide a preconfigured container instances?
service to a customer or user.
A. Standard environment
D. none of above
B. Both standard and flexible environ-
21. What is external hosting? ments
A. Data is saved onto your local computer C. Flexible environment
for people to access externally D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 983

27. Windows Azure and Force.com are exam- 32. What extra things can you do on Cloud
ple of? Computing?

PRACTICE BOOK» NOT FOR SALE


A. PaaS A. Use your computers in any whether
B. SaaS B. Share Files
C. IaaS C. It does your work for you

D. All of the above D. none of above

33. What is the use of Certification Authority


28. What is private cloud?
(CA) in PKI?
A. A cloud architecture maintained within
A. Issues the certificate
an enterprise data center.
B. Requests a certificate
B. A cloud service inaccessible to anyone
but the cultural elite C. Registration Authority
D. None of the above
C. A standard cloud service offered via
the Internet 34. The ‘Cloud’ refers to resources and on-
D. none of above line storage that can be accessed on a
scale.
29. Which of the following is correct about URI A. Local
in RESTful web services?
B. Global
A. Each resource in REST architecture is
C. Regional
identified by its URI
D. Social Media
B. Purpose of an URI is to locate a re-
source(s) on the server hosting the web 35. Software as a Service is considered to be
service included in whichcloud computing layer?
C. Both of the above A. Data
D. None of the above B. Client
C. Application
30. The model originally did not require
a cloud to use virtualization to pool re- D. Infrastructure
sources.
36. The cloud infrastructure is operated for
A. NEFT the exclusive use of an organization.
B. NIST A. Public
C. NIT B. Private
D. All of the mentioned C. Community
D. All of the mentioned
31. which is not an advantage of grid
37. Although the Hadoop framework is imple-
A. scalable
mented in Java, MapReduce applications
B. uses unused computing power need not be written in:
C. provide standard and high cpu A. apple
D. multi-tenancy B. Java interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 984

C. c$ 43. CaaS stands for


D. C as service.
A. Compliance
38. This is a software distribution model in
B. Computer
which applications are hosted by a vendor
or service provider and made available to C. Community
customers over a network, typically the In- D. Communication
ternet.
44. provides the flexibility to increase or

NARAYAN CHANGDER
A. Software as a Service (SaaS). decrease the computing requirement as per
B. Infrastructure as a Service (IaaS) need.
C. Platform as a Service (PaaS) A. space savings
D. none of above B. cost savings
C. Accessibility
39. All of these are types of cloud services ex-
cept D. Scalability
A. Public cloud 45. “cloud”in cloud computing represents
B. Segregated cloud what?
A. Wireless
C. Hybrid cloud
B. Hard drives
D. Private cloud
C. People
40. When companies store data using cloud D. Internet
technologies, to keep things secure, the
data will be 46. Users are able to provision cloud comput-
A. Qualified ing resources without requiring human in-
teraction.
B. Decrypted
A. On-demand self-service
C. Protected
B. On demand action
D. Encrypted
C. Self service console
41. If your laptop uses the cloud for every- D. Automated service
thing, your hard drive must be
47. A payment method for cloud computing
A. empty that charges based on usage.
B. high tech A. Pay as you grow
C. fast B. Pay on demand
D. full C. Cash on delivery
42. Rapid elasticity D. Credit scoring

A. Resources are provisioned and re- 48. What is an example of PaaS?


leased on-demand A. Google App Engine
B. Resources are stretched to capacity B. Amazon Web Services
C. Resources are paid for by use C. SAP Business onDemand
D. Resources are scalable D. Google Calendar

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 985

49. Virtual machines run on top of? A. Storage


A. Hardware B. Application

PRACTICE BOOK» NOT FOR SALE


B. Software & Hardware C. CPU
C. Hypervisor D. All of the mentioned
D. VM Instance 55. Interoperability is enabled by
50. The cloud services purchased by a user in- A. Cloud operating system
clude an application running environment, B. Middleware
but do not contain any application or re- C. a community cloud
lated data. This mode is
D. A composite cloud
A. IaaS
56. In the case of a private cloud, the connec-
B. PaaS
tivity may be provided by
C. SaaS
A. LAN
D. NaaS
B. MAN
51. These cloud services are of the form of util- C. WAN
ity computing i.e. the uses these ser- D. None
vices pay-as-you-go model.
A. Cloud providers 57. Which of the following is about the on-
demand self-service feature of cloud com-
B. Clients puting?
C. End users A. Users do not need to communicate the
D. Cloud users service providers at all when using cloud
computing resources.
52. A cloud computing service where enter-
B. After determining the required cloud
prises rent or lease servers for computing
computing service, users can apply for
and storage in the cloud
cloud computing resources by them-
A. PaaS selves.
B. SaaS C. The cloud computing service providers
C. IaaS only need to prepare the cloud services
and users will complete remaining pro-
D. FaaS cess all by themselves.
53. Which of the following is best known ser- D. When using cloud computing re-
vice model? sources, the users need to solve all by
A. SaaS problems by themselves.

B. IaaS 58. Examples of VoIP platforms include


C. PaaS A. Skype
D. All of the mentioned B. WhatsApp
C. Google Gmail
54. Which of the following type of virtualiza-
tion is also characteristic of cloud comput- D. Facebook Messenger
ing? E. AIM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 986

59. EC2 stands for? 64. Which option describes the benefit of vir-
A. Elastic Compute Cloud tualized servers?

B. Elastic Configuration Cloud A. Shared hardware

C. Elastic Cloud Configuration B. Individual hardware per virtual server

D. Elastic Cloud Compute C. Physical servers taking less room


space than virtual servers
60. What type of computing technology refers D. Virtual servers taking less disk space

NARAYAN CHANGDER
to services and applications that typically than physical servers
run on a distributed network through vir-
tualized resources? 65. Which cloud computing feature allows the
A. Distributed Computing service to change in size or volume to meet
user needs.
B. Cloud Computing
A. Security
C. Soft Computing
B. Scalability
D. Parallel Computing
C. Cost savings
61. Cloud computing model that provides vir-
tualized computing resources over the in- D. Virtualization
ternet.
66. GHZ radio frequency has than 2 GHZ
A. IaaS radio frequency because there are fewer
B. PaaS devices that operate at 5 GHZ

C. SaaS A. less signal interference

D. RaaS B. More signal interference


C. Same amount of signal interference
62. Which of the following module of SOA
is shown in the following figure? cloud- D. none of above
computing-questions-answers-service-
oriented-architecture-q4 67. Chose the most appropriate answer:Cloud
technology allows users to and
A. Description from anywhere in the world.
B. Messaging A. Download music (and) movies
C. Business Process B. Collaborate (and) share files
D. QOS C. Hack (and) plant viruses
63. A cloud provider offers an environment for D. Commit cyber crimes (and) break laws
buildingapplications that will run from the
customer’s environment.Which cloud com- 68. Broadly divide the cloud architecture
puting delivery model are they using? into?
A. Platform as a Service A. 1
B. Software as a Service B. 2
C. Development as a Service C. 3
D. Infrastructure as a Service D. 4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 987

69. The service provider gives the capability to A. Cloud Computing


the consumer to deploy onto the cloud in B. Network Computing

PRACTICE BOOK» NOT FOR SALE


A. Platform as a Service C. Storage Computing
B. Software as a Service D. None of the choices
C. Infrastructure as a Service
75. What is a public cloud?
D. None of these
A. A cloud formation that can be seen
70. function is responsible for consolidat- across the globe
ing the results produced by each of the B. A cloud service that can only be ac-
Map() functions/tasks. cessed from a publicly shared computer
A. Reduce C. A multi-tenant cloud environment ac-
B. Map cessed over the internet
C. Reducer D. A cloud environment owned, operated
and controlled by a public company
D. process
76. Cloud computing is a system and it is
71. What is Ubiquitous Access?
necessarily unidirectional in nature.
A. Anytime, anywhere, any device cloud
A. Stateless
access
B. Stateful
B. Sometime, somewhere, some devices
cloud access C. Reliable
C. Anytime, some devices access D. All of the above
D. No access anytime 77. A is a combination load balancer and
application server that is a server placed
72. Through which one of the following mod-
between a firewall or router.
els, SaaS supports multiple users and of-
fers a shared data model? A. ABC
A. Single tenancy B. ACD
B. Multi tenancy C. ADC
C. Multi instance D. All of the mentioned
D. Single instance 78. . In which category of SaaS services does
customerrelationship management (CRM)
73. The inter process communication between software fall?
different nodes in Hadoop uses
A. Consumer services
A. REST API
B. Communication services
B. RPC
C. Infrastructure services
C. RMI
D. Business services
D. IP Exchange
79. Sharing resources is the main priority of
74. is a general term used to describe
a new class of network based computing A. Client server computing
that takes place over the Internet B. P2P Computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 988

C. Distributed computing 85. Parallels Desktop is an example of?


D. collaborative computing A. TYPE-1 Hypervisor

80. Select the advantages of using the Cloud B. DISPATCHER


for gaming. C. TYPE-2 Hypervisor
A. Hacking D. INTERPRETER
B. Free Games
86. Which concept aligns business and IT as-

NARAYAN CHANGDER
C. Larger customer base sets, helpsprovide flexible IT capacity, and
D. Game developers can reduce their provides realtimeallocation of IT resources
costs in line with demand frombusiness pro-
cesses?
E. Customers normally pay less for a
game A. elasticity

81. Usually methods like RAID strategies are B. virtualization


used in cloud computing to maintain in- C. dynamic infrastructure
tegrity. What RAID stands for?
D. automated management of resources
A. Redundant array of independent disks
B. Redundant arrangements of indepen- 87. The property states that the system
dent disks must have a mechanism to recover from
committed transactions should that be nec-
C. Removal of array in independent disks essary.
D. Remove array for integrity dependent A. Atomicity
82. IaaS stands for? B. Consistency
A. IT-as-a-Service C. Isolation
B. Internet-as-a-Service D. Durability
C. Infrastructure-as-a-service
88. Which types of issues are associated with
D. Interoperability-as-a-service the SaaS?
83. The most important area of concern in A. Modest software tools
cloud computing? B. Multitenant solutions
A. Storage C. Centralized management and data
B. Scalability
D. Network dependence
C. Security
89. You can’t count on a cloud provider main-
D. All of them
taining your in the face of government
84. How close is the closest data center? actions.
A. 10 mins away A. scalability
B. 1.5 hours away B. reliability
C. 4 hours away C. privacy
D. 10 hours away D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 989

90. A cross-platform authentication protocol B. Virtualization


that uses key encryption to verify the iden- C. Mobility Pattern
tity of clients and to securely exchange in-

PRACTICE BOOK» NOT FOR SALE


formation after a client logs on to a sys- D. All of the mentioned
tem? 95. Point out the correct statement
A. CHAP A. A client can request access to a cloud
B. EAP service from any location
C. TKIP B. A cloud has multiple application in-
D. Kerberos stances and directs requests to an in-
stance based on conditions
91. How does Cloud computing change the C. Computers can be partitioned into a
relationship between provider and cus- set of virtual machines with each machine
tomer? being assigned a workload
A. Increased focus on service level D. All of the mentioned
agreements (SLAs)
96. provides virtual machines, virtual stor-
B. Less compliance to standards
age, virtual infrastructure, and other hard-
C. Less focus on service level agree- ware assets.
ments (SLAs)
A. IaaS
D. More focus on training
B. SaaS
92. Which of the following is essential concept C. PaaS
related to Cloud?
D. All of the mentioned
A. Reliability
97. Which of the following statements could
B. Productivity
be used to describe a private cloud deploy-
C. Abstraction ment?
D. All of the mentioned A. A cloud environment maintained within
an enterprise’s own data center
93. Point out the wrong statement:
B. A private environment within a third-
A. The vendor is responsible for all the op- party or public cloud provider’s architec-
erational aspects of the service ture
B. The customer is responsible only for C. A cloud service inaccessible to anyone
his interaction with the platform. but the cultural elite
C. Google’s App Engine platform is PaaS D. Both 1 and 2
offering
D. SaaS require specific application to be 98. A hybrid cloud combines multiple clouds
accessed globally over the internet. where those clouds retain their unique
identities but are bound together as a unit.
94. Which of the following should be replaced A. Public
with the question mark in the following fig-
ure? cloud-computing-questions-answers- B. Private
virtualization-technologies-q10 C. Community
A. Abstraction D. Hybrid

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 990

99. What is a single-tenant cloud 104. Cloud computing shifts capital expendi-
A. Only one customer is hosted on a tures into expenditures.
server and is granted access A. operating
B. Multiple customers hosted on a server B. service
and is granted access
C. local
C. None of the above
D. none of the mentioned
D. none of above

NARAYAN CHANGDER
105. Benefits of cloud computing include
100. Consider the following state-
(choose two)
ments:Statement 1:Volatility refers to the
data velocity relative to timescale of event A. Everyone has the same version of the
being studiedStatement 2:Viscosity refers software
to the rate of data loss and stable lifetime B. It can be used offline
of data
C. Changes within the document can be
A. Only statement 1 is true tracked by who made them.
B. Only statement 2 is true D. You always have a backup stored on
C. Both statements are true your local device.
D. Both statements are false
106. How many types of Cloud are there in De-
101. Servicing multiple customers using the ployment Models?
same physical resources. A. 3
A. Resource pooling B. 2
B. Rapid elasticity
C. 4
C. Resource elasticity
D. 5
D. Rapid pooling
107. Nimbostratus and cumulonimbus clouds
102. A disadvantage of cloud computing is can signal what type of upcoming
A. You need an internet connection to ac- weather?
cess the data or software A. fair skies
B. You need an internet connection to ac-
B. hot, sunny weather
cess your LAN
C. windy weather
C. You cannot use a device that is con-
nected to the internet D. rainy weather
D. You need local storage to manage the 108. In a Classical Algorithm of Ring Election,
data backups what will be the message complexity for
103. The term “IDaaS” stands for? N labelled processes?
A. Interoperability-as-a-Service A. (N-1) messages
B. ID-as-a-Service B. (2N-1) messages
C. Intranet-as-a-service C. (3N-1) messages
D. Identity-as-a-Service D. (4N-1) messages

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 991

109. Which of them is not an advantage of cloud provider and to pay for thoseser-
Cloud? vices as they are used. The cloud provider
manages theinfrastructure and any appli-

PRACTICE BOOK» NOT FOR SALE


A. Pay as you use
cation upgrades. This is anexample of
B. Immediate availability of resources what type of cloud delivery model?
C. Code Review A. Platform as a Service
D. High Availability B. Software as a Service
110. What is a possible disadvantage of cloud C. Application as a Service
computing in education system? D. Infrastructure as a Service
A. The need for high speed internet ac- 115. What are two advantages of cloud com-
cess puting
B. The management of data and products A. Available 24/7
C. The absence of hardware B. Automatic updates
D. The wide connection of networks C. Easy to access
111. For every additional symbol added to the D. Optional backups
length of your password what happens?
116. is a general term used to describecom-
A. Makes password difficult to remember puting that takesplace over the Internet
B. Makes password more complex and A. Cloud Computing
harder to break B. Network Computing
C. Makes password more confusing C. Storage Computing
D. none of above D. None of the choices
112. Which of the following are advantages of 117. Which type of cloud service provides an
cloud computing? environment for buying, building, testing,
A. lower speeds deploying, and running software applica-
tions?
B. local software
A. Infrastructure as a Service (IaaS)
C. greater cost
B. Platform as a Service (PaaS)
D. easier collaboration
C. Software as a Service (SaaS)
113. What is a multi-tenant cloud model? D. none of above
A. Only one customer access to comput-
118. Which of the following risks is actually in-
ing resources in a public cloud
creased by cloud-specific security technolo-
B. Customers can share computing re- gies?
sources in a public or private cloud
A. Increased/shared attack surface
C. Single customer environment
B. Configuration and vulnerability man-
D. A model with multiple servers agement

114. A company has decided to leverage the C. Identity management


web conferencingservices provided by a D. Administrative access control

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 992

119. As a developer for a software company, A. Service-oriented architecture


you have decided to build and test your B. Standardized Web services
web applications in a cloud environment.
C. Web-application frameworks
Which type of cloud service best meets
your needs? D. All of the mentioned
A. PaaS 125. For which businesses would cloud com-
B. SaaS puting be best suited? (Choose two.)
A. Waterfront marketplace that thrives

NARAYAN CHANGDER
C. IaaS
during the summer tourist season
D. XaaS
B. Rural medical practice with four em-
120. Which of the following is not an exam- ployees
ples of Type 1 hypervisors? C. Law enforcement agency
A. VMware ESXi D. A new company start-up that manufac-
B. Citrix XenServer tures watercraft
C. VMware Player 126. Cloud computing embraces many concepts
that were previously touted as the next
D. Microsoft Hyper-V hypervisor
big thing in information technology. Which
121. Type of Cloud Deployment beneficial of of these are an antecedent of the cloud?
organisation having very sensitive data A. Software as a services
A. Public B. Utility computing
B. Private C. Remote hosted services
C. Hybrid D. Desktop computing
D. Any of the above 127. The vendor provides every level of sup-
port in this type of cloud computing.
122. Managed IT services are based on the
concept of? A. IaaS
A. Virtualization B. PaaS
C. SaaS
B. SOA
D. XaaS
C. Grid Computing
D. Utility Computing 128. You are the IT director for a retail cloth-
ing outlet. Your competitors are using
123. Google App Engine (often referred to as Internet-delivered inventory, storage, and
GAE or simply App Engine) is backup solutions from a specific provider.
A. Is a Platform as a Service You conclude it is best that your com-
pany use the same services from the same
B. Is a Software as a Service provider. What type of cloud will you be
C. Is a Infrastructure as a Service subscribing to?
D. All of the above A. Community cloud
B. Retail Cloud
124. Which of the following architectural stan-
dards is working with cloud computing in- C. Private Cloud
dustry? D. Public Cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 993

129. What are the components of a cloud com- A. On-demand self-service


puting environment?
B. Broad network access

PRACTICE BOOK» NOT FOR SALE


A. application, platform, infrastructure
C. Resource pooling
B. client, application, session, network,
data D. All of the mentioned

C. application, presentation, transport, 135. The set of hardware, networking, stor-


network, data age, services, applications, and interfaces
D. client, application, platform, infras- owned and operated by an organization
tructure, server for the use of its employees, partners, or
customers is the private cloud. This can be
130. Which billing tool is designed to prevent created and managed by a third party for
the over-consumption of resources due to the exclusive use of one enterprise.
an error or a malicious attack?
A. Private Cloud:
A. Budgets
B. Public Cloud:
B. Alerts
C. General Cloud:
C. Quotas
D. Reports D. none of above

131. Consumer doesn’t manage individual ap- 136. In , the first standard for Wi-Fi de-
plication capabilities in vices was released
A. Sssa A. 1989
B. Pas B. 1999
C. IasS C. 1979
D. None of them D. 1997
132. Which compute service would be consid-
137. Which is responsible for the operation
ered IaaS?
of a collection of computers that are c
A. Compute Engine connected via high speed local area net-
B. Cloud Functions works?
C. App Engine A. Computer Manager
D. Google Kubernetes Engine B. Cloud Manager
133. What is a federation Cloud? C. Cluster Manager
A. Cloud from a particular country D. None of these
B. collaboration between Clouds
138. Which of these options is not a PaaS of-
C. military Cloud fering?
D. international Cloud A. IBM App Mix
134. Which of the following benefit is related B. Azure App Service
to creates resources that are pooled to-
C. AWS Elastic Beanstalk
gether in a system that supports multi-
tenant usage? D. Google App Engine

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 994

139. You have been asked to design a A. Mapper


“Open File System” which is derived from B. Cascader
GFS / HDFS architecture with following
variances-chunk size of 100 MB, block C. Scalding
size of 1 MB. A file of size 1 TB needs D. None of the mentioned
to be stored on this file system. How
many chunk servers will be needed, if each 144. Select an example of an output device
server hosts 1000 blocks? A. Keyboard

NARAYAN CHANGDER
A. 500 B. Mouse
B. 1000 C. Speakers
C. 1500 D. none of above
D. none of the mentioned
145. What is the biggest disadvantage of com-
140. Broader model of cloud computing. Any- munity cloud?
thing as a Service. A. Collaboration has to be maintained
A. IaaS with other participants
B. PaaS B. Less security features
C. SaaS C. Cloud is used by many organisation for
different purposes
D. XaaS
D. Organisation losses business auton-
141. The wider the bandwidth the omy
A. larger amount of data that can be 146. Technically, what is the drawback of
trensfered cloud computing in industry or other envi-
B. lesser amount of data that can be ronment?
transferred A. The absence of hardware
C. No effect on data transfer B. The need for high speed internet ac-
D. none of above cess

142. What is the main feature of a private C. The management of data and products
cloud? D. The wide connection of networks
A. Customers, or tenants, maybe differ- 147. When files are held on two devices, are
ent individuals or groups within a single updated to make sure they have the same
company content
B. Customers, or tenants, maybe differ- A. Uploading
ent individuals or groups from different
companies. B. Downloading

C. Customers, or tenants within a single C. Synchronising


company on a PC D. Streaming
D. none of above 148. All cloud computing applications suffer
143. The output of the is not sorted in the from to their WAN connectivity.
Mapreduce framework for Hadoop. A. propagation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 995

B. Latency 154. Point out the correct statement.


C. Noise A. Amazon Elastic Cloud is a system for

PRACTICE BOOK» NOT FOR SALE


creating virtual disks(volume)
D. none of above
B. SimpleDB interoperates with both
149. What is the front end of cloud comput- Amazon EC2 and Amazon S3
ing? C. EC3 is an Analytics as a Service
A. The third party company provider
D. None of the mentioned
B. The personal computer user
C. The internet 155. Tethering is .
A. where a network acts as an access
D. Your personal home server
point to share its internet connection
150. IaaS shares issues with? B. where a smartphone acts as an access
point to share its files
A. PaaS
C. where a network acts as an access
B. SaaS point to share its files
C. Both a and b D. where a smartphone acts as an access
D. None of the above point to share its internet connection
156. Saas stands for?
151. Virtualization
A. Software as a service
A. multiple operating systems on a single
B. System Software and services
physical system
C. Software as a system
B. single physical system
D. System as a service
C. multiple operating systems on a multi-
ple physical system 157. Select the best statement describes the
relationship between application, server,
D. Virutual box and client in a multitenancy environment?
152. Where are Google Cloud resources de- A. Single instance of software running on
ployed? a server and serves one client

A. Multi-region B. Single instance of software running on


a server and serves multiple clients.
B. Region
C. Multiple instances of software running
C. Zone on a server and serves multiple clients.
D. Location D. Multiple instances of software running
on multiple servers and serves one client.
153. Apache Hadoop YARN stands for:
158. A key mechanism for protecting data?
A. Yet Another Reserve Negotiator
A. Access control
B. Yet Another Resource Network B. Auditing
C. Yet Another Resource Negotiator C. Authentication
D. Yet Another Resource Manager D. All of them

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 996

159. Which feature of cloud computing allows C. Accessible from anywhere (with an In-
the service to change in size to meet the ternet connection)
users needs? D. Can work without Internet connection
A. Security E. You have to be in the office
B. redundancy
164. Which of the following cloud concept is re-
C. Scalability lated to pooling and sharing of resources?
D. Dont click this button A. Polymorphism

NARAYAN CHANGDER
160. How many bits are needed to represent B. Abstraction
128 values? C. Virtualization
A. 6 D. None of the mentioned
B. 7
165. Putting copies of data on multiple servers
C. 8 is a process called
D. 9 A. Cloning

161. What is benefit of storage availability in B. Redundancy


the Cloud? C. Data Processing
A. Additional storage does not require D. Cloud Computing
budget for new large storage devices.
166. What are some open source cloud comput-
B. Storage in the Cloud has a higher avail- ing platform databases
ability than storage devices in the local
area network. A. MongoDB

C. Storage in the Cloud has shorter ac- B. CouchDB


cess times than storage in the local area C. LucidDB
network. D. all of the mentioned
D. Storage in the Cloud is easier to pro-
tect against intrusion 167. . as a Service is a cloud computing infras-
tructure that creates a development envi-
162. Which of the following allows you to cre- ronment upon which applications may be
ate instances of the MySQL database to build.
support your Web sites? A. Infrastructure
A. Amazon Elastic Compute Cloud B. Service
B. Amazon Simple Queue Service C. Platform
C. Amazon Relational Database Service D. All of the mentioned
D. Amazon Simple Storage System
168. Which of the following is an example of
163. Applications like Google Docs are useful cloud computing?
because (choose two) A. Using your laptop on an airplane
A. No need to install anything on the com- B. Using Wi-Fi to connect to a network
puter printer
B. You need to install on the device C. Using Google Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 997

D. All of the options are examples of 174. ensures the ability to exchange/ ob-
cloud computing tain the information to be consumed

PRACTICE BOOK» NOT FOR SALE


A. Data Level Interoperability
169. Which of the following dimension is re-
lated to organization’s boundaries? B. Service Level Interoperability
A. Physical location of data C. Security Level Interoperability
B. Ownership D. Machine Level Interoperability
C. Security boundary 175. Amazon Web Services, Microsoft Azure,
D. All of the mentioned Google Compute Engine are
A. IaaS
170. Cloud providers provide cloud services to
the cloud users. B. PaaS
A. true C. SaaS

B. false D. All of the above

C. MAYBE 176. In cloud computing, which term is used to


D. CANT SAY describe the natureof IT infrastructure and
allowsdynamic scaling depending onthe de-
171. What is cloud Computing replacing? mand for resources?
A. Corporate data centers A. elasticity
B. Expensive personal computer hard- B. clustering
ware C. consolidation
C. Expensive software upgrades D. virtualization
D. All of the above
177. Cloud processing could be used as a ser-
172. What are the uses of cloud storage? vice if

A. Backup A. You need more storage space

B. File sharing B. You need more hardware

C. Data synchronization C. You need to run complicated programs


with many complex mathematical calcula-
D. Media Distribution tions
E. Data Archiving D. You want to stop hackers

173. What is a system of interconnected 178. enables batch processing, which


computers and other electronic devices greatly speeds up high-processing applica-
called? tions.
A. Server A. Scalability
B. Network B. Reliability
C. Data Link C. Elasticity
D. Cloud Computing D. Utility

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 998

179. Which of the following is built on top of a 184. A single instance of a software applica-
Hadoop framework using the Elastic Com- tion serves multiple customers.
pute Cloud?
A. Multi-tenancy
A. Amazon Elastic MapReduce
B. Tenancy scaling
B. Amazon Mechanical Turk
C. Elastic tenancy
C. Amazon DevPay
D. Multi-scalable
D. Multi-Factor Authentication

NARAYAN CHANGDER
180. Which one of the following can be consid- 185. The ability to continue to function at a
ered as the example of the Front-end? high level of performance as workflow vol-
ume increases.
A. Web Browser
A. Scalability
B. Google Compute Engine
B. Self service
C. Cisco Metapod
D. Amazon Web Services C. Elasticity
D. Measured service
181. You want a cloud subscription model that
is the least expensive way to access ser- 186. Essential componets of cloud auditor
vices that are strictly hosted by a cloud ser-
vice provider. Which cloud model describes A. security, Privacy impact, performance
this? B. Privacy impact, performance
A. Public cloud C. security,
B. Private cloud D. Privacy impact
C. Hybrid cloud
D. Cumulonimbus cloud 187. What is one benefit of a cloud computin-
genvironment?
182. What are the types of cloud services? A. It improves server performance
A. Public, private and hybrid clouds
B. It minimizes network traffic to the vir-
B. Personal area (PAN), Local area (LAN), tual machines
Campus area networks (CAN)
C. It automatically transforms physical
C. Infrastructure as a service (IaaS), servers into virtualmachines
platform as a service (PaaS), software as
a service (SaaS) D. It maximizes server utilization by im-
plementingautomated provisioning
D. Mail server, collaboration server, web
server, application server 188. Which one of the following refers to the
user’s part of the Cloud Computing sys-
183. Which of the following is considered as
tem?
Web Service Platform Elements?
A. WSDL A. back End

B. SOAP B. Management
C. UDDI C. Infrastructure
D. All of the mentioned D. Front End

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 999

189. Which of the following CANNOT be of- 194. For which of the following operations is
fered as a service via Cloud Computing? NO communication with the NameNode re-
quired?

PRACTICE BOOK» NOT FOR SALE


A. hardware
B. software A. A client writing a file to HDFS.
B. A client requesting the filename of a
C. storage space
given block of data.
D. data
C. A client reading a block of data from
190. “allow organizations to store and man- the cluster.
age data on off-site file servers instead of D. A client reading a file from the cluster.
building their own physical data centers “
this statement refer to. 195. OpenStack provides
A. virtualization A. SaaS
B. Storage components B. PaaS
C. Physical server C. IaaS
D. Device D. All the above

191. What branch of Information Technology 196. Which of the following is a structured
protects computer systems? data store that supports indexing and data
queries to both EC2 and S3?
A. Cybersecurity
A. CloudWatch
B. Hacking
B. Amazon SimpleDB
C. Database Management
C. Amazon Cloudfront
D. none of above
D. All of the mentioned
192. A node acts as the Slave and is re-
sponsible for executing a Task assigned to 197. What is the parallel efficiency(Eff) of an
it by the JobTracker algorithm? Where a task takes time T in
uniprocessor system, P is number of pro-
A. MapReduce cessors, M is time taken by each proces-
B. Mapper sor.
C. TaskTracker A. Eff = (T*P)/M
D. JobTracker B. Eff = T*(M/P)
C. Eff = T/(P*M)
193. With Network as a service (STaaS)
D. Eff = T*P*M
A. Users can back up data and hard
drives. 198. Using things like Google Docs are useful
B. Programmers use cloud-based devel- to because (choose two)
opment tools to develop online applica- A. No need to install anything on the com-
tions that run on many platforms. puter
C. Interconnections link private net- B. You need to install on the device
works. C. Accessible from anywhere (with an In-
D. none of above ternet connection)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1000

D. Can work without Internet connection C. Large Network Access


E. You have to be in the office D. All of the above

199. What are security aspects provided by 204. method is completely OS and applica-
cloud services? tion agnostic method access to OS stats
and application logs
A. Zero infrastructure investment, just-in-
time infrastructure A. Black-box, Gray-Box
B. Gray-Box, Black-box
B. Access control, identity management,

NARAYAN CHANGDER
authentication and authorization C. Black-box, White-Box
C. Quick and easy setup, smooth organi- D. Gray-box, White-Box
zation system, single management envi- 205. Supplying two or more pieces of informa-
ronment tion to verify identity.
D. Calculable cloud architecture, provide A. single sign-on
manageable workload dynamics
B. two-factor authentication
200. describes a cloud service that can only C. security token
be accessed by a limited amount of people. D. password
A. Datacenter
206. Which resources are typically provided by
B. Private cloud anInfrastructure as a Service cloud comput-
C. Virtualization ing deliverymodel?
D. Public cloud A. applications
B. virtual machines
201. What are the benefits of cloud comput-
C. virtual private networks
ing?
D. middleware software stacks
A. Scalability and flexibility.
B. Security and privacy. 207. NIST stands for
A. National Institute of Science and Tech-
C. Total control over computing re-
nology
sources.
B. National Interaction of Science and
D. none of above
Telecom
202. How many types of dimensions exists in C. National Institute of Standards and
Cloud Cube Model? Technology
A. 1 D. National Institute of Science and
Space
B. 2
C. 3 208. . provides virtual machines, virtual stor-
age, virtual infrastructure, and other hard-
D. 4 ware assets.
203. Which of the following are the features A. IaaS
of cloud computing? B. SaaS
A. Security C. PaaS
B. Availability D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1001

209. What is the main reason that companies A. AUTHORIZATION


turn to using the Cloud? B. AUTHENTICATION

PRACTICE BOOK» NOT FOR SALE


A. cost saving C. SECURITY OF DATA
B. better performance D. AUDITING
C. ubiquitous computing 215. Which of the following is one of the
D. flebility unique attributes of Cloud Computing?

210. A cloud computing company (for exam- A. utility type of delivery


ple AWS and Microsoft Azure) usually B. elasticity
provides C. low barrier to entry
A. Storage as a service D. All of the mentioned
B. Software as a service 216. serves as a PaaS vendor within
C. Infrastructure and processing as a Google App Engine system.
service A. Google
D. Storage, software, processing and in- B. Amazon
frastructure as a service
C. Microsoft
211. Broad network access D. All of the mentioned
A. Cloud computing resources are acces- 217. Which of these is not a component of com-
sible over the network putational thinking?
B. Resource pooling A. Abstraction
C. Measured service B. Memory
D. Self-service C. Decomposition
212. Who provide GUI (Graphical User Inter- D. Pattern Recognition
face) to interact with the cloud? 218. . cloud is one where the cloud has been
A. Client organized to serve a common function or
B. Application purpose by many organisation .
A. Public
C. Client Infrastructure
B. Private
D. Server
C. Community
213. All of these are types of cloud deploy- D. All of the mentioned
ment except:
A. public cloud 219. which of the following can be considered
an advantage of cloud storage
B. private cloud
A. the user has no control over their data
C. community cloud
B. accessible anywhere with an internet
D. segregated cloud connection
214. REFERS TO DIGITALLY SPECIFY C. portability
THE ACCESS RIGHTS TO PROTECTED RE- D. many programs can be run at the same
SOURCES USING ACCESS POLICIES time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1002

220. Which of the following is a type of Ser- C. 2008


vice Models? D. 2012
A. Public-as-a-Service
225. Which cloud is deployed when there is a
B. Platform-as-a-Service budget constraint but business autonomy
C. Community-as-a-Service is most essential?
D. Public-as-a-Service A. Private cloud
221. A third-party provider hosts applications B. Public cloud

NARAYAN CHANGDER
and makes them available to customers C. Hybrid cloud
over the Internet. D. Community cloud
A. SaaS
226. Which of the following should be used
B. IaaS
considering factors shown in the fig-
C. Paas ure? cloud-computing-aws-interview-
D. Traditional model questions-answers-q1
A. SimpleDB
222. Select the NIST Cloud Agents? (Give in
check box) B. RDS
A. Cloud Consumer C. Amazon EC2d)
B. Cloud Provider D. All of the mentioned
C. Cloud Broker 227. Which of the following can be identified
D. Cloud Carrier as cloud?
A. Web Applications
223. Which of the following does not reflect
the self-service feature of cloud comput- B. Intranet
ing? C. Hadoop
A. Engineer A purchases an ECS from D. All of the mentioned
Azure CLOUD to meet his/her own re-
quirements 228. Which of the following can be referred
to the location and management of the
B. Engineer B changes the operating
cloud’s infrastructure?
system of the ECS purchased by him-
self/herself from Linux to Windows A. Service
C. Engineer C increases the number of B. Application
CPUs of the ECS purchased by him- C. Deployment
self/herself from 2 to 4.
D. None of the mentioned
D. Engineer D receives an SMS notifica-
tion from the ECS provider one week be- 229. Which of these is a managed environment
fore the ECS expires. for deploying containerized apps?

224. Google Drive was launched in what A. Cloud Run


year? B. App Engine
A. 1992 C. Google Kubernetes Engine
B. 2004 D. Cloud Functions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1003

230. Which of the following is Cloud Platform C. flipkart.com


by Amazon? D. None of the above

PRACTICE BOOK» NOT FOR SALE


A. Azure
236. Select if all applicable for features of
B. AWS cloud?
C. Cloudera A. Development of applications that can
D. All of the mentioned manage several clients at a time.

231. What does IP-Address stand for? B. Access and management of the com-
mercial software.
A. Interweb-protocol address
C. Centralization of software will elimi-
B. Internet-protocol address nate the need of downloading the updated
C. Internet-probable address versions.
D. Intranet-protocol address D. All of them

232. Cloud Computing applications are typi- 237. Which one of the following is a kind
cally accessed through of technique that allows sharing the sin-
gle physical instance of an application or
A. Hardware on your computer.
the resources among multiple organiza-
B. A proxy server. tions/customers?
C. A web browser. A. Virtualization
D. An offline application. B. Grid Computing
233. Platform services are provided by a ven- C. SOA
dor while the customers are responsible D. Utility Computing
for their own applications and data in this
type of cloud computing. 238. The is something that you can obtain
under contract from your vendor.
A. IaaS
A. PoS
B. PaaS
B. QoS
C. SaaS
C. SoS
D. XaaS
D. All of the mentioned
234. According to research by Nasuni in 2013,
how much data is stored in the cloud? 239. Which of the following is a characteristic
of the SaaS applications?
A. 1 exabyte
A. SaaS applications are reliable
B. 1 petabyte
B. Non-reliable
C. 500 petabytes
C. SaaS applications are not customiz-
D. 1 yottabyte able
235. Which of the following SaaS platform is D. SaaS applications are customizable
with an exposed API?
240. From the standpoint of a it makes
A. salesforce.com no sense to offer non-standard machine in-
B. amazon.com stances to customers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1004

A. CaaS 246. uses your Internet connection to send


B. AaaS live voice information such as a telephone
call
C. PaaS
A. Router
D. IaaS
B. Wi-Fi
241. Utility computing is based on? C. VoIP
A. Grid Computing Model D. Ethernet

NARAYAN CHANGDER
B. Pay-per-Use model
247. By default, this is the area in Google
C. virtual isolation Model Drive that shows your personal files.
D. SOA Model A. My Drive
242. Resource usage is monitored, measured, B. Shared with me
reported and billed based on use. C. Docs
A. Measured service D. My Stuff
B. Measured outcomes
248. The may arise when a process rolls
C. Pay as you grow back to its checkpoint after a failure and
D. Pay as you measure requests all the other affected processes
also to roll back
243. Point out the wrong statement:
A. Rollback
A. All applications benefit from deploy-
B. Phantom Effect
ment in the cloud
C. Domino Effect
B. With cloud computing, you can start
very small and become big very fast D. Livelock problem
C. Cloud computing is revolutionary, even 249. An authentication protocol that can oper-
if the technology it is built on is evolution- ate over PPP but serves only as the frame-
ary work and does not perform encryption or
D. None of the mentioned authentication on its own.
A. PAP
244. Google docs, Google sheets are examples
of B. CHAP
A. Cloud storage C. RADIUS
B. Cloud computing D. EAP
C. don’t know 250. The essential characteristics of cloud com-
D. none of above puting
A. On-demand self service, Broad Net-
245. enables batch processing, which greatly work service, Resource pooling, Rapid
speeds up high-processing applications elasticity, Managed Service
A. Scalability B. Rapid elasticity, Managed Service
B. Reliability C. Managed Service, On-demand self ser-
C. Elasticity vic
D. Utility D. Managed Servic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1005

251. How is infrastructure as a service pro- B. Private


vided? C. Community

PRACTICE BOOK» NOT FOR SALE


A. Virtualization D. Hybrid
B. Virtual Realization
257. Which of the following is not a phase of
C. Cloud Services cloud lifecycle management?
D. Hardware service A. The definition of the service as a tem-
252. Which of the following things you will plate for creating instances.
need if you wish to setup an IT company? B. Client interactions with the service
A. Office space C. Management of the operation of in-
stances and routine maintenance
B. computers servers
D. None of the mentioned
C. cafeteria
D. all of the above 258. Which of the following is a repeatable
task within a business process?
253. What is it called when you work for a
A. service
company from home?
B. bus
A. Teleconfrencing
C. methods
B. Commuting
D. all of the mentioned
C. TeleCommuting
D. The Daily Grind 259. feature allows you to optimize your
system and capture all possible transac-
254. Encryption provides which of the follow- tions.
ing assurances?
A. scalability
A. confidentiality
B. reliability
B. integrity
C. elasticity
C. availability
D. None of the mentioned
D. accessibility
260. Which of these is a cloud computing pric-
255. Which of the following behaves like the ing model?
entry point of the monitor and reroutes the A. Free
instructions of the virtual machine?
B. Pay Per Use
A. Dispatcher
C. Subscription
B. Allocator
D. Perpetual License
C. Interpreter
D. Both A and B 261. what do cloud services provide to help
with privacy and security concerns
256. A cloud combines multiple clouds A. collaboration
where those clouds retain their unique
identities, but are bound together as a B. accessibility
unit. C. encryption
A. Public D. backups

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1006

262. Which are disadvantages of external 267. A large collection of servers is know as a
hosting?
A. Ideal for local network users-less A. Network
bandwidth needed
B. Computer System
B. Expensive service
C. Server Farm
C. If servers go down it is out of your con-
trol D. Database

NARAYAN CHANGDER
D. Slow bandwidth connection 268. How many deployment models in cloud
computing?
263. Point out the correct statement in context
of YARN: A. 4
A. YARN extends the power of Hadoop B. 3
to incumbent and new technologies found C. 2
within the data center
D. 7
B. YARN is highly scalable
C. YARN enhances a Hadoop compute 269. What are two traits of a cloud computing
cluster in many ways architecture? (Choose two.)
D. All of the mentioned A. single tiered

264. Cloud computing is a concept that in- B. not scalable


volves pooling physical resources and of- C. on-demand access to resources
fering them as which sort of resource? D. internet/intranet accessible serverE.
A. cloud client and server run inthe same physical
B. real environment
C. Virtual 270. The addition of a software package on
D. none of the mentioned top of a cloud storage volume makes most
cloud storage offerings conform to a
265. A drawback for gamers, when using the as a Service model.
cloud, is the possible limited capac-
ity which would affect the quality of the A. Software
steaming. B. Platform
A. broadband C. Analytics
B. internet D. None of the mentioned
C. WWW
271. One way third party companies that pro-
D. Buffering vide cloud services protect your informa-
266. which of the following is specified param- tion from being lost because of server fail-
eter of SLA ure is to use a method called
A. response times A. Cloud Computing
B. responsibilities of each party B. Networking
C. warranties C. Redundancy
D. All of the mentioned D. Security Protocols

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1007

272. Identify which statement is TRUE about 277. How many types of services are there
a bare metal hypervisor? those are offered by the Cloud Computing
to the users?

PRACTICE BOOK» NOT FOR SALE


A. It can only be hosted on an existing op-
erating system. A. 2
B. It requires a separate license for the B. 4
native operating system
C. 5
C. It has minimum functionality to sup-
port only one type of operating system D. 3
D. It runs directly on server hardware to
provide virtual machines with timesharing 278. Which of these describes the parts to
resources. cloud computing?
A. The front end connects the back end to
273. I can print to my printer from anywhere
the internet
in the building because
A. It is a wireless printer B. The back end connects the front end to
the internet
B. It has a bluetooth connection
C. The internet connects the front end to
C. It is connected to iCloud
the back end
D. It is on a network
D. The front end needs no connection to
274. Why can Cloud Computing sometimes pro- the back end
vide better performance?
A. specialisation of the technology 279. What are two important benefits of us-
ing cloudcomputing? (Choose two.)
B. less friction on the Internet
A. Optimizes IT investments
C. no need to worry about security
B. Deployment of single tenant applica-
D. serving a single user
tion
275. Which one of the following cloud concepts C. Enhanced Web V2.0 interfaces for user
is related to sharing and pooling the re- interactions
sources?
D. Lower total cost of ownership and im-
A. Polymorphism
proved asset utilization
B. Virtualization
E. Provides better availability than a stan-
C. Abstraction dard computing environment
D. None of the mentioned
280. The user can scale, through a control
276. computing refers to applications and panel, the required infrastructure without
services that run on a distributed network disrupting operations.
using virtualized resources.
A. On demand self service
A. Distributed
B. Cloud B. Elasticity

C. Soft C. Scalablility
D. Parallel D. Ubiquitous access

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1008

281. One problem with streaming movies and D. None of the above
music from the cloud is that
286. Which project identifier does not need to
A. Cloud services are expensive be globally unique?
B. You need internet access to watch or A. Project ID
listen
B. Project name
C. The cloud is not open to the public
C. Project number
D. You can’t keep the media on your de-
D. none of above

NARAYAN CHANGDER
vice
282. How can you upload content to Google 287. The option allows you to copy jars
Drive? locally to the current working directory of
tasks and automatically unjar the files.
A. Click New, File upload
A. archives
B. Click New, Folder upload
B. files
C. Drag files into the Drive window
C. task
D. You can use any of these methods to
upload files to Google Drive D. None of the mentioned

283. Consider the following state- 288. What is the fully automated, elastic third-
ments:Statement 1:The Job Tracker is wave cloud that consists of a combination
hosted inside the master and it re- of automated services and scalable data?
ceives the job execution request from A. Container-based architecture
the client.Statement 2:Task tracker is the B. On-premises
MapReduce component on the slave ma-
chine as there are multiple slave machines. C. Colocation

A. Only statement 1 is true D. Virtualized data center

B. Only statement 2 is true 289. Which of the following is not an actor in


C. Both statements are true cloud computing?

D. Both statements are false A. cloud consumer


B. cloud provider
284. Wi-Fi uses
C. cloud carrier
A. modulated radio signals
D. cloud monitor
B. digital signals
C. satellite signals 290. Google Docs allows users to do which of
these things (choose all that apply)
D. none of above
A. Add comments to documents for oth-
285. What is a hybrid cloud? ers to see
A. A blend of public and private cloud ser- B. Track changes to documents, so you
vices with orchestration between them can see who changed what
B. A cloud service deployed across multi- C. Live editing, so you can all work on a
ple offices or locations document at the same time
C. A blend of private cloud and legacy on- D. Use chat facilities, to discuss what
premises hardware things you would like to do to a document

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1009

291. Which of the following statements are 296. refers to the location and manage-
true about key/value pairs in Hadoop? ment of the cloud’s infrastructure

PRACTICE BOOK» NOT FOR SALE


A. A map() function can emit up to a max- A. service
imum number of key/value pairs (depend-
ing on the Hadoop environment). B. deployment
B. A map() function can emit anything be- C. Application
tween zero and an unlimited number of
key/value pairs. D. none of the mentioned

C. A reduce() function can iterate over


297. Putting copies of the same data on multi-
key/value pairs multiple times.
ple servers is a process called
D. A call to reduce() is guaranteed to re-
ceive key/value pairs from only one key. A. Cloning

292. Exchange Online hybrid is an example of B. Redundancy


what kind of cloud deployment model? C. Data Processing
A. Service cloud
D. Cloud Computing
B. Hybrid cloud
C. Private cloud 298. Which of the following is a benefit of us-
D. Public cloud ing a cloud storage option?
A. It protects your computer from viruses
293. Cloud technology has improved educa-
tional scenery except B. You don’t need Internet access to re-
A. Lower cost trieve the data
B. Creation of virtual classroom C. It provides a backup of your data, files
C. Increase learning time and photos
D. Better access to education and train- D. It is deleted over time
ing
299. Google drive is an example of
294. Which of the following is the most widely
used technique for abstraction? A. cloud computing
A. Load balancing B. cloud storage
B. Load schedulin
C. don’t know
C. Load scaling
D. none of above
D. All of the mentioned
295. Which of the following is application and 300. What are advantages of external host-
infrastructure management software for ing?
hybrid multi-clouds?
A. Costs less than an internal host
A. VMware Hyperic
B. Little technical knowledge required
B. Webmetrics
C. Univa UD C. More prone to viruses and hacking
D. Tapinsystems D. Backups are made for you

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1010

301. Which is/are true regarding cloud com- C. Write down your password and store
puting? it in a secure physical location.
A. It provides on-demand network ac- D. Do not reuse passwords after they
cess have expired.
B. It does not provide ubiquitous access
306. What is the term for delivering an appli-
C. Resources can be released with no
cation over the internet called?
management effort

NARAYAN CHANGDER
D. None of these A. PaaS
B. Faas
302. Consider the following state-
ments:Statement 1:When two processes C. SaaS
are competing with each other causing
D. laaS
data corruption, it is called deadlock.
Statement 2:When two processes are
307. is a pay-as-you-go model matches re-
waiting for each other directly or indi-
sources to need on an ongoing basis.
rectly, it is called race condition.
A. Only statement 1 is true A. Utility
B. Only statement 2 is true B. Elasticity
C. Both statements are true C. Low barrier to entry
D. Both statements are false D. All of the mentioned
303. What is FE (hex) in binary?
308. Which is a fundamental attribute of cloud
A. 1101 1111 computing?
B. 1110 1111
A. Customers pay for allocated comput-
C. 1111 0101 ing resources whether they make use of
D. 1111 1110 them or not.

304. Programmers use cloud-based develop- B. Customers only get computing re-
ment tools to develop online applications sources when the cloud provider has avail-
that run on many platforms. ability.

A. PaaS C. Customers get access to computing re-


sources over the internet, from anywhere.
B. IaaS
C. SaaS D. Computing resources cannot be scaled
up or down.
D. AaaS

305. Which of the following is NOT a sug- 309. Which are advantages of local hosting?
gested tip for making/keeping passwords A. Ideal for local network users-less
secure? bandwidth needed
A. Do not use any word that might appear B. Always on-cannot use sleep mode
in a dictionary.
C. Costs less than external hosting
B. Make the password longer than 8 char-
acters. D. Slow bandwidth connection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1011

310. Below is a list of cloud infrastructure com- 315. is a new process by which the router
ponents except and the client exchange information to
determine the optimal path their signals

PRACTICE BOOK» NOT FOR SALE


A. Storage components
should travel. Instead of broadcasting ev-
B. Physical server erywhere, the router and client focus and
C. Private cloud concentrate their signals. This makes the
signals stronger.
D. Network components
A. Beam Excgange
311. WHICH OF THE FOLLOWING ARE MECHA- B. Forging stream
NISMS USED FOR SECURING DATA IN MO- C. Beaming
TION
D. Beamforming
A. TLS
316. describes a distribution model in
B. SSL which applications are hosted by a service
C. SYMMETRIC ENCRYPTION provider and made available to users.
A. IAAS-Infrastructure-as-a-Service
D. ASYMMETRIC ENCRYPTION
B. PaaS-Platform-as-a-Service
312. What is it called when a business uses its C. SaaS-Software-as-a-Service
servers to store files for another organisa-
D. All of them
tion?
A. Guesting 317. WHICH OF THE FOLLOWING IS NOT AN
AUTHENTICATION MECHANISM
B. Hosting
A. OTP
C. Serving B. OAuth
D. Owning C. SSO

313. What is local/internal hosting? D. SAML-TOKEN

A. You pay a company to host your web- 318. CRM is an example of


site A. SaaS
B. Data is saved onto your local computer B. PaaS
for people to access externally C. IaaS
C. More prone to viruses and hacking D. Both 1 and 2
D. Data is saved onto an external com- E. All of the above
puter for people to access externally
319. Which of the following are levels of ac-
314. IaaS offer non-standard machine to cus- cess you can set for files that you share
tomers on Google Drive?
A. Can edit, Can comment, and Can view
A. true
B. Can delete, Can edit, and Can comment
B. false
C. Can share, Can edit, and Can view
C. it depends upon use
D. Can copy, Can download, and Can com-
D. none of the mentioned ment

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1012

320. How many types of hypervisor are 325. A type of network model where all com-
there? puters on the network share responsibility
and there is no one central server.
A. 2
A. Peer to peer
B. 3
B. Client-server
C. 4
C. Mesh
D. 5
D. Virtual network

NARAYAN CHANGDER
321. Provides a platform allowing customers
to develop, run, and manage applications 326. The number of maps is usually driven by
without the complexity of building and the total size of
maintaining the infrastructure. A. inputs
A. PaaS B. outputs
B. IaaS C. tasks
C. SaaS D. None of the mentioned
D. AaaS
327. What is a Virtual Private Network
322. In private cloud customer control (VPN)?

A. Applications, data, OS, Virtualization, A. A secured connection for remote ac-


Servers, Stroage, Networking cess to a local area network

B. Applications, data, OS B. A secured private cloud for a single


user
C. Virtualization, Servers,
C. A virtual network device for private
D. Networking purposes
323. Consumer doesn’t require to manage in- D. An operating system for private net-
dividual application capabilities in work systems
A. SaaS 328. Cloud computing is an extension of what
B. PaaS type of computing arrangement?

C. IaaS A. Star

D. None B. Mesh
C. Client-server
324. Cloud Architecture
D. Peer to peer
A. Deployment Model, Service Model, Es-
sential Characteristics, Common Charac- 329. Which is not a major cloud computing plat-
teristics form?
B. Characteristics A. Google 101
C. Deployment model B. IBM Deep blue
D. Service Model C. Microsoft Azure
E. Common Characteristics D. Amazon EC2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1013

330. Web services communicate using pay-as-you-go, infinitely scalable, univer-


A. None of these sally available system

PRACTICE BOOK» NOT FOR SALE


D. All of the mentioned
B. Open protocols
C. Close protocols 335. Select 4 main security risks of cloud com-
puting
D. Open-Close protocols
A. Legal compliance violations
331. How can confidentiality of information be B. Identity/Data theft
achieved? C. Poor Hardware implementation
A. By ensuring enough resources to make D. Malware infections and data breaches
information available for all users
E. Weak access control/login measures
B. By preventing unauthorized changes
336. Facilities that house large collections of
C. By regularly backing up the informa- servers are called
tion
A. Data Centers
D. By restricting access to information
B. Computer Processing Plants
332. Virtual Machine Ware (VMware) is an C. Internet Routing Facilities
example of D. Cloud Computing Centers
A. Infrastructure Service
337. Which one of the following statements is
B. Software Service true about the SSO?
C. Platform Service A. It has multiple authentication servers
D. none of above B. It manages single accesses to other
systems
333. Which one of the following can be consid-
C. In SSO, User sends the ticket to in-
ered as a utility is a dream that dates from
tranet server.
the beginning of the computing industry it-
self? D. All of the above
A. Computing 338. . refers to the location and management
of the cloud’s infrastructure.
B. Model
A. Service
C. Software
B. Deployment
D. All of the mentioned
C. Application
334. Point out the wrong statement D. None of the mentioned
A. The massive scale of cloud computing 339. what widely used services is built on
systems was enabled by the populariza- cloud computing technology?
tion of the Internet
A. Twitter
B. Soft computing represents a real
B. Gmail
paradigm shift in the way in which sys-
tems are deployed C. YouTube
C. Cloud computing makes the long-held D. Skype
dream of utility computing possible with a E. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1014

340. Which of the following components re- B. App Engine


side on a NameNode?
C. Google Kubernetes Engine
A. Filenames, blocks and checksums
D. Cloud Functions
B. Blocks and heartbeat messages
C. Filenames, block locations 345. In PaaS, you manage?

D. Blocks and block locations A. Application


B. Storage

NARAYAN CHANGDER
341. What is a benefit of Cloud Computing?
C. Runtime
A. Use your computers in any weather
B. Share Files D. Security

C. It does your work for you 346. What is an example of a WAN network?
D. Your files can fly A. Personal Hotspot
342. What advantage is there for an enter- B. Bluetooth
prise to adopt a virtual private cloud C. The Internet
model?
D. Router
A. Reduce costs by adopting a flexible
pricing model for the entire operation. 347. has many of the characteristics of
B. Reduce infrastructure costs since all what is now being called cloud computing.
data centers will be managed in a third A. Internet
party cloud.
B. Softwares
C. Manage sensitive data in a compliant
and secure manner and benefit from flex- C. Web Service
ible pricing models for select services or D. All of the mentioned
infrastructure.
D. Obtain maximum control over aspects 348. Which one of the following a technology
such as security and performance since works behind the cloud computing plat-
the entire infrastructure will be managed form?
within the IT department. A. Virtualization
343. What is the Need of Cloud Computing? B. SOA
A. Maintenance, Cost, Performance, Se- C. Grid Computing
curity
D. All of the above
B. Cost, Performance, Storage
C. Performance, Cost, Security, Storage 349. Which of the following does the most
commonly used set of protocols uses as the
D. Performance, Storage, Security messaging format?
344. Which of these is a lightweight, fully A. JSON
managed serverless execution environ-
B. BSON
ment for building and connecting cloud ser-
vices? C. XML
A. Compute Engine D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1015

350. Which service provides raw compute, 355. Which of the following is an edge-
storage, and network capabilities, orga- storage or content-delivery system that
nized virtually into resources that are sim- caches data in different physical loca-

PRACTICE BOOK» NOT FOR SALE


ilar to physical data centers? tions?
A. FaaS A. Amazon Relational Database Service
B. IaaS B. Amazon SimpleDB
C. PaaS C. Amazon Cloudfront
D. SaaS D. Amazon Associates Web Services

351. A cloud computing service that provides 356. What is the purpose of APIs offered by
developers with a framework that can be various Google Cloud services?
used for building custom applications A. APIs allow physical access to data cen-
A. PaaS ters.
B. IaaS B. APIs provide Cloud Console access
through a simple web-based graphical
C. SaaS
user interface.
D. FaaS
C. APIs allow code to be written to con-
352. Automatic backups are not provided au- trol Google Cloud services.
tomatically by drupal cloud reseller. D. APIs provide monthly pricing dis-
A. Platform.sh counts.

B. Amaze.io 357. Fill in the blank describes a cloud ser-


vice that can only be accessed by a limited
C. Acquia
amount of people.
D. Pantheon
A. Data Centre
353. How many types of service model are B. Public Cloud
mainly present in Cloud?
C. Vertulization
A. 1
D. Private Cloud
B. 2
358. WSDL Stands for
C. 3
A. None of these
D. 4
B. Web Services Description Language
354. What are the four classes of clouds based
C. Web Services Design Language
on altitude?
D. Web Services Development Language
A. cirrus, nimbus, stratus, cumulus
B. low, middle, high, vertically developed 359. A company interested in cloud computing
is looking for a provider who offers a set
C. troposphere, stratosphere, meso-
of basic services such as virtual server pro-
sphere, thermosphere
visioning and on-demand storage that can
D. classes of clouds are not based on al- be combined into a platform for deploy-
titude ing and running customized applications.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1016

What type of cloud computing model fits C. SSH


these requirements?
D. Bash
A. Platform as a Service
B. Software as a Service 365. What is true about Service-Oriented Ar-
chitecture?
C. Application as a Service
D. Infrastructure as a Service A. Service-Oriented Architecture helps to
use applications as a service for other ap-
360. The networking layer which prepares a

NARAYAN CHANGDER
plications
message in a form that will be understood
B. It is possible to exchange the data be-
by the receiving application.
tween applications of different vendors
A. Application without additional programming
B. Transport C. It offers computational resources on
C. Network demand as a metered service.
D. Data link D. Both a and b
361. function processes a key/value
366. Which of the following is a benefit of
pair to generate a set of intermediate
cloud computing?
key/value pairs.
A. Map A. The ability to make a backup copy of
your cloud computing software
B. Reduce
B. The reliability of locally installed appli-
C. Both Map and Reduce
cations
D. None of the mentioned
C. Scalable storage capacity
362. provides shared services as opposed
D. Needs to be installed on the computer.
to local servers or storage resources
A. Cloud Computing 367. Which of the following is related to ser-
B. Network Computing vice provided by Cloud?
C. Science Computing A. Sourcing
D. None of the choices B. Ownership
363. Which hash sizes are most popular to use C. Reliability
in SHA-2?
D. AaaS
A. 128
B. 160 368. as a utility is a dream that dates from
C. 256 the beginning of the computing industry it-
self.
D. 512
A. Model
364. Which command line tool is part of the
Cloud SDK? B. Computing

A. gsutil C. Software
B. Git D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1017

369. What happens when you delete a file in A. IaaS


Google Drive?
B. SaaS

PRACTICE BOOK» NOT FOR SALE


A. Nothing, you cannot delete files
C. PaaS
B. It is gone forever
D. All the above mentioned
C. It goes to the Trash
D. It just hides it from your view, but you 375. What are the main components of
can still search for it Hadoop Ecosystem?
A. MapReduce, HDFS, YARN
370. Why cloud computing more essential?
B. MLlib, GraphX
A. Keep the files as organised in cloud
B. Extend your network on cloud C. Gelly, Table, CEP

C. Reduce the company expenditure D. None of the mentioned

D. Secure your application local storage 376. You want to leverage the cloud to host
virtual machines (VMs). Which type of
371. A short-range technology that con-
cloud service is this?
nects multiple devices, for example mo-
bile phones to speakers over a short A. Infrastructure as a Service (IaaS)
distance B. Platform as a Service (PaaS)
A. Internet
C. Software as a Service (SaaS)
B. Bluetooth
D. none of above
C. WiFi
D. 4G 377. Which of the following is the machinery
for interacting with Amazon’s vast prod-
372. Which is not an advantage of Grid? uct data and eCommerce catalog function?
A. Scalable A. Amazon Elastic Compute Cloud
B. uses unused computing power B. Amazon Associates Web Services
C. provide standard and high cpu C. Alexa Web Information Service
D. multi-tenancy D. All of the mentioned
373. Which of the following “cloudly” char- 378. which of the following is true about cloud
acteristics that cloud management service computing
must have?
A. it is always going to be less expensive
A. Billing is on a pay-as-you-go basis
and more secure than local computing
B. The management service is extremely
B. you can access your data from any
scalable
computer in the world as long as you have
C. The management service is ubiquitous internet connection
D. All of the mentioned C. only a few small companies are invest-
ing in the technology, making it a risky en-
374. Which one of the following offers the
ture
control structures and development frame-
works? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1018

379. Which of them is not a Cloud Service B. software hypervisor


Model? C. hardware hypervisor
A. SaaS D. system hypervisor
B. IaaS
385. Which delivery model is an example of a
C. DaaS cloud computingenvironment that provides
D. PaaS users access tovirtual machines?
A. Platform as a Service

NARAYAN CHANGDER
380. Which of these is an example of Cloud
Computing? B. Software as a Service
A. USB stick C. Application as a Service
B. Drop Box D. Infrastructure as a Service
C. SD Card 386. Which of the following describe Cloud
D. none of above Computing from the user view?
A. providing scalable infrastructure
381. Benefits of Virtualization
B. ubiquitous access to IT-infrastructure
A. Isolation
C. selling IT on pay-per-use basis
B. Encapsulation
D. virtualizing IT infrastrcture
C. Hardware Independence, Portability
D. Hardware Independence, Portability, 387. In the Planning Phase, Which of the fol-
Encapsulation, Isolation lowing is the correct step for performing
the analysis?
382. What is true about Virtualization?
A. Cloud Computing Value Proposition
A. In Virtualization, it is necessary to
B. Cloud Computing Strategy Planning
have well-compiled Multitenant.
C. Both A and B
B. In Virtualization, we analyze the strat-
egy problems that customer might face D. Business Architecture Development
C. It assign a logical name to a physical 388. data represents more than 50 per-
resource and providing a pointer to that cent of the data created every day.
physical resource when demanded.
A. Shadow
D. All of the above
B. Light
383. Cloud computing is a system and is C. Dark
one-way in nature. D. All of the mentioned
A. stateful
389. Which of the following entity is responsi-
B. stateless ble for making a service available to inter-
C. reliable ested parties?
D. none of above A. Cloud Monitor

384. The program which provide partitioning, B. Cloud Broker


isolation or abstraction is called? C. Cloud Provider
A. virtualization hypervisor D. Cloud Auditor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1019

390. What is it called when you connect up 395. Which of the following is a billing and ac-
multiple computers together to share print- count management service?
ers, and resources?

PRACTICE BOOK» NOT FOR SALE


A. Amazon Elastic MapReduce
A. Server B. Amazon Mechanical Turk
B. Network C. Amazon DevPay
C. Data Link D. Multi-Factor Authentication
D. none of above 396. Which of the following is an example of
the cloud?
391. Which of the following regulations apply
to cloud computing? (Select four) A. Amazon Web Services (AWS)
A. Cloud Compliance Act B. Dropbox

B. Health Insurance Portability and Ac- C. Cisco WebEx


countability Act (HIPPA) D. All of the above
C. Sarbanes-Oxley Act 397. What are the different types of cloud de-
D. Gramm-Leach-Bliley Act (GLBA) ployment?

E. General Data Protection Regulation A. Public, private, and hybrid.


B. Local, regional, and international
392. which model is used when people have
C. Standard, advanced, and professional.
similar interests?
A. Hybrid D. none of above
B. Community
398. Consider the pseudo-code for MapRe-
C. Private duce’s WordCount example (not shown
D. Software-as-a-service here). Let’s now assume that you want
to determine the frequency of phrases con-
393. enables the migration of the virtual sisting of 3 words each instead of de-
image from one physical machine to an- termining the frequency of single words.
other. Which part of the pseudo-code do you need
to adapt?
A. visualization
A. Only map()
B. virtualization
B. Only reduce()
C. migration
C. Both map() and reduce()
D. virtual transfer
D. The code does not have to be changed
394. How much storage does Google give a 399. What is a disadvantages of external
user for free in Google Drive? hosting?
A. 1GB A. Costs less than an external host
B. 5GB B. Little technical knowledge required
C. 15GB C. More prone to viruses and hacking
D. 50GB D. Expensive service

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1020

400. Which of these is not a major type of 405. Which of the following impose additional
cloud computing usage? overhead on clients and offer faster trans-
A. Hardware as a Service fer?
B. Platform as a Service A. Block storage
C. Software as a Service B. File Storage
D. Infrastructure as a Service C. File Server
401. What can be offered as a part of IaaS? D. All of the mentioned

NARAYAN CHANGDER
A. application software 406. Key requirement based on fact that
B. call-center services server workload in non-linear in nature
C. computing capacity A. Auto Scale
D. consulting B. Flexibility
402. which of the following is true about the C. Scale-ability
resource pooling feature of cloud comput-
D. none of above
ing?
A. The resource pooling feature of cloud 407. The term “Cloud Computing” is a
computing shields the difference between metaphor that originated in what?
resources of the same type. A. Graphical depiction of computer archi-
B. The resource pooling feature of cloud tecture
computing allows CPUs and disks to be
B. Meteorological symbolism
added to the same resource pool.
C. The resource pooling feature of cloud C. Worries about an unclear future for
computing is the prerequisite for the ubiq- computing architecture
uitous network access feature. D. The idea that computer user trust in
D. The resource pool feature of cloud magic
computing depends on the virtualization
408. Cloud storage can be provided as a ser-
technology
vice by allowing your data to be stored
403. Which of the following service provider A. remotely on the host company’s
provides the least amount of built in secu- servers
rity?
B. remotely on your local computer
A. SaaS
C. locally on your network
B. PaaS
C. IaaS D. locally on your remote computer
D. All of the mentioned 409. In which category of SaaS does CRM soft-
ware fall?
404. There are types of cloud computing.
A. two A. Consumer Services
B. four B. Communication Services
C. three C. Infrastructure Services
D. unlimited D. Business Services

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1021

410. Which of the following is NOT a potential 415. The rest state and motion of body are
advantage of Cloud Computing? A. non relative

PRACTICE BOOK» NOT FOR SALE


A. Flexibility in payment plans B. not related
B. scalability and flexibility C. relative
C. instant updates and upgrades D. none of above
D. full control over data and software
416. Independent server clusters share stor-
411. SaaS does not necessarily mean that the age through high-speed network storage
software is? in-

A. dynamic A. Shared memory architecture

B. static B. Shared nothing architecture


C. Shared disk architecture
C. sololithic
D. None of the above
D. diolithic
417. Two examples of Software as a service
412. Which of the following was one of the
(SaaS)
top 5 cloud applications in 2010?
A. Microsoft Office and 365Google Docs
A. Cloud backup
B. Google Drive and Shutterfly
B. Web applications
C. Salesforce.com and iCloud
C. Business applications
D. none of above
D. All of the mentioned
418. which of the following could be consid-
413. How much monthly is a extra 200Gb for ered a drawback of cloud computing espe-
icloud? cially in OUR SCHOOL
A. 2.49 A. the need for high speed internet
B. 0.79 B. management of data
C. 1.49 C. absence of hardware
D. 3.00 D. wide connection of networks

414. Your company is running Microsoft Ex- 419. services are provided by the service
change Server 2007 and your employees provider on an on-premise or dedicated or
use Microsoft Office 2007. You need to hosted cloud infrastructure.
update your systems, but you want to min- A. IaaS
imize your CapEx impact. Which of the fol-
B. PaaS
lowing is the best solution?
C. SaaS
A. Purchase Exchange Server 2016 and
Office 2016 D. UIaaS
B. Purchase Exchange Server 2010 and 420. refers to the biases, noise and abnor-
Office 2010 mality in data, trustworthiness of data.
C. Subscribe to Microsoft 365 A. Value
D. none of above B. Veracity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1022

C. Velocity C. A person’s first name.


D. Volume D. A person’s dental history.
421. Which of the following best describes the
426. Which of the following storage devices
benefits of cloud computing?
exposes its storage to clients as Raw stor-
A. Cloud computing is cost effective, elas- age that can be partitioned to create vol-
tic and on-premises. umes?
B. Cloud computing is scalable, inelastic A. block

NARAYAN CHANGDER
but always current.
B. file
C. Cloud computing is scalable, elastic
and reliable. C. disk
D. Cloud computing is cost effective but D. all of the mentioned
unreliable.
427. Name of the Cloud provided by Microsoft
422. Which of the following can be considered
PaaS offering? A. AWS
A. Google Maps B. App Engine
B. Gmail C. Azure
C. Google Earth D. Cloudera
D. All of the mentioned
428. What does the ‘S’ stand for in HTTPS
423. What happens to data when you stream
A. Security
a movie?
A. It gets deleted as you watch it B. Safe
B. It is saved on your computer C. Secret
C. It is saved on the cloud D. Secure
D. It gets deleted after you watch the
whole movie 429. Which of the architectural layer is used
as a front end in cloud computing?
424. What is Data Protection. A. client
A. The protection of all
B. cloud
B. The protection of a businesses sales
data. C. soft
C. How the government keeps our infor- D. all of the mentioned
mation safe.
430. Which one of the following options can
D. The protection of people’s personal in-
be considered as the Cloud?
formation.
A. Hadoop
425. Which one of the following is not pro-
tected by Data Protection. B. Intranet
A. A person’s address. C. Web Applications
B. A person’s date of date birth. D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1023

431. A major advantage of Cloud Computing providers create a highly scalable data cen-
is the ability to have a resource known ter that hides the details of the underlying
as ‘ ’-which creates a copy of a file infrastructure from the consumer

PRACTICE BOOK» NOT FOR SALE


stored in a secure location in case the orig- A. Public Cloud
inal file gets lost / corrupted
B. Private Cloud
A. Hard Drive
C. Genral Clound
B. Optical Storage
D. none of above
C. Main Memory
436. is the process that allows video to
D. File Backup
be viewed straight away on a website,
432. How much storage does Google give a without having to wait for the full video
student user for free in Google Drive? to download. This technology is very im-
portant to platforms such as Netflix and
A. 1GB YouTube.
B. 5GB A. Buffering
C. UNLIMITED B. Virtual Download
D. 50GB C. Streaming

433. We can access our applications and data D. Upload


anywhere in the world, on any system. 437. Which one of the following can be consid-
This is which advantage of cloud comput- ered as the most complete cloud computing
ing? service model?
A. Speed & Scales A. PaaS
B. Flexibility B. IaaS
C. Device Diversity C. CaaS
D. Easier Management D. SaaS

434. Hardware services are provided virtu- 438. An application that needed storage
ally while customers are responsible for alone might not benefit from a cloud de-
their own application installations and ployment at all.
data management in this type of cloud com- A. online
puting.
B. offline
A. IaaS
C. virtual
B. PaaS
D. all of the mentioned
C. SaaS
439. Which of the following is the IaaS service
D. XaaS
provider?
435. The set of hardware, networking, stor- A. EC2
age, services, applications, and interfaces B. EC1
owned and operated by a third party
for use by other companies or individu- C. EC10
als is the public cloud. These commercial D. EC20

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1024

440. Messages whose ‘send’ is done but 445. Which is considered the most widely used
‘receive’ is undone due to rollback are cloudcomputing service?
called
A. Infrastructure-as-a-Service (IaaS)
A. In-transit messages
B. Platform-as-a-Service (PaaS)
B. Lost messages
C. Communication-as-a-Service (CaaS)
C. Orphan messages
D. Software-as-a-Service (SaaS)
D. Duplicate messages

NARAYAN CHANGDER
446. Which of the following software can be
441. Which of the following is a more sophis- used to implement load balancing?
ticated load balancer?
A. Apache mod balancer
A. workload managers
B. Apache mod proxy balancer
B. workspace managers
C. F6’s BigIP
C. rackserve managers
D. All of the mentioned
D. all of the mentioned
447. A company is considering a cloud environ-
442. Which of these is a managed compute
ment to improve theoperating efficiency
platform that lets you run stateless con-
for their data and applications. The com-
tainers through web requests or Pub/Sub
pany ispart of an industry where strict se-
events?
curity and data privacy issues areof the
A. Cloud Run highest importance. Which type of cloud
B. App Engine would be a goodchoice?

C. Google Kubernetes Engine A. hybrid cloud

D. Cloud Functions B. public cloud


C. private cloud
443. Cloud Computing provides
D. governed cloud
A. Resource Pooling
B. Measured Service 448. How can a cloud-tech company protect
data (multiple correct answers)?
C. Broad Network Access
A. Encryption
D. None
B. Hire a security guard
444. What are the types of cloud service mod-
els? C. Store data on multiple servers in dif-
ferent locations
A. Public, private and hybrid clouds
D. Delete data to hide it
B. Personal area (PAN), Local area (LAN),
Campus area networks (CAN) 449. Which is not a characteristics od SaaS?
C. Infrastructure as a service (IaaS), A. Multi device support
platform as a service (PaaS), software as
B. Web Access
a service (SaaS)
C. one to Many
D. Mail server, collaboration server, web
server, application server D. offline Acess

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1025

450. How do you create a local OneDrive A. It is vulnerable to hacking


folder on a Windows 10 PC?
B. The storage can be expanded accross

PRACTICE BOOK» NOT FOR SALE


A. Download and install an app from Play- platforms
store
C. You must be connected to the Internet
B. Create the folder in File Explorer, then to use applications and data stored in the
configure it to sync with your OneDrive lo- cloud.
cation
D. Subscription costs over several years
C. Download and install an app from may exceed the one-time cost of purchas-
OneDrive.com ing and maintaining a local copy
D. A local OneDrive folder is built in E. Can be accessed remotely
451. An authentication protocol that can oper- 455. Working as a group is a concept of
ate over PPP and encrypts usernames and
passwords for transmission. A. Client server computing
A. PAP B. Distributed Computing
B. CHAP C. Collaborative Computing
C. RADIUS D. P2P computing
D. EAP 456. Which type of app generally provides the
452. A disadvantage of cloud storage is that. most complete feature set?

A. Your data will always be hacked be- A. Desktop apps


cause your data can be accessed from any B. Browser apps
device with an internet connection
C. Tablet apps
B. Your data is vulnerable to hacking be-
cause your data can be accessed from any D. Smartphone apps
device with an internet connection
457. is a paradigm of distributed comput-
C. Your data can easily be hacked be- ing to provide the customers on-demand,
cause there is no system security pro- utility based computing service.
vided by the host
A. Remote Sensing
D. Your data is vulnerable to hacking be-
B. Remote Invocation
cause it is stored locally on your computer
C. Cloud Computing
453. A Person, organization, or entity respon-
sible for making a service available to in- D. Private Computing
terest parties.
458. means that when a user makes a
A. Cloud Consumer change to a file this change will appear in
B. Cloud Provider the versions used by others
C. Cloud Broker A. Synchronization
D. Cloud Carrier B. Upload
C. Real time processing
454. What are 3 disadvantage of cloud com-
puting? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1026

459. Which of the following is not a layer in 465. cloud is one where the cloud has been
the cloud architecture? organized to serve a common function or
A. User/Client Layer purpose.

B. Network Layer A. Public

C. Software Layer B. Private

D. Hardware Resource Layer C. Community


D. All of the mentioned

NARAYAN CHANGDER
460. Which of the following is NOT a potential
risk of Cloud Computing? 466. Which of the following are true about the
A. security and legal issues cloud computing deployment modes?
B. lock-in A. The industry cloud generally has at-
tributes of a certain industry, which is
C. cross-over risks from other customers
a large private cloud” or “small public
D. dependance on physical location cloud”.
461. Which of the following is deployment B. The public cloud is generally con-
model? structed by carriers or cloud service
providers. It sells or leases services to
A. Public the public.
B. Private
C. The private cloud is deployed on the
C. Hybrid premises of enterprises and used by inter-
D. all of the mentioned nal employees.
D. all of the aboves
462. What type of storage device can a Desk-
top computer use? 467. Web services can be discovered using
A. USB Drive A. UDDII
B. Solid State Drive B. UDII
C. Hard Drive C. UDDI
D. All of the above D. UDDDI
463. The allows systems and services to 468. Google Apps
be accessible by a group of organizations.
A. SaaS
A. Public Cloud
B. PaaS
B. Private Cloud
C. IaaS
C. Community Cloud
D. None of these
D. Hybrid Cloud
469. The Cloud may be overloaded to serve a
464. How many characteristic of cloud? number of requests, and hence exhausted,
A. 5 which can cause
B. 4 A. Zombies
C. 3 B. DOS
D. 1 C. DDOS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1027

D. Backdoor channel attack C. Broad network access


E. Both 2 & 3 D. Resource pooling

PRACTICE BOOK» NOT FOR SALE


470. What facet of cloud computing helps to 474. The allows systems and services to
guard against downtime and determines be accessible within an organization.
costs? A. Public Cloud
A. Service-level agreements B. Private Cloud
B. Application programming interfaces C. Community Cloud
C. Bandwidth fees D. Hybrid Cloud
D. Virtual private networks
475. Simple Storage Service use for?
471. A company wants to build a test environ- A. It allows the users to store and re-
ment to test software updates and new trieve various types of data using API
solutions. The environment should mirror calls.
the production environment and be secure
and inaccessible from outside the company B. It does contain computing element.
network. The company does not want to C. Both A and B
invest in infrastructure that may be idle for
D. None of the above
a significant amount of time. Which cloud
computing model will satisfy all these re- 476. Cloud Deployment Models
quirements?
A. Public Cloud
A. Public Cloud
B. Private Cloud
B. Private Cloud
C. Hybrid Cloud, Community Cloud
C. External Cloud
D. Hybrid Cloud, Community Cloud, Public
D. Virtual Private Cloud Cloud, Private Cloud
472. Which of the following tool is designed 477. cloud computing is also a good option
for efficiently transferring bulk data be- when the cost of infrastructure and man-
tween Apache Hadoop and structured agement is
datastores such as relational databases.
A. Low
A. Apache Sqoop
B. High
B. Pig
C. Moderate
C. Mahout
D. none of the mentioned
D. Flume
478. All cloud computing applications suffer
473. Which cloud characteristic refers to the from the inherent that is intrinsic in
ability of a subscriber to increase or their WAN connectivity.
decrease its computing requirements as
needed without having to contact a human A. Propagation
representative of the cloud provider? B. Latency
A. Rapid elasticity C. Noise
B. On-demand self service D. All of the Above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1028

479. Live & Regular migration are the tech- 484. Cellular network is an example of
niques of A. P2P computing
A. Virtual Machine
B. Distributed computing
B. Virtual Machine Migration
C. cloud computing
C. Security Isolation
D. collaborative computing
D. Resource Isolation
485. Which one of the following types of

NARAYAN CHANGDER
480. A service provider gets the same ben- risks cannot be mitigated solely with cloud-
efits from a composable system that a user specific security technologies?
does.
A. Identity management
A. CaaS
B. Virtual sprawl
B. AaaS
C. Denial-of-service attacks
C. PaaS
D. Intellectual property protection
D. All of the mentioned
E. Administrative access control
481. A company would like to leverage cloud
computing to provideadvanced collabora- 486. Choose the correct statement
tion services (i.e. video, chat, and webcon- A. With a pay-as-you-go, endlessly ex-
ferences) for its employees but does not pandable, and universally available sys-
have the ITresources to deploy such an in- tem, cloud computing realise the long-
frastructure. Which cloudcomputing model held goal of utility computing
would best fit the company needs?
B. use of the Internet enables the huge
A. Hybrid Cloud size of cloud computing systems
B. Public Cloud C. identity must be authenticated
C. Private Cloud D. All of them
D. Virtual Private Cloud
487. Although the Hadoop framework is imple-
482. What hardware component is responsible mented in Java, MapReduce applications
for managing running processes need not be written in
A. Hard drive A. Java
B. RAM B. applet
C. Monitor C. c
D. Graphics card D. c#

483. is not a disadvantage of Public Cloud 488. Who is believed to have invented cloud
storage?
A. Unreliability
A. Ada Lovelace
B. Susceptible for Hacking
B. J. C. R. Licklider
C. Variable broadband Internet Connec-
tion C. Bill Gates
D. Pay Per Use D. Steve Jobs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1029

489. A hypervisor is sometimes also called a? 495. In Virtualization, which architecture pro-
A. VMA vides the virtual isolation between the
several tenants?

PRACTICE BOOK» NOT FOR SALE


B. VMM
A. IT architecture
C. VMR
B. Business architecture
D. VMN
C. Multitenant
490. is a resource management platform
D. Deployment
responsible for managing compute re-
sources in the cluster and using them in 496. What does syncing do?
order to schedule users and applications.
A. Moves your old files to a new place in
A. Hadoop Common the cloud
B. Hadoop Distributed File System B. Downloads the latest files from your
(HDFS) computer and stores it in a new part of
C. Hadoop YARN the cloud
D. Hadoop MapReduce C. Updates all of the files on the cloud to
the latest ones and deletes the old files
491. Amazon Web Services is which type of
cloud computing distribution model? D. Deletes the files from your computer
and the cloud
A. Software as a Service
B. Platform as a Service 497. how many types of dimensions exists in
cloud cube model
C. Infrastructure as a Service
A. 3
D. none of above
B. 2
492. is the basis for Web services
C. 5
A. XML
D. 4
B. CSS
C. CGI 498. Communication between services is done
widely using protocol.
D. PHP
A. REST
493. What part of the computer are all hard- B. SOAP
ware components connected to?
C. RESTful
A. RAM Slots
D. None of the mentioned
B. GPU
C. Motherboard 499. Choose two example of third-party cloud
storage providers that can manage and
D. CPU
maintain data along with remote back-
494. Long form of SOAP is ups.
A. Secure Object Access Protocol A. amazon simple storage service (s3)
B. Simplified Object Arbitary Protocol B. mozilla firefox
C. Simple Object Access Protocol C. microsoft word
D. None of these D. microsoft azure

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1030

500. Identify the advantages of cloud comput- 505. An example of a file-sharing platform
ing from the options presented. that uses the cloud is:
A. Automatic Software Updates A. Facebook
B. Potential Downtime B. Twitter
C. Unlimited Storage C. Google Docs

D. Bandwidth Limitations D. Snapchat


506. Which of the following dynamically grow

NARAYAN CHANGDER
E. Cost Effective
and shrink the load-balancing capacity to
501. Which one of these is not Cloud Storage adjust to traffic demands
A. OneDrive A. Amazon Cloud-front
B. IOS B. Elastic Caches
C. Icloud C. Amazon RDS
D. DropBox D. Elastic Load Balancing
507. What is commonly meant for losing en-
502. dimension corresponds to two dif-
crypted data?
ferent states in the eight possible cloud
forms. A. lose the encryption standard
A. Physical location of data B. lose the keys
B. Ownership C. lose of account
D. all of them
C. Security boundary
D. None of the mentioned 508. In how many parts we can broadly divide
the architecture of the Cloud?
503. A network comprised of physical objects A. 4
capable of gathering and sharing electronic
information. B. 3
C. 2
A. Internet of Things ( IoT)
D. 5
B. Cloud computing
C. Data science 509. Who sorts the security and backups when
storing your files in the cloud?
D. none of above
A. You
504. Point out the correct statement. B. The hosting company
A. Google’s cloud includes perhaps some C. Someone else
10 data centers worldwide D. none of above
B. Flipkart.com’s infrastructure was built
510. What is SLA?
to support elastic demand so the system
could accommodate peak traffic A. Service Provider Assignment
C. Data centers have been sited to opti- B. Software level assessment
mize the overall system latency C. Service Level Agreement
D. All of the mentioned D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1031

511. Which of the following is owned by an C. XML + HTML


organization selling cloud services? D. XML + HTTP

PRACTICE BOOK» NOT FOR SALE


A. Public
517. which of the following do you believe
B. Private would be the number one concern about
C. Community cloud computing?
D. Hybrid A. too expensive
B. security concerns
512. You can’t count on a cloud provider main-
taining your in the face of government ac- C. too many platforms
tions. D. accessibility
A. scalability 518. How can a team use cloud computing?
B. reliability A. Can work on the same document at the
C. privacy same time

D. none of the mentioned B. Can post comments and edits


C. Can email easily
513. Which of the following services that need
D. Can access from anywhere
to be negotiated in Service Level Agree-
ments? 519. What is the Compute Engine feature that
A. Logging allows VMs to be added to or subtracted
from an application based on load met-
B. Auditing rics?
C. Regulatory compliance A. Network time protocol (NTP)
D. All of the mentioned B. Autoscaling
514. A secure version to transfer files. C. Persistent disks
A. IPsec D. Load balancing
B. SSL VPN 520. Which of the following is a feature found
C. SSH in most cloud accounts?
A. Automatic backup
D. SFTP
B. Cloud storage space
515. A cloud requires virtualized storage
C. Apps to connect multiple devices to
to support the staging and storage of data.
your account
A. soft D. All of these are features found in most
B. compute cloud accounts.
C. local 521. Which of the following is true concerning
D. none of the mentioned a local Google Drive folder?
A. The app for creating a local folder is
516. The basic Web Services platform is com-
built into Windows 10
bination of and
B. You create the folder in File Explorer,
A. CSS + HTTP then configure it to sync with your My
B. CSS + JAVA Drive location

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1032

C. It is set for automatic synchronization C. Distributed-tenancy


with your My Drive location D. none of above
D. The app for creating a local folder is
527. where a VM can be moved from one
built into iOS
physical machine to another even as it con-
522. Which of the following acronyms refers tinues to execute.
to a software distribution model in which A. Load Balancing
a cloud provider manages and hosts an app B. Migration

NARAYAN CHANGDER
that users access via the internet?
C. Live Migration
A. IaaS
D. Server consolidation
B. PaaS
528. model attempts to categorize a cloud
C. SaaS network based on four dimensional fac-
D. FaaS tors.
A. Cloud Square
523. Cloud Computing refers to
B. Cloud Service
A. Accessing the Hardware
C. Cloud Cube
B. Configuring the Hardware
D. All of the mentioned
C. Manipulating the Hardware
529. Which of the following is not a NoSQL
D. All of the above database?
524. Cloud computing services such as storage A. HBase
and software B. SQL Server
A. Can be accessed on any device C. Cassandra
B. Are always free D. None of the mentioned
C. Can be accessed by any device that is 530. Which of the following is considered an
connected to a LAN essential element in cloud computing by
D. Can be accessed on any device that is CSA?
connected to the internet A. Multi-tenancy
525. Which of the following cloud is specifi- B. Identity and access management
cally designed to address the needs of the C. Virtualization
specific industry? D. All of the mentioned
A. Public Cloud
531. SWIGGY.IN formed a cloud for its all
B. Private Cloud branches but due to its limited resources it
C. Hybrid Cloud obtained theservices of AWS for extended
provisioning and thus modified its cloud ;
D. Community Cloud The cloud so formed is the example of
526. What model do most public cloud A. Private cloud
providers use for their customers? B. Public cloud
A. Single-tenancy C. Hybrid cloud
B. Multi-tenancy D. community cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1033

532. Web services use to code and to de- 537. Which of the following OpenStack compo-
code data nent is used for networking services?

PRACTICE BOOK» NOT FOR SALE


A. UDDI A. Swift
B. XML B. Neutron
C. SOAP C. Cinder

D. None of the mentioned D. Keystone


538. Which is not a challenge of a Multi-Tenant
533. Google’s cloud service is called
Data Center:
A. Google Cloud A. Agility
B. Google Mail B. Location independent addressing
C. Google Dropbox C. Performance uniformity
D. Google Drive D. Scalability

534. Which of the following is another name 539. UDDI Stands for
for the system virtual machine? A. Universal Development, Design and In-
A. hardware virtual machine tegration

B. software virtual machine B. None of these


C. Universal Description, Discovery and
C. real machine
Integration
D. none of the mentioned
D. Universal Description, Development
535. Choose the scenarios that need virtualiza- and Integration
tion software. 540. Which of the architectural layer is used
A. A client needs to run one operating sys- as backend in cloud computing?
tem at a time. A. client
B. A company needs an application to re- B. cloud
duce hardware and electricity costs. C. software
C. A company needs to additional costs D. Network
and configuration complexities when up-
grading the hardware. 541. Which of the following is not true about
cloud-based virtual server management
D. none of above
platforms?
536. With cloud computing, companies can A. Cloud-based management platforms
scale up or scale down the need of com- can support multiple cloud-virtual server
puting resources.This is which feature of vendors.
cloud computing? B. Cloud-based management platforms
A. Pay per use can support multiple cloud-virtual server
operating systems.
B. One demand self service
C. Cloud-based management platforms
C. Elasticity
cannot support internally hosted server
D. Resource Pooling platforms.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1034

D. Cloud-based management platforms C. cipher


can support change management method- D. plaintext
ologies.
547. Which framework of policies and tech-
542. The term refers to a Network or In- nologies for ensuring that the proper peo-
ternet. ple in an enterprise have the appropriate
A. Cloud Computing access to technology resources?
B. Cloud A. Single sign-on

NARAYAN CHANGDER
C. Computing B. Identity and Access Management
D. Resource C. Registration Authority

543. Which of the following system does not D. User Management


provision storage to most users? 548. What deployment models are not avail-
A. PaaS able for Cloud?
B. IaaS A. Hybrid
C. CaaS B. Private
D. SaaS C. Enterprise

544. Define the role of virtualization in cloud D. Public


computing? 549. What is the main security issue with us-
A. It removes operating system ineffi- ing HTTP (un-encrypted internet connec-
ciencies tions)
B. It improves the performance of web A. The data sent will be slower
applications. B. Sometimes websites don’t allow it
C. It optimizes the utilization of comput- C. It allows people to sniff out packets
ing resources.
D. Any data being sent is exposed in plain-
D. It adds extra load to the underlying text, including passwords
physical infrastructure and has no role in
cloud computing. 550. What is the name of Apple’s cloud ser-
vice?
545. Which of the following is cloud computing
replacing? A. The Cloud

A. corporate data centers B. Drive

B. expensive personal computers C. Dropbox

C. expensive software upgrades D. iCloud

D. all of the above 551. When we create a Virtual Machine in


Cloud, it called as which model?
546. A small file containing verified identifica-
tion information about the user and their A. Platform as a Service
public key. B. Infrastructure as a Service
A. key pair C. Software as a Service
B. digital certificate D. Container as a Service

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1035

552. A service provider reselling a may 557. Which of the following describes
have the option to offer one module to cus- a message-passing taxonomy for a
tomize the information component-based architecture that pro-

PRACTICE BOOK» NOT FOR SALE


vides services to clients upon demand?
A. CaaS
A. SOA
B. AaaS
B. EBS
C. PaaS
C. GEC
D. SaaS
D. All of the mentioned
553. All hardware and software is in house
558. When you add a software stack, such as
managed by the organisation.
an operating system and applications, it is
A. Traditional on premises called the model.
B. SaaS A. Iaas
C. PaaS B. Paas

D. IaaS C. Saas
D. No one
554. Graphical information that is stored in a
way that it can be used by devices such as 559. What is a possible disadvantage of cloud
smartphones and tablets to provide data computing?
about your location A. It is vulnerable to hacking
A. Geo-data B. The storage can be easily expanded
B. G-data C. Portability
C. Glob-data D. All of the above
D. Global-data 560. Point out the correct statement
555. Which of the following is not cloud ser- A. The use of the word “cloud” makes ref-
vice provider? erence to the two essential concepts

A. Amazon B. Cloud computing abstracts systems by


pooling and sharing resources
B. Amazon EC2
C. cloud computing is nothing more than
C. Hadoop the Internet
D. GAE D. All of the mentioned
E. Azure 561. What is a possible risk of cloud comput-
ing?
556. Cloud Computing depend on?
A. Lack of Access to Data
A. Mother Board
B. Full control over the data
B. Application Software
C. Storage of data without control over
C. Specific Hardware the location of where the data is stored
D. Internet and Web Services D. Lack of the ability to back up data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1036

562. Which model of cloud computing services B. File processing


providesthe servers, storage devices, and C. Stream processing
networks for asubscriber?
D. Event driven extract, transform and
A. IaaS load function
B. PaaS
568. In cloud computing, your resources ae
C. CaaS measured, and you only pay for the re-
D. IaaS sources and workload you use. This is

NARAYAN CHANGDER
which feature of cloud computing?
563. part of the MapReduce is responsible
for processing one or more chunks of data A. Pay per use
and producing the output results. B. on demand self service
A. Maptask C. elasticity
B. Mapper D. resource pooling
C. Task execution
569. In creating a new virtual machine, by us-
D. All of the mentioned ing a virtualization software, a user is
able to do following EXCEPT:
564. Virtual networks that are logically de-
fined for secure communication over public A. hardware settings such as how much
transmission systems. memory the VM should have.
A. Point-to-Point Protocol B. what hard disks should be virtualized
through which container files and what
B. Serial Line Internet Protocol
CDs are mounted,
C. Virtual Private Networks
C. devide the operating system into mul-
D. none of above tiple versions based on latest update.
565. The technology used to distribute service D. state information whether the Virtual
requests to resources is referred to as Machine is currently running and saved its
snapshots.
A. load performing
B. load scheduling 570. Swiggy.in formed a cloud for its all
branches but due to its limited recources it
C. load balancing
obtained the services of AWS for extended
D. all of the mentioned provisioning and thus modified its cloud;
The cloud so formed is the example of
566. Which of the these companies is not a
leader in cloud computing A. Private Cloud
A. Google B. Public Cloud
B. Amazon C. Hybrid Cloud
C. Raybiz D. Community Cloud
D. Microsoft 571. which of the architectural layer is used as
567. Real time data processing in a cloud func- front end in cloud computing
tion does not help in A. client
A. Video and image analysis B. cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1037

C. soft 577. Which of the following is a means for ac-


D. all of the mentioned cessing human researchers or consultants
to help solve problems on a contractual or

PRACTICE BOOK» NOT FOR SALE


572. Which of the following is NOT a service temporary basis?
that all cloud computing offers? A. Amazon Elastic MapReduce
A. elastic service B. Amazon Mechanical Turk
B. support for multiple platforms C. Amazon DevPay
C. unmetered service D. Multi-Factor Authentication
D. on-demand service available to the
578. Which cloud computing feature allows for
user at any time
serverconsolidation resulting in increased
573. In which layer does IPsec work? asset utilizationand decreased data center
energy needs?
A. Data link layer
A. Automation
B. Network layer
B. Governance
C. Transport layer
C. Provisioning
D. Presentation layer
D. Virtualization
574. Which of the following are components
that are included with Microsoft 365? (Se- 579. Consider the pseudo-code for MapRe-
lect three) duce’s WordCount example (not shown
here). Let’s now assume that you want to
A. Office 365 Enterprise determine the average amount of words
B. Office 2016 per sentence. Which part of the (pseudo-
C. Windows 10 Pro )code do you need to adapt?

D. Windows 10 Enterprise A. Only map()


B. Only reduce()
E. Enterprise Mobility + Security
C. map() and reduce()
575. A third-party provider hosts applications
D. The code does not have to be changed.
and makes them available to customers
over the Internet. Customers access online 580. A company wants to build a test envi-
software applications through a browser. ronment to test softwareupdates and new
A. SaaS solutions. The environment should mirror
theproduction environment and be secure
B. IaaS
and inaccessible fromoutside the company
C. Paas network. The company does not want
D. Traditional model toinvest in infrastructure that may be idle
for a significant amount oftime. Which
576. Open source software used in a SaaS is cloud computing model will satisfy all the-
called SaaS. serequirements?
A. closed A. Public Cloud
B. free B. Private Cloud
C. open C. External Cloud
D. all of the mentioned D. Virtual Private Cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1038

581. Which of the following is not the feature B. virtualization


of Network management systems?
C. scalability
A. Accounting
D. utility
B. Security
C. Performance 587. Cloud Service consists of

D. None of the mentioned A. Platform, Software, Infrastructure


B. Software, Hardware, Infrastructure

NARAYAN CHANGDER
582. In order to participate in cloud-computing,
you can use the following OS . C. Platform, Hardware, Infrastructure
A. Windows D. none of above
B. Linux
588. Which of the following is NOT a Cloud
C. MAC computing challenge?
D. All of the above A. security and legal risks
583. Cloud computing is a kind of abstraction B. defining a contract
which is based on the notion of combining
C. hiring IT-specialists
physical resources and represents them as
resources to users. D. lock-in risks
A. Real 589. A system uses components to assem-
B. Cloud ble services that can be tailored for a spe-
C. Virtual cific purpose using standard parts.

D. none of the mentioned A. reliable


B. scalable
584. . offering provides the tools and develop-
ment environment to deploy applications C. composable
on another vendor’s application. D. none of the mentioned
A. PaaS
590. Cloud Services have a relationship
B. IaaS
with their customers.
C. CaaS
A. Many-to-many
D. All of the mentioned
B. One-to-many
585. These are the benefits of cloud computing
C. One-to-one
in education system except
D. none of above
A. shareable and traceable data
B. stable technology for everyday use 591. A period of time when a computer or ser-
C. Easy access from anywhere vice is unavailable is called .

D. Inflexibility in customizing products A. Geo-Data


B. Downtime
586. Which of the following is NOT a key char-
acteristic of Cloud Computing? C. Synchronising
A. external provider D. Downloading

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1039

592. Most recognizable model of cloud comput- C. community


ing D. communication

PRACTICE BOOK» NOT FOR SALE


A. Private
597. is the slave/worker node and holds
B. Public the user data in the form of Data Blocks.
C. Hybrid A. NameNode
D. Community B. DataNode
593. A? is a computer that manages lots of C. Data block
processing requests, delivering data be- D. Replication
tween machines that are connected in a lo-
cal network 598. An advantage of cloud storage is
A. Router A. It is easy to increase the amount of
storage available
B. Bus
B. It is always free to increase the
C. Server amount of storage available
D. USB C. An internet connection is not needed
to access your data
594. When a company needs more bandwidth
than usual, a cloud-based service can D. An internet connection is needed to ac-
instantly meet the demand because of cess your data
the vast capacity of the service’s remote
599. Encryption protocol that defines the rules
servers. This is which advantage of cloud
for encryption, authentication, and key
computing?
management for TCP/IP transmissions.
A. Flexibility
A. IPsec
B. On Demand Self Service
B. SSL VPN
C. Accessibility
C. SSH
D. Pay as you go D. SFTP
595. When talking about cloud services, what 600. I have an application to host in cloud
does the term “scalable” mean? provider. But i don’t want to take any un-
A. Able to build models derlying computing burden.
B. Able to resize organizational data A. IAAS
structures B. PAAS
C. Able to add or reduce service capacity C. SAAS
on demand
D. FAAS
D. Services are deployed in a redundant
manner 601. Hospitals in a geographic area would
like access to a shared medical database.
596. Caas stands for as Which cloud deployment model is most ap-
service propriate?
A. computer A. private cloud
B. compliance B. public cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1040

C. community cloud C. c) Quality of service


D. none of above D. d) Quality object oriented service
602. Which of the following refers to the client 608. Which of the following are valid reasons
part of cloud computing system? for a firm’s not adopting a cloud solution?
A. Front end (Choose two.)
B. Back end A. Local hardware is being fully utilized
for unchanging IT workloads.

NARAYAN CHANGDER
C. Infrastructure
D. Management B. The number of employees rarely
changes.
603. A simple example of SaaS is an online C. The number of employees changes of-
A. Email service ten.
B. Server D. The firm experiences unpredictable
C. Infrastructure service project spikes throughout the year.
D. Platform service 609. What does it mean when a public
cloud provider has the availability of five
604. How can data be secured in a database?
nines?
A. Decryption
A. No downtime
B. With a key
B. Unavailable for potentially five min-
C. Encryption utes a day
D. A padlock C. Unavailable for potentially five min-
605. Cloud providers ensure that data files are utes a month
stored online. D. Unavailable for potentially five min-
A. temporarily utes a year
B. permanently 610. Which billing model is based on the pack-
C. synchronized aging of computingresources (i.e. compu-
tation andstorage)and the amount ofthose
D. duplicated
resources used?
606. is used to convert your application A. metered
into Web-Application.
B. recurring
A. Browser Action
C. Subscription
B. Struts Services
D. per user based
C. Java Service
D. Web Services 611. which of the following does NOT rely on
cloud technologies?
607. CaaS vendor offer guaranteed QOS in
A. google drive
SLA to their clients .what does QOS stands
for? B. testout desktop pro
A. Quality operating system C. facebook
B. Quality in other services D. microsoft paint

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1041

612. When working in Google Docs, how do 616. What is Microsoft Azure?
you save your changes?
A. A cloud computing platform offered by

PRACTICE BOOK» NOT FOR SALE


A. Click the Save button Microsoft.
B. Press CTRL+S B. A word processing application.
C. As you work, all your changes are au- C. An online data storage service.
tomatically saved
D. none of above
D. You cannot save documents in Google
Docs 617. Which refers to the practice of a
primary cloudprovider offering services
613. Cloud computing is a product of parallel that are distributedthrough another cloud
computing, grid computing, and distributed provider?
computing. Which of the following is true
about their relationship? A. Hybrid cloud
A. Distributed computing completely re- B. Composite cloud
places grid computing. C. Virtualization
B. Cloud computing is a type of dis- D. Grid computing
tributed computing.
C. Parallel computing, grid computing, 618. Resources such as software, infrastruc-
and distributed computing all belong to ture or platforms can be deployed quickly
cloud computing A. Rapid deployment
D. Grid computing completely replaces B. Fast deployment
parallel computing.
C. Self service deployment
614. With Storage as a service (STaaS)
D. Quick deployment
A. Centralized online storage of
databases can be accessed from any loca- 619. Which of the following network re-
tion on many platforms. sources can be load balanced?
B. Players with different OS platforms A. Connections through intelligent
can compete in the same online game. switches
C. Users access online software applica- B. DNS
tions through a browser
C. Storage resources
D. Users upload and store files, videos, or
photos for sharing. D. All of the mentioned

615. All cloud computing applications suffer 620. provides the run time environment
from the inherent that is intrinsic in their for applications, development and deploy-
WAN connectivity. ment tools, etc.
A. propagation A. IaaS
B. latency B. PaaS
C. noise C. SaaS
D. None of the mentioned D. IDaaS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1042

621. What is pay-as-you-go model? 627. Choose the issues relates to cloud com-
A. You need to pay everything upfront puting.
B. No need to pay, until you use it A. Legal and compliance
C. Use and pay sometime later B. Security Issues
D. After use some functions in cloud, you C. Data Management Issue
need to pay immediately D. All of them
622. Which computing feature is related to util-

NARAYAN CHANGDER
itycomputing? 628. Cloud computing architecture is a combi-
nation of?
A. metering
A. a) service-oriented architecture and
B. security grid computing
C. multi-tenancy
B. b) service-oriented architecture and
D. virtualization event-driven architecture.
623. Which of the following is the most impor- C. c) virtualization and event-driven archi-
tant area of concern in cloud computing? tecture.
A. Security D. utility computing and event-driven ar-
B. Storage chitecture.
C. Scalability 629. Cloud computing is also a good option
D. All of the mentioned when the cost of infrastructure and man-
agement is
624. Cloud computing doesn’t require that
and software be composable. A. low
A. cloud B. high
B. database C. moderate
C. hardware D. none of the mentioned
D. all of the mentioned
630. How many types of services Cloud com-
625. Select the cloud services from cloud puting offers?
providers. A. 2
A. Dropbox
B. 3
B. AWS
C. 4
C. Google sheet
D. 5
D. All of them
626. Which of the following is the best-known 631. An operating system running on a Type
service model? VM is full virtualization.

A. IaaS A. 1
B. PaaS B. 2
C. SaaS C. 3
D. All of the above D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 Cloud Computing 1043

632. Which of the following provides com- B. Ad Hoc Network


mands for defining logic using conditional C. LAN Network
statements?

PRACTICE BOOK» NOT FOR SALE


D. Ad Hic Network
A. XML
B. WS-BPEL 638. PIN stands for
C. JSON A. Private identification number
D. None of the mentioned B. Personal identification number
C. Private identification network
633. refers to the connectedness of big
data. D. Personal identification network
A. Value 639. Which of the following is the correct full
B. Veracity form of SaaS?
C. Velocity A. Storage-as-a-Service
D. Valence B. Software-as-a-Service
C. Server-as-a-Software
634. Which of these files can be created in
Google Drive? D. None of the above
A. Google Docs 640. Cloud computing is an abstraction based
B. Google Forms on the notion of pooling physical resources
and presenting them as a resource.
C. Google Sites
A. real
D. All of these
B. virtual
635. This refers to applications and services
C. cloud
that run on a distributed network using vir-
tual resources D. none of the mentioned
A. distributed computer 641. Live editing means?
B. cloud computer A. Making changes to previous versions
C. soft computer of the document
D. parallel computer B. Multiple users can work on the same
document at once.
636. The group of people who use digital de-
C. Adding a sound track to your work
vices and embrace the newest technology
is known as? D. Saving an updated version of the docu-
A. Digital lower class ment on your local device.

B. Digital middle class 642. Whats wayne’s favorite present to get?


C. Digital upper class A. toblerome
D. none of above B. tobelrone

637. A type of wireless network that does not C. toblerone


rely on fixed hardware such as routers D. fresh socks
A. Bus Network E. shoes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1044

643. Application frameworks provide a means B. Client, Application, Platform, Infras-


for creating hosted applications using tructure, Server
IDE C. Software, Application, Platform, In-
A. PaaS frastructure, Server
B. SaaS D. none of above
C. CaaS 648. In the Google Cloud resource hierar-
D. All of the mentioned chy, into which entity are resources orga-

NARAYAN CHANGDER
nized?
644. What is the difference between HTTP and A. Organization node
HTTPS
B. Folders
A. HTTP is new
C. Zones
B. Websites don’t allow HTTP
D. Projects
C. HTTPs uses encryption
649. Which of the following is the deployment
D. SSL Certificates are required for HTTP
model?
645. Which delivery model is an example of a A. public
cloudcomputing environment that provides B. private
users withaweb based e-mail service?
C. hybrid
A. Software as a Service
D. All of the mentioned
B. Platform as a Service
650. Most of the cloud architectures are built
C. Computing as a Service
on this type of architecture.
D. Infrastructure as a Service
A. skeleton
646. Level Agreement (SLA) is the contract B. grid
for performance negotiated between you C. linear
and a service provider.
D. template
A. Service
B. Application 651. Which of the following is used to define
the service component that performs the
C. Deployment service?
D. All of the mentioned A. WSDL
647. Cloud Computing has below layers B. SCDL

A. User, Software, Platform, Infrastruc- C. XML


ture, Server D. None of the mentioned

11.2 Internet of Things (IoT)


1. What bit processor is used in Pi 3? B. 32-bit

A. 64-bit C. 128-bit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1045

D. Both 64 and 32 bit 7. Which statement is correct to describe


IoT?
2. Current flow is due to the following

PRACTICE BOOK» NOT FOR SALE


A. Atoms A. IoT is the concept of transferring data
over a network without requiring human-
B. protons to-human or human-to-computer interac-
C. electrons tion.
D. neutrons B. IoT is the development of technology
3. In order to work, IoTP needs to collect by utilizing human-to-human interaction
from the connected devices. C. IoT is one of the developments of the
A. friend requests internet and technology
B. data D. IoT is the most recent internet devel-
C. likes opment today
D. none of above E. IoT is the concept of transferring data
from computers through humans
4. Choose BOARD for IOT technology in the
market: 8. What is a smart Home?
A. Arduino Uno
A. household appliances so that they can
B. Raspberry Pi be monitored and controlled from one cen-
C. Intel Edison tral point.
D. Adafruit FloraIntel Galileo Gen 2 B. An IOT system for the comfort and se-
E. BeagleBone Black curity of people.

5. Which of the following fields is not part C. both answers


of the top application in Internet of Things D. none of above
(IOT)?
A. Traffic Monitoring 9. What kind of information is obtained when
B. Health and Security devices are connected together in the con-
cept of IoT is expected to be obtained?
C. Transport and Logistics
A. Big Data
D. Daily life and Domotics
E. None of the above B. Memory Data

6. Lightweight message oriented middleware C. Science Data


based on publish and subscribe model, D. Large Data
with hierarchical topic(s) oriented. De-
vices connects to brokers over TCP proto- 10. Which protocol is used to link all the de-
col to publish or subscribe based on a topic. vices in the IoT?
What is the protocol described?
A. TCP/IP
A. TCP
B. MQTT B. Network

C. CoAP C. UDP
D. AMQP D. HTTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1046

11. The IoT platforms are mainly divided into 17. A benefit of IoT is:
how many types A. Increase my internet speed.
A. 3 types B. IoT depends on a reliable internet con-
B. 5 types nection.
C. 4 types C. Data can be access by hackers.
D. 2 types D. Industries can gather useful informa-
tion to improve their products.

NARAYAN CHANGDER
12. Which one is Smart home?
18. The Internet of Things (or IoT, for short)
A. smart home
refers to
B. good house
A. a network of hotel objects you can con-
C. safe house trol from smartphone
D. beautiful house B. a network of house objects you moni-
tor from CCTV
13. A smart Traffic camera device can:(more
then one answer) C. a network of every task in a factory in
controlling machines
A. Monitor road for traffic congestion.
D. a network of every day, usually house-
B. Monitor road for accidents. hold objects
C. Check weather conditions.
19. What is the direct benefit from the appli-
D. Provide navigation routes to cars. cation of internet of things:IOT technology
in agriculture?
14. Smart objects can be designed by means of
A. prevent the price of agricultural prod-
A. Arduino Board
ucts from falling
B. Beaglebone black
B. It creates a good image for agricul-
C. Raspberry Pie tural products.
D. All of the above C. Able to allocate land for agriculture
cost-effectively
15. When there is an excessive amount of data
flow, which the system cannot handle, D. Get information to analyze results in
attack takes place. agriculture.
A. Database crash attack 20. A Web 3.0 View
B. Data overflow Attack A. Publishing & Pushing Content
C. Buffer Overflow attack B. Publication to participation
D. Denial of Service attack C. Two way flow of information
D. Above All
16. Which is the software or a programming
language used for controlling of Arduino? 21. Who is “father” of Artificial intelligence
A. Assembly Language A. John McCarthy
B. C Languages B. Fisher Ada
C. JAVA C. Allen Newell
D. Any Language D. Alan Turning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1047

22. A key IPV6 based network protocol 28. The operation of MQTT IoT Device or User
A. IP device that is interested in receiving news
from other devices must notify their inten-

PRACTICE BOOK» NOT FOR SALE


B. 6LoWPAN tion by doing what?
C. CoAP
A. Subscribe
D. XMPP
B. Publish
23. GPS stands for?
C. Topic
A. Generac Power Systems
D. Transport
B. Gravity Plating System
C. Global Positioning System 29. Which one is the correct example of web
D. Global Python System based learning tools?
E. Great Positioning Stuff A. Microsoft PowerPoint

24. An IoT platform gathers and uses informa- B. Notepad


tion to build a secure: C. Socrative
A. Bus D. Microsoft Word
B. Database
30. Which of the following is the not the ad-
C. Wordprocessor
vantages of using IoT in English learning?
D. none of above
A. Can improve students’ vocabulary
25. What is the number of estimated con-
B. Help students in speaking and writing
nected devices by 2020 (Cisco)?
skills
A. 2 million
C. Provide fun learning
B. More than 50 billion
D. Demotivate students to learn
C. 50 million
D. none of above 31. What is the Ethernet/LAN cable used in
RPi?
26. Which of these security approaches is fea-
sible for most IOT devices? A. Cat5
A. Use of antivirus software B. Cat5e
B. Use of internal firewall C. Cat6
C. Regular installation of product
D. RJ45
firmware updates
D. Complete separation of the device 32. This is an example of Internet of Things
from the internet
A. Uploading a file to the internet.
27. BONUS POINT. Choose your point. B. Giving city drivers information about
A. where to park in the city center through
B. an app.
C. C. Using a PowerPoint presentation.
D. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1048

33. In the near future IoT will be made up 39. Examples of “things” that are being man-
of ufactured that can hook up to the IOT
A. hundreds of billions of devices are (check all that apply)
B. billions of devices A. light bulbs
C. hundreds of millions of devices B. refrigerator
D. a single device C. car
34. What are the components of IoT? D. thermostat

NARAYAN CHANGDER
A. IoT Device E. none of the above
B. Sever
40. Information can be processed through
C. Gateway
A. Search engine
D. User Device
B. Data Analytics
E. Internet
C. Data Center
35. Which of the following could be an IOT de-
vice? D. None of the above
A. A Lamp 41. All of these statements are true about web
B. A Couch based learning except
C. A Pen A. Students need to be in the classroom
D. All of the Above setting to access the materials

36. An Internet of Things platform collects B. Can include online materials


data from many devices to share data with C. Allow blended learning
applications by using:
D. Is often called as online learning or e-
A. Tests learning
B. Checks
C. Analytics 42. Which instruction set architecture is used
in Raspberry Pi?
D. none of above
A. X86
37. Which is not an IoT product?
B. MSP
A. Smart City
C. AVR
B. Smart Watch
D. ARM
C. Smart Water
D. Smart Savings 43. The communication Model in which Brokers
maintains the service lists as per the cate-
38. When IoT devices are communicating to-
gory it belongs is
gether, these form
A. an intelligent system. A. Push Pull

B. a big device. B. Request Response


C. an android. C. Publish Subscribe
D. a robot. D. Excl. Pair

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1049

44. When the industry receives the data sent C. IoT


from the IoTP worldwide, it uses this data D. Credit
to (Choose 4 answers)

PRACTICE BOOK» NOT FOR SALE


A. create better products in the future. 49. Devices connected to the Internet

B. help the customer use the product. A. transmit data

C. fix the problems their product is facing B. store data


(updates). C. receive data
D. create a bank account for the prod- D. delete data
uct’s sale profit.
50. How many USB ports are present in Rasp-
E. pinpoint problems in the production berry Pi 3?
line.
A. 5
45. Which on of the following is TRUE about B. 2
IoT?
C. 4
A. IoT is an application installed on the
D. 3
computer from a CD.
B. IoT is an application used for online 51. How power supply is done to Raspberry
meetings like Microsoft Teams. Pi?
C. IoT shares only personal information. A. USB connection
D. A device gathers data through sensors B. Internal battery
and sends it to an IOT platform. C. Charger
46. content is socially based and user gener- D. Adapter
ated 52. What applications of Internet of Things are
A. Web 1.0 used to help manage electrical systems?
B. Web 2.0 A. Smart City
C. Web 3.0 B. Smart wearable
D. Web 4.0 C. Smart home
D. Smart Grid
47. The IoT can receive data from various de-
vices. What is done with that data to re- 53. Which one of the following allows devices
ceive benefit from it? to interconnect and transmit data?
A. Delete the data A. Sensor
B. Analyse the data B. A Network
C. Sort the data C. GPS
D. none of above D. Smart Phone
48. Automatic watering of fields is carried out 54. How many hours a week do you study the
by remote control via Internet Of Things Module?
A. Internet A. 2 jam
B. Bluetooth B. 3 jam

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1050

C. 4 jam 60. Which one is not a component of the Inter-


D. 5 jam net of Things?
A. sensors and devices
55. It has own local storage and embedded ap-
plication to perform data analytics directly B. connectivity and user interface
from the devices. What is the gateway de- C. connectivity and data processing,
scribed? D. ios and Android
A. Device Gateway
61. Out of the following is not a data link layer

NARAYAN CHANGDER
B. Smart Gateway technolgy
C. Smartphone A. Bluetooth
D. none of above B. HTTP
56. What types of things can you track and C. WiFi
adjust using telemetry? (select all that ap- D. UART
ply)
62. IOT stands for
A. Room temperature
A. Internet of Things
B. Shower temperature
B. Things of Internet
C. Location of household items
C. Internet of Nothing
D. Hours of electronics usage
D. Internet of Internet
57. What is the java extension file in IoT?
63. What are the advantages associated with
A. .jar Fog computing?
B. .c A. Reduction of network traffic
C. .exe B. Suitable for IoT tasks and queries
D. .py C. Low latency requirement
58. Identify which is not part of the features D. Scalability
of Internet of things technology. 64. What brings together all the gathered in-
A. Artificial Intelligence formation and provides a common lan-
B. Architecture guage?
A. Internet of Things Sorter
C. Geo-Location
B. Internet of Things Platform
D. Size Consideration
C. Internet of Things Provider
59. IoT is defined as a network of internet-
D. Internet of Things Helper
connected things with and are able to
talk to each other and collect or exchange 65. After the data is analyzed, the will be
data. sent to a smartphone.
A. Security A. connectivity
B. Senses B. data
C. Sensors C. information
D. none of above D. technology

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1051

66. What does MQTT stand for? 71. Identify the IoT communication pattern
A. Management Queue telephone Trans- which uses bidirectional, fully duplex com-
munication model that has a persistent

PRACTICE BOOK» NOT FOR SALE


port
connection between the client and the
B. Management Queue telecommunica- server?
tion Transport
A. Request-response
C. Message Queue telegram Transport
Transport B. Exclusive pair

D. Message Queue Telemetry Transport C. Push-pull


D. Publish-subscribe
67. The following is an example of Active Com-
ponent 72. Baseline technology for IoT is:
A. Voltage Source A. Machine to machine communication
B. Resistors B. Cyber physical system
C. Capacitor C. Web of things
D. Inductor D. All
68. IOT means?
73. Expanded form of NFC
A. International of Things
A. Near Field Conversion
B. Internet of Think
B. Near Field Community
C. Internet of Things
C. Near Field Conversation
D. International of Things
D. Near Field Communication
69. Where each node is equipped with a sen-
sor to detect physical phenomena such as 74. Which one of the layer is not including in
light, heat, and pressure. Three layer Architecture of IoT

A. RFID A. Application Layer

B. IOT B. Transport Layer

C. WSN C. Network Layer

D. WPAN D. Perception Layer

70. A method of representing data in a visual, 75. Following are among the examples of IOT
machine-readable form. Initially, barcodes being used across major industries.
represented data by varying the widths A. Retail industry and supply manage-
and spacings of parallel lines. ment
A. ZigBee B. Smart Home (Automation of Home
B. WIFI Equipment)
C. Barcode C. Health and Fitness
D. RFID D. Automotive & Logistics
E. Sensors and Smartphones E. Agriculture

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1052

76. DIO stands for 81. All these statements are true about IoT in
A. Data Input Output Education except
A. Learning can be more attractive
B. Data Information Object
B. Measure student’s progression and
C. DODAG Information Object
performances
D. DDOS Information Object C. Learning can be at anywhere and any-
77. IoT devices functioning steps are time

NARAYAN CHANGDER
D. Slows down the communication be-
A. Collect, Key Attributes, Transmit, Pro-
tween the teachers and students
cess, Information
B. Key Attributes, Collect, Information, 82. Why Edmodo can be regarded as one of the
Process, Transmit tools to implement IoT in education?
C. Transmit, Process, Collect, Key At- A. Because teachers can create interac-
tributes, Information tive and artistic story to enhance students’
speaking skills and writing skills.
D. Process, Collect, Key Attributes, Infor-
mation, Transmit B. Because teachers can create interac-
tive online videos by embedding formative
78. Which of the following language is pre- assessment in the video
ferred for IoT analytics? C. Because teacher can create online col-
A. Python laborative groups as a learning platform.
B. S D. none of above

C. R 83. A disadvantage of IoT is (more then


one answer)
D. All of the mentioned
A. Home system can be attacked by hack-
79. This service utilized information of the ers.
Knowledge-based service to estimate the B. IoT uses a lot of sensors to receive in-
performance of available cloud resources. formation.
What is it referred to?
C. IoT devices collect information which
A. Raw Data Management is sent to a centralized system which can
B. Performance Prediction (Machine be compromised.
Learning) D. Privacy issues about my daily life
C. Monitoring & Profiling (Actionable In- might arise due to the amount of informa-
sights) tion/data being collected.
D. none of above 84. The IoT Internet of Things

80. An open OASIS, ISO standard lightweight A. A network of intelligent systems


protocol is (smart devices) exchanging data over the
internet.
A. DDS
B. A network of e-commerce websites
B. AMQP sharing product information.
C. TCP C. A very fast internet connection.
D. MQTT D. A social media website.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1053

85. What does the statement “industrial rev- 90. Client-Server scenario based communica-
olution 4.0” mean? tion model is

PRACTICE BOOK» NOT FOR SALE


A. Developed water and steam powered A. Push Pull
machines to help workers.
B. Excl. Pair
B. Using more electricity than steam or
water power because production is fo- C. Request Response
cused on one machine. D. All of the above
C. Automate individual machines to suit
operators 91. is a virtual copy of the Smart Factory
D. Automate individual machines to which is created by linking sensor data
change operators (from monitoring physical processes) with
virtual plant models and simulation models
E. Automate manufacturing processes
based on the internet or wireless net- A. Virtualization
works. B. Decentralization
86. Which one is not the product of Internet of C. Modularity
Things?
D. Interoperability
A. Smart Speakers:Amazon Echo
B. Home Lighting:Phillips Hue 92. It is a collection of software used for de-
veloping applications for a specific device
C. Smart Thermostats:Nest
or operating system. What is it referred
D. Samate Transformation Car to?
87. One use of IoT is A. API
A. Computer B. SDK
B. Laptop C. Machine Learning
C. Smart Home
D. Event Services
D. none of above
93. Which is the main protocol used to access
88. Different names of IOT
data on the world wide web?
A. M2M (Machine to Machine)
A. HTTP
B. “Internet of Everything” (Cisco Sys-
tems) B. FTP
C. “World Size Web” (Bruce Schneier) C. SMTP
D. Skynet” (Terminator movie) D. RIP
89. Which one of this is not a networking de- 94. What is the size of the IPv6 addressed?
vice:
A. 32 bits
A. Router
B. Switch B. 64 bits
C. Bridge C. 128 bits
D. Traffic Analyzer D. 256 bits

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1054

95. Cyber Physical Systems not including one C. the Cloud (servers)
of the following
D. none of above
A. Communication
B. Control 101. Data Validation means .
C. Cyber A. Authentication
D. Computation
B. Affirmation
96. Digital camera, vending Machines are ex-

NARAYAN CHANGDER
C. Renounce
amples of
A. Commercial Systems D. Authorization
B. Digital Systems
102. Robotic technology for use in the home.
C. Embedded Systems The automatic control of home appliances
D. Application Systems by electronic systems.

97. The following is an example of Passive A. Domotics


Component B. IOT
A. Voltage Source
C. ZigBee Technology
B. Resistors
D. Wifi Technology
C. Transistor
D. Diode E. Geo-Localization

98. Physical Design of IoT (Bottom-up) 103. Enable Interoperability between ma-
A. Application Layer, Data Processing chines, enterprise system and mobile de-
Layer, Network Layer, Sensing Layer vices. What is the protocol described?
B. Sensing Layer, Network Layer, Data A. AllJoyn
Processing Layer, Application Layer
B. Data Connectivity Standard (DDS)
C. Network Layer, Application Layer,
Sensing Layer, Data Processing Layer C. WebSocket
D. Data Processing Layer, Network Layer, D. AMQP
Application Layer, Sensing Layer

99. oWPAN stands for 104. What are the benefits of 5G?
A. 6Low bandwidth PAN A. High speed data transmission and the
B. 6 Lossy Wireless PAN use of powerful computers is mandatory.
C. IPV6 enabled Low power PAN B. Has a low data transmission speed.
D. None of the above C. It has a high data transmission rate
per second without the aid of a computer.
100. the data exchange between devices in
IOT is stored in D. Makes VR streaming unlimited.
A. The central point E. 5G can render and return images in a
B. my computer few minutes to the user.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1055

105. Which statement is true about IOT (Inter- B. Because of its high progress in the
net of Things)? area of computing, robotics and technol-
ogy distribution for companies, also giv-

PRACTICE BOOK» NOT FOR SALE


A. One Identification Technology
ing more access to people in the areas al-
B. electronic communication equipment ready mentioned.
C. It is like the brain of a computer in mak- C. Because of its technological advance
ing decisions or calculating. and prioritization of helping companies
and profit.
D. that various electronic devices Can link
or send information to each other by the D. Because of its high technology that has
Internet. been evolving over the years and even for
its marketing about evolution.
106. According to the text (XR, VR & AR)
what is the year of growth of VR and AR. 110. The rate at which data is moving.

A. 2000 A. Data in motion

B. 2005 B. Data at rest


C. Velocity
C. 2010
D. Volume
D. 2016
E. 2019 111. IIoT stands for
A. Industrial Internet of Things
107. What does GCR stand for?
B. Index internet of Technology
A. Global Channel Republic
C. Intense internet of things
B. Global Course Resources
D. all of them
C. Global Channel Resources
112. What does the Internet of Things plat-
D. Globe Channel Republic form do?
E. Global Course Republic A. Deletes the data coming from various
devices.
108. are devices that detect and respond
to changes in an environment. They’re em- B. Integrates the data coming from vari-
bedded in smart phones and an integral ous devices.
part of the Internet of Things (IoT). C. Sorts the data coming from various de-
vices.
A. ZigBee
D. none of above
B. Wi-Fi
C. Barcode 113. What is the Internet of Things?

D. RFID A. Things found on the internet.

E. Sensors B. Bluetooth, WIFI and ethernet cables.


C. A network of devices that “talk” to one
109. How is Industry 4.0 related to the 4th another and work together to coordinate
Industrial Revolution? specific tasks.
A. Because she works with computers. D. none of the above.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1056

114. GPS C. Cloud


A. Global Packaging System D. device
B. Global Positioning Services
120. examples oF Internet of Things
C. both A & B
D. Only A A. bicycles

115. are pre built circuit boards that fit on B. Medical sensors
top of Android

NARAYAN CHANGDER
C. laptop
A. Sensor D. none of above
B. Data types
C. Breadboard 121. IOT devices gather private information
about users. Which statement is most true
D. Sheilds about the security of that data?
116. Within the IOT, the process of utilizing A. User can ensure security of collected
sensors to monitor data and actuators data by encrypting it manually
instructing your devices to make adjust-
ments based off the data is called B. Users must rely on data collecting
agencies to securely store and transmit
A. Astrophysics
their data
B. Telemetry
C. User can sue data collecting agencies
C. Biology if their data is not held securely
D. Analytics
D. Most data gathered by IOT devices is
117. Meaning of Scalability in IoT safe because IOT devices are not a target
of hackers
A. Impenetrable
B. Expandable 122. One of the uses of IoT is?
C. Inflexible A. Smartphone
D. descendible
B. Factory Machines
118. The IoT Internet of Things is
C. Smart Home
A. A network of intelligent systems
(smart devices) exchanging data over the D. computer
internet. E. Laptop
B. A network of e-commerce websites
sharing product information. 123. . Which of the IoT uses is considered as
an example of how farming of the future
C. A very fast internet connection.
will be?
D. A social media website.
A. Infrastructure IoT
119. All device s of the Internet of Things can-
not be operated without B. Industrial IoT

A. smartphone C. Commercial IoT


B. Internet D. all above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1057

124. One of the first business sectors that be- C. Loss of privacy and securities when
came interested in IoT technologies. sent assignments or assessments on the
network.

PRACTICE BOOK» NOT FOR SALE


A. Health
B. Security D. The students lack of skills in using high
thinking orders in certain topics.
C. Traffic Monitoring
D. Transport and Logistics 129. How does MQTT relate to IoT?
E. Daily life and Domotics A. communication mechanism Used to
process information in the work process.
125. Which of the following can be considered
smart devices? There is more than one an- B. communication mechanism Used to
swer. link data between IoT Devices.

A. Devices that able to communicate with C. processing mechanism Used to pro-


each other without the need of human in- cess information in the work process.
tervention D. processing mechanism Used to link
B. Devices that can receive a command data between IoT Devices.
from another devic.
130. What does the gateway or processing
C. A Computer Monitor nodes do with the data collected from the
D. Devics that use a number of sensors to general and sensing devices?
gather information from its enviroment. A. Deletes the information
126. The Internet of Things is a complex B. Sends the information to the cloud to
of smart home devices, the internet, and be analyzed.
ourselves. C. Sends the information to space.
A. system D. Stores the information.
B. information
131. What is IOT?
C. network
A. Internet of things
D. schedule
B. Data exchanged between computer
127. MQTT is: and sensors to do a task
A. Based on client-server architecture C. both answers
B. Based on publish-subscribe architec- D. none of above
ture
C. Based on both of the above 132. Select which of the alternatives bring in-
novations that Industry 4.0 brought. (It
D. Based on none of the above
can be more of an alternative)
128. These statements show the disadvan- A. Automation
tages of IoT in education for students ex-
B. IoT (connection between multiple de-
cept
vices)
A. Students will be more lazy to do any
C. Internet
sort of physical activity.
B. Students can make interaction with D. Computers and software
the other students around the world. E. Telephony

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1058

133. What can Smart Thermostats:Nest do? 139. What can Amazon Echo do?
A. Controlling home lighting from smart- A. Controlling home lighting.
phone. B. Analyzing home temperature
B. Customizing home temperature. C. Reading the news
C. Setting alarm and reading the news. D. Allowing us to talk with guests.
D. Allowing host to talk with guests.
140. It enables faster retrieval, perform com-

NARAYAN CHANGDER
134. The Protocol involves Message Queueing putations and eases processing for data
is analysis. What is it referred to?
A. MQPP A. Device management
B. AMQP B. NoSQL databases
C. CoAP C. Contextualize data
D. MQTT D. none of above

135. Which is the same meaning of ‘Things’? 141. An Internet of Things platform:
A. Objects A. provides services for accessing, using,
or participating in the Internet
B. Systems
B. allows for devices and apps to commu-
C. Involves
nicate with each other
D. Contains
C. allows individuals and organizations to
136. Applications of the Internet of Things are make their website accessible
as follows, except for any of them. D. none of above
A. Smart City
142. It is the network of physicalobjects-
B. Smart wearable devices, vehicles, buildings and other
C. Smart home items embeddedwith electronics, soft-
ware, sensors, and networkconnectivity-
D. CCTV sensor
that enables these objects to collect and
137. Physical Object + Sensor +? = Internet exchangedata.
of things A. Internet of Things
A. Cloud B. Network
B. actuator C. MAN
C. Internet D. Computer topology
D. Devices 143. What is the name of the CEO of GCR
138. IoT security management includes A. Andi Mulja
A. Security with hardware B. Tony Tsao
B. Data storage C. Andy Neo
C. Simple and fast installation D. Onno
D. Protocol abstraction E. Tony Neo

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1059

144. Lighting control system, such as turning A. Collect data received from each IoT
on/off or adjusting the brightness level in Device.
the house

PRACTICE BOOK» NOT FOR SALE


B. Process data obtained from IoT Device
A. Smart home
C. order data operations
B. Connected Car
D. Forward the obtained data to other de-
C. Smart retail vices. who want to use the information
D. Smart farming
150. IoT stands for
145. it is expected that a business has every-
A. Inter Office Trunks
thing online
A. Web 1.0 B. Internet of Things

B. Web 2.0 C. Internet of Think


C. Web 3.0 D. International of Things
D. Web 4.0 151. . Which of the following is a disadvan-
146. A piece of clothing or accessory that has tage of IoT use?
advanced electronic capabilities. A. Over-dependence on Technology
A. Gateway B. Better lifestyle
B. Sensor C. Increased productivity
C. Big data D. Cost savings
D. Wearables
152. ‘Internet of Things’ means
147. What can Phillips Hue do?
A. the connections between objects other
A. Controlling home lighting from smart- than the normal devices such as a com-
phone. puter or laptop.
B. Analyzing home temperature B. that can detect signals from the envi-
C. Setting alarm and reading the news. ronment
D. Allowing host to talk with guests. C. that allows the device to transmit its
data
148. What are the advantages of using IoT?
D. Once the data is collected and it gets
A. The data obtained is realtime
to the cloud, the software performs pro-
B. The data obtained is limited cessing on the acquired data.
C. The data obtained is difficult to ob-
serve 153. What is the largest portion of a city’s en-
ergy costs?
D. The data obtained is difficult to analyze
A. Street lights
E. The data obtained is very minimal
B. air conditioning units
149. Which of the following does not use the
C. internet networks
function of serving machine in the func-
tional components of the IoT D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1060

154. IoT stands for? C. HELLO flood Attacks


A. Internets of Thing D. Distributed Denial of Service (DDoS)
B. Intranet of Things
159. The huge number of devices connected to
C. Intranets of thing the Internet of Things has to communicate
D. Internet of Things automatically, not via humans. What is
this called?
155. Router operate at layer of OSI refer-
ence model? A. Intercloud

NARAYAN CHANGDER
A. Layer 2 (Data Link) B. Skynet
B. Layer 3 (Network) C. Machine 2 Machine
C. Layer 1 (Physical) D. Bot 2 Bot
D. Layer 4 (Transport) 160. Static content provided by the site’s cre-
156. How does IoT work? ator/owner

A. works through a combination of wire- A. Web 1.0


less networking technology, physical de- B. Web 2.0
vices, advanced data analytics and cloud
C. Web 3.0
computing.
B. that can detect signals from the envi- D. Web 4.0
ronment
161. IoT stands for
C. Once the data is collected and it gets
A. International of things
to the cloud, the software performs pro-
cessing on the acquired data. B. Internet of things
D. that allows the device to transmit its C. Internet of think
data
D. Internet of thoughts
157. Which layer is uses to detect changes in
162. An API which allows bidirectional, full du-
the physical condition of connected things
plex communication between clients and
in real time.
servers is
A. Communications Layer
A. REST API
B. Management layer
B. Web Socket based API
C. Sensing Layer
C. Request Response API
D. Network Layer
D. All of the above
158. An attack initiated and continued by huge
amount of attackers, starts by populating 163. Which of the following does not use the
unwanted traffic packets with enormous Internet of Things?
size in order to capture and completely de-
A. Smart Home
plete memory resource. What is the IOT
security attack is referred to? B. Smart Grid
A. Selective forwarding Attacks C. smart farm
B. Witch Attacks D. Smart Suit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1061

164. What is the main advantage of the Inter- 169. Which of the following can be considered
net of Things? smart devices? More then one answer.

PRACTICE BOOK» NOT FOR SALE


A. The sharing of data coming from differ- A. Devices that are able to communicate
ent devices with each other without the need of hu-
B. Having an Internet connection every- man intervention.
where you go B. Devices that use a number of sensors
C. The sharing of devices between users to gather information from its environ-
ment.
D. none of above
C. Devices that can receive a command
165. Massive Potential of IoT can be identified from another device.
as D. A computer monitor.
A. Improved Performance
170. integrates content with other marketing
B. Reduced Cost and New Revenue Sys- communication
tem
A. Web 1.0
C. Create Innovative Series
B. Web 2.0
D. All of the above
C. Web 3.0
166. comprises distributed devices with D. Web 4.0
sensors used to monitor environmental
and physical conditions 171. Select two advantages of the IoT:
A. Wireless Nodes A. Reduce waste

B. Standby Nodes B. Wastes time and money

C. Wireless Sensor Nodes C. The ability to access information from


anywhere at anytime
D. Parked Nodes
D. Slows down communication between
167. The following includes the four functional devices
pillars of Industry 4.0, except
172. Another way of referring to IoT devices
A. Internet of Things (IoT) is
B. Big Data A. Smart
C. Technical Assistance B. Connected
D. Artificial Intelligence C. Both
E. Social Media D. Neither
168. is a code injecting method used for at- 173. Since we have studied IoT, let’s answer
tacking the database of a system / web- the following questions! What is a commu-
site nication system in IoT?
A. HTML injection A. Bluetooth
B. SQL Injection B. Hotspot
C. Malicious code injection C. Internet
D. XML Injection D. Credit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1062

174. CoAP stands for B. Teachers can engage with the learning
A. Common Application Protocol materials for future references.

B. Constrained Application Protocol C. The learning materials can be stored


and shared to the students in easy way at
C. Co axial application Protocol anytime and anywhere.
D. Communication Application Protocol
D. none of above
175. What is the Internet of Things (IoT)
180. Who invented IOT in 1998

NARAYAN CHANGDER
A. A network of intelligent systems
(smart devices) exchanging data over the A. Makinsov
internet. B. Kevin Wetser
B. A very fast internet connection. C. Kevin Asthon
C. A network of e-commerce websites D. Mark Weiser
sharing product information.
D. A social media website. 181. Select examples where IoT can help hu-
mans:(Choose 4 answers.)
176. helps IoT by bringing together every-
day objects. A. Citywide traffic system

A. Artificial Intelligence B. Checking the weather conditions


B. Searches C. Keeping record of my books
C. Connectivity D. The automation of home applications
D. none of above E. The control of road traffic

177. XMPP stands for 182. Which Layer is called a port layer in OSI
A. Extended Message point to point Model
B. Extensible Messaging and Presence A. Application
Protocol B. Presentation
C. Extended Medium point to point
C. Transport
D. Extensible Messaging Point Protocol
D. Session
178. How power supply is done to RPi?
183. Machine learning is
A. USB connection
A. The selective acquisition of knowledge
B. Internal battery
through the use of manual programs
C. Charger
B. The autonomous acquisition of knowl-
D. Adapter edge through the use of manual programs
179. Which statement is showing the incorrect C. The selective acquisition of knowledge
answer based the advantages of IoT to the through the use of computer programs
teachers? D. The autonomous acquisition of knowl-
A. Difficult to obtain students perfor- edge through the use of computer pro-
mances. grams

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1063

184. Internet of Things combines 190. According to the text (XR, VR & AR)
A. computer capabilities and data analyt- what is the correct alternative? 2019 was
a growth year for and augmented

PRACTICE BOOK» NOT FOR SALE


ics
(VR / AR)-known collectively as
B. computer portability and data sorting
A. Virtual and Reality
C. computer specifications and data re-
trieval B. Extended and Reality
D. none of above C. Virtual and Extended

185. The manufacturing belongs to the applica- D. VR and Extended Reality


tion of: E. VR and Augmented Reality
A. Commercial
191. Some benefits of smart traffic lights in-
B. Consumer clude:(select all that apply)
C. Industrial A. Helps with traffic congestion
D. Infrastructure B. Helps reduce fuel consumption since
186. Who defines IOT (Internet of Things)? cars don’t have to wait at lights for nearly
as long.
A. Alfred Nobel
C. real time tracking of traffic
B. Kevin Ashton
D. none of the above
C. Oprah Winfrey
D. Nelson Mandela 192. Identify one of the advantages of IoT
187. wireless router What are the devices in A. Enhance data collection
the IoT component? B. Security
A. IoT Device C. Reduce waste
B. Gateway D. All of the above
C. Server
193. What underlies the industrial revolution
D. User device
4.0?
188. WSN stands for A. Computer
A. Wired Sensor Network B. Internet
B. Wireless Sensor Network C. Information
C. Wired Service Network
D. Internet of Things (IoT)
D. Wireless Service Network
E. Computer and automation
189. Which are the big challenges or Disadvan-
tages of IoT? 194. Which one of the following can be consid-
ered a good example of IoT.
A. None at all
A. Home security System.
B. Security and Privacy
B. YouTube educational videos.
C. It is very easy to create and implement
C. Virtual learning of schools.
D. none of above D. Microsoft 365 office suite.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1064

195. Is an IEEE 802.15.4-based specification B. generator


for a suite of high-level communication C. smart phone
protocols used to create personal area net-
works with small, low-power digital ra- D. sensor
dios, such as for home automation, med-
200. A key IP based protocol defines encapsu-
ical device data collection, and other low-
lation, header compression mechanisms
power low-bandwidth needs, designed for
small scale projects which need wireless A. IPV6
connection. Low cost, easy to deploy and

NARAYAN CHANGDER
B. IPV4
has very long battery life.
C. CoAP
A. ZigBee
D. 6LowPAN
B. WIFI
C. Barcode 201. How does MQTT work for a device that
wants to share its information with oth-
D. RFID
ers?
E. Sensors and Smartphones
A. Subscribe
196. The IoTP stands for B. Publish
A. Internet of Things Platform. C. Topic
B. Internet of Things Processes. D. Transport
C. Internet of Things Process.
202. Which of the following is not a compo-
D. Internets of Thing Platform. nent of IoT?
197. Internet of Things is the evolution of A. IoT Device
connected to the Internet. B. Broker
A. cars, mobiles, and desktop computers C. Gateway
B. mobiles, homes and embedded appli- D. User people
cations
C. mobiles, streets, applications 203. What is the microcontroller used in Ar-
duino UNO?
D. none of above
A. ATmega328p
198. A device that detects or measures an
B. ATmega2560
event or physical property.
C. ATmega32114
A. Gateway
D. AT91SAM3x8E
B. Sensor
C. Big data 204. The following is not included in the cate-
gory of solution given by GCR
D. Wearables
A. Infrastructure
199. What type of device could allow a refrig-
B. SAS
erator to place a replacement order for an
item contained within it? C. Furniture
A. digital network D. IoT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1065

205. IoT means? E. Web of things


A. Inter Office Trunks
210. A network infrastructure that provides

PRACTICE BOOK» NOT FOR SALE


B. Internet of Things access to users and end devices in a lim-
C. Internet of Think ited area such as a home, school, office
building, or campus. It provides high speed
D. International of Things
bandwidth to internal end devices and in-
206. What is IoT? termediate devices.
A. things that have unique identities that A. LAN
are connected to Internet B. WAN
B. end points connected to Internet C. Internet
C. things to communicate and exchange D. none of above
data over Internet
D. All of the above 211. The devices in the IoT are connected
A. to the server.
207. IoT requires sophisticated sensors and
computer chips that (Choose 2 an- B. to the Internet.
swers) C. directly to one another.
A. transmit data to the IOTP over a se- D. none of above
cure channel.
B. read data from the surrounding envi- 212. Based on which functional unit does an
ronment. IoT Device work?
C. are built into physical things. A. receiving unit
D. transmit data to the IOTP over a non- B. processing unit
secure channel. C. memory
E. are placed close to physical things. D. display unit
208. The number of levels in IoT Reference
213. IEEE 802.16 is
model of World Forum is
A. WIFi
A. 4
B. Ethernet
B. 5
C. 6 C. WiMax

D. 7 D. None of the above

209. This is the ontologies for knowledge rep- 214. states the effect of a telecommu-
resentation<br />(information collected nications network is proportional to the
by the objects, etc.) Objects (things) are square of the number of connected users
the resources. of the system (n2 ).
A. World Wide Web A. Reed’s Law
B. Semantic Web B. Sarnoff’s Law
C. Static Web C. Beckstrom’s Law
D. Dynamic Web D. Metcalfe’s law

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1066

215. According to the text (XR, VR & AR) 220. The Open System Interconnection (OSI)
what is the correct sequence? 5G OPENS to implement protocols in layers
NEW POSSIBILITIES FOR AND A. 6
A. XR and VR B. 7
B. XR and VR C. 8
C. AR and XR D. 4
D. AR and VR 221. A popular wireless networking technol-

NARAYAN CHANGDER
E. VR and AR ogy that uses radio waves to provide wire-
less high-speed Internet and network con-
216. More Customer engagement-people ex- nections. Widely used both in indoor and
pect something for their time outdoor environments.
A. Web 1.0 A. ZigBee
B. Web 2.0 B. WIFI
C. Web 3.0 C. Barcode
D. Web 4.0 D. RFID
E. Sensors and Smartphones
217. What statement suits the Internet of
Things best? 222. The huge numbers of devices connected
A. refers to the billions of devices around to the internet of things have to commu-
the world that are connected to the inter- nicate automatically, not via humans and
net. this is called as

B. The Internet of Things aims to build re- A. Bot to Bot


liable software B. Machine to Machine
C. The Internet of Things aims to connect C. Intercloud
humans and things D. Skynet
D. none of above
223. Which one is not a device?
218. Which One is COrrect A. smartphone
A. INTRANET-THE COMPANY B. router
B. EXTRANET-PARTNERS C. Internet
C. INTERCONNECTED-USERS D. Thermostat
D. INTERNET-THE WORLD 224. The following trend is NOT related to the
growth in IOT technology
219. The network layer of OSI model does not
include A. Increase in computer monitor size
over time
A. Addressing
B. Increase in computer performance
B. Routing over time
C. Multiplexing C. Decrease in computer size over time
D. Traffic control D. Decrease in computer cost over time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Internet of Things (IoT) 1067

225. What is embedded in a device to read 231. About Headsets it is correct to say that
data from the world around it? they are getting:
A. sensors

PRACTICE BOOK» NOT FOR SALE


A. bigger, more portable and more pow-
B. camera erful.
C. wires B. smaller, fixed and more powerful.
D. Internet C. smaller, more portable and weaker
D. smaller, more portable and more pow-
226. In Cloud Which Onoe is Not Existing
erful.
A. IAAS
E. bigger, fixed and more powerful.
B. PAAS
C. SAAS 232. Data centric middleware standards for
device-to-device communication defined in
D. CAAS
A. Data Distribution Standard
227. IoT Network and high level communica-
B. Data Distribution Service
tion protocols technology are
C. Data distributed Service
A. Raspberry Pi, BlueTooth
D. None of the above
B. BlueTooth, ZigBee
C. Beaglebone, IntelGalileo 233. The IoTP (Choose 4 answers)
D. None of the above A. transmits important data to the indus-
try.
228. How much is the IOT market expected to
be worth by 2025? B. sends all the data to the industry.
A. 1 trillion C. filters the most important data from all
the data received.
B. 3tn
D. receives different types of data values
C. 500bn
from different devices.
D. 2tn
E. provides a common language for dif-
229. An IOT device can most easily be differ- ferent devices to be able to work to-
entiated from a standard computer based gether.
on
234. The following converts a form of energy
A. Computational Performance into mechanical energy
B. Memory Capacity A. Actuator
C. Interface with the user and the world B. Transducer
D. Weight/Size
C. Sensor
230. The communication API model which en- D. mulitmeter
ables easy scalability in both horizontal
and vertical deployment is 235. IoT is built on
A. Web socket API A. Data gathering sensors
B. REST API B. Cloud computing
C. EDGE C. Both the above mentioned
D. GLASS D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1068

11.3 Artificial Intelligence and Machine Learning


1. Which of these is NOT one of the laws of B. Duplicate value
robotics suggested by Asimov? C. Logically wrong value
A. A robot may not injure a human being
D. Missing values
or, through inaction, allow a human being
to come to harm. 6. Which of the languages below are used to
code a robot?

NARAYAN CHANGDER
B. A robot must resemble a human or hu-
manoid so that it can exist in harmony with A. Python
its creators
B. Machine Learning
C. A robot must protect its own existence
as long as such protection does not con- C. Java
flict with the First or Second Law. D. Computer Vision
D. A robot must obey orders given it by
7. By the housework done, we have time
human beings except where such orders
to further our studies.
would conflict with the FirstLaw
A. taking
2. My sister her ear pierced last week-
B. to have
end.
C. having
A. did
B. got D. to get

C. made 8. Alexa and Siri are examples of this type


D. took of artificial intelligence
A. Super
3. The A.I. robot uses the input to find a so-
lution for the given problem which is re- B. Narrow
ferred to as C. Strong
A. output D. none of above
B. formula
9. can be defined as the ability of a com-
C. scenario puter to perform tasks that require human
D. problem solving intelligence.

4. Google Translate uses to improve its A. Machine Learning


results. B. Artificial Intelligence
A. Machine Learning C. Unsupervised Learning
B. Internet D. Human intelligence
C. Machine Optimization
10. The purpose of AI is to
D. Data Warehouses
A. Build computer programs that exhibit
5. What are the common types of dirty intelligent behavior
data? B. Build problems, learns and understand
A. Malformed value language.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1069

C. Build emotions, language and under- 16. The idea of Strong Artificial intelligence
stands mathematical problems. is

PRACTICE BOOK» NOT FOR SALE


D. Create a robot friend for every fifth A. Just solving problems
grader
B. Solving problems and learn
11. Which is/are concerns in using A.I? C. Solving problems, learn and plannig
A. Autonomous weapons for the future
B. Job loss and unemployment D. none of above
C. Black box problem
17. Which of the following is a technique fre-
D. All of these quently used in machine learning and AI
12. Who is driving the Sachin’s Car in the video programs?
shown in ppt? A. Classification of data into categories
A. Sachin himself based on attributes.
B. Ghost B. Grouping similar objects into clusters
of related events or topics
C. Mr. India
D. AI Technology C. Identifying relationships between
events to predict when one will follow
13. What is Artificial intelligence? the other.
A. Putting your intelligence into Com- D. All of the above.
puter
18. Mar/io was used to complete what?
B. Programming with your own intelli-
gence A. A level of Mario
C. Making a Machine intelligent B. A lap of the Mario Kart
D. Playing a Game C. None of these
14. Why haven’t scientists been completely D. A level of sonic the hedgehog
successful when developing AI?
19. We had the computer technician the
A. They do not have the time or money
new software for us.
B. The human brain is very simple
A. to install
C. The human brain is very complex
B. installed
D. They are trying to replicate the human
heart C. installing

15. is a subset of AI which enables ma- D. install


chines to improve at taskes with experi-
20. A computer system modelled on a brain
ence (data).
A. Machine learning A. Artificial Neural Network

B. Computer vision(CV) B. A* Algorithm


C. NLP C. Graph
D. Deep learning D. Machine Learning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1070

21. IBM created a AI that defeated television C. robbers


game show “Jeopardy!”’ champions in D. crooks
2011, it also now used for tennis high-
lights. What was its name? 27. The following statements describe Artifi-
A. Watson cial Intelligence EXCEPT
B. Jenny A. AI is very useful in the present gener-
C. Sherlock ation increasing its productivity.

NARAYAN CHANGDER
D. Oliver B. Al is a threat if mismanaged or used
for bad intentions.
22. Color recognition:
C. AI replaces humans as it is more effi-
A. computer vision cient than humans.
B. robotics D. All of the above
C. Natural Language Processing
28. All keywords in Python are in
D. none of above
A. lower case
23. A human agent has hands, legs, mouth,
B. UPPER CASE
and other body parts for
C. Capitalized
A. Effectors
B. Sensors D. None of the above

C. Both A and B 29. A structure used to model relationships be-


D. None tween objects.
A. Artificial Neural Network
24. What is A.I.?
A. When robots shut down automatically B. A* Algorithm

B. Technology that performs tasks that C. Graph


normally a human would D. Machine Learning
C. Discovering technology for the first
30. For the image classification problem,
time
which of the following neural networks is
D. None of the above more suitable to solve this problem?
25. An Expert System uses the knowledge of A. Perceptron
many experts in a particular field to B. RNN
A. solve problems and make decisions
C. CNN
B. retain knowledge
D. Fully connected neural network
C. write game playing programs
D. none of above 31. Sophia is example of
A. Narrow
26. Installing is firewall is one method of try-
ing to protect against B. General
A. hackers C. Super
B. thieves D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1071

32. NASA has had an autonomous C. Neurons


spaceship the universe recently. D. Neural Networks

PRACTICE BOOK» NOT FOR SALE


A. to explore
38. The ability of a computer to understandim-
B. explored ages and videos
C. explore A. computer vision
D. exploring
B. robotics
33. Find the word which has a different sound C. Natural Language Processing
in the part underlined.
D. none of above
A. algorithm
39. Which of the following is a subset of ma-
B. threat
chine learning?
C. thousand
A. Numpy
D. theory
B. SciPy
34. refers to the AI modelling where the C. Deep Learning
machine learns by itself.
D. All of the above
A. Machine Learning
40. Which of these is not an element of AI?
B. Learning Based
A. Machine Learning
C. Rule Based
B. Process Learning
D. Data Sciences
C. Deep Learning
35. who owns the smart phone named 2.0
D. Language Processing
A. bill gates
B. mark zukerberg 41. Give 2 examples of Supervised Learning
models.
C. steve jobs
A. Classification and Regression
D. none of above
B. Clustering and Dimensionality Reduc-
36. Which of the following is not the promise tion
of artificial neural network? C. Rule Based and Learning Based
A. It can explain result D. Classification and Clustering
B. It can survive the failure of some
nodes 42. What is back propagation?

C. It has inherent parallelism A. It is another name given to the curvy


function in the perceptron
D. It can handle noise
B. It is the transmission of error back
37. Set of algorithms, modeled loosely after through the network to adjust the inputs
the human brain, that are designed to C. It is the transmission of error back
recognise patterns. through the network to allow weights to
A. Robot calculator be adjusted so that the network can learn
B. Artificial brain networks D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1072

43. NN is mostly used when there is an? 48. A computer method used to find the opti-
A. structured data mal path between two mapped locations.
A. Artificial Neural Network
B. unstructured data
B. A* Algorithm
C. Both structured data & unstructured
data C. Graph
D. None of the above D. Machine Learning
49. Which of these does not use NLP?

NARAYAN CHANGDER
44. What perceives it’s environment by sen-
sors and acts upon an environment by ef- A. Translation Tools
fectors? B. Email Filters
A. Robot C. Facial Recognition
B. A.I D. Autocomplete Feature
C. Agent 50. Pupils should have the doctor their
D. None of the above eyes regularly.
A. tested
45. In programming, what is the definition of
precision? B. test
A. How quickly your program can perform C. to test
tasks D. testing
B. How much you should trust the accu- 51. He has succeeded in his career in tele-
racy of your program vision.
C. How many math problems your pro- A. resurrect
gram can complete in a given time
B. to resurrecting
D. How well your program can perform
C. resurrecting
on a video game
D. resurrected
46. states that about every 2 years,
technology advances so that the speed of 52. Which is the type of AI in which we can
computers doubles. build emotional relationships?

A. Moore’s Law A. ASI (Artificial Super Intelligence)


B. ANI (Artificial Narrow Inteligence)
B. Trump’s Law
C. AGI (Artificial General Intelligence)
C. Murphy’s Law
D. none of above
D. Lawrence’s Law
53. Which is true for neural networks?
47. When was the term Artificial Intelligence
A. It has set of nodes and connections
first proposed?
B. Each node computes it’s weighted in-
A. 1920’s
put
B. 1950’s
C. Node could be in excited state or non-
C. 2000’s excited state
D. 1990’s D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1073

54. SELECT ALL THAT APPLY.Which of the fol- 59. Which of the these machine learning types
lowing does a machine have to be able to uses a combination of labeled and unla-
do in order for it to have Artificial Intelli- beled data?

PRACTICE BOOK» NOT FOR SALE


gence?
A. Supervised learning
A. interpret data
B. Semi-supervised learning
B. learn from data
C. achieve specific goals C. Unsupervised learning
D. perform basic tasks like a human D. Reinforcement learning
E. talk in complete sentences
60. Which of these does not depict AI?
55. Mark the letter A, B, C, or D to indicate the
word whose underlined part differs from A. Autonomous Car
the other three in pronunciation in each of B. Notes counting machine
the following questions.
A. automated C. Google Home
B. controlled D. code that can play chess
C. invented
61. Do you think Machine learning and AI are
D. substituted
taught like a child.A child knows only what
56. In , the machine is trained with huge it is taught.
amounts of data which helps it in training A. Yes
itself around the data.
A. Supervised Learning B. No
B. Deep Learning C. Maybe
C. Classification D. none of above
D. Unsupervised Learning
62. The of gunpowder was one of the
57. Which form belongs to Passive most significant achievements of the Mid-
Causative? dle Ages in China. [INVENT]
A. S + have + Sb + Vo + sth .
A. inventive
B. S + have/get+ sth + Pii (Ved/C3) (+
by Sb) B. inventor
C. S+ get + Sb + To Vo+ sth C. invention
D. S + want + Sb + to Vo + sth.
D. none of above
58. Strong AI system
A. are able to defeat human beings in 63. Expand CBT
combat A. Computer Behaved Training
B. are able to mimic intelligence without
B. Cognitive Behavioural Therapy
being intelligent
C. are capable of true intelligence C. Consolidated Batch of trainers
D. are unable to undertake common tasks D. Combined Basic Training

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1074

64. is a domain of AI that depicts the ca- C. It comprises systems with human-
pability of a machine to get and analyse level intelligence, reasoning, thinking, and
visual information and afterwards predict decision-making.
some decisions about it. D. It comprises systems that are faster
A. NLP than the smartest humans.
B. Data Sciences
70. Which of the following statements illus-
C. Augmented Reality trate the good effects of artificial Intelli-

NARAYAN CHANGDER
D. Computer Vision gence. I. Uplifts economic status due to
old invented AI machines II. Enables easy
65. Which of the following helps you in assess- and fast negotiations III. Helps the society
ing machine learning algorithms? in seeking solutions IV. Creates problems
A. K-Means Clustering due to misuse of technology
B. Linear Regression A. I, II
C. Data Analysis B. II, III
D. Performance Metrics C. III, IV

66. Which of these is not a type of machine D. I, III


learning?
71. Machines are not always and some-
A. Superficial Learning times break down so we should limit how
B. Supervised Learning much we depend on them in everyday life.
[RELY]
C. Unsupervised Learning
A. unreliable
D. Reinforcement Learning
B. rely
67. Artificial intelligence is all about robots.
C. reliable
A. True
D. none of above
B. False
C. Maybe 72. Which of the following does not belong to
the stage ‘ Data Exploration’?
D. none of above
A. Gathering Data
68. Machine Learning is a subset of
B. Data Analysis
A. Data Science
C. Data Preparation
B. Deep Learning
D. Data Wrangling
C. Artificial Intelligence
D. None of the above 73. Among the machine learning algorithms,
which of the following are not integrated
69. Which of the following is true of Artificial learning strategies?
General Intelligence?
A. Boosting
A. It comprises systems that are masters
B. Stacking
at every skill, subject, or discipline
B. It is limited to one or two functional ar- C. Bagging
eas. D. Marking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1075

74. Applications of Machine Learning (Select 80. are parts of expert system
all that apply). A. User Interface

PRACTICE BOOK» NOT FOR SALE


A. Image processing
B. Computers
B. Speech recognition
C. Explanation system
C. Predicting weather
D. Rule base
D. Surfing on website
E. Smart Base
75. The role of neural networks comes under
which type of learning? 81. Which of these is a tool used in Artificial
A. Supervised Intelligence?

B. Unsupervised A. Art
C. Reinforcement B. Input
D. Deep Learning C. Design

76. Machine learning algorithms build a model D. Neural Networks


based on sample data, known as
82. The number of nodes in the input layer is
A. Training data 10 and the hidden layer is 5. The maxi-
B. Confusion data mum number of connections from the input
layer to the hidden layer are
C. Market data
D. None of the above A. 50
B. less than 50
77. Python was released in the year
C. more than 50
A. 1951
D. It is an arbitrary value
B. 1947
C. 1956 83. The fundamental unit of network is
D. 1991 A. brain
78. Machine Learning is a subset of Artifi- B. nucleas
cial Intelligence which allows a machine to C. neuron
make by learning from experiences.
D. axon
A. preparation
B. predictions 84. Indicate the word(s) CLOSEST in meaning
C. testing to the underlined word(s) in each of the
following questions. By inventing revolu-
D. precaution tionary new technologies, such a super in-
79. is defined as the percentage of correct telligence might help us eradicate war, dis-
predictions out of all the observations. ease and poverty.

A. Predictions A. erect
B. Accuracy B. illiterate
C. Reality C. generate
D. F1 Score D. exterminate

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1076

85. The process of imitating the working of a 91. Human face recognition:
human brain for processing data and used A. computer vision
to make decisions
B. robotics
A. Robotics
C. Natural Language Processing
B. Machine Learning
D. none of above
C. Deep learning
D. Decision Support 92. SELECT ALL THAT APPLY.Which of these

NARAYAN CHANGDER
are an example of gathering data?
86. What is the concept of reinforcement learn-
A. A computer tracking temperature
ing?
changes throughout the week
A. Learning from labeled data
B. A computer that categorizes people on
B. Learning from unlabeled data whether or not they like similar bands
C. Learning from environment C. A computer that tracks which friends
D. none of above like your posts the most.

87. A full pass over the training set, so every D. A computer that tracks the things that
data point has been examined once you purchase with your credit card.

A. Deployment 93. D atasets that are too large or complex to


B. Confidence score be used by traditional data processing ap-
plications.
C. Epoch
A. big data
D. none of above
B. artificial intelligence
88. What is the return value of trunc()? C. data mining atasets that are too large
A. int or complex to be used by traditional data
B. bool processing applications.
C. float D. none of above
D. none 94. Which of these questions would “Siri” or
“Alexa” not be able to answer?
89. Domain of the AI used by price comparison
websites is A. What’s the weather like outside?
A. Data Science B. Is there any traffic on the way to work?
B. NLP
C. What am I having for my tea tonight
C. CV
D. What day is Christmas Day on this
D. none of above
year?
90. Voice to text:
95. Some people believe that AI is such a
A. computer vision technology that it will change our lives just
B. robotics as the Internet or TV did. [TRANSFORM]
C. Natural Language Processing A. transformative
D. none of above B. transforming

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1077

C. transformation 100. Artificial Intelligence is the intelligence


demonstrated by a that simulates hu-
D. none of above
mans in cognition, learning and making de-

PRACTICE BOOK» NOT FOR SALE


96. Recent in machine learning has al- cisions.
lowed us to create machines that can win A. machine
with humans in some areas. [DEVELOP] B. car
A. well-developed C. printer
B. development D. counting machine

C. developed 101. If a computer can play chess it known as


D. developing
A. a good
97. How does Weak AI differs from Strong B. a simple
AI? C. an intelligent
A. Weak AI contains basic information D. none of above
like programmed response while Strong
AI contains high cognitive information like 102. the artificial intelligence timeline, the pe-
the ability to reason. riod from 1974-93 was known as
A. AI winter
B. Weak AI is a developing type of intel-
ligence while the Strong AI is already es- B. AI summer
tablished. C. AI cold
C. Strong AI is better than weak AI be- D. AI hot
cause it is an improved version.
103. All the AI applications you can find nowa-
D. Strong AI is widely used compare to days are
Weak AI. A. general
98. What are the issues on which biological B. narrow
networks proves to be superior than AI C. super
networks? D. none of above
A. robustness & fault tolerance 104. We had the roof last year.
B. flexibility A. mend
C. collective computation B. mending
D. all of the mentioned C. mended
D. being mended
99. Sentiment analysis using Deep Learning is
a many-to one prediction task 105. The ability of a computer to interact an-
dunderstand different human languages
A. True
A. computer vision
B. False B. robotics
C. can be true and false C. Natural Language Processing
D. Can not say D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1078

106. DEEP LEARNING is often used in: A. When the machines mimic the cogni-
A. OBJECT DETECTION tive functions that humans ought to carry-
out
B. IMAGE PROCESSING
B. When a machine turns on
C. TO OVERCOME LIMITATIONS OF MA-
C. When a machine performs very well
CHINE LEARNING
D. When a machine becomes faulty
D. ALL OF THE ABOVE
112. AI is incorporated into a variety of differ-

NARAYAN CHANGDER
107. The canvas helps you in identifying ent types of technology. Here are some of
the key elements related to the problem. the examples EXCEPT
A. Problem scoping A. Automation
B. 4Ws Problem B. Machine vision
C. Project cycle C. SIRI
D. Algorithm D. Natural language processing

108. Which of the following would have a con- 113. Name any 2 methods of collecting data.
stant input in each epoch of training a Deep A. Surveys and Interviews
Learning model?
B. Rumors and Myths
A. Weight between input and hidden layer
C. AI models and applications
B. Weight between hidden and output
D. Imagination and thoughts
layer
C. Biases of all hidden layer neurons 114. Which of this is the most common type of
artificial intelligence use in the daily life?
D. Activation function of output layer
A. ASI (Artificial Super Intelligence)
109. Which is a not commonly used program- B. ANI (Artificial Narrow Intelligence)
ming language for AI?
C. AGI (Artificial General Intelligence)
A. Python
D. none of above
B. R
115. Machine Learning is a preferred approach
C. Perl
to:
D. Java
A. Medical Analysis
110. Deep learning techniques show a lot of B. Speech Recognition
promise for challenging natural language C. GPS Navigation Systems
processing problems.
D. Cleaning Robots
A. Deep learning techniques
116. Deep learning neural network training re-
B. logistic techniques
quires a lot of matrix calculations. Gener-
C. scientific techniques ally, we need to use hardware to enable
D. None of the above the computer to have parallel computing
capabilities. The following hardware de-
111. When is the term Artificial Intelligence ap- vices can provide parallel computing capa-
plied? bilities:

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1079

A. Motherboard B. The process of learning with training


labels (like donut or bagel from the crash
B. RAM
course video).

PRACTICE BOOK» NOT FOR SALE


C. CPU
C. The process of learning without train-
D. GPU ing labels through grouping and clustering
things that are similar.
117. Steps involved in the self driving cars:
D. none of above
A. Object detection
122. Which of the following is believed to be
B. Motion planning
of the same capacity as that of human in-
C. Both of the above telligence?
D. None of the above A. SuperIntelligence
B. Weak AI
118. Pupils should have their eyes regu-
larly. C. Strong AI
A. tested D. General AI

B. to test 123. What type of data is:a=[(1, 1), (2, 4), (3,
9)]?
C. test
A. Array of tuples
D. testing
B. List of tuples
119. Is Sophia Robot an example of AI? C. Tuples of lists
A. Yes D. Invalid type
B. No
124. Playing chess is a task that require
C. May be
A. Computer
D. none of above B. intelligence
120. Consider the following two statements:i) C. application
AI technology is the first truly safe tech- D. none of above
nology of 21st century ii) AI technology
provides best returns at minimum risks. 125. A theoretical type of AI where the ma-
Which of these statements is/are true? chine can outperform human intelligence in
every task
A. Only ( i )
A. Artificial general intelligence
B. Only ( ii )
B. Artificial narrow intelligence
C. Both ( i ) and ( ii )
C. Artificial super intelligence
D. Neither ( i ) nor ( ii )
D. none of above
121. What is the definition of Unsupervised
126. In training an Artificial Intelligence sys-
Learning?
tem, we need to provide a data set
A. The process of learning an action with sufficiently large amount of photos,
through feedback and practice until the speeches, or texts, etc. for the system to
action is completed.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1080

A. analyse 131. What is data?


B. learn A. Facts and Statistics
C. manage B. A kind of food

D. practice C. A kind of drink


D. A computer
127. Who among the following is the pioneer
of AI research? 132. which AI system passed an eight grade

NARAYAN CHANGDER
science test developed by the allen insti-
A. Google
tute?
B. Facebook A. deep blue
C. US department of defence B. deep learning
D. US department of justice C. aristo
D. sophiya
128. Training a pet with rewards and punish-
ments looks exactly like learning 133. I’d like to have my shoes at one.
A. Supervised A. repair
B. Unsupervised B. repairing
C. Reinforcement C. repaired
D. Deep D. being repaired

129. A computer program that improves its 134. Which of these does not belong to rein-
performance at certain tasks with experi- forcement learning?
ence. A. rewards
A. Artificial Neural Network B. agent
B. A* Algorithm C. environment
C. Graph D. labelled input

D. Machine Learning 135. System that stores the information an


provide us with data is known as
130. Deep Learning is a Machine Learning algo-
A. Expert System
rithm that simulates the learning method
of our brain. It is a complicated algorithm B. Information System
based on artificial neuralnetworks. In the C. Super System
right figure below, each circle/node repre-
sents an which simulates a biological D. Smart System
neuron in our brain. 136. What is artificial intelligence said to be?
A. neuron algorithm A. very dangerous
B. algorithm neuron B. intelligent robots
C. artificial neuron C. smarter than humans
D. neuron artificial D. the future

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1081

137. Which of the following is not an example 142. In the operation of computer, we need to
of Artificial Intelligence? tell a computer how to solve a problem by
designing the detailed steps in an

PRACTICE BOOK» NOT FOR SALE


A. Chess Playing Computers
B. Self Driving Cars A. calculation
B. counting
C. Face Recognising Devices
C. algorithm
D. Money Counting Machines
D. mathematics
138. I can do only one task, but I do it per-
fectly. 143. What is the definition of Reinforcement
Learning?
A. Narrow AI
A. The process of learning an action
B. General AI
through feedback and practice until the
C. Super AI action is completed.
D. none of above B. The process of learning with training
labels (like donut or bagel from the crash
139. The ability of a computer to understand course video).
human language is called
C. The process of learning without train-
A. NLP ing labels through grouping and clustering
B. Computer Vision things that are similar.
C. Medical Science D. none of above
D. none of above 144. Who is the quotee of “It (general AI)
would take off on its own, and re-design
140. Suppose we have a 5-layer neural net-
itself at an ever increasing rate. Humans,
work which takes 3 hours to train on a
who are limited by slow biological evolu-
GPU with 4GB VRAM. At test time, it
tion, couldn’t compete, and would be su-
takes 2 seconds for single data point.Now
perseded.”
we change the architecture such that we
add dropout after 2nd and 4th layer A. Stephen Hawking
with rates 0.2 and 0.3 respectively.What B. Barack Obama
would be the testing time for this new ar-
C. Christopher Nolan
chitecture?
D. Bill Gates
A. Less than 2 secs
B. Exactly 2 secs 145. Which of these in not a core data type in
python?
C. Greater than 2 secs
A. Lists
D. Can’t Say
B. Dictionery
141. Artificial intelligence is ?
C. Tuples
A. Not real
D. Class
B. Playing a Game
146. The area of A.I that investigates meth-
C. Making a Machine intelligent ods of facilitating communication between
D. none of above people and computers:

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1082

A. Artificial language processing B. Using traffic data to work out what


B. Symbolic processing cars people are likely to buy

C. Natural Language processing C. Playing hangman

D. Decision support D. Writing a joke

147. A.I. is used in? 152. Which one of these statements is cor-
rect?
A. Smart Phones

NARAYAN CHANGDER
B. Cars A. Machine learning is a technique where
computers can be trained to perform
C. Social media feeds tasks instead of needing to be given an ex-
D. Banking plicit set of steps to follow
E. Surveillance B. Machine learning is magic

148. Which one of these jobs COULD NOT be C. Machine learning means we don’t
taken by a robot with AI? need to think about problems any more be-
cause computers will think for us
A. Doctor
D. Machine learning has replaced the
B. Bank clerk need for us to learn how to code
C. Telephone sales person
153. Intelligent machines that can learn any
D. Shop worker
tasks that humans can do.
149. A percentage accompanying a prediction; A. Artificial general intelligence
it shows how confident the model is in its
output B. Artificial narrow intelligence

A. Epoch C. Artificial super intelligence

B. Confidence score D. none of above


C. Deployment 154. Which of these would be a good use of
D. none of above machine learning?

150. Which of the following is a formalization A. Adding big numbers together


of relationships between variables in the B. Counting the number of times a button
form of mathematical equations? is pressed
A. Deep Learning C. Recognizing if an email is spam
B. Machine Learning D. none of above
C. Statistical analysis
155. Which of the following means ‘Cleaning
D. Statistical model of collected data for the project’?
151. Which of the following tasks would an A. Data Collection
AI be able to perform the LEAST success-
B. Sensors
fully?
C. Data Wrangling
A. Suggesting what someone might want
to buy from a shopping website D. Data Analysis

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1083

156. RNNs stands for? 161. In which year do you think the term ‘Ar-
A. Receives neural networks tificial Intelligence’ was coined?

PRACTICE BOOK» NOT FOR SALE


B. Report neural networks A. 1950

C. Recording neural networks B. 1960


D. Recurrent neural networks C. 1966
D. 1956
157. Which of the following is correct about
the difference between machine learn- 162. I’ll have a new dress for my daugh-
ing algorithms and traditional rule-based ter.
methods?
A. making
A. Traditional rule-based methods, in
which the rules can be explicitly clarified B. to make
manually C. make
B. Traditional rule-based methods use ex- D. made
plicit programming to solve problems
163. What is Machine learning?
C. The mapping relationship of the model
in machine learning is automatically A. The autonomous acquisition of knowl-
learned edge through the use of computer pro-
grams
D. The mapping relationship of the model
in the machine learning institute must be B. he autonomous acquisition of knowl-
implicit edge through the use of manual programs
C. The selective acquisition of knowledge
158. What can A.I. do that humans can’t?
through the use of computer programs
A. Eat
D. The selective acquisition of knowledge
B. Sleep through the use of manual programs
C. Think
164. What will be the output of the follow-
D. Do the same thing for a long time with- ing Python code? 1. »>t=(1, 2, 4, 3)2.
out getting tired/bored »>t[1:-1]
159. AI stands for A. (1, 2)
A. Antificial Intelligent B. (1, 2, 4)
B. Artificial Intelligence C. (2, 4)
C. Artificial Intelligent D. (2, 4, 3)
D. Antificial Intelligence
165. Which of the followings are most widely
160. Which of the following is NOT a goal or used metrics and tools to assess a classifi-
feature of AI? cation model?
A. Reasoning/decision making A. Confusion matrix
B. Forward planning B. Cost sensitive accuracy
C. Displaying emotion C. ROC curve
D. Natural Language D. all of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1084

166. Although machine learning is useful, 170. Which of these is not a Google Product?
there are barriers to implementation.
A. Pixel
What is one common obstacle faced by
businesses looking to use machine learning B. Echo
tools? C. Nest
A. Not enough data to perform machine D. Waymo
learning processes.
B. Lack of data science skills or data sci- 171. What would make a robot intelligent?

NARAYAN CHANGDER
entists. A. It responds to the environment.
C. No need for the big analytics process- B. It responds to the environment accord-
ing power in machine learning programs. ing to previous experiences.
C. It calculates mathematical problems
D. none of above faster than human minds.
167. is a widely used and effective ma- D. It can jump 1.5 meters higher than hu-
chine learning algorithm based on the idea mans.
of bagging.
172. refers to the field and practice of using
A. Regression algorithms that are able to “learn” by
B. Classification extracting patterns from a large body of
data.
C. Random forest
A. bias
D. decision tree
B. machine learning
168. Which of the following statements best
C. machine intelligence
describes the difference between robots
and humans? D. none of above
A. Robots move differently and made up 173. To find the you add up all the numbers
of metal. and then divide by how many numbers you
B. Robots do not have feelings and emo- have.
tions as compared to humans. A. Mean
C. Robots are too smart as compared to
B. Median
humans.
C. Mode
D. Robots are more effective than hu-
mans. D. Range

169. What is the role of Computer Science in 174. A computer can play chess, What type of
Machine Learning? learning is exhibited by the computer pro-
gram?
A. Solve problems
A. Supervised Learning
B. Collect data
B. Unsupervised Learning
C. Provide a model that solves the prob-
lem C. Reinforcement Learning
D. Cluster data D. Deep Learning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1085

175. I can learn and understand like humans D. a machine that improves performance
A. Narrow AI based on watching a human do the same
task

PRACTICE BOOK» NOT FOR SALE


B. General AI
181. Alexa is a type of
C. Super AI
A. chatter box
D. none of above
B. chatbox
176. What is intelligence? C. chatbot
A. Storing or keeping lots of information D. chat box
B. Understanding 182. Which is the first stage in AI Project Cy-
C. Being emotional cle?
D. Being heartless A. Data Acquisition
B. Project Scoping
177. In this type of learning neural networks
C. Problem Scoping
are involved.
D. Problem Solving
A. ML
B. DL 183. Why do machines demonstrate artificial
intelligence?
C. Supervised ML
A. Because machines are not really intel-
D. None of these ligent compare to humans.
178. Learning from labeled data. B. Because machines are capable of do-
ing tasks for humans by programming
A. Supervised Learning them with a specific information.
B. Unsupervised Learning C. Because machines are useful and rele-
C. Reinforcement Learning vant in our daily lives.
D. none of above D. Because machines give you artificial in-
formation which are important.
179. Examining the knowledge base for infor-
184. What kind of learning algorithm for “Fu-
mation that matches the user’s query
ture stock prices or currency exchange
A. Inference engine rates”?
B. Knowledge base A. Recognizing Anomalies
C. User Interface B. Prediction
D. Expert system C. Generating Patterns
D. Recognition Patterns
180. An example of ‘machine learning’ is
A. a calculator that can do hard math 185. He was barely of writing his own
problems name.
A. able
B. voicemail messages of your favorite
celebrities B. capable
C. installing a new hard drive on a com- C. enable
puter D. talented

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1086

186. What year do futurists believe A.I will 191. WHAT ARE AI’S FEEDED UP WITH?
meet adult human intelligence?
A. QUALITY DATA
A. 2025
B. JUNK FOOD
B. 2035
C. COMMON SENSE
C. 2040
D. none of above
D. 2029
192. In the Turing test, how can a computer
187. Can AI work in small, dark, airless

NARAYAN CHANGDER
considered as an intelligent, thinking en-
spaces?
tity?
A. Well
A. AI learns new behaviors; improve per-
B. Sure! formance as more experience is acquired.
C. Not really B. AI makes work easier and faster, far
D. Cannot at the moment more convenient than before.

188. Like other technologies, the development C. If a sufficient proportion of interroga-


of Artificial Intelligence can have good and tors are unable to distinguish computer
bad impacts on us or our society. Good from human being.
impacts often involve improvements in au- D. If computers are able to reason and
tomation, efficiency, and accuracy. On the make decisions without depending on hu-
other hand, Artificial Intelligence can some- man manipulation.
times lead to issues related to ethics and
193. NLU Stands for
A. privacy A. Neutral Language Understanding
B. open B. Natural Language Understanding
C. announce C. National Language Understanding
D. obscure D. None of the Above
189. What can Ai do that humans can’t?
194. What decade did formal A.I research be-
A. Make no mistakes gin?
B. Sleep A. 1980
C. Think quickly B. 1950
D. Everything
C. 1960
E. Do the same thing for a long time with-
D. 2000
out getting tired/bored

190. system that mimic the expertise of an ex- 195. Artificial Intelligence is a machine spe-
pert is known as cialized in one task or area

A. Information System A. General


B. Computer System B. Super
C. Expert System C. Advance
D. Super System D. Narrow

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1087

196. It is an artificial chatting robot or chat B. By using AI as a weapon in wars, many


box that responds to your questions. innocent lives will be affected.

PRACTICE BOOK» NOT FOR SALE


A. SimiSimi C. AI replaces the human force resulting
B. SimSimi to less job opportunities to human work-
ers.
C. SimSimmi
D. AI programmed devices are harmful
D. SimmSimi through the radiation it produces.
197. Someone is checking my car tyres for me.
202. A is divided into multiple layers and
A. My car tyres are being checked by my- each layer is further divided into several
self. blocks called nodes.
B. I have my car tyres checked regularly. A. Neural Networks
C. I’m having my car tyres to be checked B. Convolutional Neural Network (CNN)
by someone.
C. Machine learning algorithm
D. I’m getting my car tyres checked.
D. Hidden Layers
198. is the ability of a computer to perform
tasks that require human intelligence 203. is the personal digital assistant devel-
oped by Microsoft and works for windows
A. skill 10.
B. AI A. google assistant
C. Data B. cortana
D. Application C. apple siri
199. Which of the following is not part of the D. alexa
AI Project Cycle?
204. Which of these statements is not true
A. Data Exploration about AI?
B. Modelling
A. Machines can do everything
C. Testing
B. Machines can solve a specific problem
D. Problem Scoping
C. Machines are designed to make repet-
200. Artificial Intelligence of today is properly itive tasks
known as D. There are no machines capable of mak-
A. Narrow artificial intelligence (weak AI) ing rational decisions
B. General artificial intelligence (AGI or 205. Mark the letter A, B, C, or D to indicate
strong AI) the word that differs from the other three
C. Applied artificial intelligence in the position of primary stress in each of
the following questions.
D. none of above
A. intelligence
201. In what way can artificial intelligence be-
come harmful? B. diversity

A. Excessive use of AI makes people lazy C. automated


since they rely too much on it. D. exterminate

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1088

206. There are Sustainable Development 211. Which is the last stage of AI Project Cy-
Goals cle?
A. 17 A. Evaluation
B. 19 B. Deployment

C. 20 C. Problem Scoping
D. Testing
D. 27
212. How many layers Deep learning algo-

NARAYAN CHANGDER
207. Many people question whether an AI can rithms are constructed?
make ethical decisions. What do we mean
by ETHICS? A. 2
B. 3
A. The laws of particular country
C. 4
B. The rules of behaviour imposed by a
programmer or the AI creator D. 5

C. A set of moral principles 213. Recall-Evaluation method is


D. Human emotions A. defined as the fraction of positive
cases that are correctly identified.
208. It’s used by marketing teams at some B. defined as the percentage of true pos-
companies to avoid the science fiction aura itive cases versus all the cases where the
that sometimes surrounds AI prediction is true.
A. cognitive computing C. defined as the percentage of correct
B. artificial intelligence predictions out of all the observations.
D. comparison between the prediction
C. artificial weak
and reality
D. none of above
214. The study of computer algorithms that im-
209. What shape is a normal distribution prove automatically through experience is
curve? termed?
A. Half curve A. Compilation

B. Round curve B. Formulation


C. Machine Learning
C. Bell curve
D. Ability
D. Square curve
215. Which of these activities takes place in
210. Machine Learning is a subset of AI. ML the testing phase within machine learn-
deals with developing systems which can ing?
improve their performance with
A. Labeled data is fed as input into the al-
A. Experience gorithm along with the expected output or
labels.
B. Deep Learning
B. The system classifies the test data
C. Neural Networks
based on the patterns learned from the
D. none of above training data.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1089

C. The algorithm studies the data pat- with correct outcomes (e.g. types of ani-
terns and works out a conclusion based mals) for the machine to After learning
on the input and output training data. from the training data, a predictive model

PRACTICE BOOK» NOT FOR SALE


D. A machine learning model is derived, is generated for the machine to make fu-
to be used with test datasets. ture predictions.
A. exam
216. In the classic convolutional neural net-
work model, what hidden layer does the B. test
Softmax function follow? C. practice
A. Convolutional layer D. learn
B. Pooling layer
221. Jobs that are highly repetitive and re-
C. Fully connected layer quire weak skills are the jobs most
D. All of the above easily replaced by AI:
A. Computing
217. AGI means
B. Intelligent
A. Artificial intelligence
C. Social
B. Graphical artificial intelligence
C. Artificial Intelligence D. Vocal

D. Super intelligence 222. Which of the following are 4W’s canvas

218. Which of the following is a Python tu- A. Where


ple? B. What
A. [1, 2, 3] C. Who
B. (1, 2, 3) D. Why
C. {1, 2, 3} E. All of the above
D. { }
223. How many types of Artificial intelligence
219. Which of the following is a scenario are?
where an AI is being asked to make an
A. one
ETHICAL decision?
B. two
A. A self-driving car can only avoid one of
two pedestrians and must choose which C. three
B. A chess computer must choose its next D. four
move
224. Which one of the following is an applica-
C. A voice assistant is asked to schedule
tion of AI?
an appointment on the users calendar
A. Remote controlled Drone
D. A voice assistant is asked whether the
user will need an umbrella today B. Self-Driving Car
C. Self-Service Kiosk
220. machine learns from examples or experi-
ences. We need to provide training data D. . Self-Watering Plant System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1090

225. A.I. stands for? C. the study of mental faculties through


A. After Incident the use of mental models implemented on
a computer
B. Alien Invasion
D. all of the above
C. Artificial Intelligence
D. none of above 230. The intelligence displayed by humans and
other animals is termed?
226. Machine Learning enables a machine to
A. Constance
“recognize” and “learn” the patterns in

NARAYAN CHANGDER
the training set of data. The machine B. Ability
learns by looking for patterns from the C. Natural Intelligence
training data set and then builds a
D. Cognition
A. pattern
B. module 231. Software designed to facilitate a conver-
sation between a computer and human
C. machine end-user?
D. model
A. Voice response
227. What means was devised to help work B. Walkie Talkie
out whether or not a computer can think
C. Chatbot
like a human?
D. Messaging
A. IQ test
B. AI test 232. The practice of learning from observation
C. Turing Test and making predictions about something:

D. Machine Learning A. Neural Network


B. Machine Learning
228. We use the term Big Data to describe
collected. In short, the Big Data is a C. Natural Language Processing
larger, more complex data set, especially D. Deep Learning
one from a new data source. The data set
is so large that traditional data processing 233. Not an example of Weak Artificial Intelli-
software cannot manage it. gence?
A. the very little amount of data A. Google search
B. the little amount of data B. Siri, Alexa
C. the small amount of data C. ROSS
D. the huge amount of data D. Self-driving cars
229. Strong Artificial Intelligence is 234. Which of these jobs COULD be taken by
A. The embodiment of human intellectual a robot using AI?
capabilities within a computer A. Teacher
B. a set of computer programs that pro- B. Doctor
duce output that would be considered to
reflect intelligence if it were generated by C. Nurse
humans D. Bank clerk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1091

235. Linguistics is the scientific study of lan- 240. I can solve complex problems that the hu-
guage which includes man cannot solve

PRACTICE BOOK» NOT FOR SALE


A. grammer A. Narrow AI
B. semantics B. General AI
C. phonetics C. Super AI
D. all of the above D. none of above
236. Can be defined as the ability of a com- 241. What is a computer system that emulates
puter to perform tasks that require human the decision-making ability of a human ex-
intelligence. pert.
A. Machine Learning A. Decision system
B. Artificial Intelligence B. Expert System
C. Unsupervised Learning C. Experiment System
D. none of above D. All of the above
237. What is AI used for? 242. Most smartphones have voice input ( )
A. Healthcare function that allows users to use voice typ-
ing with speech recognition program.
B. Transportation
A. text-to-speech
C. Education
B. speech-to-speech
D. All of the Above
C. text-to-text
238. is set of algorithms that allows com-
D. speech-to-text
puters to learn from data without being
explicitly programmed. 243. An is anything that can be viewed
A. Machine Learning as perceiving its environment through sen-
sors and acting upon that environment
B. Deep Learning
through effectors.
C. Neural Networks
A. Machine Learning
D. none of above
B. Agent
239. Which of the following statements are C. Rational Agent
FALSE? (choose as many as are appropri-
ate) D. None

A. An AI might be placed in a position 244. What is the role of modelling in an NLP


where it has to make a life or death de- based AI model?
cision A. Modelling in NLP helps in processing of
B. AI’s use the same criteria as humans, AI model
when making decisions B. Modelling is required to make an AI
C. AI’s can learn from the mistakes that model
they make C. In NLP, modelling requires data pre-
D. No machine has ever passed for a hu- processing only after which the data is fed
man being to the machine.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1092

D. Modelling is used in simplification of 250. Which of the following are sub-fields of


data acquisition AI?

245. All of the following are types of AI ex- A. Machine Learning


cept. B. Computer Vision
A. Natural Language Processing C. Speech Recognition
B. Machine Learning D. Natural Language Proc.
C. Internet of Things

NARAYAN CHANGDER
251. Which of the below is not supervised
D. Speech Recognition learning?

246. How is A.I. different from machine learn- A. Spam email identification
ing? B. House price prediction
A. Machine learning is slower. C. Clustering customers into different
B. Machine learning is smarter. groups of similarity

C. Machine learning is a technique to D. none of above


achieve A.I. and provides a machine with 252. It is generally recommended to replace
the capability to learn from data and expe- pooling layers in generator part of convo-
rience through algorithms. lutional generative adversarial nets with
D. none of above ?

247. What device below is not an example of A. Affine layer


Machine Learning? B. Strided convolutional layer
A. Wearable fitness tracker C. Fractional strided convolutional layer
B. Google Assistant D. ReLU layer
C. Speech to Text 253. Which of these does not use Machine
D. Google Search Learning / AI?
E. None of the above A. driverless cars

248. I’ll have the boys the chairs. B. Siri / Alexa

A. paint C. Wireless speakers

B. to paint D. facial recognition on your phone

C. painted 254. Which of the following is the definition of


D. painting accuracy?
A. The proportion of actual negatives that
249. is the sub-field of AI that is focused are correctly identified
on enabling computers to understand and
process human languages. B. The closeness of two or more mea-
surements
A. Deep Learning
C. The total number of correct predic-
B. Machine Learning tions made out of all the predictions
C. NLP D. The proportion of actual positives that
D. Data Sciences are correctly identified

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1093

255. Engineers can now apply technologi- B. discover


cal solutions to automate many tasks that C. discoverer
required human input. [ADVANCE]

PRACTICE BOOK» NOT FOR SALE


D. none of above
A. advancement
B. advanced 261. Exploding gradient problem is an issue
in training deep networks where the gra-
C. advancing
dient getS so large that the loss goes
D. none of above to an infinitely high value and then ex-
plodes.What is the probable approach
256. Parts of expert system
when dealing with “Exploding Gradient”
A. Knowledge Base problem in RNNs?
B. Inference Engine A. Use modified architectures like LSTM
C. Rule base and GRUs
D. Database B. Gradient clipping
E. Website C. Dropout
D. None of these
257. Which of the applications below is promi-
nent in AI? 262. Define Machine Learning.
A. Speech Recognition A. Machine learning refers to computer
B. Honesty systems (both machines and software)
C. Emotional Management enables machines to perform tasks for
which it is programmed.
D. Anxiety
B. Machine Learning refers to projects
258. In deep learning tasks, when encounter- that allow the machine to work on a par-
ing data imbalance problems, which of the ticular logic.
following methods can we use to solve the C. Refers to any technique that enables
problem: computers to mimic human intelligence.
A. Random oversampling D. Machine learning is the study of com-
B. Batch delete puter algorithms that improve automati-
C. Synthetic sampling cally through experience.
D. Random undersampling 263. Translation:
259. WHAT IS THE FULL FORM OF AGI? A. computer vision
A. ARTIFICIAL GENERAL INTELLIGENCE B. robotics
B. ARTIFICIAL GRAND INTELLIGENCE C. Natural Language Processing
C. ARTIFICIAL GRASP INTELLIGENCE D. none of above
D. none of above 264. The three stages of artificial intelligence
260. Their was quickly confirmed, making include computational intelligence, ,
it the first confirmation of planets outside and cognitive intelligence:
our Solar System. [DISCOVER] A. Weak AI
A. discovery B. Perceptual Intelligence

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1094

C. Behavioral Intelligence 270. Collection of facts and rules .


D. Strong AI A. Inference engine
B. Rule base
265. There are reasons why we should cre-
ate artificial intelligence. [NUMBER] C. Knowledge base
A. number D. EXpert
B. numerous 271. A brand new AI program is similar to

NARAYAN CHANGDER
C. numberous making a guess.
D. none of above A. a teacher
B. a dog
266. Is Python case sensitive when dealing
with identifiers? C. an adult

A. Yes D. a baby

B. No 272. By Problem Scoping, we mean


C. machine dependent A. understanding the problem
D. none of the above B. examining who will be affected
C. checking where can this help
267. What modern invention gave machines
enough data to begin mimicking human in- D. all of the above
telligence?
273. The science and engineering of making
A. Instagram intelligent machines, especially intelligent
B. Drones computer programs.
C. Tik Tok A. Machine learning
D. Social Media B. Deep Learning
C. Artificial Intelligence
268. It is broadly defined as the automatic ma-
nipulation of natural language, like speech D. None of the above
and text, by software 274. Which of the following is an example of
A. natural language processing computer vision.
B. artificial intelligence A. Smart assistants
C. compiler design B. Email filters
D. none of the above C. Self driving cars
D. Price comparison websites
269. After the power failure last night, the
washing machine started to , so I had 275. The normal curve is symmetrical about
to wash the clothes by hands. the
A. make noise A. Mean
B. malfunction B. Median
C. operate C. Mode
D. work D. X-axis/Y-axis

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 Artificial Intelligence and Machine Learning 1095

276. They have just had air conditioning in 282. One of the following is not an example
their house. of A.I.

PRACTICE BOOK» NOT FOR SALE


A. install A. ATM
B. to install B. Robot
C. installed C. Bicycle
D. installing D. Self-driving car

277. The unique characteristics of something 283. What is the most important difference be-
tween batch gradient descent, small batch
A. Supervised learning gradient descent, and stochastic gradient
B. Features descent?
C. Unsupervised learning A. Gradient size
D. none of above B. Gradient direction
C. Learning rate
278. Which of these objects is not an example
of the use of Artificial Intelligence? D. Number of samples used
A. Siri 284. It is a device module, or system used in
B. Cortana electronic gadgets and materials to detect
events and changes.
C. Alexa
A. Electrons
D. Electric buses
B. Motor
279. A human agent has eyes, ears, and other C. Sensor
organs for
D. detector
A. Effectors
285. The system that allows a computer to
B. Sensors make decisions, such as in health care and
C. Both A and B financial advice is called
D. None A. Experiment system
B. Expert system
280. AI duet is a game which uses
C. Random search generator
A. Natural language processing
D. none of above
B. Natural image processing
C. Computer vision 286. How does artificial intelligence become
useful to society?
D. None of these
A. It becomes helpful in completing tasks
281. You should have your car before go- quickly and efficiently thus producing
ing. more products
A. servicing B. It becomes helpful in completing tasks
quickly thus makes people lazy
B. to service
C. It becomes helpful in making task eas-
C. service ier and less efficient resulting to the boost
D. serviced of economy.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.4 Quantum Computing 1096

D. It helps us to complete our task. C. GPU memory

287. Which of the following descriptions of D. All of the above


machine learning is correct? 289. A machine that is specialized in one task
A. Deep learning is a branch of machine or area.
learning A. Artificial general intelligence
B. Deep learning and machine learning B. Artificial narrow intelligence
are mutually inclusive

NARAYAN CHANGDER
C. Artificial super intelligence
C. Deep learning and machine learning
are both artificial intelligence but have no D. none of above
relationship with each other 290. Kelly wanted a live band at her wed-
D. None of the above ding.

288. Which of the following is a bottleneck for A. been playing


deep learning algorithm? B. to play
A. Data related to the problem C. played
B. CPU to GPU communication D. to be played

11.4 Quantum Computing


1. What does ‘entanglement’ mean? 4. Who created the basic thesis of Quantum
A. Two particles are connected Computing?

B. Two particles are seperate A. Richard Feynman


C. Two particles are different B. Max Planck
D. Two particles are independent C. David Deutsch
D. none of above
2. In spin resonance, a finite detuning from
the resonance condition makes the Rabi os- 5. What is the experimental fingerprint of
cillations spin-orbit-induced electrically driven spin
A. slower and incomplete resonance?
B. faster and incomplete A. anomalous resonance condition
C. slower and more complete B. linear relation between Rabi frequency
D. faster and more complete and ac gate-voltage amplitude
C. linear relation between Rabi frequency
3. In the perturbation theory applied to de- and dc B-field
scribe spin-orbit-mediated EDSR, which is
the dominant (greatest) energy scale? D. imprecise quantum gates
A. orbital level spacing 6. When does the superposition of a Quan-
B. spin-orbit matrix element tum state collapse?
C. electric-field matrix element A. on being cooled
D. Zeeman energy B. on heating

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.4 Quantum Computing 1097

C. on observation 12. Which programming language is used in


D. on being charged quantum computing?

PRACTICE BOOK» NOT FOR SALE


A. Java
7. Which pulse is used to induce spin dynam-
ics in a conventional electron spin reso- B. C++
nance experiment? C. python
A. dc magnetic-field pulse D. QCL
B. dc gate-voltage pulse
13. In the 1D quantum harmonic oscillator, the
C. ac magnetic-field pulse
momentum operator p provides a nonzero
D. ac gate-voltage pulse matrix element
8. Why is quantum computing important? A. between any two energy eigenstates
A. They can help us find new ways to B. only between the ground state and the
model data. first excited state
B. Has some artificial intelligence fea- C. only between nearest-neighbour en-
tures ergy eigenstates
C. It is much easier to capture the atten- D. none of the others
tion of the consumer.
14. What is a quantum computing?
D. It is important because it could have
the potential to solve many problems. A. Set of programs of a computer system.

9. What does a Quantum Computer use for B. It is the manipulation of matter at the
computing, unlike a classical computer? nanometer scale.

A. A bit C. A concept that refers to a digital inter-


connection.
B. Qu-bit
D. It’s a different computing paradigm.
C. cell
D. slot 15. An electron moving along x in a 2DEG in
the xy plane, subject to Rashba spin-orbit,
10. What is Quantum computing suppose to be feels an effective spin-orbit field
able to reach
A. along x
A. To simulate solutions
B. along y
B. Find the human barrier for technology
C. along z
C. The possibility for the revival of dead
people D. neither
D. none of above 16. What is the typical arrangement of Ga and
11. Qu-bit uses which principle of Quantum As nuclear spins in a GaAs quantum dot at
Mechanics? 100 millikelvin?
A. superposition A. ferromagnetic alignment
B. interference B. antiferromagnetic alignment
C. entanglement C. helical magnetic ordering
D. all of these D. random, unpolarized

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.4 Quantum Computing 1098

17. What is Quantum Computing for? 22. What does Quantum Computing use to sim-
ulate possible solutions?
A. it allows technological systems to per-
ceive their environment, to relate to it. A. Superposition and entanglement
B. It serves to later share those images B. Some hardware
on the same platform. C. It used magic
C. It is based on the use of qubits instead D. none of above
of bits, and gives rise to new logic gates.
23. Which company has a quantum computer

NARAYAN CHANGDER
D. It deals with the set of specifications that we can use through their website?
that serve to define how, when and what
is stored. A. Microsoft
B. IBM
18. When the information is between 0 and 1
C. Apple
in a quantum computer, what do we call
this? D. Google
A. Same position 24. Why are we not able to use quantum com-
B. Different position puters in our homes? Select TWO reasons.
A. It needs to be completely isolated
C. Superposition
B. It is too expensive
D. Ordinary position
C. It is too heavy
19. Who is the father of Quantum Comput- D. It has to be kept at absolute zero tem-
ing? perature
A. David deutsch
25. What can quantum computers be used for?
B. Charles Babbage Select TWO.
C. George Boole A. Homework
D. Gordon E Moore B. Artificial Intelligence
C. Google Docs and Slides
20. What do we call the pieces of information
in a quantum computer? D. Simulations/Predictions
A. Bits E. Computer games

B. Bytes 26. Quantum computers are very good at deal-


ing with
C. Qubits
A. Certainty
D. Qubytes
B. Uncertainty
21. Which company first used quantum com- C. Reliability
puting?
D. Clarity
A. IBM
27. Which pulse is used to switch on and off
B. Google
the Coulomb-blockade configuration in the
C. Amazon bracket current-detected ESR experiment?
D. Alibaba group A. ac magnetic-field pulse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1099

B. dc magnetic-field pulse 29. Which pulse is used to induce electrically


driven spin resonance?
C. ac gate-voltage pulse

PRACTICE BOOK» NOT FOR SALE


A. dc magnetic-field pulse
D. dc gate-voltage pulse
B. ac magnetic-field pulse
28. If a homogeneous electric field acts on a C. dc gate-voltage pulse
1D quantum harmonic oscillator, then the D. ac gate-voltage pulse
oscillator ground-state wave function
30. What is a superposition?
A. becomes narrower
A. plotting graphics
B. becomes broader
B. Quantum calculation
C. is shifted to a new equilibrium position C. combination of two states
D. does not change at all D. None of these

11.5 Virtual and Augmented Reality


1. The Software Library for building AR is? C. cure cancer
A. Unity D. treat insomnia
B. Unreal Engine 5. on AR Cameras on mobile phones have the
C. Augment Desktop ability to examine the environment and ac-
D. ARToolkit quired data, as well as being able to locate
physical items and objects
2. What Type of AR/VR is described below:A
A. Real
person using a Snapchat filter.
B. Count Dan may
A. Augmented
C. flat
B. Fully-immersive virtual
D. none of above
C. Non-immersive virtual
D. Filter 6. Define Augmented reality.
A. Your own reality that you dream of.
3. What Type of AR/VR is described below:A
student scans an item in the real world and B. AR is a developed version of the real
their phone tells them what it is. world shown by technology such as visual
elements, sound or any sensory features
A. Augmented
C. A reality that you use goggles that
B. Fully-immersive virtual
make you feel you are some where else
C. Non-immersive virtual
D. Map D. none of above
4. Another use of augmented reality in 7. Which one is to enchance of your real
medicine is to world with a set of magical virtual objects
A. treat phobias. in it?
B. operate on living things. A. Virtual Reality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1100

B. Augmented Reality C. VR is a technology used for gaming,


C. Sensorama while AR is a technology that projects
computer-generated augmentations on
D. none of above top of reality
8. What is Google Maps? D. VR is a technology that immerses the
A. An application that enhances the user in a digital environment, while AR is
search experience a method used to render real-world data
and present it intuitively

NARAYAN CHANGDER
B. An ever-expanding VR community
where you can explore, create and defy 12. Once the Upload operation succeeds, a
physics and reality will be displayed on the screen.
C. An AR app that enhances the search ex- A. Picture
perience with digital directions on top of
the real world B. Image

D. A 360-degree audio-visual 4d simula- C. QR code


tion D. Video
9. Choose the right statement about Aug- 13. What is Augmented Reality?
mented reality
A. Replaces the world with a digital expe-
A. Only enhances a fictional reality rience
B. Enhances both the virtual and real B. digital reality
world
C. Adds digital characters to real back-
C. Completely virtual
grounds
D. Altered version of reality where data
D. none of above
or 3D images of objects are overlaid over
the real world. 14. What VR stands for?
10. How is augmented reality used in watch- A. Virtual Reality
ing a football game?
B. Virtual Radical
A. The scoreboard
C. View Reality
B. Replays
D. none of above
C. Yellow 1st Down Marker
D. For the coaches to communicate 15. Which of the following is NOT a factor of
student collaboration in AR-based experi-
11. What is the difference between VR and ences?
AR?
A. Communication through non-verbal
A. VR is a technology that projects cues
computer-generated augmentations on
B. Use of physical objects
top of reality, while AR uses headsets to
create a simulator environment C. Switch between looking at a computer
screen and looking at peers
B. VR is a technology that extends reality,
while AR is a technology that creates real- D. Virtual content and their peers in the
ity same place

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1101

16. Augmented reality experiences can be en- C. Window on world Virtual Reality
abled through which of these mediums? D. none of above

PRACTICE BOOK» NOT FOR SALE


A. Laptops
21. What is the most popular Augmented Re-
B. Smartphones
ality application?
C. Smart boards
A. Snapchat
D. All of the above
B. Player Unknown Battleground (PUBG)
17. Sensorial modalities includes visual, audi- C. Pokemon Go
tory, , smell and taste.
D. Among Us
A. acoustic
E. Fall Guys
B. tactile
C. ocular 22. If a Character is continuously turning and
moving in four directions, it means charac-
D. scent ter is moving in a Path.
18. Hardware A. Circular
A. components for augmented reality B. Straight
are:processor, display, sensors and input C. Straight with four points
devices
D. Square
B. Various technologies are used in Aug-
mented Reality rendering including optical 23. The A in David Zeltzer’s AIP cube stands
projection systems, monitors, hand held for?
devices, and display systems worn on the
A. Automatic
human body
B. Alternative
C. (SAR) augments real world objects and
scenes without the use of special displays C. Aptitude
such as monitors, head mounted displays D. Autonomy
or hand-held devices
D. Displays employ a small display that 24. In the 1980’s how much was a VR head-
fits in a user’s hand set worth?
A. $300
19. A person who writes a code for VR
B. $25
A. Programmer
C. $49, 000
B. Author
D. $100, 000
C. User
D. none of above 25. Which movie is not about vir-
tual/augmented reality.
20. Which Virtual Reality is a perception of
A. Star Wars
being physically present in a non-physical
world? B. Ready Player One
A. Immersive Virtual Reality C. The Matrix
B. Non Immersive Virtual Reality D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1102

26. What is Facebook Horizon? D. none of above


A. A technology used for gaming
31. The article discussed four difficulties in us-
B. An AR app that enhances the search ex- ing AR for education. Which of the follow-
perience ing was NOT mentioned as a difficulty?
C. An ever-expanding VR community A. Investment Costs
where you can explore, create and defy
B. Student Engagement
physics and reality
C. Lack of Content-Creation Tools

NARAYAN CHANGDER
D. A platform used to catch Pokemon
D. Limited Research
27. Do you see yourself using AR in your class-
rooms? E. Technology Learning Curves
A. Yes 32. When was augmented reality invented?
B. Maybe A. 2007
C. No B. 1854
D. What is AR?
C. 1979
28. Why does virtual reality enhance instruc- D. 1957
tion?
A. It tally’s rewards to help with class- 33. What was the author’s purpose in writing
room management this book?

B. It allows teachers to communicate A. to persuade companies to invest more


with parents money in virtual reality
C. It provides a deeper understanding B. to promote a growing technology and
with realistic 3D imagery show its many uses
D. All of the above C. to caution readers who are becoming
too reliant on technology
29. The purpose of the section “Learning by
D. to show the many ways virtual reality
Viewing and Doing” is to .
has changed the gaming industry
A. discuss the potential dangers in using
virtual reality 34. App Publishing
B. defend educational tools that were A. An open-source operating system for
used before virtual reality mobile devices created by Google
C. show the different ways virtual reality B. An AR app such as Layar or Aurasma
can enhance education that is designed to provide Augmented Re-
D. promote learning by going outside and ality viewing experiences across multiple
interacting with the world brands and content types
C. is the changing the way we interact
30. Choose the right topic of this training
with the world, one aura at a time along-
A. Mixed reality in education side their catalogue by embedding our
B. Augmented reality in education technology into the argos app
C. Augmented and Virtual Reality in edu- D. Allows users to download the app via
cation the Apple App Store and/or Google Play

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1103

35. Augmented reality (AR) provides features 40. Augment in latin word call?
that are A. Augere

PRACTICE BOOK» NOT FOR SALE


A. Visual, interactive, and 3D B. Agment
B. Collaborative, virtual, and simulated C. Apricus
C. Computer-generated, sensory, and vir- D. Aurora
tual
E. Imber
D. Sounds, sensory, and cost-efficient
41. A person using a zoom filter.
36. What are the advantages of VR
A. Augmented
A. Are a fun and interactive way of learn-
ing B. Fully-immersive virtual

B. Costly C. Non-immersive virtual


D. Filter
C. connection Problems
D. not flexible 42. What is the benefit of the VR film Too
Much Information?
37. What Does VR Mean?
A. It shows teachers how too much vir-
A. Vibrant Reality tual reality can harm students.
B. Augmented Reality B. t shows non-autistic children what it’s
C. Virtual Reality like to live with autism.
D. Virtual Real Estate C. It cautions educators what can happen
when there’s too much virtual reality.
38. Mixed reality D. It promotes the country’s most popu-
A. Allows you to manipulate virtual ob- lar virtual reality program.
jects in your physical environment.
43. What group was one of the first to start
B. Allows you to manipulate virtual ob- using Augmented Reality?
jects in a computer generated simulation.
A. Doctors
C. Allows you to see but not manipulate
virtual objects in your physical environ- B. The Military
ment. C. Businessmen
D. Allows you to see but not manipulate D. Engineers
virtual objects in a computer generated
simulation. 44. VR stand for
A. virtual reality
39. The company where Russell McGraw
works designs VR and AR products for all B. virtual realism
of the following fields, EXCEPT C. vibration reality
A. medicine D. victoriously real
B. fashion 45. What is the software that we use to cre-
C. religion ate AR in our training?
D. science A. Walking UP AR Studio

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1104

B. WakingApp AR Studio A. Amazon Prime Video


C. WalkingApp Studio B. Netflix
D. Walking AR C. Hulu
D. YouTube
46. What creates artificial objects in the real
world? 51. A student scans an item in the real world
A. Virtual Reality and their phone tells them what it is.
A. Augmented

NARAYAN CHANGDER
B. Augmented Reality
C. Genetic Engineering B. Fully-immersive virtual
D. Artificial Intelligence C. Non-immersive virtual
D. Map
47. A flight simulator allows a pilot to do all
these, except 52. Avatar
A. take off and land an airplane for real. A. is the changing the way we interact
B. recreate the landscape the pilot sees. with the world, one aura at a time along-
side their catalogue by embedding our
C. practice flying virtually in all kinds of technology into the argos app
weather.
B. A person’s online representation as a
D. to handle every sort of emergency. character, whether in the form of a 2-D or
48. What is one advantage of using virtual re- 3-D image or simply through text
ality in certain health care fields? C. Is the ability of the user to interact
with an application
A. Patients can work on their own ill-
nesses. D. Various technologies are used in Aug-
mented Reality rendering including optical
B. It is more accurate than non-virtual
projection systems, monitors, hand held
treatments.
devices, and display systems worn on the
C. Patients and doctors can review health human body
records together.
53. Read the central idea statements below.1.
D. Doctors’ visits can be like video
The Leaders Sport Business Summit met to
games.
discuss the future of mixed reality.2. The
49. A game based on which animated franchise development of mixed reality has the po-
propelled augmented reality (AR) into the tential to transform sports.3. New tech-
mainstream in recent years? nology can help athletes train and simulate
their experience for fans.4. New sensors
A. Super Mario
are making it possible to train athletes in
B. PokemonGo! sit-down sports as well.Which two state-
C. World of Warcraft ments accurately reflect the article’s cen-
tral ideas?
D. Fortnite
A. 1 and 3
50. Which popular on-demand video stream- B. 1 and 4
ing service has an app on the Gear VR
for watching all your favourite shows and C. 2 and 3
movies? D. 2 and 4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1105

54. How are all types of digital reality the C. Immersive technologies that enable
same? users to experience digitally rendered
content in both physical and virtual

PRACTICE BOOK» NOT FOR SALE


A. They block out the real world.
B. They create a completely artificial en- D. none of above
vironment.
59. What are the 3 types of VR?
C. They allow users to interact with com-
A. Immersive, 3D, non-immersive
puter programs.
B. Immersive, semi-immersive, non-
D. They have virtual objects and real ob-
immersive
jects that interact.
C. Digital, semi-immersive, projective
55. What are the 3 type of virtual reality
(VR)? D. 3D, non-immersive, digital

A. Immersive, semi-immersive, non- 60. Which of the following is not a benefit of


immersive Augmented Reality?
B. Immersive, 3D, non-immersive A. Allow students to experiment in a
C. 3D, non-immersive, digital safer environment than handling chemi-
cals in real life
D. Digital, semi-immersive, projective
B. “Triggers” or “Markers” (i.e. images,
56. The haptic feedback will allow objects, locations and/or actions that trig-
A. users to experience fear. ger an action on the device screen via the
AR app)
B. people to feel the touch in the real
world. C. Save on budget

C. users to disconnect from the real D. Improving understanding of abstract,


world. spatial geometric concepts through ma-
nipulation and multi-angle observation of
D. users to perceive different odors. virtual 3D objects
57. A teacher of a design class has her stu- 61. What role does D-BOX Technologies play
dents use an app to see what different in the development of mixed reality in
fixtures and paint colors would make the sports?
classroom look like.
A. The company pioneered the first vir-
A. Augmented tual reality suits and headsets that were
B. Fully-immersive virtual used to train athletes.
C. Non-immersive virtual B. The company designs moving seats
D. Semi-Virtual that use data and sensors to recreate the
experience of live sports.
58. What is augmented and virtual reality in C. The company premiered plans for aug-
education? mented stadiums that will overlay graph-
A. A computer program or software appli- ics on stadium fields.
cation designed to run on a mobile device D. Both details reflect the view that the
B. An artificial environment that is cre- development of new VR technology can let
ated with software spectators feel like athletes.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1106

62. Who invented AR C. Monitor


A. Elon musk D. Mouse
B. Stephen Hawking 68. different types of VR styles
C. Bill nelson A. AR(augmented reality)
D. Morton Heilig B. MR(mixed reality)
63. A graphic design software developed by C. AR(awesome reality)
Trimble, is?

NARAYAN CHANGDER
D. VR(very real)
A. SketchUP
69. how is the headset connected to the com-
B. Revit puter?
C. Cinema 4D A. HDMI & USB
D. Blender B. USB
64. A person sees a 3D picture on the ID card C. HDMI
A. Hologram D. AUX
B. Fully-immersive virtual 70. Which of the following block/blocks
C. Non-immersive virtual is/are responsible for a same character
D. 3 D picture to do two different things, at the same
time?
65. How do most people use AR currently? A. Run independently
A. Their computers B. Run Parallel
B. Their phones C. Both of them
C. Their TV’s D. None of them
D. AR Goggles
71. The following is the correct statement re-
66. Which of the following is NOT a listed ben- garding Mixed Reality (MR).
efit of augmented reality (AR) in Educa- A. MR transports users into a Virtual Envi-
tion? ronment (VE) and allows them to interact
A. Bringing Opportunities for Collabora- within it
tion B. MR combines digital content with the
B. Increasing Accessibility to Educational real world in real time but there is no in-
Content teraction
C. Improving Student Academic Achieve- C. MR combines Virtual Reality and Aug-
ment mented Reality technologies
D. Appealing to Multi-Modal Learning D. MR is a software program or operating
system that requires internet
67. Which of the following is NOT a way for a
user to input information into Virtual Re- 72. Several 3D panoramas connected by tran-
ality? sitions are called
A. Hand Controller A. multimedia
B. Keyboard B. presentation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1107

C. 3D tour to the real world with the help of com-


D. video clip puter webcams, cameras, and even special
glasses.

PRACTICE BOOK» NOT FOR SALE


73. In order to view the Project in the appli- A. AR
cation, it has to be exported. In thiscase,
B. RA
you need to go to
C. VR
A. File > Export Project > To Cloud.
D. AND
B. To Cloud > Export Project > File.
C. Scene > Export Project > To Cloud. 78. What is an Avatar?

D. Asset> Export Project > To Cloud. A. a digital self


B. a gamer
74. AR Video Playback
C. a game
A. A video anchored in 3D space (typically
D. none of above
superimposed on an Image Target) while
maintaining the view of the physical envi- 79. Illusion of reality is created by fooling hu-
ronment as opposed to full screen play- man by using technology to generate
back artificial sensations
B. An image or graphic superimposed A. perception
over an Image Target
B. presence
C. The image recognized by the App,
C. imagination
which launches the AR experience
D. interaction
D. allows for the projection of video con-
tent into live environments 80. The following is the correct statement re-
garding Virtual Reality (VR).
75. What model do you need for Augmented
reality A. VR transports users into a Virtual Envi-
ronment (VE) and allows them to interact
A. 1D within it
B. 4D B. VR combines digital content with the
C. 2D real world in real time
D. 3D C. VR combines Mixed Reality, Aug-
mented Reality and Extended Reality tech-
76. What is virtual reality? nologies
A. A technology that projects computer- D. VR is a software program or operating
generated augmentations on top of reality system that requires internet
B. A technology that extends reality 81. Google Voice, Cortana, Bixby, Alexa are
C. A technology that creates reality products of this type of AI:
D. A technology that uses headsets to cre- A. Machine Learning
ate a simulator environment B. Deep Learning

77. technology that is able to insert informa- C. Natural Language Processing


tion into the virtual world and display it D. Internet of Things

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1108

82. Which is not mentioned as one of the chal- 87. Augmented reality experiences can benefit
lenge students to (choose 3 elements)
A. Dissemination of fake information A. enhance engagement
B. Augmented reality can distort people’s B. raise attention
lives
C. add fun to study
C. Privacy problems of the Augmented re-
ality D. improve collaborative work

NARAYAN CHANGDER
D. Unrealistic Expectations E. practice sports

83. Filters 88. What are Snapchat filters?


A. Adds computer-generated content to A. One of the best examples of AR
the user’s view of the world, giving them
B. A technology that creates reality
a composite view.
B. An augmented reality experience in C. An application that enhances the
SnapChat that uses the user’s face as the search experience
trigger image. D. A technology used for gaming
C. an app that allows you to create AR
89. Which movie use Augmented Reality to
D. A three dimensional computer- produce their movie?
generated simulation that people can ex-
perience with special equipment. A. Avatar
B. Iron Man
84. How does an AR app work?
C. Naruto
A. Lets you view 360 objects.
B. Augmented reality, allow users to D. Mr Bean Animation
place life size models around you
90. Mark the correct 3d environment platform
C. Images come out of your camera from the following which is used to create
D. none of above AR/VR projects
A. Tinkercad 3D
85. An example of non-immersive VR device
is B. Unity 3D
A. An IMAX C. CoSpaces edu
B. An iPad D. None
C. A virtual reality headset
91. Aura
D. A screen projection
A. Allows users to download the app via
86. Who is considered as the father of Virtual the Apple App Store and/or Google Play
Reality?
B. Basic building blocks
A. Mark Zuckerberg
C. images, videos, animations or even 3D
B. Ivan Lendl models that appear whenever Cospaces
C. Ivan Sutherland sees an image that it recognises
D. Steve Jobs D. Augmented reality actions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1109

92. Which of the following is not a type of im- 97. Interactivity


mersive technology?
A. A program or instructions that give di-

PRACTICE BOOK» NOT FOR SALE


A. Virtual reality rections to the computer
B. Augmented reality B. Is the ability of the user to interact
C. Mixed reality with an application
D. Sensory reality C. a movie with images having three di-
93. Which of these is not a type of augmented mensional form or appearance
reality? D. is the changing the way we interact
A. Location-based with the world, one aura at a time along-
side their catalogue by embedding our
B. Posture-based
technology into the argos app
C. Superimposed
D. Object recognition 98. To activate the marker database that we
created, we must enter the development
94. Virtual Reality is a high-end user- key on the menu
computer interface that involves and
interactions through multiple sensorial A. Vuforia Engine
channels. B. AR Camera
A. real-time simulation C. Target Key
B. control
D. Vuforia Configuration
C. environments
D. navigation 99. Which of the following is NOT a constraint
of VR?
95. Chroma Key Video
A. It can only be used for Science and Ge-
A. An image or graphic superimposed
ography
over an Image Target
B. A video anchored in 3D space (typically B. It can be costly
superimposed on an Image Target) while C. Developing experiences can be time
maintaining the view of the physical envi- consuming
ronment as opposed to full screen play-
D. Resistance to new technology
back
C. a technology that superimposes a 100. Trigger Image
computer-generated image, video or 3D
model on a user’s view of the real world A. A distinct image that the device can
recognise through the camera and track.
D. allows for the projection of video con-
tent into live environments B. How the device anchors digital content
to the real world.
96. Pokemon Go is an example of
C. Digital content that is superimposed
A. Virtual Reality
over a trigger image.
B. Augmented Reality
D. A three dimensional computer-
C. Mixed Reality generated simulation that people can ex-
D. Extended Reality perience with special equipment.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1110

101. The importance of augmented and virtual C. A three dimensional computer-


reality in education generated simulation that people can ex-
A. To be advanced from others perience with special equipment.

B. Easy to use D. A distinct image that the device can


recognise through the camera and track.
C. Encourages creative thinking
D. Help students become more involved 107. Who first invented augmented reality?
A. Peter Brown

NARAYAN CHANGDER
102. What type of model is used to get the AR
effect? B. Alan Turing
A. 3D C. Rodrigo Santos
B. 2D D. Morton Heilig
C. animations
108. What is AR stand for?
D. 1D
A. Augmented realive
103. The AR works through successive
stages. B. Application reality
A. 3 C. Application realive
B. 2 D. Augmented reality
C. 4
109. Interactive Video
D. 5
A. A video with features, such as
104. is defined as the sense of being in an hotspots, that call for the user to inter-
environment. act with the video
A. Telepresence B. A video anchored in 3D space (typically
B. Immersion superimposed on an Image Target) while
maintaining the view of the physical envi-
C. Presence ronment as opposed to full screen play-
D. Perception back

105. What does the abbreviation AR stand C. An image or graphic superimposed


for? over an Image Target

A. Augmented reality D. An AR app such as Layar or Aurasma


that is designed to provide Augmented Re-
B. Active reality ality viewing experiences across multiple
C. Approved reality brands and content types
D. Aqualung reality
110. what does VR stand for?
106. Tracking A. Very Right
A. Digital content that is superimposed
B. Vertal Reality
over a trigger image.
C. Virtual Reality
B. How the device anchors digital content
to the real world. D. Virtual Realty

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1111

111. The following is the correct statement re- A. Smartphones or tablets with internet
garding Augmented Reality (AR). connection

PRACTICE BOOK» NOT FOR SALE


A. AR transports the user into a Virtual B. No extra tools required
Environment (VE) and does not allow inter- C. Elevated student engagement
action within it
D. Accessible learning
B. AR combines digital content with the
real world in real time 116. What is Virtual Reality?
C. AR combines Mixed Reality, Virtual Re- A. Real vegetables
ality and Extended Reality technologies B. Replace your vision of the world with a
D. AR is a software program or operating digital version
system that requires the internet C. Is a type a reality that is mixed
D. none of above
112. VR may be useful for students with spe-
cial needs because 117. The Google Android Developer Tools
A. It allows them to escape from difficult (ADT) plugin for Eclipse, termasuk ke
social situations dalam:

B. They can attend class from home A. ADT Bundle


B. Paket standar umum pengembangan
C. Teachers can develop personalized
di android
lessons for students
C. AR Software Components
D. none of above
D. Aurasma
113. AR Overlay
118. According to the section “Brave New Re-
A. A video anchored in 3D space (typically alities, “ workplaces and schools will use
superimposed on an Image Target) while more virtual reality because it’smore
maintaining the view of the physical envi-
A. entertaining
ronment as opposed to full screen play-
back B. complex
B. An image or graphic superimposed C. affordable
over an Image Target D. informative
C. allows for the projection of video con- 119. What is the sixth sense?
tent into live environments
A. Proportion
D. The image recognized by the App,
B. Proprioception
which launches the AR experience
C. Procreation
114. AR stands for D. Procratiotaction
A. Augmented reality
120. What is the general term included AR and
B. Augmented realism VR
C. Application reality A. combined reality
D. Answers remembered B. mixed reality
115. AR is a must for this generations’ stu- C. compound reality
dents EXCEPT D. corporate reality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1112

121. A fitness fanatic using a treadmill, and a B. Audio


projected image on the screen in front of C. Video
them.
D. Graphics
A. Augmented
B. Fully-immersive virtual 126. Abbreviation of IoT
C. Non-immersive virtual A. Internet of Technology
D. Hologram B. Internet of Telecommunications

NARAYAN CHANGDER
C. Internet of Things
122. AR stands for what?
D. Internet of Thinking
A. Augmented reality
B. Application reality 127. How will we interact with technology in
the future?
C. Augmented realive
A. A Keyboard
D. Application realive
B. Voice
123. The main similarity of virtual reality and
C. Eyes
augmented reality is
D. Thoughts
A. they are designed to alter the view of
the world. 128. Which statement would Doug Liddle be
B. they are only used for entertainment. MOST likely to agree with?
C. people use them similarly. A. Experiencing space through virtual re-
ality is something everyone should have
D. none of them has potential future ap-
the chance to do.
plications.
B. Experiencing space through virtual re-
124. Augmented Reality vs Virtual Reality ality is not as cool as experiencing it the
A. One enhances one’s current percep- way astronauts do.
tion of reality, whereas in contrast, the C. Experiencing space through virtual re-
other replaces the real world with a stim- ality is not something that will happen for
ulated one. a long time.
B. Interaction with virtual environment D. Experiencing space through virtual re-
by conventional means and can be done ality is a great way for companies to make
in real time a lot of money.
C. One ensures you are in reality,
129. What does AR stand for?
whereas in contrast, the other is the real
world. A. Augmented reality
D. Considered to be the father of video B. Augmented-virtual reality
games because he created the interactive C. Augumented reality
television
D. none of above
125. Multimedia elements that give visual
emphasis to an information presentation 130. What game has Augmented Reality
are? A. Pokemon
A. Tex B. Netflix

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1113

C. Phone games C. Projection-based AR


D. PlayStation D. Superimposition-based AR

PRACTICE BOOK» NOT FOR SALE


131. Augmented Reality Viewer app
136. Augmented reality devices
A. App that allows users to download
the app via the Apple App Store and/or A. mobile devices
Google Play B. ticker
B. An AR app such as Layar or Aurasma C. helmet
that is designed to provide Augmented Re-
ality viewing experiences across multiple D. Playstation VR
brands and content types
137. The author indicates that one of the plea-
C. A program or instructions that give di-
sures of video games is they allow players
rections to the computer
to .
D. Images, videos, animations or even 3D
models that appear whenever Cospaces A. play only combat games
sees an image that it recognises B. wear headsets
132. What type of model that you need to use C. squeeze into full-body game suits
in order to get the AR effect?
D. get out of the real world
A. 3D
B. 2D 138. Nuke includes software in engineering
C. 0D A. Marker based Tracking
D. 1D B. Motion Tracking
133. Who create sensorama? C. Tracking System
A. Ivan Sutherland D. Markerless Tracking
B. Lewis Capaldi
C. Jaron Lanier 139. According to the definition, Virtual Real-
ity simulates
D. Dead Heilig
A. pieces of our world or imagined worlds
134. The layer used to manage game assets,
is? B. water and air

A. Application Layer C. the emotional aspect of being


B. AR Layer D. the National Football league
C. OS/Third Party Layer
140. Who is being pointed as godfather of VR
D. Tracking Layer display?
135. Cab services use this feature to locate A. Mortan Heilig
and reach you by generating maps and di-
rections. B. Martin Alves

A. Marker-based AR C. Ivan Sutherland


B. Markerless AR D. Mark Vector

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1114

141. Android 145. Virtual reality


A. An open-source operating system for A. can be experienced using only a smart-
mobile devices created by Google phone or a tablet.
B. Allows users to download the app via B. doesn’t feel real.
the Apple App Store and/or Google Play C. is a copy of a real-world environment.
C. Augmented reality actions D. takes the viewer into the real world.
D. A program or instructions that give di-

NARAYAN CHANGDER
146. Who invented the first VR device?
rections to the computer
A. Mark Zuckerberg
142. Which of the following is an example of B. Morton Heilig
a prototype?
C. Jaron Lanier
A. a Ford automobile just off the assem-
D. Stephen Spielberg
bly line
B. a written idea for a new automobile 147. Virtual reality device

C. a virtual reality program that’s been A. smart glasses


used for years B. interactive stand
D. a model car that is tested before going C. interactive kiosk
into production D. standalone VR glasses
143. What is the meaning of augment? 148. Which of the two options is/are correct?
A. To go 1) Camera can be navigated as a charac-
ter using arrow keys.2) Gravity can act on
B. To decrease camera under certain conditions.
C. To add A. Both are incorrect
D. To increase B. Both are correct
E. To less C. Only 1 is correct
D. Only 2 is correct
144. Define AR
A. The result of combining real and virtual 149. What is VR?
worlds to create new environments and vi- A. Vendor Reality
sualizations where physical and digital ob-
B. Virtual Room
jects coexist and interact in real time.
C. Virtual Reality
B. An environment that augments the
real world with real-time digital data. D. There’s Roll
C. The result of introducing any sensory 150. The command to add a canvas in Unity
data into the field of perception in order is
to supplement information about the en- A. UI-Canvas
vironment and improve the perception of
information. B. Game Object-Canvas

D. The philosophical position that reality C. Vuforia Engine-Canvas


is a simulation. D. Image-Canvas

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1115

151. When was sensoroma created? 156. What device we can use for apply Virtual
A. 1957 Reality system?

PRACTICE BOOK» NOT FOR SALE


A. Computer
B. 1962
B. Scanner
C. 1963
C. Smartphone
D. 1998
D. VR Glasses
152. Virtual Reality
157. Why did the designers of the Atlanta
A. A three dimensional computer- Braves’ stadium usevirtual reality?
generated simulation that people can ex-
perience with special equipment. A. to detect and make changes to certain
problems before construction
B. Digital content that is superimposed
B. to see how entertaining it would be to
over a trigger image.
see a baseball game using virtual reality
C. How the device anchors digital content
C. to entertain clients in a way that had
to the real world.
never been done before
D. A distinct image that the device can
D. to see how baseball would be played
recognise through the camera and track.
when the players used virtual reality
153. Where is augmented reality being used? 158. How many level does AR have?
A. In NASA A. 9
B. In America B. 4
C. In every life situation C. 3
D. In computers D. 2
E. In hospitals 159. Space VR is an example of AR applied to
fields
154. What was the problem with IKEA’s aug-
mented reality app, IKEA Place? A. Military
A. It stalked the users camera and sold B. Sport
their data. C. Space
B. It was expensive to download. D. Health
C. It was not available on android de-
160. Which definition best fits “Augmented
vices.
Reality”?
D. It broke the users device. A. Technology that turns physical objects
into digital objects
155. Choose the example of Augmented Real-
ity application for students B. Technology that overlays digital infor-
mation on top of real world items
A. Quiver
C. Technology that completely immerses
B. Pokemon GO
users in a new digital environment
C. Google Translate D. Technology that can achieve a human-
D. Arloon Plants level understanding of images

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1116

161. Augmented Reality 166. What is the main way we interact with
A. Adds computer-generated content to technology currently?
the user’s view of the world, giving them A. A Keyboard
a composite view. B. Voice
B. A distinct image that the device can C. Eyes
recognise through the camera and track.
D. Thoughts
C. How the device anchors digital content

NARAYAN CHANGDER
to the real world. 167. What is AR?
D. Digital content that is superimposed A. Augmented Reality
over a trigger image. B. Action Reality
162. Which VR headset is most expensive? C. Arjen Robben
A. PlayStation D. Anua R
B. Oculus Rift 168. Can we code in Cospaces Edu, just by
C. Computer dragging the 3D characters to the Environ-
ment?
D. Samsung
A. Yes
163. What are immersive technologies?
B. No, We should enable coding for each
A. Technologies used for gaming characters
B. Technologies that extend reality C. In some conditions, we can.
C. Technologies used for education D. Information is insufficient.
D. Technologies that create reality 169. You need to scan the code with the to
164. How many benefits of AR? load and view the AR experience you’ve
created.
A. 3
A. WakingApp AR Studio mobile applica-
B. 2 tion
C. 4 B. WakingApp AR Studio website
D. 5 C. WakingApp AR Studio email
165. Pokemon Go! D. WakingApp AR Studio image
A. An early example of an augmented re- 170. What are the 4 difficulties in using aug-
ality game that put digital animals into the mented reality (AR) in education?
real world.
A. Lack of content-creation tools, invest-
B. Digital content that is superimposed ment costs, technology learning curves,
over a trigger image. limited research
C. Adds computer-generated content to B. Digital divide, limited funding, limited
the user’s view of the world, giving them research, functionality issues
a composite view. C. Access to resources, lack of flexibility,
D. How the device anchors digital content lack of interpersonal connections, invest-
to the real world. ment costs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1117

D. Investment costs, functionality issues, 175. marker based AR is belong to which


digital divide, lack of content-creation level?
tools

PRACTICE BOOK» NOT FOR SALE


A. 1
171. HP Reveal B. 2
A. is the changing the way we interact C. 3
with the world, one aura at a time along-
D. 4
side their catalogue by embedding our
technology into the argos app
176. An example of an immersive VR device is
B. These components for augmented re-
A. An IMAX
ality are:processor, display, sensors and
input devices B. An iPad
C. Various technologies are used in Aug- C. A virtual reality headset
mented Reality rendering including optical D. A screen projection
projection systems, monitors, hand held
devices, and display systems worn on the 177. Overlay
human body
A. A distinct image that the device can
D. Displays employ a small display that recognise through the camera and track.
fits in a user’s hand
B. How the device anchors digital content
172. Which of the following is NOT a means to the real world.
for a user to supply input to Virtual Real- C. Digital content that is superimposed
ity? over a trigger image.
A. Hand Controller
D. A three dimensional computer-
B. Keyboard generated simulation that people can ex-
C. Monitor perience with special equipment.

D. Mouse 178. According to Craig Barr, Virtual Reality


simulates
173. It can be inferred that this type of tech-
nology A. pieces of our world or imagined worlds
A. is very expensive B. water and air
B. is very difficult to operate C. the emotional aspect of being
C. will be for sale everywhere D. the National Football league
D. will continue to evolve in the future.
179. Mixed Reality is
174. Which of the following ideas did the au- A. When virtual world combined with real-
thor develop LEAST in the article about world
how virtual reality is changing sports?
B. When environment is fully computer
A. the opinions of experts in the field generated
B. its out-of-reach cost for most people C. When virtual object overlaid on real-
C. the sensory experience it can provide world environment
D. its potential to improve even more D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1118

180. What kind of movement should your VR 184. Augmented reality (AR) can turn abstract
subjects have? concepts into realistic experiences by mak-
ing abstractions appear as real objects in
A. Complete and total freedom of move-
the user’s world and allowing them to in-
ment.
teract with them naturally. Which type of
B. The viewer should be in a central loca- learner will benefit most from the use of
tion and movement be limited. augmented reality?
C. The viewers movement is not impor- A. Auditory learner

NARAYAN CHANGDER
tant. B. Logical/mathematical learner
D. The viewer should be able to run in real C. Kinesthetic/visual learner
life with a headset on.
D. All of the above
181. AR works by projecting artificial light
185. Why is investment costs an issue when
onto a real surface. In some cases it al-
using AR for education?
lows the user to interact with it. It’s like
the holograms you see in sci-fi genre films A. Schools have to acquire technologies
like Star Wars B. It cost money to train teachers
A. Projection Based Augmented Reality C. Maintenance cost should be consid-
B. Superimposition Based Augmented Re- ered
ality D. All of the above
C. Markerless Augmented Reality 186. When was the VR headset made?
D. none of above A. 1968
B. 2002
182. Image Target
C. 1945
A. The image recognized by the App,
which launches the AR experience D. 1977
B. An image or graphic superimposed 187. What Type of AR/VR is described be-
over an Image Target low:A teacher of a design class has her
C. An AR app such as Layar or Aurasma students use an app to see what different
that is designed to provide Augmented Re- fixtures and paint colors would make the
ality viewing experiences across multiple classroom look like.
brands and content types A. Augmented
D. a technology that superimposes a B. Fully-immersive virtual
computer-generated image, video or 3D C. Non-immersive virtual
model on a user’s view of the real world
D. Semi-Virtual
183. A person using a Snapchat filter. 188. What is a 360 video?
A. Augmented A. Takes video from all directions
B. Fully-immersive virtual B. It allows to watch 360 things
C. Non-immersive virtual C. Is a wider rectangle picture view
D. Filter D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1119

189. AR technology allows students to inter- D. To criticize the use of both virtual and
act with the physical world by augmented reality.

PRACTICE BOOK» NOT FOR SALE


A. Moving around to change perspectives 194. This game launched augmented reality
B. Moving closer/further to change scale (AR) into the spotlight in recent years
C. Select virtual objects by pointing to A. Super Mario
them B. Pokemon
D. All of the above C. World of Warcraft
190. What is the main difference between D. Fortnite
merged reality andaugmented reality?
195. Who invented virtual reality?
A. the use of goggles, headwear, or
smartphones A. Ivan Sutherland

B. the interaction of items that are virtual B. Bill Evans


and real C. Steve Lesler
C. the ability to read books and translate D. Amanda Sheldons
them
196. What Type of AR/VR is described be-
D. the ability of computer software to in- low:A fitness fanatic using a treadmill, and
put everything you see or hear a projected image on the screen in front of
191. The screen which appear as a VR back- them.
ground is an infinite background? ? ? A. Augmented
A. NO B. Fully-immersive virtual
B. MAY BE C. Non-immersive virtual
C. MAY BE NOT D. Hologram
D. YES 197. Oculus devices like the Quest 2 are exam-
192. ROAR ples of
A. A three dimensional computer- A. VR headset
generated simulation that people can ex- B. AR headset
perience with special equipment. C. Mixed reality headset
B. an app that allows you to create AR D. VR and AR console
C. How the device anchors digital content
to the real world. 198. Software

D. Digital content that is superimposed A. Augmented reality actions


over a trigger image. B. A program or instructions that give di-
rections to the computer
193. What’s the purpose of the talk?
C. a movie with images having three di-
A. To promote the use of virtual reality. mensional form or appearance
B. To define and compare virtual reality D. is the changing the way we interact
and augmented reality. with the world, one aura at a time along-
C. To support the use of augmented real- side their catalogue by embedding our
ity. technology into the argos app

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.5 Virtual and Augmented Reality 1120

199. Identify the device through which data B. Output device


and instructions are entered into a com-
puter C. Input device
A. Software D. Memory

NARAYAN CHANGDER

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
12. Computer Peripherals

12.1 Printers and Scanners


1. Which printer contains a wheel that looks 4. A is two or more computers linked to-
like a flower with raised letters and sym- gether to share files, software, and re-
bols on each petal? sources, such as printers.
A. Inkjet printers A. Laptop
B. Daisy-wheel printer B. Network or Server

C. Dot-matrix printer C. RAM


D. ROM
D. Laser printer
5. What should you do if your dot-matrix
2. Most printers that use the electrophoto- printer output is covered with dots and
graphic process contain how many stan- small smudges?
dard assemblies?
A. Replace the drum.
A. Five
B. Clean the platen
B. Six
C. Clean the printhead
C. Four D. Replace the cartridge
D. Nine
6. At the end of the laser printing process,
3. What Control Panel applet can be used to what is cleaned?
manage printers and faxes in Windows 7, A. Toner
8, 8.1, and 10?
B. Laser head
A. Devices and Printers C. Photosensitive drum
B. Printers and Scanners D. Fuser
C. Printers and Faxes
7. This type of printer relies on a photocon-
D. Printers and Hardware ductive process to work .

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1122

A. Dot-matrix 13. Which of the following printer types use


B. Inkjet a continuous-tone process rather than
dithering to produce an image on paper or
C. Laser other print medium?
D. Thermal A. Impact
8. Which of the following acronyms relate to B. Ink Jet
print resolution? C. Dye-Sublimation

NARAYAN CHANGDER
A. PPM D. Thermal Wax
B. DPI
14. there are two type of output hardcopy and
C. PPI
A. soft copy
D. CMYK
B. printer
9. Which voltage is applied to the paper to C. monitor
transfer the toner to the paper in an EP
D. none of above
process laser printer?
A. +600VDC 15. Which device in an inkjet printer contains
the print head?
B. -600VDC
A. Toner cartridge
C. +6000VDC
B. Ink cartridge
D. -6000VDC
C. Daisy wheel
10. Which type of scanner has built-in WiFi?
D. Paper tray
A. ES-60W
16. What technology does the Flatbed Scanner
B. DS-360W
use?
C. DS-570W
A. Change Copled Device
D. All true
B. Charge Coupled Device
11. You are printing from a dot-matrix C. Charge Copy Device
printer and notice that the characters look
D. Computer Connectivity Device
chopped off at the top. What should you
try adjusting? 17. LPM stands for
A. Toner A. Line paper minute
B. driver B. length per minute
C. Print Head C. lines per minute
D. Drum D. length paper minute
12. DPI stands for what? 18. Select three types of Scanner
A. dots per inches A. Flatbed Scanner
B. dual per integrator B. Sheet-Fed Scanner
C. dot per inches C. Handheld Scanner
D. dual per inches D. Portable Scanner

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1123

19. How is laser printer resolution mea- 24. What is the correct order of the steps in
sured? the EP print process?

PRACTICE BOOK» NOT FOR SALE


A. Color per inch A. Developing, exposing, transferring,
B. Dots per inch fusing, charging, cleaning, processing

C. Pixels per inch B. Charging, processing, exposing, devel-


oping, transferring, fusing, cleaning
D. Bits per inch
C. Processing, transferring, exposing,
20. What happens during the developing stage developing, charging, cleaning, fusing
of laser printing? D. Processing, charging, exposing, devel-
A. An electrostatic charge is applied to oping, transferring, fusing, cleaning
the drum to attract toner particles.
25. If you want a very effective method of
B. Heat is applied to the paper to melt the printing , use a Laser Printer.
toner.
A. spot color
C. The laser creates an image of the page
on the drum. B. full-color images
D. An electrostatic charge is applied to C. complex images
the paper to attract toner particles D. 256-bit color
21. This printer are the most commonly used
26. What is the meaning of PPM?
type of printer and produces hard copy by
spraying ink onto paper? A. paper per minute
A. Inkjet Printer B. print per minute
B. Laser Printer C. pages per minute
C. Dot Matrix Printer D. point per minute
D. Thermla Printer
27. What is the abbreviation for Liquid Crystal
22. What needs to be vacuumed or replaced Display
periodically in a laser printer? A. LCD
A. Ozone filter B. CRT
B. Drum C. VDU
C. Toner cartridge D. none of above
D. Powder
28. Ejecting ink through tiny tubes is the
23. The output on paper or acetate sheets is method of printing for this type of
called printer .
A. printout A. Laser
B. print server B. Inkjet
C. cartridge C. Dot-matrix
D. print D. Impact

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1124

29. PPS MEANS: 34. what is the abbreviation for Visual Display
A. Pages per second Unit

B. Paper per minute A. VDU

C. Print per minute B. LCD

D. Paper print per minute C. CRT


D. none of above
30. Which laser printer component perma-

NARAYAN CHANGDER
nently presses the toner into the paper? 35. In the laser printing process, the uses
A. Transfer corona friction to isolate a single sheet any others
that were picked up.
B. Fuser assembly
A. duplexing assembly
C. Printer controller circuitry
B. separation pad
D. Paper transport assembly
C. transfer roller
31. Apakah jenis-jenis printer bagi 2D D. gearbox
printer?
A. Inkjet Printer, Laser Printer, Dot- 36. This element is heated by tiny resistors or
Matrix Printer electroconductive plates at the end of each
tube in an inkjet printer?
B. Dot-Matix Printer, Point Printer, Jet
Printer A. Ink

C. Dot Printer, Point Printer, Digital B. Toner


Printer C. Toner powder
D. Laser Point Printer, VIrtual Printer, D. Nozzle
Dot Printer
37. Which types of printers are referred to as
E. I don’t know Printer page printers because they receive their
32. The printer is the most popular copy print job instructions one page at a time?
output device (Choose two.)

A. hardcopy A. Daisy wheel

B. softcopy B. Dot matrix

C. hardware C. Inkjet

D. software D. Laser
E. Thermal
33. The term sublimation means to cause
something to change from a solid into a 38. part of computer that print out information
form and then back into a solid. on the paper
A. vapor A. Monitor
B. plasma B. printer
C. crystalline C. mouse
D. liquid D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1125

39. What is a plotter? A printer that C. M1110


A. uses a group of pins to create pre- D. M2140

PRACTICE BOOK» NOT FOR SALE


cise dots
45. What kind of printer is used with multi-
B. uses ink and fine pens held in a car- part forms such as those with point of sale
riage to draw detailed designs on paper (POS) machines?
C. generates an image by spraying A. Impact
tiny, precise drops of ink onto the paper
B. Thermal
D. uses laser beam to fix the ink to the
paper C. Inkjet
D. Laser
40. What does the primary corona wire
charge? 46. Which type of printer is the most complete
A. The fuser assembly in terms of features and capabilities?
B. The paper A. for 180
C. The toner B. L4410
D. The drum C. L5190
D. M6410
41. part of computer that show information on
the screen 47. A dye-sublimation printer uses this
A. monitor method of color printing .?
B. printer A. PPM
C. keyboard B. RGB
D. none of above C. CMYK
D. LEDS
42. The fuser assembly in a laser printer is al-
most always separate from the 48. This is high speed printer that prints one
A. laser head line at a time. It is used when large quan-
tity of output is required as it produces the
B. gearbox
quick output.
C. drum
A. Character printer
D. toner cartridge
B. Line printer
43. Which printer uses a powder called toner? C. Page printer
A. dot-matrix printer D. none of above
B. ink-jet
49. When something is changed from a solid
C. imagesetter into vapor, and then back into a solid, it is
D. laser printer referred to as this .

44. Which is not a type of M series Single Func- A. ionized


tion printer? B. sublimation
A. M1120 C. Water Soluble
B. M1140 D. Gassious Soluble

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1126

50. What are the missing wordsScanner is a 55. The printing speed of this printer is 5 to
device used to transfer or into a 300 pages per minute (ppm).
A. Laser printers
A. Computer, printer, text B. Thermal printers
B. printer, scanner, computer C. Inkjet printers
C. text, image, computer D. Line printers
D. none of above

NARAYAN CHANGDER
56. What “process” of color printing is typi-
cally used by today’s color printers?
51. Which Epson applications can users use to
print remotely? A. Spot color
A. Epson iPrint B. RGB

B. Epson Email Print C. CMYK

C. Epson Scan to Smart D. WYSIWYG


E. 2iyl3fbgigiuberiuhih34p8hti3494w754hngeiobnoerb
D. Remote Driver
57. Which type of scanner has a built-in Ether-
52. During the laser printer process, after the net port?
erase lamp exposes the entire surface of
the photosensitive drum to light, what A. DS-360W
happens to the photosensitive coating? B. DS-410
A. It becomes bright. C. DS-780N
B. It becomes electrically charged. D. DS-6500
C. It becomes conductive. 58. The Primary Corona Wire charges this in
D. It becomes nonconductive. the Laser Printing Process
A. The fuser assembly
53. A machine that combines, printer, fax, pho-
B. The paper
tocoping and scanning is called
C. Ther toner
A. multi-function printer
D. The drum
B. laser printer
C. plotter 59. In a laser printer, what must be done to
the drum to make it receptive to new im-
D. tonner ages?

54. What is the name of the scan application A. It must be sterilized and decontami-
installed on the PC specifically for the ES- nated
50 and ES-60W scanners? B. It must be grounded and fully dis-
A. Epson Scan 2 charged
C. It must be charged with a uniform pos-
B. Epson DocumentScan
itive charge
C. Epson ScanSmart
D. It must be charged with a uniform neg-
D. Epson iPrint ative charge

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1127

60. A fast line printer can print as many as 66. If Roger wants to print multipart forms
lines per minute. (like those on a Point of sale machine) he
should use this type printer

PRACTICE BOOK» NOT FOR SALE


A. 3, 000
B. 4, 000 A. Dot-matrix
C. 2, 000 B. Daisy-wheel
D. 5, 000 C. Inkjet
D. Color
61. The speed of a printer is measured using
all the following EXCEPT 67. What is the definition for Scanner?
A. RPM A. A scanner is a device that scans
B. CPS images from photographic prints and
C. LPM posters

D. PPM B. A scanner is a gadget that scans


images from photographic prints and
62. Which type of printers can be used with posters
multipart forms? C. A scanner is a tool that scans images
A. Inkjet printers from photographic prints and posters
B. Laser printers D. A scanner is a device that takes
C. Thermal printers images from photographic prints and
posters
D. Dot-matrix printers
68. Which step in the laser printer printing pro-
63. What is typically included in the EP laser
cess occurs immediately after the exposing
printer toner cartridge? (Choose three.)
phase?
A. Toner
A. Charging
B. Print drum
B. Fusing
C. Laser
C. Transferring
D. Cleaning blade
D. Developing
64. A direct thermal printer puts dots on the
surface of the paper by . 69. part of computer that record sound
A. etching A. Microphone
B. embedding B. printer
C. burning C. keyboard
D. spraying D. none of above

65. The Hewlett-Packard system for control- 70. what is the abbreviation for Cathode Ray
ling printers is Tube
A. PCL A. CRT
B. PostScript B. LCD
C. ASCII C. VDU
D. Unicode D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1128

71. part of computer that scan picture 77. The acronym CPS stands for
A. scanner A. characters per second
B. printer
B. characters per save
C. mouse
C. Computer process per second
D. none of above
D. character process per second
72. A Laser Printer uses toner (fine powder)
that is made up of plastic particles that are

NARAYAN CHANGDER
78. A laser printer creates an image of dots
bonded to this type of particles. and holds it in memory before printing it.
A. nickel What is this image of dots called?
B. polyester A. Raster image
C. aluminum B. Laser image
D. pigment
C. Vector image
73. Which of the following is an advantage of
D. High-resolution image
impact printers?
A. High Resolution 79. Which of the following are page-
B. Less expensive description languages? (Choose two.)
C. Energy Efficient A. Page Description Language (PDL)
D. Many options to select B. PostScript
74. Which printer part gets the toner from the C. PageScript
photosensitive drum onto the paper?
D. Printer Control Language (PC)L
A. Laser-scanning assembly
B. Fusing assembly 80. What kind of chip is used by a laser printer
C. Corona assembly to translate the raster image sent to the
printer into commands for the laser?
D. Drum
A. RAM
75. What mobile scanning applications can be
used to facilitate the scanning process? B. RIP
A. Epson iPrint C. ROM
B. Epson DocumentScan D. UART
C. Epson Google Print
D. Epson Scan to Cloud 81. It prints one character at a time; it prints
at the speed of around 30 to 600 charac-
76. What causes an unwanted mark (ghosting) ters per second.
to appear on printed pages?
A. Character printer
A. A damaged laser
B. Line printer
B. A damaged ozone filter
C. A damaged transfer corona C. Page printer
D. A damaged drum D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1129

82. The following are the advantages of the B. Transfer corona


DS-360W scanner, except C. Fuser assembly

PRACTICE BOOK» NOT FOR SALE


A. There is a battery indicator D. Laser
B. Built-in wifi
88. In a laser printer, the fuser assembly is al-
C. Big size most always separate from this
D. Has a special slot for card scanning A. laser head
83. Toner particles are composed mostly of B. gearbox
, which allows them to be melted to C. drum
the page.
D. toner cartridge
A. carbon
89. You have just installed a new printer. Af-
B. pigment
ter it is installed, it prints only garbled
C. plastic text. Which of the following is likely the
D. Teflon problem?
A. Wrong IP address
84. Laser printers usually use a laser as the
light source because of their B. Worn print head
A. intensity C. Incorrect print drivers
B. brightness D. Unsupported printer
C. precision 90. The following are examples of a Non-
D. cost-effectiveness Impact Printer, EXCEPT:
A. Thermal Printer
85. How are the dots which make up the vari-
ous printed characters put onto the surface B. Laser Printer
of paper from a direct thermal printer? C. Daisy Wheel Printer
A. Through spraying D. Inkjet Printer
B. By etching
91. What are the examples of Impact
C. Through impact Printer?
D. By burning A. Laser, Inkjet and Thermal Printer
86. What is the name of the remote printing B. Dot Matrix, Daisy Wheel and Line
application (Jakarta-Singapore) installed Printer
on the PC? C. Thermal, Line and Laser Printer
A. Remote Print Driver D. Laser, Inkjet and Daisy Wheel Printer
B. Email Print 92. What should be added to a laser printer to
C. Epson iPrint resolve a memory overflow problem?
D. Epson Air Print A. RET

87. The paper in the laser printing process is B. RIP


charged by this . C. ROM
A. Primary corona D. RAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1130

93. Printers that use a 9-pin dot-matrix are C. converts data into a form that your
generically referred to as . printer can understand
A. Economy quality D. describes how to print the text and
B. Near-letter quality draw the images on the page

C. Draft quality 98. In laser printers, what component applies


a positive charge to the paper, drawing
D. Letter quality
the negatively charged toner particles to

NARAYAN CHANGDER
94. Which of the following most accurately de- the paper?
scribes how to obtain a firmware upgrade A. Transfer corona
for your laser printer?
B. Turning gears
A. Download the firmware upgrade for
C. Laser
free from the manufacturer’s website.
D. Toner
B. Pay to download the firmware upgrade
from the manufacturer’s website. 99. What part of a laser printer supplies
C. Have a certified laser printer techni- the voltages for charging and transferring
cian come to your site and install a new corona assemblies?
firmware chip. A. High-voltage power supply (HVPS)
D. Contact the manufacturer of the B. DC power supply (DCPS)
printer, and they will send you the
C. Controller circuitry
firmware upgrade on a CD.
D. Transfer corona
95. This printer creates an image by physi-
cally striking an Ink Ribbon and pressing 100. When a thermal printhead passes over
it against the surface of the Paper the film ribbon, what melts onto the pa-
per?
A. Laser
A. Toner
B. Dot-matrix
B. Wax
C. Thermal
C. Dye
D. Impact
D. Ink
96. What kind of printers tend to have prob-
101. It is an output device that accepts text
lems with ink drying out inside the nozzles
and graphic from a computer and transfers
when the printer is not used for a period?
the information to paper.
A. Color
A. Scanner
B. Laser
B. Xerox Copier
C. Inkjet
C. Printer
D. Dot-matrix
D. Fax Machine
97. What does the print spooler do? 102. Printers can use , which enable the
A. storage files to be printed printer to automatically print on both sides
B. lets you change the order of docu- of the paper.
ments in the queue A. bidirectional assemblies

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 Printers and Scanners 1131

B. document feeders 108. Which step in the EP print process uses


a laser to discharge selected areas of the
C. duplex assemblies
photosensitive drum, thus forming an im-

PRACTICE BOOK» NOT FOR SALE


D. fuser assemblies age on the drum?

103. It prints a whole page at a time. A. Writing

A. Character printer B. Transferring


C. Developing
B. Line printer
D. Cleaning
C. Page printer
D. none of above 109. Printwires, also known as a grid of tiny
pins, that strikes the ink ribbon to produce
104. What is the L5190 printer ink code? the image on a piece of paper is used by
A. 005 this type of printer .
A. Dot-matrix
B. 664
B. Inkjet
C. 003
C. Laser
D. 001
D. Thermal
105. In a laser printer, what component is
used to write a positive image on the sur- 110. What kind of printer creates an image on
face of the drum? paper by physically striking an ink ribbon
against the paper’s surface?
A. Toner
A. Impact
B. Marker
B. Solid Ink
C. Laser
C. Thermal
D. Head
D. Dot-Matrix
106. Which of the following are possible inter-
111. The following are the advantages of
faces for printers? (Choose three.)
Inkjet Printer, EXCEPT:
A. Parallel
A. High Resolution
B. PS/2 B. Expensive
C. USB C. Energy Efficient
D. Network D. Many options to select
107. How many print wires are in the print- 112. Assuming a printer is in good working
head of a near-letter quality dot-matrix order and online, what should you check
printer? next if nothing prints?
A. 8 A. Calibration
B. 12 B. Port settings
C. 18 C. Printer emulation
D. 24 D. Print spooler

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.2 Digital Cameras and Camcorders 1132

113. What type of printer works by heating D. It allows the printer to communicate
tiny resistors or electroconductive plates with networks, servers, and workstations
at the end of different tubes filled with
ink? 116. Most of today’s printers, scanner, and
multifunction devices connect to a com-
A. InkJet
puter via a
B. Solid Ink
A. proxy server
C. Dye-Sublimation
B. parallel port

NARAYAN CHANGDER
D. Direct Thermal
C. Ethernet cable
114. What are 9-pin dot-matrix printers D. USB port
generically called?
A. Economy quality 117. What voltage does the corona wire or
corona roller hold?
B. Near-letter quality
A. +600VDC
C. Draft quality
D. Letter quality B. -600VDC
C. 0VDC
115. Which of the following is not an ad-
vantage of a Universal Serial Bus (USB) D. -100VDC
printer interface?
118. A device that can sometimes also work
A. It has a higher transfer rate than a se- as a copying machine.
rial connection.
A. Computer
B. It has a higher transfer rate than a par-
B. Printer
allel connection.
C. It automatically recognizes new de- C. Scanner
vices. D. none of above

12.2 Digital Cameras and Camcorders


1. Using 3-dimensional scanners, the scanned D. none of above
images can be used in COMPUTER AIDED
3. Depending on how the image is formed,
DESIGN (CAD) or, more recently, sent to a
the type of TOMOGRAPHIC scanner can
A. INK-JET printer have different names, EXCEPT:
B. LASER printer A. CT-Scanner
C. DOT-MATRIX printer B. MRI
D. 3D printer C. SPECT
D. Rontgen
2. How motion appears in a photograph is pri-
marily effected by 4. The followings are advantages of using
barcodes in the supermarket EXCEPT:
A. shutter speed
A. Faster checkout queues (staff don’t
B. ISO need to remember/look up prices of
C. Lens Opening items)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.2 Digital Cameras and Camcorders 1133

B. Errors in charging customers are re- 9. In a film camera, light passes through the
duced lens onto actual

PRACTICE BOOK» NOT FOR SALE


C. Better track of ‘sell by dates’ so food A. SD card
should be fresher B. wall
D. The cashier doesn’t have to print the C. film
bill D. metal plate
5. The creation of a 3D image of a human 10. This is what happens during scanning, ex-
body based on TOMOGRAPHY technology cept:
which basically builds up an image of the A. Document is put on a glass surface of
solid object through a series of very thin the scanner and the cover/lid is closed
‘slices’ is used in
B. A bright light illuminates the document
A. Airports C. A SCAN-HEAD moves across the docu-
B. Hospitals ment
C. Cashiers D. The focused image falls onto a CCD
made from pixels
D. Libraries
E. The image is processed into a file using
6. Besides in supermarkets, BARCODES are OCR
commonly used in 11. In a supermarket, when the barcode has
A. Libraries been read, then the followings happen, ex-
cept:
B. Airports
A. The barcode number is looked up in the
C. Hospitals stock database (the barcode is known as
D. Bus terminals the KEY FIELD in the stock item record);
this key field uniquely identifies each
7. The quality of a digital camera depends on stock item.
the resolution measured in the number of B. When the barcode number is found,
A. Dots the stock item record is looked up
C. The price and other stock item details
B. Pixels
are sent back to the checkout or POS
C. Red-eye (POINT OF SALE) terminal.
D. Aperture D. The cashier types in the product ID

8. On a digital camera, the photograph is cap- 12. To make a comparison between barcode
tured when light passes through the lens and QR code, normal barcodes can hold up
onto a light sensitive cell made up of tiny to 30 digits while QR codes
elements known as A. can hold over 7000 digits
A. Dots B. can hold less digits

B. Pixels C. can hold more or less the same num-


ber of digits
C. Red-eye
D. can hold around twice or thrice of the
D. Aperture digits

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.2 Digital Cameras and Camcorders 1134

13. Digital cameras are controlled by a micro- B. 100 MP


processor which can automatically carry C. 1000 MP
out the following tasks, EXCEPT:
D. 10000 pixels
A. Adjust the shutter speed and aperture
size 19. Unlike an ordinary SCANNER, comput-
B. Focus the image automatically ers equipped with OPTICAL CHARACTER
RECOGNITION (OCR) software allow the
C. Operate the flash automatically scanned document to be converted into a

NARAYAN CHANGDER
D. Add “RED EYE” to the image file such as

14. An image sensor in a digital camera is like A. File.DOCX


this body part B. File.XLSX
A. eye C. File.JPG
B. big toe D. File.MP3
C. fingernail 20. Thes are what happens when a barcode is
D. head scanned, EXCEPT:

15. Scanned image using 3D scanner can be A. The barcode is first read by a red laser
used/processed in a CAD software like or red LED (LIGHT EMITTING DIODE)
Auto-CAD. CAD stands for B. Light is reflected back off the barcode;
A. Computer Aided Design the dark areas reflect little or no light
which allows the bars to be read
B. Computer Aided Drawing
C. The reflected light is read by sensors
C. Computer Aided Document (photoelectric cells)
D. Computer Aided Digital D. The focused image falls onto a CCD
16. A series of dark and light parallel lines of made of pixels
varying thickness 21. When using a scanner:If the original docu-
A. Barcode ment was a photograph or image, then the
B. QR-code scanned image forms a file such as

C. Tomographic A. File.DOCX

D. OCR B. File.XLSX
C. File.JPG
17. Below are numerous technologies used in
3D scanners, except: D. File.TXT

A. Lasers 22. In an airport, a face recognition software


B. Magnetic resonance is used to compare two facial images. One
is the live photograph taken by a camera.
C. White light Second is the photograph on the passport.
D. Plastic ruler Below are the items compared EXCEPT:

18. Average cameras in hand-phones has the A. Distance between eyes


following resolution: B. Width of the nose
A. 10 MP C. Shape of the cheek bones

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.3 Audio and Video Devices 1135

D. Shape of the eyebrow D. all of the above


E. Colour of the skin 25. A storage device that you take out of your

PRACTICE BOOK» NOT FOR SALE


23. Made up of a matrix of filled-in dark digital camera and put directly into your
squares on a light background computer to download pictures.

A. Barcode A. graphic tablet

B. QR-code B. keyboard

C. CT-scan C. SD Card

D. Pixels D. none of above

24. Aperture is 26. What does camera use?

A. lens opening A. hats

B. adjustable B. solar pannels

C. controls amount of light that reaches C. a 2 dimensional light source


sensor D. light energy

12.3 Audio and Video Devices


1. VGA can transmit what kinds of data, se- 4. A provides and connects and adds ad-
lect ALL that apply ditional secondary storage to a desktop
A. Video such as full sized optical drive and exter-
nal hard drive. It also provides interfaces
B. Sound that enables a laptop to serve as a desk-
C. Programs top computer .
D. Computer files A. Port Replicator
B. Docking Station
2. Smartphones and tablets most commonly
use what type of USB for chargin and C. USB Adapter
transfering data? D. HDMI Adapter
A. Type A 5. Which is a computer?
B. Type B A. Laptop
C. Type C B. Desktop
D. Micro B C. All-in-One

3. The physical connection between net- D. Tablet


worked computing devices is established 6. Audio plugs with 2 rings are used for
using either or
A. Stereo sound
A. Cable Media
B. Microphones
B. Hathway
C. A single speaker
C. Wireless Media D. headsets with speakers and micro-
D. None of these phone

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.3 Audio and Video Devices 1136

E. h B. search the manufacturer’s website


with the computers model number
7. Digital signals consist of binary digits
C. go to the command screen and type in
A. 0 & 1
manual
B. 2 & 3
D. have the customer search for the pa-
C. 8 & 16
per copy of the manual before you work
D. 9 & 0 on it

NARAYAN CHANGDER
8. These allow you to hear audio such as mu-
13. HDMI can transmit what kinds of data, se-
sic, voice, and other sounds
lect ALL that apply
A. CPU
A. Video
B. Hard drive
C. Keyboard B. Sound

D. Speakers C. Programs

9. A is an electronic device, operating un- D. Computer files


der the control of instructions stored in its
own memory. 14. This device enables the user to transfer
digital images to a computer
A. Server
B. Laptop A. Keyboard

C. Computer B. Mouse
D. Tablet C. Digital Camera
10. The computer or device that is used for D. Scanner
sending data is called -
A. Sender 15. A specialized output device for producing
charts, maps, and very high-quality draw-
B. Reciever ings is a?
C. Manager
A. Printer
D. Follower
B. Plotter
11. Which type of printer is best suited for
C. Scanner
higher volumes of printing?
A. Plotter D. OMR
B. Dot matrix
16. is a connection in which the data flows
C. Laser in only one direction, from the transmitter
D. Inkjet to the receiver.

12. You are working on a laptop that is new A. Simplex Connection


to you. Where would you find the service B. Half Duplex Connection
manual?
C. Full Duplex Connection
A. Use the one you have, they are all the
same D. All above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.3 Audio and Video Devices 1137

17. USB micro, mini, and Tpye B are commonly 22. consists of electronic components that
used to connect these devices, select ALL store instructions waiting to be executed
that apply and the data needed by those instructions.

PRACTICE BOOK» NOT FOR SALE


A. Gaming Controllers A. Memory
B. Document Cameras
B. Mamory
C. Printers
C. RAM
D. Keyboards
D. ROM
18. What type of electrical current does a com-
puter use?
23. Light pen is used by them to draw directly
A. 12V DC on computer screen.
B. 120 V AC
A. Engineer
C. 240V Ac
B. Architect
D. none of above
C. Designer
19. Choose the answers that are mobile and
game devices D. All of these
A. Digital camera
24. The newest screens that do not even need
B. Laptop
a backlight are called
C. E-book reader
A. LCD
D. Game device
E. Portable/digital media player B. OLED

20. This device enables users to transfer audio C. LED


to a computer as digital files D. analog
A. Microphone
B. Digital Camera 25. This device enables users to click, highlight,
and drag graphical representations (icons)
C. Flash Drive
of resources on a computer
D. Mouse
A. Keyboard
21. What is Wi-Fi?
B. Scanner
A. A worldwide collection of computer
networks that connects millions of people. C. Microphone
B. Program designed to make users more D. Mouse
productive and/or assist them with per-
sonal tasks. 26. VGA stands for
C. A series of related instructions, orga-
nized for a common purpose. A. Vigilant Gangster Account

D. Broadband Internet connection that B. Video Guide Assistant


uses radio signals to provide high-speed
C. Video Graphics Array
Internet and network connections to com-
puters and devices. D. Violet Ground Antenna

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.3 Audio and Video Devices 1138

27. A is an output device that produces 32. What is a smartphone?


text and graphics on a physical medium, A. A portable cell phone.
such as paper or other material.
B. A cell phone that rings and uses the in-
A. Fax machine ternet.
B. Scanner
C. A phone that includes a calendar.
C. Display
D. An Internet-capable phone that usually
D. printer also includes a calendar, an appointment

NARAYAN CHANGDER
book, an address book, a calculator, a
28. Message can be , & files.
notepad, games, browser, and numerous
A. Text other apps.
B. Audio
33. A is a device designed to connect to a
C. Video laptop to provide additional ports to con-
D. Alphabets nect peripheral devices. The user simply
plugs in the laptop to this device.
29. You are changing the hard drive in a lap-
top. One way to transfer the files, data, A. docking station
and OS is to use a migration app. Anther B. port replicator
way would be to C. USB adapter
A. Create an image of the old hard drive
D. HDMI adapter
and restore to the new hard drive
B. right click on the c drive icon then cut 34. How many pins does a SO DIMM DDR2
and paste the icon on the new hard drive have?
C. go to the command line and type in A. 204
“move hard drive” B. 200
D. go to the command line and type in “ip- C. 288
config”
D. 260
30. What kinds of devices commonly use USB
Type A to connect, select ALL that apply 35. connection is a connection in which
the data flow in both directions simulta-
A. Printer neously.
B. Keyboard A. Simplex Connection
C. Mouse B. Half Duplex Connection
D. Flashdrive
C. Full Duplex Connection
31. The is a worldwide collection of com- D. All above
puter networks that connects millions of
businesses, government agencies, educa- 36. A computer keeps data, instructions, and
tional institutions, and individuals. information on
A. web A. disk
B. network B. CD Rom
C. interent C. hard drive
D. browser D. storage device

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.3 Audio and Video Devices 1139

37. Where would you find the Wi-Fi antennae 42. A is an output device that visually con-
and inverter in a laptop? veys text, graphics, and video informa-
tion.

PRACTICE BOOK» NOT FOR SALE


A. under the keyboard
B. under the touchpad A. CPU
C. behind the screen B. printer
D. in the power cord C. display
D. mouse
38. What is Bluetooth
A. Wireless communication technology 43. Choose all that are types of computers
that uses short-range radio signals to A. Tablet
transmit data between two Bluetooth-
B. Desktop
enabled computers or devices to commu-
nicate with each other C. Server
B. A tooth that is blue. D. All-in-One
C. A computer with blue speakers 44. Ethernet cables connect computes to
D. Wireless communication technology A. networks
that transmit data between two comput-
B. keyboards
ers to communicate with each other.
C. mouse
39. What would be the Easiest and Cheapest
way to connect Bluetooth to a laptop that D. speakers
does not have Bluetooth connectivity? 45. You plan on working on your laptop on an
A. Replace the laptop airplane. What type of laptop accessory
B. Buy a USB Bluetooth adapter will you need for power on the airplane?
C. Buy a Mini PCIe Bluetooth adapter A. AC adapter
D. change out the motherboard B. DC Adapter
C. USB Drive
40. A customer brings in her laptop and tells
you he would like to draw on the screen D. Wi-Fi Antennae
and have the laptop capture them. What
46. A contains keys you press to enter data
device needs to be installed?
and instructions into a computer or mobile
A. Touchpad device.
B. Inverter A. Laptop
C. Capturer B. Mouse
D. Digitizer C. CPU
41. What is the red dot in the middle of some D. Alphanumeric Keyboard
laptop keyboards called?
47. This device enables the user to copy and
A. point stick save printed images and documents as dig-
B. trackball ital files
C. home button A. Scanner
D. touchpad B. Digital Camera

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1140

C. Mouse A. Stylus
D. Microphone B. Keyboard
48. A type of printer that produces high- C. Game Controller
quality and is inexpensive. D. Mouse
A. Laser
50. A provides services to other computers
B. Inkjet
or devices on a network.
C. Dot matrix

NARAYAN CHANGDER
A. computer
D. Plotter
B. internet
49. This computer device enables users to con-
trol movement on the screen when playing C. web
a video game D. server

12.4 Mobile Devices and Smartphones


1. What 2 ways have manufacturers im- D. Process
proved CPU execution speeds?
E. Execute
A. Multiple Core
B. More RAM 5. Which would be considered a benefit to
owning a tablet?
C. Bigger motherboards
A. Easily access your stored photos
D. Threading
B. Play your favorite music
2. Which protocol is required to access the In-
ternet? C. Check out movie times
A. 802.11a D. All of these
B. TCP/IP
6. Most smartphone Bluetooth accessories
C. 802.11ac have a communication range of approxi-
D. TKIP mately how far?

3. File servers offer users a central storage A. 10 centimeters


place for what? B. 10 meters
A. Files C. 100 meters
B. Internet
D. 1 kilometer
C. Security
D. none of above 7. How fast is Fast Ethernet?
A. 10 Mbps
4. Select 4 main functions of the CPU
A. Fetch B. 100 Mbps
B. Store C. 1 Gbps
C. Decode D. 10 Gbps

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1141

8. Which of the following wireless commu- A. A network that covers a small geo-
nication methods has the shortest opera- graphical area.
tional range?

PRACTICE BOOK» NOT FOR SALE


B. A network that covers a large geo-
A. Wi-Fi graphical area.
B. Bluetooth C. A network connected to another net-
work.
C. NFC
D. none of above
D. IR
14. WiFi uses:
9. awareness is often used to implement
advanced functionality such as swiping, A. RD technology
pinch to zoom, and other predefined ges- B. RA technology
tures.
C. RP technology
A. Sense
D. RF technology
B. Multi-touch
15. What is the fastest data transfer speeds
C. Point currently supported by NFC?
D. none of above A. 106kbps
10. VoIP is available on many , personal B. 212kbps
computers, and on Internet access devices C. 424kbps
A. TV’s, D. 636kbps
B. headphones,
16. How much data can a micro SDXC memory
C. smartphones, card hold?
D. none of above A. 4GB
11. What are two advantages of a Wi-Fi net- B. 32GB
work over a cellular network? C. 128GB
A. Accessible from more places. D. 2TB
B. Speed is faster. 17. Which wireless communication method has
C. Cost less money to transfer data. an operational range of about 1 meter?
D. Mobility. A. Wi-Fi
B. Bluetooth
12. What company invented the Mobile
Phone? C. NFC
A. Microsoft D. IR
B. Motorola 18. is a methodology and group of tech-
C. Apple nologies for the delivery of voice commu-
nications and multimedia sessions over In-
D. Samsung
ternet Protocol (IP) networks, such as the
13. Which of these best describes a local area Internet.
network (LAN)? A. Voice Option IP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1142

B. Voice Over IP (VoIP) 23. Which of these hardware components are


C. Vocal Over IP not found in a server
A. RAM
D. none of above
B. CPU
19. You use a POS terminal at work. Which C. Network Port
of the following is the type of business at
which you likely work? D. None of the above

24. Which of the following server types is in

NARAYAN CHANGDER
A. Financial
the form of a single circuit board?
B. Retail
A. blade
C. research laboratory
B. tower
D. library
C. rack
20. Which manufacturer uses the term AirPods D. dedicated
to refer to headphones that fit in your ear
and connect wirelessly to devices? 25. What are the programs on mobile devices
known as?
A. Apple
A. Apps
B. Samsung
B. Baps
C. Sony
C. Caps
D. Nokia
D. Zaps
21. Radio waves form a part of the elec-
26. computing refers to an environment
tromagnetic (EMF) spectrum. What else
that provides resources and services ac-
does?
cessed via the Internet
A. Ordinary light A. Cloud Computing
B. A light bulb B. Vitural
C. Mobile phone towers C. Internet
D. Fibre cables D. Global

22. Sue made a big bowl of popcorn and is 27. Which of the following broadband tech-
planning to stream four hours of Disney nologies is the fastest?
movies to her cell-enabled tablet. Why A. DSL
has she opted to use Wi-Fi for her movie
night? B. Satellite
C. Broadband cable
A. Wi-Fi gives a clearer picture.
D. 3G cellular
B. Using Wi-Fi won’t impact her data
plan. 28. What happes after the CPU fetches an in-
C. Wi-Fi provides for true surround- struction and stores it in the instruction
sound. register?

D. No special reason; Sue is just being A. Decode the instruction


whimsical. B. Save the instruction

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1143

C. Execute the instruction 34. Which GPS component is responsible for


D. Convert the instruction triangulation?

PRACTICE BOOK» NOT FOR SALE


A. Satellites
29. In mobile devices, what is the main in-
B. Ground control network
ternal component where most components
are built into a single integrated circuit C. Receiver
called? D. All three combined
A. System-on-a-Mobile device 35. Cellphones and Smartphones send calls on
B. System-on-a-Chip the
C. System-on-a-Circuit A. Cellular Network
D. Motherboard B. Satellite Network
C. Smart Network
30. Most mobile devices include a and
for video and music files D. Cellular Satellites
A. Camera, printer 36. Servers are primarily used for and
B. camera, media player data.
A. Searching, Finding
C. USB port, media player
B. Downloading, Uploading
D. none of above
C. Analyzing, Sorting
31. A(n) is a thin, lighter-weight mobile D. Sideloading, Crossloading
computer that has a touch screen. (3-1/3-
3) 37. Uploading is files.
A. notebook A. Receiving
B. PC B. Taking
C. desktop C. Giving
D. Tablet D. Changing

32. The strength of the signal from the mobile 38. Which of the following are advantages
phone tower is indicated by of e-readers using E Ink over tablets?
(Choose two.)
A. How big the tower is
A. More vivid colors
B. The number of bars on your phone
B. Longer battery life
C. Where the tower is located
C. Easier to read in bright light
D. The size of your phone D. Better screen resolution
33. Which of the following are two main com- 39. is the process of initiating contact be-
ponents on the motherboard? tween two Bluetooth devices.
A. memory and storage A. tethering
B. interpreter and compiler B. initiating
C. processor and memory C. coupling
D. compiler and processor D. pairing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1144

40. Select the 2 main display technology types 46. Which of the following is NOT considered
in smartphones. a mobile device?
A. LCD A. tablet
B. System-on-a-Chip B. phablet
C. LED
C. smartphone
D. Smart screen
D. desktop computer

NARAYAN CHANGDER
41. The type of display that Google Glass
presents to its users is called what? 47. Which of the following is the name of the
protocol used to transmit data in NFC peer-
A. Retinal projection
topeer mode?
B. VR
A. NDEF
C. AR
B. NFCP
D. OCR
C. LLCP
42. Most mobile devices are shipped with
LPDDR3 or 4. What does LP mean? D. SNEP
A. Low Power 48. A Bluetooth device in discoverable mode
B. Limited Power transmits the device class, list of ser-
C. Low Processor vices, and other technical information on
demand.
D. Limited processor
A. device code
43. What function of the CPU describes the re-
ception of an instruction or set of instruc- B. device address
tions? C. device name
A. Fetch D. none of above
B. Decode
49. Which wireless standard simplifies the
C. Execute
process of adding a device to a WLAN?
D. Store
A. WPA
44. What do we use smartphones for?
B. WPA2
A. To throw.
C. WEP
B. To print.
D. WPS
C. To talk on and surf the internet.
D. none of above 50. Which two are connections made using an
Ethernet port on a Laptop?
45. A tablet is a computer
A. Connect to a camera.
A. Laptop
B. Desktop B. Connect to a switch.
C. Mobile C. Connect to another computer.
D. Cellular D. Connect to a printer.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1145

51. What is a disadvantage of mobile de- C. Touch Screen


vices?
D. Touch Stylus

PRACTICE BOOK» NOT FOR SALE


A. They don’t have a ton of storage space
B. They’re always connected to the inter- 57. Which of the following best describes the
net concept of tethering?

C. They’re small enough to take with you A. When a cellular device uses another
device’s Wi-Fi connection to get on the In-
D. They’re easy to use ternet
52. What is a task that a tablet CANNOT per- B. When a Bluetooth device uses another
form? device’s Wi-Fi connection to get on the In-
A. make phone calls ternet
B. edit a google doc C. When a Wi-Fi device uses another de-
vice’s Bluetooth connection to get on the
C. download a gaming app
Internet
D. connect to the internet
D. When a Wi-Fi device uses another de-
53. The is often referred to as the brain of vice’s cellular connection to get on the In-
the computer ternet
A. Random Access Memory (RAM)
58. Some smartphones support a(n) key-
B. Central Processing Unit (CPU) board app, on which users enter words by
C. Motherboard tracing a path on an on-screen keyboard.
D. Power Supply Unit (PSU) A. Touch
B. Swipe
54. What part of a computer performs calcula-
tions, actions, and runs programs. C. Finger
A. Calculator D. none of above
B. Graphics Processing Unit (GPU)
59. With which iPhone version was the Light-
C. Central Processing Unit (CPU) ning connector introduced?
D. Power Supply Unit (PSU)
A. iPhone 4
55. What hardware component in a server per- B. iPhone 5
manently stores all digital content.
C. iPhone 5s
A. CPU
D. iPhone 6
B. RAM
C. Hard Disk Drive 60. Data that a computer accepts and pro-
D. Mother board cesses is called
A. Input
56. Smartphones use technology to navi-
gate through them. B. Digital Facts
A. Infrared C. Information
B. Touch Pad D. Bytes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1146

61. A master Bluetooth device can communi- 66. A(n) is a handheld vertical lever,
cate with a maximum of devices in a mounted to a base, that you move to con-
piconet. trol the actions in a game.
A. seven A. joystick
B. eight B. gamepad
C. nine C. drive shaft

D. none of above D. control wand

NARAYAN CHANGDER
67. What type of server runs websites?
62. When was the first Mobile Phone in-
vented? A. Web Server

A. 1970 B. Internet Server


C. Internet Server
B. 1973
D. Email server
C. 1976
D. 1981 68. A home network is an example of a
A. LAN
63. A server that manages the sending and re- B. WAN
ceiving of emails is called
C. Server
A. Web Server
D. Internet
B. Communication Server
69. Which of the following devices was the
C. Internet Server first commercial tablet computer in the
D. Email server marketplace?
A. Microsoft Surface Pro
64. Multi-touch refers to which feature of a
touchscreen device? B. Tablet PC
A. The ability to touch multiple parts of C. iPad
the screen at once to provide input. D. GRiDPad
B. The ability to touch the screen multiple 70. Downloading is files.
times consecutively as part of the same in-
A. Taking
put stream.
B. Giving
C. The ability for multiple people to use
the touchscreen device. C. Changing

D. The ability to use a stylus or a finger D. Finding


as an input device. 71. Most mobile devices can be equipped with
Wi-Fi, Bluetooth, NFC and communica-
65. Which Wi-Fi standard is the fastest? tion capabilities.
A. 802.11a A. Wireless
B. 802.11ac B. CPS
C. 802.11g C. GPS
D. 802.11n D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1147

72. blindness occurs when a person’s at- C. AES


tention is diverted while performing a nat- D. Bluetooth
ural activity, such as walking.

PRACTICE BOOK» NOT FOR SALE


A. Inattentional 78. Bluetooth security uses the to gener-
ate the encryption key used to secure com-
B. Accidental
munication.
C. Virtual
A. link key
D. Occupational
B. encryption code
73. What is the number of active satellites
C. link code
used by GPS?
D. none of above
A. 12
B. 24 79. In M2M communication, such as with the
C. 30 Internet of Things trend, the M stands for

D. 36
A. mobile
74. Common examples of wireless networks
B. machine
include
C. manufacturer
A. Mobile phone cellular networks
B. WiFi D. media

C. Bluetooth 80. Lighting, HDMI, and Thunderbolt are all


D. All the above types of
A. Networks
75. The Cellular Network uses and to
make long distance calls. B. ISP
A. Time and Space C. Ports
B. Cell Towers and Space Phones D. Gaming device
C. Satellites and Carriers
81. An E-reader is an example of what type of
D. Cell Towers and Satellites device?
76. What is Lithium-ion technology used for in A. Mobile Devices
mobile phones? B. PC devices
A. Screen
C. Reading devices
B. System-on-a-Chip
D. none of above
C. Battery
D. Apps 82. What function of the CPU generates out-
put?
77. If Sheila wanted to connect headsets to her
A. Fetch
smartphones, she should use this wireless
technology ? B. Decode
A. WPA-Enterprise C. Execute
B. WPA-PSK D. Store

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1148

83. Mobile Devices are highly C. Your carrier’s cell network.


A. Powerful D. Your company’s LAN.
B. Fast
89. Which of the following are Smartphone
C. Mobile makers?
D. Large A. Acer
84. Bluetooth security risks may be mitigated B. Samsung

NARAYAN CHANGDER
by
C. Macintosh
A. using Bluetooth only when required
D. Apple
B. using bluetooth all the time
C. paring multiple devices 90. A frame that houses the system unit on a
desktop is called a(n)
D. none of above
A. briefcase
85. A(n) is a thin, lighter-weight mobile
B. tower
computer that has a touch screen.
C. sleeve
A. Notebook
B. PC D. canister

C. Desktop 91. What does WiFi mean?


D. Tablet A. Wireless Fidelity
86. What did we learn about? B. A trademarked term meaning IEEE
802.11x
A. Mobile Devices
B. Things we use in class? C. Wireless Frequency

C. Things we break? D. All of the above


D. none of above 92. Mobile devices have an , and can
run various types of application software,
87. Ann’s cable modem has only one Ethernet
known as apps.
port and does not support wireless connec-
tions. What must she add to her network A. operating system (OS)
in order to share her Internet connection B. Main Application
with her laptop, tablet and smart phone?
C. Aplication system
A. A wireless broadband router.
D. none of above
B. A network printer.
C. An optical network terminal. 93. What is the name of the Russian-managed
D. A satellite dish. GNSS?
A. GLONASS
88. Which of the following is an example of a
private network? B. Galileo
A. The Internet. C. BDS
B. The telephone network. D. IRNSS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1149

94. The cornerstone of any wireless network 100. A frame that houses the system unit on
is: a desktop is called a(n) (3-1/3-3)

PRACTICE BOOK» NOT FOR SALE


A. Broadcast point A. briefcase
B. Computer point B. tower
C. An access point
C. sleeve
D. Transmission point
D. canister
95. What two types of connectivity can net-
works make use of? 101. What is the mobile device called that we
use to read?
A. Bluetooth and infrared
B. Wired and wireless A. Computer

C. Blu-ray and DVD B. Coloring book


D. none of above C. E-reader

96. What device in a server makes it possible D. none of above


to connect it to the internet?
102. The instructions received by the CPU are
A. CPU received from what device?
B. Router
A. RAM
C. Network
B. Hard Disk Drive
D. Bandwidth
C. CPU
97. Which of the following is the most common
input method for mobile devices? D. PSU

A. Stylus 103. When desired, users can the Blue-


B. Resistive touchscreen tooth link key to remove bonding relation-
ships.
C. Capacitive touchscreen
D. Keyboard and mouse A. add
B. delete
98. Apps for Android-based smartphones and
tablets can be downloaded from which C. establish
store?
D. none of above
A. App Store
B. Google Play 104. Mobile devices are small, typically hand-
held computing devices having a display
C. Android Store screen with and/or a miniature key-
D. Windows Store board and a variety of wireless connectiv-
ity options
99. Which cellular network is fastest?
A. radio input
A. GSM
B. 2G B. sense input
C. 3G C. touch input
D. LTE D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.4 Mobile Devices and Smartphones 1150

105. Which of the following is the operating A. A network that covers a small geo-
system used by Apple Watch? graphical area.
A. WatchOS B. A network that covers a large geo-
B. iOS graphical area.
C. OS X C. A network limited to just one room.
D. Apple OS D. none of above
106. Instructions received by the CPU are 108. Which two frequency bands are used by

NARAYAN CHANGDER
stored where? wireless LANs?
A. RAM A. The 88MHz band and the 206MHz
B. Hard Disk Drive band.
C. Registers B. The 800MHz band and the 1.2GHz
D. Storage device band.

107. Which of these best describes a wide C. The 2.4GHz band and the 5GHz band.
area network (WAN)? D. The 54MHz band and the 300GHz band.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
13. Computer Applications

13.1 Office Automation Software


1. The correct formula to calculate the total C. Touch typing
in the given table is:
D. None of these
A. =B2+C2+D2+E2
B. =B2+C2 5. Which menu contains the Numbering op-
tion?
C. =sum (B2TOE2)
A. File
D. =sum (B2fromE2)
B. Edit
2. Filter option is available in tab.
C. Tools
A. home
D. Format
B. function
C. tool 6. Which function will you use to enter cur-
rent time in a worksheet cell?
D. data
A. =currentTime()
3. The cell reference for cell range of A2 to
B. =time()
M12 is
C. =now()
A. A2!M12
D. All of the above
B. A2.M12
C. A2;M12 7. To move data from one part of the docu-
D. A2:M12 ment to another, following is used
A. Cut and Delete
4. is the typing technique by which we
can learn typing. B. Cut and Paste
A. Finger typing C. Copy and Paste
B. Typing technique D. Copy and Undo

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.1 Office Automation Software 1152

8. refers to changing the font style, size, C. Alt + Left arrow


color, bold, Italic, underline and other re-
D. Ctrl + Left arrow
lated parameters.
A. Formatting 14. What will be the result from the follow-
B. Alignment ing expression (Assume H1=12, H2=12)?
=H1<>H2
C. Proofing
A. True
D. Filtering

NARAYAN CHANGDER
B. False
9. Identify the default view in Impress
C. 24
A. Normal
D. 1212
B. Slide Sorter
C. Handout 15. What is the shortcut key for finding and
replacing text in a document?
D. Notes
A. Ctrl + F
10. The software that is used to format a doc-
B. Ctrl + F5
ument is:
C. Ctrl + F4
A. MS word
B. MS PowerPoint D. Ctrl +F7

C. MS excel 16. The special character that initiates the for-


D. MS access mula mode in a cell is:
A. /
11. Microsoft Office is a user friendly applica-
tion at complete B. =
A. Software C. -
B. Packahes D. *
C. Office Automation
17. Which menu contains the Slide Transition
D. Process automation option?
12. Identify the extension of the Impress pre- A. Slide Show
sentation B. View
A. , odp
C. Tools
B. .ppt
D. Format
C. .odp
D. , odb 18. function inside another function is called

13. Which of the following key combinations is A. Nested function


used to increase the width of the current
column? B. Round function
A. Alt + Right arrow C. Inner function
B. Ctrl + Right arrow D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.1 Office Automation Software 1153

19. Find & Replace option is available in which 25. The shortcut key is used to save the docu-
menu? ment is

PRACTICE BOOK» NOT FOR SALE


A. File A. ctrl+S
B. Edit B. Shift+S
C. Format C. Alt+S
D. Tools D. Alt+F2

20. is word processor software. 26. Spelling and grammar checking feature
shows underline for spelling errors.
A. MS Window
A. Red
B. MS Excel
B. Green
C. MS Powerpoint
C. Yellow
D. MS Word D. Blue
21. Which area in an Excel window allows en- 27. Which of the following syntax is correct
tering values and formulas? regarding to SUM function in Excel?
A. Title bar A. =SUM (A1, B1)
B. Menu bar B. =SUM (A1:B9)
C. Formula bar C. =SUM (A1:A9, B1:B9)
D. Standard tool bar D. All of the above

22. A formula in calc may begin with 28. To apply the table of contents automati-
cally, the most important task is to prop-
A. +
erly define
B. =
A. levels of heading
C. -
B. page numbering
D. All the above C. page layout
23. Two options of orientations for page setup D. themes
are and
29. CTRL+N is used to
A. up, down
A. Open document
B. left, right
B. Close document
C. centre, justify C. New document
D. portrait, landscape D. Save document
24. Formatting is performed on 30. What is the short cut key for Undo?
A. Text A. Ctrl +E
B. Table B. . Ctrl + U
C. Menu C. Ctrl + Z
D. Both (a) and (b) D. Ctrl + n

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.1 Office Automation Software 1154

31. Charts are basically used to C. 4


A. design tables D. 1
B. Organize data in tables
37. The term describes the physical as-
C. Sort data in different columns pects of computers and related devices
D. show the quantities and their relation- A. Process Automation
ships graphically
B. Sotfware

NARAYAN CHANGDER
32. What is the shortcut key to go to the start
C. Hardware
of the document?
D. None
A. Ctrl + Home
B. Ctrl + End 38. Which of the following function will use to
C. Home find the highest number in a series of num-
ber?
D. End
A. HIGH (B1:B3)
33. is electronic spreadsheet software
B. MAXIMUM (B1:B3)
used for automated calculations.
C. MAX(B1:B3)
A. MS Window
B. MS Excel D. None of the above

C. MS Powerpoint 39. In MS-Excel which functions will calcu-


D. MS Word late the number of workdays between
6/9/2013 and 8/12/2013
34. Which is used to move quickly from one
A. workday
slide to another?
B. date
A. Compass
B. Navigator C. networkday

C. Fill color D. weekday


D. Page border 40. An Excel Workbook is a collection of
35. Which of the following is a rectangle el- A. Workbooks
ement which can be moved around the B. Worksheets
worksheet?
C. Charts
A. cell
D. Worksheets and charts
B. cell pointer
C. address 41. Autocorrect was originally designed to re-
D. cell name place words as you type.
A. Short, repetitive
36. spreedsheet window has sets of scroll
bars B. Grammatically incorrect
A. 2 C. mispelled
B. 3 D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.1 Office Automation Software 1155

42. Which key is used to move the cell pointer C. Returns a subtotal in a list or database
in the forward direction within the work-
D. Both (a) & (b)
sheet?

PRACTICE BOOK» NOT FOR SALE


A. Enter 48. In MS-Excel which of the following is an
B. Tab absolute cell reference?
C. Shift + Tab A. !A!1
D. Delete B. $A$1
43. Which is the shortcut key to view the C. #a#1
slideshow? D. None of these
A. F6
B. F10 49. Which is the first electronic spreadsheet?

C. F5 A. Excel
D. F9 B. Lotus 1-2-3

44. Which option allows you to assign text, ta- C. Visicalc


bles, graphics and other items to a key or D. OpenOffice Calc
key combination?
A. Autoformat 50. The function which is used to re-arrange
data according to specific criteria is called:
B. Automatic
A. Filtering
C. Auto text
D. Autographics B. Sorting
C. Organizing
45. The correct formula to calculate the per-
centage in the given table is: D. Grouping
A. =B2+C2+D2+E2 /400*100
51. To return the remainder after a number is
B. =B2+C2+D2+E2 *100 divided by a divisor in EXCEL we use the
C. =(B2+C2+D2+E2) / 400*100 function?
D. =(B2+C2+D2+E2) /100*400 A. ROUND()
46. Formulas in Excel start with B. FACT()
A. % C. MOD()
B. # D. None
C. *
52. Which chart will be suitable to show the
D. =
share of three partners in a business?
47. In MS-Excel what does SUMIF function A. line chart
do?
B. bar chart
A. Adds up cell values based on a condi-
tion C. graph chart
B. Adds all the numbers in a range of cells D. pie chart

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.1 Office Automation Software 1156

53. What is entered by the function =today() C. double


A. Today’s date as Text format D. 1
B. The date value for the day according to 59. Which of the following symbol is used to
system clock make a cell address as an absolute refer-
C. None of the above ence?
D. The time value according to system A. +
clock B. %

NARAYAN CHANGDER
54. If we want to change the overall design of C. &
a word document, we should use:
D. $
A. themes
60. The software that is used for accounting
B. page layout
purpose is:
C. watermark
A. MS word
D. margins
B. MS excel
55. Microsoft word is software. C. MS PowerPoint
A. Application D. MS access
B. Compiler
61. Grid of cells with a programmable calcula-
C. System tor
D. Programming A. Spreadsheet
56. Which is displayed at the top part of the B. Database
window? C. Word processor
A. Menu bar D. Linux
B. Tool bar
62. option in word changes the structure
C. Title bar and layout of pages.
D. Format bar is displayed at the top part A. Format
of the
B. Print and Print preview
57. Excel displays the current cell address in C. Page Setup
the .
D. Proofing
A. Status Bar
B. Name Box 63. Which of the following software used to
show information in the form of slide
C. Formula bar show?
D. None of the above A. word processor
58. The default linespacing is B. spreedsheet
A. 1.5 C. presentation
B. single D. draw

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1157

13.2 Graphics and Multimedia Software

PRACTICE BOOK» NOT FOR SALE


1. When you are creating graphical images, 6. Which of the following is considered a vec-
which technique can you use to control how tor image file format?
well you can see lower layers through the A. TIFF
upper ones?
B. JPG
A. Layers
C. GIF
B. Transparency
D. SVG
C. Shapes
7. You have an image of a building but there
D. Opacity are people standing on the far left side.
You would like to remove those people.
2. Which graphics program tool enhances
Which tool do you need?
color, but does not select any portion of
an image? A. Cropping
A. Lasso B. Clipping
B. Sponge C. Snipping
C. Marquee D. Cutting

D. Wand 8. is used for deleting or rearranging


scenes, adding voice-overs, and adding
3. What occurs when you paste a copied im- other special effects
age or portion of an image into an image
A. Painting Program
file in a graphics software program?
B. Drawing Program
A. A copy of the image file is created.
C. Image Editing Program
B. A duplicate layer is created.
D. Video Editing Software
C. A new image file is opened.
9. What is resolution, when speaking of
D. A new layer is created.
graphics?
4. Which option is used to resize and rotate A. Whether the picture is in color or black
an image? and white.
A. Anchor B. The number of pixels that can be dis-
played in each dimension.
B. Constrain Proportions
C. How bright the picture is.
C. Opacity
D. How dark the dark parts of the picture
D. Free Transform
are, compared to the lighter parts.
5. Which of the following are common blend- 10. It refers to recording data on a recordable
ing tools in graphics software? or rewritable DVD.
A. Magic Wand, Lasso, Marquee A. DVD Authoring Software
B. Erase, Gradient, Drawing B. DVD Burning
C. Blur, Dodge, Sharpen C. Video Editing Software
D. Spot Heal, Bloat, Pinch D. Audio and Editing Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1158

11. Amir is searching on his computer for a file 16. TIFF files are best used for:
that he created and saved in Pixlr’s native
A. Both Web and print publishing.
file format. Which type of file should he
be searching for? B. Print publishing only.
A. EPS C. Web publishing only.
B. PDF D. Neither web publishing nor print pub-
C. PXD lishing.

NARAYAN CHANGDER
D. PSD 17. is one of the oldest forms of human-
expression, with evidence for its exis-
12. A graphic editing software that lets you
tenceeven before written communication.
create a fine vector arts. Create logos,
sketches, typography, icons or even com- A. telegram
plex illustrations. B. mobile communcation
A. Adobe Illustrator C. Arts
B. Adobe Photoshop
D. Drawing
C. Indesign
D. GIMP 18. Which type of image format is constructed
using proportional formulas rather than
13. Which type of image file is constructed by pixels?
a series of pixels to form an image? A. Raster
A. Vector B. JPEG
B. SVG
C. Vector
C. Raster
D. PNG
D. PDF
19. What graphic editing software is known to
14. When using a graphics editing program, be the alternative for Adobe Illustrator?
which option allows you to adjust the
space around an image? A. Inkscape
A. Constrain proportions B. Cyberlink
B. Image size C. Coreldraw
C. Canvas size D. sketch-up
D. Anchor points
20. It is a drawing technique that uses some
15. When a drawing is created using graphics kind of paint applied to some kind of sur-
software. It is the act of using a computer face, usually a flat, two-dimensional can-
to draw. vas.

A. Adobe Illustrator A. painting


B. digital drawing B. spray painting
C. digital apps C. wall designing
D. graphic designs D. painter

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1159

21. Which of the following is a vector 26. Raster images are best used for:
graphic? A. photos.

PRACTICE BOOK» NOT FOR SALE


A. SVG B. illustrations.
B. JPG C. logos.
C. PPI D. typography.
D. DPI 27. Which of the following are selection graph-
ics software tools?
22. Which of the following is an example of a
selection tool? A. Move, Magic Wand, Lasso, Marquee
B. Blur, Dodge, Sharpen
A. Color Picker
C. Spot Heal, Bloat, Pinch
B. Brush
D. Erase, Gradient, Drawing
C. Move
28. Which graphics program tool makes a se-
D. Sharpen
lection based on color and tone values that
are similar to the area clicked?
23. Which of these image formats is most
likely to be used for logos, typography, A. Sponge
fonts and illustrations? B. Marquee
A. JPEG C. Lasso
B. AI D. Wand
C. GIF 29. When you are creating a graphical image,
D. TIFF how can you make certain you can move
shapes around without merging them to-
24. Which image file format can support both gether by accident?
animation and transparency? A. Change the opacity of the layers.
A. BMP B. Create them on different layers.
B. GIF C. Change the transparency of the layers.
C. TIFF D. Create them on the same layer, but
make them different colors.
D. JPEG
30. Which option is used as a filter?
25. Which is not a function of a graphic design-
A. Crop
ing software?
B. Resize
A. Create original or edit existing images
C. Brighten
B. Add special effects, filters and styles
D. Dry brush
to images
C. Reduce file size of images for easy up- 31. What term is used to describe how clear
load to the web or see-through an object appears?

D. Create mood or add music to enhance A. Transparency


quality B. Background

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1160

C. Resolution D. Graphics can be used only if they are


D. Clarity your own original creations.

32. What is the term used when saving an im- 37. Malachi has to create vector graphics that
age and all layers are merged? can be opened by all of his clients, no mat-
ter which design editors their companies
A. anchored use. Which file format should he use to
B. imported make sure they can all open his files?

NARAYAN CHANGDER
C. exported A. PNG
D. flattened B. TIFF

33. A dotted line represents ( ) what type C. EPS


of line? D. BMP
A. Orthographic
38. Traditionally create bitmap images, which
B. Hidden are created by coloring the individual pix-
C. Isometric els in an image.
D. none of above A. Painting Program
B. Drawing Program
34. Which image file format is a large raster
file that is used when saving photographs C. Image Editing Program
for print only? D. Audio Capture and Editing Software
A. JPEG
39. What orientations (positions) are
B. TIFF used for paper on your drawing
C. PNG board/canvas/artboards?
D. GIF A. portrait and landscape
B. landscape or vertical
35. Which graphics program tool is used to se-
lect a rectangular area of a layer or the C. inverted and interval
canvas? D. diagonal and alignment
A. Sponge
40. Which of the following will allow you to
B. Wand have an image on that allows the back-
C. Lasso ground for another image to show through
when placed on top of it?
D. Marquee
A. Transparency
36. Which statement is true about using graph-
B. Opaque
ics in presentations?
A. Graphics should not be used to attract C. Blur
attention. D. Clear
B. Graphics can be used to evoke emo- 41. You have just completed a course about
tions. graphics software and you are excited to
C. Graphics are pretty but cannot commu- use your new skills. For which task can
nicate messages. you use graphics software?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1161

A. Slide show creation A. The wrong layer has been selected.


B. Spreadsheets B. The shape layers are in the wrong or-

PRACTICE BOOK» NOT FOR SALE


C. Digital photo editing der.

D. Word processing C. Delete them and draw the shapes on


different layers.
42. Bret took a photo of a beach sunset while
D. The shape layer is locked.
on vacation. The image also captured two
people in the water. Bret wants to re-
46. In graphics software, which type of mod-
move the people from the image, replacing
ification is used to change the color, tone,
them with the water details. Which graph-
contrast and vibrancy of an image?
ics tool will allow Bret to copy the water
details and paste them in another area on A. Layers
the same image? B. Adjustments
A. Dodge
C. Special effects
B. Color replace
D. Filters
C. Clone stamp
D. Burn 47. Typically create vector graphics, which use
mathematical formulas to represent image
43. Which raster image format produces a content instead of pixels
large file size that does not lose quality,
A. Painting Program
and is best used when saving photographs
for print? B. Drawing Program
A. PSD C. Image Editing Program
B. GIF D. Audio Capture and Editing Program
C. PNG
48. Which image format is commonly used for
D. TIFF digital photos, and Web and print publish-
ing?
44. Which option is used to maintain the width
and height proportions when resizing an A. SVG
image or shape?
B. Vector
A. Crop
C. DRW
B. Constrain Proportions
D. Raster
C. Anchor
D. Cross Process 49. When an image is saved as a JPG, all lay-
ers contained in the image are merged. In
45. Glenn places two circle shapes on the im- other words, the image is:
age canvas in a graphic software applica-
tion. When he tries to move the blue cir- A. anchored
cle to a different position, he realizes that B. imported
the two shapes move together. Glenn only
C. exported
needs to move one circle. How can he fix
this problem? D. flattened

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1162

50. Which option is used to delete unwanted C. Inkscape


areas of a graphic image? D. hyperdraw
A. Cross Process E. Micromedia fireworks
B. Anchor
56. Vector graphics are:
C. Crop
A. resolution-dependent.
D. Constrain Proportions B. made up of pixels.

NARAYAN CHANGDER
51. Which option is used to maintain width and C. not able to be resized without losing
height ratios when resizing an image? quality.
A. Constrain Proportions D. made up of mathematical equations.
B. Anchor 57. It is believed that was used as as-
C. Free Transform pecialized form of communication before
theinvention of the written language.
D. Opacity
A. telegram
52. Which image file format creates a large B. telephaty
raster file best used for print but not rec-
C. drawing
ommended for use on the Web?
D. painting
A. TIFF
B. PNG 58. A graphic software ideal for layout design
usage like online magazines. Whether you
C. GIF want to create layouts for printed books
D. JPG or digital magazine this is the tool you
need. However, it has limited tools for
53. Drawing is considered to be a form of creating graphics.
within the visual arts.
A. Illustrator
A. arts
B. Indesign
B. expression
C. Serif Drawplus
C. emotion D. cyberlink
D. inspiration
59. Which graphics software tool is used for
54. You have been asked to design a logo for editing?
a community organization. What kind of A. Lasso
image would you create?
B. Clone Stamp
A. Raster
C. Blur
B. Vector D. Zoom
C. Transparent
60. What is Mrs. Thompson’s Snail’s name?
D. Opaque
A. Slow Down
55. Which is not a graphic editing software? B. Hippie
A. Photoshop C. Smiley
B. Illustrazo D. Warp Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1163

61. Which image file format should be used to A. PNG


save an image with a transparent back- B. BMP
ground for use on a Web page?

PRACTICE BOOK» NOT FOR SALE


C. GIF
A. JPG
D. JPEG
B. BMP
C. TIFF 66. Which of these file types is best for print-
D. PNG ing photographs?
A. PNG
62. Which choice lists common tools from
graphics programs that are examples of B. BMP
selection tools? C. EPS
A. Blur, Dodge, Sharpen D. TIFF
B. Magic Wand, Lasso, Marquee
67. Which of the following is a vector graphics
C. Spot Heal, Bloat, Pinch format?
D. Erase, Gradient, Drawing A. SVG
63. Drawing or painting programs that are B. JPG
specifically designed for touching up or
C. PPI
modifying images, such as original digital
images and digital photos. D. DPI
A. Drawing Program 68. Which term is used to describe how solid
B. Painting Program an object appears?
C. Image Editing Programs A. Background
D. none of above B. Clarity
64. Mark took a photo of a beach sunset while C. Opacity
on vacation. He realized when you viewed D. Resolution
the picture that there is a portion of a
bridge showing on the far left. Mark 69. Which image file format is the best format
doesn’t want to crop the image, he wants to use for photographs on the Web?
to remove the bridge and extend the hori-
A. EPS
zon. Which tool will allow him to remove
the bridge and leave only the beach sun- B. JPG
set? C. TIFF
A. Dodge D. GIF
B. Color replace
70. Which term is used to describe bitmap im-
C. Burn
ages?
D. Clone stamp
A. Raster
65. Which image file format is an uncom- B. EPS
pressed raster file which may contain dif-
ferent depths of color depths per pixel, or C. SVG
may be saved in grayscale? D. Vector

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1164

71. Which choice lists common tools from 75. Which tool is used to rotate and resize an
graphics programs that are examples of image or shape in a graphics editing pro-
blending tools? gram?
A. Blur, Dodge, Sharpen A. Free Transform
B. Magic Wand, Lasso, Marquee B. Crop
C. Erase, Gradient, Drawing C. Free Distort
D. Spot Heal, Bloat, Pinch D. Move

NARAYAN CHANGDER
72. Dmitri has several logos he’s designed. He 76. is an interactive computer application
wants to add them to the company’s Web for organization, analysis and storage of
site. He has asked you if he should save data in tabular form.
the images as vector or raster. Which A. spreadsheet
statement is the best response?
B. database
A. The raster file format should never be
C. document form
used for Web publishing.
D. organized files
B. The vector file format is best used with
digital photographs. 77. Anahi is creating a graphic that will be
C. Vector images are best for logos, be- used on her company’s Web site, in print
cause they can be resized without losing materials, in advertising and on uniforms.
resolution. She needs to choose an image file format
that will not lose quality when the image
D. Raster images are best for logos, be-
is resized. Which graphic format should
cause they can be resized without losing
Anahi use?
resolution.
A. Vector
73. Which graphics program tool is used to se- B. TIFF
lect a free-hand area of a layer or the can-
vas? C. Bitmap

A. Lasso D. Raster

B. Marquee 78. Which image format is most commonly


C. Wand used for logos, typography, fonts and il-
lustrations?
D. Sponge
A. JPEG
74. What do you call a computer program that B. Bitmap
lets you type words or text which shows
C. Vector
up in a virtual “document” on your com-
puter screen? D. Raster
A. Word processing software 79. Glenn places two circle shapes on the im-
B. Graphic software age canvas. When he tries to move the
once circle to a different position, he real-
C. Typography
izes that the two shapes have been joined
D. Virtual document and can no longer be moved individually.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1165

What is the most likely reason that this 84. uses a combination of different content
occurred? forms such as text, audio, images, anima-
tions, video and interactive content.

PRACTICE BOOK» NOT FOR SALE


A. The wrong layer has been selected.
B. The shape layers are in the wrong or- A. Multimedia
der. B. software
C. The shape layer is locked.
C. graphics design
D. The shapes were drawn on the same
layer. D. applications

80. A is a computer-made image that is 85. Sharing an image online generally requires
made up of points, lines, and curves that which of the following?
are based upon mathematical equations,
A. Low resolution
rather than pixels.
A. vector grahic B. HIgh resolution
B. pixels and frames C. Blurring
C. graphic images D. Kaleidoscope
D. jpeg file formats
86. Yuki is creating a memory book for her
81. Using this graphic software you can easily friend’s birthday. Which file type should
combine multiple images and even remove she use to print the pictures?
unwanted objects from the image.
A. DRW
A. Adobe illustrator
B. Raster
B. Photoshop
C. GIMP C. SVG
D. Corel draw D. Vector

82. A drawing is started with 87. Which of the following is a raster graphics
A. All simple shapes laid out in composi- format?
tion. A. SVG
B. The colors being mixed and ready for
B. JPG
application.
C. All the important details. C. PPI
D. The separation between lights and D. DPI
darks.
88. When you are creating graphical images,
83. What term describes images that are made which technique can you use to control and
up of pixels and cannot be resized without manipulate elements individually?
losing quality?
A. Layers
A. DPI
B. Opaque B. Shapes

C. Vector C. Transparency
D. Raster D. Opacity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1166

89. Which of the following is used to reverse B. PNG


changes made to an image or shape in
C. EPS
graphics editing software?
A. Clear D. BMP
B. History
95. Gilah is creating a graphic that will be
C. Deselect All used on her school’s Web site, in newslet-
D. Navigator ters, and on sports uniforms. She needs

NARAYAN CHANGDER
to choose an image file format that will
90. Which image file type is best for logos? not lose quality when the image is resized.
A. Raster Which graphic format should Gilah use?
B. Vector A. Raster
C. Transparent B. Vector
D. Opaque C. JPEG
91. What drawing technique is use showing D. GIF
variety of tonal values on the paper to rep-
resent the shade of the material as well as 96. Which graphics tool is used to make a se-
the placement of the shadows? lection?
A. shading A. Eraser
B. sketching
B. Lasso
C. painting
C. Zoom
D. tracing
D. Color Picker
92. What graphic editing software is known
to be the perfect alternative for Photoshop 97. Which file format was designed to produce
as it has alike features? high-resolution vector graphics for print
A. Adobe Illustrator that can be opened in any design editor?
B. GIMP A. TIFF
C. Corel Draw B. EPS
D. Inkscape
C. BMP
93. Which program is an example of graphics D. PNG
editing software?
A. Google Docs 98. Which “lossless” image type is best suited
B. Microsoft Outlook for Web pages, but is not suitable for
print?
C. Adobe Photoshop
A. PSD
D. Google Slides
B. TIFF
94. Which raster image format is best used fof
webpages but is not suitable for print? C. PNG
A. TIFF D. SVG

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.2 Graphics and Multimedia Software 1167

99. It is a form of visual art in which a A. TIFF and JPEG


personuses various drawing instruments B. PNG and TIFF
tomark paper or another two-dimensional

PRACTICE BOOK» NOT FOR SALE


medium. C. JPEG and GIF

A. painting D. GIF and PNG

B. drawing 104. A is represented by a dot or square


C. sketching on a computer monitor display screen.

D. tracing A. Vector
B. Bitmap
100. What drawing technique is like creating
C. Pixel
‘carbon copy’ of the original image?
D. none of above
A. tracing
B. sketching 105. Which image format would be most likely
used for a photo directory in web or print
C. painting
publishing?
D. shading
A. AL
101. Which panel is used to reverse changes B. DRW
made in graphics software?
C. PNG
A. clear
D. SVG
B. history
106. Which option is used to specify how the
C. navigator
canvas is modified?
D. deselect all
A. Crop
102. Trent has scanned several digital pho- B. Constrain Proportions
tographs. He wants to add the scanned C. Anchor
photos to his Web site. He has asked you
if he should save the scanned images as D. Cross Process
vector or raster. Which statement is the
107. You want to transform an image with
best response?
artistic effects. Which menu would you
A. The raster file format should not be look under?
used for Web publishing. A. Filter
B. The vector file format is best used with B. Edit
digital photographs.
C. View
C. Scanned images can only be saved as
vector images by using specialized conver- D. File
sion software. 108. You are using a graphics editing program.
D. Scanned images can only be saved as You want to create a softer edge at the
raster images by using specialized conver- border of the image you are selecting.
sion software. Which option should you use?

103. Which choice lists two image formats A. Transparency


that support transparency? B. Opacity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1168

C. Anti-aliasing caused by thickness or density variations


D. Feathering in the paper.
A. graphics design
109. Which file format would you use to cre-
ate a logo? B. watermarks
A. PDF C. arts signs
B. Raster D. painting
C. Bitmap

NARAYAN CHANGDER
113. Technically refers to any application that
D. Vector contains more than one type of media, but
is often used to refer to audio and video
110. Which term describes the arrangement or
content.
placement of image layers in a graphics
program? A. Graphics
A. Opacity B. Multimedia
B. Layer visibility C. Vector
C. Stacking order D. Bitmap
D. Transparency
114. Andrew took a photo of a beach sunset
111. Which of the following statements is true while on vacation. He wants to change the
regarding cropping or resizing an image in color of the sky to a deeper blue. Which
graphics software? tool will allow him to do so?
A. Resizing an image deletes the unused A. Dodge
portion of the image.
B. Clone stamp
B. Cropping an image keeps the unused
C. Burn
portion of the image.
D. Color replace
C. Resizing an image does not reduce its
file size. 115. Which of the following is an example of
D. Cropping an image reduces its file size. an editing tool?
112. A is an identifying image or pattern A. Lasso
in paper that appears as various shades B. Clone Stamp
of lightness/darkness when viewed by
transmitted light (or when viewed by re- C. Blur
flected light, atop a dark background), D. Zoom

13.3 Database Management Systems


1. a collection of related data representing C. Database
an organization and stored on an external
storage medium is the definition of? D. Integrated Data

A. Database Management System 2. Drop table statement


B. Data System A. deletes the table structure only

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1169

B. deletes the table structure along with C. Data normalisation


the table data
D. Foreign Key

PRACTICE BOOK» NOT FOR SALE


C. works whether or not referential in-
tegrity constraints would be violated 8. The end product of data manipulation in
D. is not an SQL statement DBMS as per the user’s choice is known
as
3. Where the database does not have any A. Record
transitive dependency?
B. Report
A. First normal form
C. Forms
B. Second normal form
D. None
C. Third normal form
D. Fourth normal form 9. The disadvantages of DBMS include
4. exists when different versions of the A. Complex for non-technical users
same data appear in different places B. Store small size data
A. Data integrity C. Low cost
B. Data anomaly
D. none of above
C. Data redundancy
10. Which of the following is false regarding
D. Data inconsistency
the reason why the function of system pro-
5. A collection of subject-oriented, inte- grammers should be separate from that of
grated, time variant, and non-volatile the database administrator?
data to support the decision-making pro- A. If one person has the authority to both
cess is the meaning of write programs and access data, then con-
A. Data mining trol issues become a concern.
B. Data warehouse B. The potential to commit fraud or em-
C. Data mart bezzlement or to destroy or alter the com-
pany’s records increases.
D. Basis data
C. The lack of proper segregation of du-
6. The steps taken after creating the ties provides more opportunity for some-
database are one to inject malicious code without being
A. Creating Tables detected.
B. Create Forms D. All information is false.
C. Make a report 11. Which one of the following keyword is
D. Create Table Files used to find out the number of values in
E. Create Queries a column?
A. Total
7. A field of one table which is also a the pri-
mary key of another table B. Count
A. Primary Key C. Sum
B. Relational database D. Add

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1170

12. A Database Management System is a type 17. The following are Characteristics of Data
of Dictionary EXCEPT
A. It is a type of system software A. include information on relationship be-
tween files
B. It is a kind of application software
B. Information about relationship of ta-
C. It is a kind of general software bles in database
D. Both A and B C. Place where all meta data for
database is stored

NARAYAN CHANGDER
13. Which of the following is not an Schema?
D. Provides direct control access to
A. Database Schema database
B. Physical Schema
18. Companies that start processing materials
C. Critical Schema and produce components or products af-
ter receiving orders from consumers. com-
D. Logical Schema
pany called?
14. The following are the benefits of digital A. LINE UP
data analysis, except B. ATO
A. spatial and non-spatial data can be C. WITH
managed together
D. MTS
B. data can be managed in a clear format E. MTO
C. costs incurred are less
19. is an example of hierarchical data
D. faster data retrieval model
E. data becomes more complex A. Doors and windows
B. Windows registry
15. are collections of similar types of enti-
ties C. RDM server

A. Relationship set D. Jellyfish

B. Entity set 20. can not be created in Microsoft access


C. ER set A. Tables
B. Queries
D. None of the above
C. Reports
16. Orders are done by carrying out the as- D. Image
sembly process of certain components to
produce the product that has been ordered. 21. The following are Characteristics of Early
Called the company? days database application EXCEPT.
A. ATO A. Contain Table Entity Relatinship
B. MTS B. Data build direct on the top of File sys-
tem
C. MTO
C. Multiple formats and duplications are
D. LINE UP implemented
E. WITH D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1171

22. Which of the following is not the type of 27. Data Manipulation Language is used to
the data model? the DBMS.

PRACTICE BOOK» NOT FOR SALE


A. Relational data model A. create
B. Semi-structured data model B. define
C. Entity-relationship model C. control access
D. Process-based data model D. manage

23. Which statement best describes a 28. In a literal sense. Data can be interpreted
database? as a representation of world facts that rep-
resent an object. An example of the object
A. a A collection of tables.
in question is except
B. Tables that are in sequence.
A. man
C. Tables of related information.
B. Goods
D. A collection of related tables. C. incident
24. There are 2 display templates that have D. The situation
been provided by Joomla, namely . E. Symbol
A. Administrator templates and site page
templates 29. The advantages of a client-server network
include:
B. Template customer dan template site
A. security is created, managed and en-
C. Administrator templates and catalog forced
templates
B. backup of data is centralised
D. Site page templates and article tem-
plates C. many computers have access to cen-
tralised resources
25. A collection of programs required to store D. All options
and retrieve data from a database is called
30. The set of all records of the same type is
A. RDBMS called
A. Files
B. DBMS
B. Tuple
C. SQL
C. Entity
D. None
D. Column
26. The following are tools that can be used
E. Attribute
for data visualization, except
A. Put. Feel 31. What is the use of DBMS in the telecom-
munication sector?
B. Plotly
A. For reservations and schedule infor-
C. FineReport
mation
D. Tableau B. Keep call records, monthly bills, main-
E. Windows Video Player taining balances

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1172

C. For storing customer, product and D. DFD


sales information E. hard drive
D. none of above
37. Which of the following must be installed
32. What is another name for the Secondary on your computer so as to run PHP script?
key field? A. ADOBE
A. Foreign key B. WINDOWS
B. Primary key

NARAYAN CHANGDER
C. APACHE
C. Alternate key
D. IIS
D. Candidate key.
38. As data objects and relationships among
33. Which type of application should you use if them are represented logical in an
you need to store a large quantity of data
A. Relational data model
in an organized format that you can easily
query? B. E-R model
A. Database C. Object based model
B. Presentation D. Semi-structured model
C. Spreadsheet 39. The database management system can be
D. Word Processor considered as the collection of that
enables us to create and maintain the
34. A data types which stores data and time database.
values from the year 100 through 9999.
A. Translators
A. Currency
B. Programs
B. Date/Time
C. Keys
C. OLE Objects
D. Language
D. Yes/No
40. The relationship between two or more en-
35. Disadvantages of File systems to store tities is the meaning of
data is:
A. Relation
A. Data redundancy and inconsistency
B. Attribute
B. Difficulty in accessing data
C. Model
C. Data isolation
D. Entity
D. All of the above
E. Key
36. The process related to the relational data
model for organizing data sets with high 41. which one of the following cannot be taken
or close dependencies and interrelation- as a primary key?
ships is the notion of A. ID
A. Normalization B. RegistrationNo
B. ERD C. DepartmentID
C. USB Disk D. Street

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1173

42. Relational calculus is a language 47. Choose multiple correct answers:To create
a database, the DBMS allows users to
A. Non-procedural

PRACTICE BOOK» NOT FOR SALE


A. Declare the data type
B. Procedural
B. Declare data structure
C. Both (A) and (B)
C. Declare constraints on data
D. none of above
D. Organize and control concurrent ac-
43. If you were collecting and storing informa- cesses
tion about your music collection, an album
48. State the 3 main categories of computer
would be considered a/an
viruses
A. Relation
A. boot sector viruses
B. Instance B. parasitic viruses
C. Entity C. micro viruses
D. Attribute D. trojan viruses

44. The reports are generally created after 49. A set of fields comprises a
making on the database. A. Database
A. Record B. Table
B. Statements C. Record
C. Tables D. File
D. Queries 50. I can perform an advanced search. I am
very similar to asking a detailed question.
45. At the user level, the database is grouped
into several user levels. Among them is A. report
the user who is the central controller of the B. query
entire database. What we usually call
C. table
A. Database Administrator
D. form
B. Application Programmer
51. It let you access frequently access com-
C. System Analyst mand.
D. Database Designer A. Navigation pane
E. End user B. Quick access toolbar

46. The details about a particular entity are C. Backstage view


called a . A is represented by a D. Ribbon
record in a database.
52. According to the definition of the term
A. Field Description database can be interpreted as a collection
B. Tuple of interconnected data that is stored to-
gether in such a way and without unnec-
C. Field type
essary redundancy, to meet various needs.
D. Attribute Redundancy means

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1174

A. Repetition 58. Data types to store text or alphanumeric


B. Branching and used the link or URL
C. Connection A. OLE Object
D. Dependency B. Lookup Wizard
E. Linkages C. Attachment
53. OLAP stands for: D. Hyperlink

NARAYAN CHANGDER
A. Online Analyst Process
59. The following is the correct way to write a
B. On Analyst Processing variable is you can answer more than
C. Online Analytical Processing 1
D. Online Analytical Processing A. price
54. The architecture of a database can be B. And Books
viewed as the
C. total price
A. One level
D. 12 talk
B. Two level
E. print
C. Three level
D. Four level 60. Which key ensure that data in a field must
only appear once in the whole table.
55. Which is not a function of a DBMS?
A. Provide database creation environ- A. Candidate key field
ment B. Foreign key
B. Provide an up-to-date and data mining C. Primary key field
environment
D. Alternate key field
C. Provides tools to control and control
access to the database 61. What does PHP files have a default file
D. Provide file management services extension?

56. Batch Orientation is included in the era A. .HTML


of B. .PHP
A. It was stable C. .XML
B. Era Mikro
D. .PH
C. He was a pioneer
D. Era Modern 62. A base or warehouse, nesting site or gath-
ering place is the literal meaning of
E. It was New
A. Basis Data
57. What is not a database component is
B. Basis
A. Table
B. Field C. Data
C. Record D. Record
D. View E. Entity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1175

63. I give the ability to present information in E. Data managed by the system supports
an easy-to-read format. I summarize and a multiuser environment (many users)
print information from the query search.

PRACTICE BOOK» NOT FOR SALE


68. The software used to support the
A. form database management process which is
B. table one of the database components is
C. query A. Application Software (software)
D. report B. Operating system (operating system).
64. Networks that are local and are usually C. Users (users)
used within the scope of schools, compa- D. Hardware
nies, and factories are called
E. Database Management System
A. MAN
69. The structure representing the organiza-
B. WAN
tional view of entire database is known
C. LAN as in MySQL database.
D. Ring A. SCHEMA
65. Which of the following gives a logical B. VIEW
structure of the database graphically? C. INSTANCE
A. Entity-relationship diagram D. TABLE
B. Entity diagram
70. A place to store a value is called
C. Database diagram
A. data type
D. Architectural representation
B. Variable
66. Sets of related data C. constant
A. Table D. Algorithm
B. Form E. Data Science
C. Report
71. The set of all possible values that a column
D. Field
may have is called as
67. The purpose of using the database is Speed A. Domain
and Ease (Speed), what is meant by Speed
B. Relation
and Ease (Speed) is
C. Degree
A. The use of databases can reduce repe-
tition or redundancy of data. D. Metadata
B. Users can save, change and display 72. Which one of the following is NOT an ad-
again quickly and easily. vantage of DBMS
C. Data accuracy is better maintained by A. Increased data consistency
applying certain rules and limitations
B. Reduced data redundancy
D. Databases that are not in use can be
separated from the database system that C. Improved data security
is currently active. D. Increase data isolation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1176

73. is a type of database that stores data 78. A set of rules in a programming language
physically. that defines what symbol combinations
A. Object database are considered to make up a properly struc-
tured document
B. Electronic Database
A. Statement
C. Manual Database
B. Syntax
D. Hybrid Database
C. Program

NARAYAN CHANGDER
74. Which of the following defines the term D. Scratch
‘field’ in relation to databases?
E. String
A. A field is all of the information about
one person or one thing 79. A list of containing every object in your
B. A field is the collection of all the database
database records on one topic or subject A. Menu Bar
C. A field is one type or piece of informa- B. Ribbon
tion
C. Navigation Pane
D. none of above
D. Quick access
75. The database management system is
80. Users involved in managing the database
A. Software and using the database which is one of the
B. Data database components are
C. Computer control program works A. Users (users)
D. Information of the organization to be B. Hardware
managed C. Database Management System
76. A person, place, event or item is called D. Application Software (software)
as E. Operating system (operating system).
A. Data
81. How many functions does a DBMS have?
B. Entity
A. 3
C. Attributes
B. 4
D. Relationships
C. 2
77. The basic database operation used to
D. 5
delete an archive sheet that is in an archive
folder is 82. MySQL belongs to which category of
A. create database DBMS?
B. create table A. OBJECT ORIENTED
C. drop table B. HIERARCHICAL
D. insert C. RELATIONAL
E. delete D. NETWORK

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1177

83. What is database? 88. Which one of these cannot be taken as a


A. Collection of organized data that al- primary key?

PRACTICE BOOK» NOT FOR SALE


lows access, retrieval of that data. A. ID
B. Collection of organized data that al- B. registration no
lows access, retrieval, and use of that C. Department ID
data.
D. Street
C. Collection of organized data that al-
lows retrieval, and use of that data. 89. In an ER model, what are objects also
known as
D. none of above
A. Entity
84. The circle symbol on the ERD is used to de- B. Relationship
scribe.
C. Bond
A. Entity
D. Joint
B. Attribute
C. Relation 90. Data elements (columns or fields) are the
smallest data units that cannot be broken
D. Enterprise down into other meaningful units. An ex-
E. object ample of a student data field is except
A. NIS
85. Which language is used to request infor-
mation from a Database? B. No
A. RELATIONAL C. . Address
B. STRUCTURAL D. Telephone
C. QUERY E. Work
D. COMPILER 91. is a collection of related fields.

86. Which of the following is not an A. Table


attribute B. Record
A. No C. Field
B. Date of birth D. Form
C. Location 92. Apa itu Internet of Things?
D. Gender A. Benda-benda di sekitar yang dapat
E. Nik berkomunikasi antara satu sama lain
melalui sebuah bantuan kecanggihan
87. The database is a system that is built by teknologi
several components including except B. Benda-benda di sekitar yang dapat
A. Hardware berkomunikasi antara satu sama lain
B. Application Software (software) melalui sebuah perangkat dengan sebuah
perangkat
C. Operating system (operating system).
C. Benda-benda di sekitar yang dapat
D. Database Management Software berkomunikasi antara satu sama lain
E. Manipulation System melalui sebuah jaringan seperti Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1178

D. Benda-benda di sekitar yang dapat 98. A base or warehouse, nesting place or


berkomunikasi antara satu sama lain gathering place is the literal meaning of
melalui pengguna dan benda
A. Basis Data
93. What will be the output of thefollowing B. Basis
PHP code? <? php$num = 1;$num1 =
2;print $num . “+”. $num1 ;? > C. Data
A. 3 D. Record

NARAYAN CHANGDER
B. 1+2 E. Entity
C. 1.+.2
99. are used for entering, modifying, and
D. ERROR viewing records.
94. Which of the following is a licensed oper- A. Tables
ating system?
B. Forms
A. Microsoft Windows NT Server
C. Database objects
B. Windows Server 2003
C. UNIX D. View

D. SOLARIS 100. The processes in ERP, except


95. is one of the oldest ways to maintain A. Sales Forecasting
records in a conventional file oriented data
B. Sales and Operations Planning
collection system.
A. records C. Advanced PlanningSystem

B. database D. Data warehousing


C. files E. Supplier Rating System
D. none
101. The phases in database design wherein
96. One way to create a table file is to use one gathers and list all the necessary
fields for database projects.
A. Datasheet View
B. Data Form A. Data control
C. Datasheet Report B. Data Definition
D. Data View C. Data relationship
E. Datasheet Queries D. Data refinement
97. The relationship between two entities can
102. Which of the following is NOT an exam-
be given using the lower and upper lim-
ple of a database?
its.This information is called
A. telephone book
A. Cardinality
B. Composite entity B. real estate listing
C. Optional relationships C. online library catalog
D. Business rules D. DVD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1179

103. What things need to be prepared in build- 107. The first step that must be taken to cre-
ing an ERP system? (more than 1 answer) ate a database application is

PRACTICE BOOK» NOT FOR SALE


A. Hardware A. Create Database Files
B. Software (software) B. Create Forms
C. Information Technology C. Make a report
D. Human Resources D. Create Table Files
E. Work steps as well as information sys- E. Create Queries
tem concepts that will be made.
108. Data Warehouse is usually used for?
104. What is the difference between an entity A. Accommodates historical data for
and an attribute? many years
A. An attribute is a table in a database B. Organizing daily data
and an entity is a field
C. Statements 1 and 2 are correct
B. An attribute is a record in a database
and an entity is a table D. Statements 1 and 2 are wrong
C. An attribute is a field in a database and 109. All of the following are data type ex-
an entity is a table cept?
D. none of above A. Name
105. Which of the following tools are used to B. Memo
open NoSQL database types? C. Short text
A. MySQL D. Number
B. Please DB
110. Which type of data can be stored in the
C. PostgreSQL database?
D. Oracle A. Image oriented data
106. The purpose of Shareability (Sharabil- B. Text, files containing data
ity) of one of the purposes of using the C. Data in the form of audio or video
database is
D. All of the above
A. The use of databases can reduce repe-
tition or redundancy of data. 111. is responsible for the maintenance of
operational control.
B. Users can save, change and display
again quickly and easily. A. Data Administrator (DA)
C. Data accuracy is better maintained by B. Database Administrator (DBA)
applying certain rules and limitations. C. Database Designers (Logical & Physi-
D. Databases that are not in use can be cal)
separated from the database system that D. Application Programmers
is currently active.
E. The data managed by the system 112. Which one of the following is NOT an ex-
supports a multiuser environment (many ample of data
users). A. RM10

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1180

B. Girl C. Database lockout


C. Boy D. Data redundancy
D. The boy received RM10 117. It allows you to specify exactly how data
should be entered into the database.
113. Software for database server, except
A. Lookup wizard
A. Ms. Access
B. Query
B. Mysql
C. Input mask

NARAYAN CHANGDER
C. SQL server D. none of above
D. Oracle
118. Data type used to store currency value
E. Ms.Office and numeric data used in mathematic cal-
culations involving data with one to four
114. At the user level, the database is grouped
decimal places
into several user levels. Among them
are users who create application programs A. Numeric
to interact with the system or access B. Currency
databases by calling through certain pro- C. Short text
gramming languages. What we usually
D. Long text
call
A. Database Administrator 119. The type of datatype can store valued
used in mathematical calculations
B. Application Programmer
A. Autonumber
C. System Analyst
B. OLE Object
D. Database Designer
C. Numeric
E. End user D. Short Text
115. Which of the following query would dis- 120. A fact about something in the real world
play all the students whose first name (can be in the form of numbers, strings of
starts with the character ‘A’? characters, symbols and images) that can
A. select first name from students be recorded and stored on computer media.
where first name like ‘A%’; is the meaning of
B. select first name from students A. Data
where first name like ‘%A’; B. Information
C. select first name from students C. Database
where first name like ‘%A%’; D. Information Systems
D. select first name from students 121. A Database Management System (DBMS)
where first name like ‘A’; is
116. Occurs when multiple users seeking ac- A. Collection of interrelated data
cess to the same set of records lockout B. Collection of programs to access data
each other.
C. Collection of data describing one par-
A. Data manipulation ticular enterprise
B. Deadlock D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1181

122. Data Warehouse berisi data: 127. In which one of the following, the mul-
A. Transaksi tiple lower entities are grouped (or com-
bined) together to form a single higher-

PRACTICE BOOK» NOT FOR SALE


B. History level entity
C. Data Corrupt A. Specialization
D. Data tidak Valid
B. Generalization
123. Company X has 25 computers that are C. Aggregation
connected to each other and can access the
internet, but at one point one computer D. None of the above
cannot connect, but other computers can 128. Defined as a relationship that occurs be-
still be connected to each other and can ac-
tween one entity and another entity.
cess the internet smoothly. So from this
illustration it can be concluded that topo- A. Entity
logically company X applies B. Attribute
A. ring topology C. Relation
B. Linear topology D. Key
C. star topology
129. DBMS is an application program that is
D. Topology Peer to peer
created and works in one system. The
124. It is used to customized formats for DBMS is designed to assist in the mainte-
adding, editing, deleting or displaying nance and utility of large data sets. DBMS
data. stands for
A. Field A. Data Manipulation System
B. Report B. System Management Database
C. Macro C. Database Management System
D. Form D. database management system
125. a = 5b = “hello”print (a, b) E. Database Manipulation System
A. 5 130. Columns in a database are called
B. Hello A. Rows
C. 5 Hello
B. Fields
D. Hello 5
C. Tables
E. 5 5
D. none of above
126. is the individual properties of an en-
tity. An is represented by a field in a 131. The following are the functions of a
database. DBMS except
A. Tuple A. Creating database
B. Field B. Processing data
C. Record C. Creating and processing forms
D. Attributes D. Administrating database

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1182

132. Before building the web the first step 137. Types of Database System supports data
that must be done is to create an empty across several sites
folder in the . directory.
A. Data Warehousing database
A. Drive C → www B. Distributed Database
B. Drive C → wamp C. Operational Database
C. Drive C → program files D. none of above
D. Drive C → wamp → www

NARAYAN CHANGDER
138. Planning that is intended to cover the
133. What are the advantages of DBMS? next 5 years is called planning?
A. Low cost of hardware & software A. the strategic plan
B. DBMS are simple to use B. medium term

C. Uniform administration procedures C. Short-term


for data D. Long-term
D. Offers a variety of techniques to store E. Measurable term
& retrieve data
139. Features in MS access build to provide
134. An e-commerce web application specially help topics and topics on tasks performed
used together with Joomla CMS namely working with Access
.
A. Index
A. Virtuemart
B. Office Assistant
B. PHPMyAdmin
C. Query
C. MySQL
D. Ribbon
D. Localhost
140. Which of the following provides a tool to
135. Which of the following PHPstatement control and control access to a database?
will store 41 in variablenum? A. Edit students’ information when new
A. BOTH (i) AND (ii) students are admitted to the union
B. ALL OF THE MENTIONED B. Find all 12th graders who are good at
Informatics
C. ONLY (iii)
C. Report at the end of the first semester
D. ONLY (i)
of the number of good, good, average and
weak students in the whole school, each
136. The characteristics of healthy data, ex-
class, and each block
cept
D. The database can be restored when
A. no redundant data
the server station is down and no longer
B. naming does not come from objects contains student data for the whole
(eg:people, places, etc.) school.
C. data must be accurate
141. A database management system (DBMS)
D. data based on user opinions is a:

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1183

A. Software system used to create, main- 146. Humans who have full responsibility in
tain, and provide controlled access to a database management include:setting ac-
database cess rights, coordinating and monitoring

PRACTICE BOOK» NOT FOR SALE


B. Hardware system used to create, and being responsible for hardware and
maintain, and provide controlled access to software requirements. Is
a database A. System Analyst
C. Hardware system used to create, B. Database Designer
maintain, and provide uncontrolled ac- C. Application Programmer
cess to a database
D. Database Administrator
D. Software system used to create, main-
tain, and provide uncontrolled access to a E. Application Programmers (Software
database Engineering)

142. The language for expressing data mining 147. A description of the data elements in a
and update requirements is database, the relationships among them,
and the logical model used to organize and
A. Data manipulation language describe the data.
B. Data definition language A. Subschema
C. Data update language B. Logical view
D. Database language C. Physical view
143. The software included in the DBMS is D. Schema
A. Visual Basic, Oracle, dan MySQL E. External-level schema
B. Delphi, Microsoft Access, dan MySQL 148. The following are not features of Close
C. Microsoft Access, MySQL, dan Oracle Loop MRP
D. Microsoft Word, MySQL, dan Oracle A. It’s a suite of functions, not just MRP
E. Pascal, Delphi, and Visual Basic B. Provides feedback function from exe-
cution to planning.
144. A collection of relationally similar records
stored on a secondary storage medium is C. Plans can be changed/replaced if
called a needed by keeping priorities valid.
A. File D. Sales and operations planning, which
is used to balance demand and supply.
B. Record
E. Consists of tools for solving priority is-
C. Tuple
sues, capacity planning and execution.
D. Attribute
149. Software (Software) that is used to
E. Entity
manage a collection or collection of data,
145. The data dictionary is a system structure where the data is organized or compiled
that stores into a data model is called
A. Database A. Field
B. Metadata B. DBMS
C. Hardware C. Record
D. Software D. Four

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1184

150. Which of the following is Database Lan- C. Support in the development of the com-
guage? plex applications software
A. Data Definition Language D. All of the above
B. Data Manipulation Language 156. The type of datatype which allows al-
C. Query Language phanumeric characters and special symbols
D. All of the above but can store up to 255 characters.
A. Auto number
151. What does DBMS stand for?

NARAYAN CHANGDER
B. Text
A. Database Management System
C. OLE Object
B. Database Manufacture System
D. Memo
C. Database Malfunction System
D. none of above 157. Which of the following is not true about
the ALTER TABLE statement?
152. Logically related data consists of these
A. It can add a new row.
EXCEPT
B. It can add a new column
A. attributes
C. It can modify existing columns
B. relationships
D. It can define a default value for the
C. entities
new column
D. variables
158. The following shows the types of
153. Using different file organization should DBMS
not require change to conceptual or exter-
A. Hierarchical database
nal schemas. This is referring to
B. Object-oriented database
A. Logical Data Independence
C. Relational database
B. Physical Data Independence
D. Rational database
C. Conceptual Data Independence
D. User Data Independence 159. One or more very large databases con-
taining both detailed and summarized data
154. What does the PING command stand for a number of years that is used for anal-
for? ysis rather than transaction processing.
A. Protokol Internet Gopher A. Data warehouse
B. Google Internet Packages B. Data Sharing
C. Paket internet Gopher C. Database
D. Paket International Gopher D. Data Mining
155. The Database Management Query lan- 160. Data warehousing is related to
guage is generally designed for the
A. create data warehouse
A. Specifying the structure of the
database B. update data

B. Support end-users who use English C. scan and load data for analysis
like commands D. write new data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1185

161. a database that stores current data and D. Quick access


past data originating from various opera-
tional systems and other sources (external 166. We can use to comment a single line?

PRACTICE BOOK» NOT FOR SALE


sources) that are of significant concern to i) /? ii) // iii) # iv) /* */
management within the organization and A. ONLY (II)
is intended for management analysis and B. (I), (iii), AND (iv)
reporting purposes in the framework of de-
C. (ii), (iii) AND (iv)
cision making is the definition of:
D. BOTH (ii) AND (iV)
A. Online Transaction Processing
B. Online Data 167. SELECT * FROM employee WHERE
salary>10000 AND dept id=101;Which
C. Data WareHouse
of the following fields are displayed as
D. Information Data output?
162. allow you to enter, store, analyze, A. Salary, dept id
and compile your data however you want. B. Employee
A. DBMS C. Salary
B. Forms D. All the field of employee relation
C. DBMS Objects 168. The core of a website that functions to
D. Tables display a website in a browser display is
called .
163. to determine the data type in Python us-
ing the code A. Search Engine

A. type() B. MySQL

B. type; C. Web Server

C. int x D. WampServer

D. a = integer 169. the field of medicine, communication in


the Modern Era (Fourth Era) is included
E. float
in
164. ERP elements consist of? (Answers more A. Expert System
than 1)
B. Al Machine
A. Company
C. Parallel Architecture
B. Resource
D. Al Pearl
C. Planning
E. Expert Machine
D. Information Systems
170. Hardware that must exist in a computer
E. Business process
in order to connect to a computer network
165. It contains multiple tabs, each with sev- is
eral groups of commands. A. VGA
A. Menu Bar B. Network Interface Card
B. Ribbon C. RAM
C. Navigation Pane D. Soundcard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1186

171. The personal database system assumes B. External level


that no two transactions will happen at C. Physical level
the same time on one table, which is
known as D. Conceptual level

A. Client Server 176. The four main objects of a relational


database consist of:
B. Network
A. form, table, query, report
C. Transaction
B. form, table, database, query, report

NARAYAN CHANGDER
D. Optimistic locking
C. form, sort, table, query
172. The system is in the form of a dis- D. form, column, row, report
tributed database that will map/convert
host/machine/domain names to IP (Inter- 177. An instruction or command sentence in a
net Protocol) addresses and vice versa programming language to be executed by
from IP addresses to hostnames, which is a computer is called
called reverse-mapping. It is a function of A. Statement
a Network Service called
B. Syntax
A. Domain Database
C. Program
B. Domain Name Server
D. Scratch
C. Web Server
E. String
D. Samba Server
178. Database management system used to
E. Mail Server
A. create, update and exploit information
173. In the database world, sometimes we are in the database
familiar with the term data redundancy. B. create information in the database
The meaning of redundancy data is
C. Create and store information in a
A. Data Allowance database
B. Data Frame D. information extraction in the database
C. Data Condition
179. a = 10b = 10c = a + bprint(c)
D. Data error
A. 10 10
E. Data Position B. 10 + 10
174. The language in which users express re- C. 20
quirements for creating databases is called D. 10
A. Data definition language E. 20 10
B. Data manipulation language
180. The convenient way to enter or find data
C. Data Description Language in tables.
D. Database language A. Forms
175. Which of the following levels is consid- B. Macros
ered as the level closed to the end-users? C. Modules
A. Internal level D. Report

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1187

181. is a unique field by which records are 186. The main challenges of the evolution of
identified in a table. software development are

PRACTICE BOOK» NOT FOR SALE


A. Name A. reduce the cost of quality computer-
based solutions
B. Field
B. increase costs and improve the quality
C. Primary Key
of computer-based solutions
D. None C. reduce costs and improve the quality
of desktop-based solutions
182. A diagram in the form of an image or
symbol that identifies the type of entity D. reduce costs and improve the quality
in a system described in the data with its of computer-based solutions
attributes, and explains the relationship E. improve the quality of computer-based
or relations between these entities, is the solutions
meaning of
187. Which of the following is not fully sup-
A. ERD
ported by all commercially available sys-
B. CFD tems, but supports if religiously?
C. MAD A. Entity integrity
D. DFD B. Referential integrity
E. DAD C. Relational algebra
D. Relational calculus
183. Which of the following is a Data Model?
A. Entity-Relationship model 188. which is the code to add comments in
python
B. Relational data model
A. //
C. Object-Based data model
B. #
D. All of the above
C. ‘’ “
184. Relationship expresses the relationship D. /*
between
E. *
A. two or more attributes
189. The recommended hardware architecture
B. two or more entities in building an ERP system is in the form
C. two or more relationships of?
D. attribute with relationship A. stand alone
E. attributes with entities B. client server
C. 3 tiers
185. The attribute refers to a of a table
D. peer to peer
A. Record
190. rapid advances in microelectronics led
B. Foreign key
to better computing capabilities at lower
C. Primary key costs around the year
D. Field A. the 1980s

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1188

B. the 1981s 196. builds the application programs that


C. the 1982s provide the required functionality for the
end-users.
D. the 1983s
A. Data Administrator (DA)
E. the 1984s
B. Database Administrator (DBA)
191. Examples of DBMS, Except: C. Database Designers (Logical & Physi-
A. Ms. Access cal)

NARAYAN CHANGDER
B. SQL Server D. Application Programmers
C. XAMPP 197. Where the database does not have any
D. Oracle multivalued columns?

192. The features responsible for controlling A. First normal form


the sequence or order of the records B. Second normal form
A. Query C. Third normal form
B. Report D. Fourth normal form
C. Sort
198. A client-server based application that
D. Table functions as a medium for exchanging data
between applications over a network, is
193. To see the templates that have been the meaning of?
added to Virtuemart, we select the menu
. A. Web Service

A. Extensions → manage B. Web communication

B. Extension → template C. Web database


C. Extensions → modules D. Web server
D. Extensions → plugins 199. The following are types of servers, EX-
CEPT?
194. The following shows the functionalities
of DBMS except A. Mail server
A. Manipulate B. Print Server
B. Multiply C. Website Servant
C. Share D. Database Server
D. Construct 200. The results of the normalization process
are data tables in the form of
195. To find out the IP address of our computer
via CMD, by typing the command . A. Normal Form
A. Ipconfig B. Form Output
B. Ping C. Chart
C. IPSetting D. Input Form
D. Select E. Horizontal table

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1189

201. Objects that represent something in the C. Game Server


real world and can be distinguished from D. Web Server
one another (unique) is the notion of

PRACTICE BOOK» NOT FOR SALE


A. Entity 206. Representing elements of data related to
relationships is called
B. Key
A. Table
C. Normalization
B. Attribute
D. Attribute
C. Relations
E. Relation
D. File
202. Joomla is a CMS that is open source, the
207. Database management so important be-
meaning of open source is .
cause of the following reasons except
A. Can accommodate web data
A. It allows better updates
B. Can be developed such as modifying,
B. It helps increase organisational acces-
deleting, or adding scripts that are in-
sibility to data
cluded in the web
C. It helps people to be promoted as man-
C. Can be run on smartphones
ager
D. Can be run without an internet connec- D. It increases efficiency
tion
208. which is displayed in a visual form, which
203. a collection of data that is managed in can be used to view, modify and analyze
such a way based on certain interrelated data in a variety of different ways is the
provisions so that it is easy to manage, is meaning of
the meaning of?
A. Query
A. Database
B. ISAM
B. DBMS
C. Table
C. Management Data
D. Trigger
D. Manipulation Data
E. Model
204. An integrated set of data that is orga-
209. In which dependency, a nonkey column is
nized to meet the needs of users within
dependent on part of the primary key?
an organization is the meaning of
A. Partial dependency
A. Data
B. Transitive dependency
B. Data warehouse
C. Total (or) full dependency
C. Basis data
D. none of above
D. Data mining
210. IOT is an acronym for?
205. These are servers that implement games
or services for games such as social game A. Internet on Things
elements. B. Integrasi of Things
A. File Server C. Internet of technology
B. Media Server D. Internet of Things

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1190

211. Which of the following is generally used 216. What is meant by SQL?
for performing tasks like creating the
A. SQL (System Qualified Language)
structure of the relations, deleting rela-
tion? B. SQL (Structure Qualified Language)
A. DML C. SQL (Structured Query Language)
B. Query D. SQL (System Query Language)
C. Relational schema
E. SQL (Structured Qualified Language)

NARAYAN CHANGDER
D. DDL
217. Types of Database System where sup-
212. This type of server provides services to
ports a small number of users(few than
applications such as mobile applications.
50) or specific department within an orga-
A. Application Server nization
B. Media Server A. Enterprise Database
C. Game Server
B. Centralized Database
D. Web Server
C. Workgroup Database
213. The database object that is used as a
means to store data is the notion of D. none of above

A. Tables 218. Which of the following is NOT Advan-


B. Form tages of DBMS
C. Report A. Increased data consistency
D. Queries B. Reduced data redundancy
E. hard drive
C. Improved data security
214. Primary Key is D. Increase data isolation
A. The value of the relation key that iden-
tifies the unique value of a relation 219. a data warehouse can include
B. Key-values that can be broken down by A. flat-files
more than one attribute
B. database table
C. key connecting the two tables and com-
pleting a relationship (relationship) to the C. online data
primary key D. all
D. is the minimal attribute that uniquely
distinguishes each row in the table 220. Which of the following provides the abil-
ity to query information from the database
215. Data types to store field uses tables or and insert tuples into, delete tuples from,
values list to validate the content of a sin- and modify tuples in the database?
gle value per row
A. DML
A. OLE Object
B. Lookup Wizard B. DDL
C. Attachment C. Query
D. Hyperlink D. Relational schema

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1191

221. A collection of fields and records in a spe- name alphabetically? SELECT * FROM in-
cific category structor ORDER BY salary , name

PRACTICE BOOK» NOT FOR SALE


A. Record A. Ascending, descending
B. Table B. Asc, Desc
C. Field C. Desc, Asc
D. none of above D. All of the above
226. What does ERD stand for?
222. data refers to describing the data
description, representing data semantics, A. Entity Relationship Diagram
and describing the consistency constraints B. External Relation Diagram
that apply to the data.
C. Entity Relationship Data
A. Adding D. Empty Relationship Diagram
B. Modifying E. External Relationship Data
C. Modeling
227. As a result of data processing that has
D. Refining been processed in such a way that it has a
certain meaning for the user, is the mean-
223. Data Management Activities: ing of
A. Data Collection > Integrity and test- A. Basis data
ing > Maintenance >Storage > Security
>Collection > Organization B. Information Systems
C. Data
B. Data Collection > Integrity and test-
ing > Storage > Maintenance > Security D. Information
> Organization > Retrieval
228. What type of datatypes your going to
C. Data Collection > Integrity and test- used if you wanted to store information if
ing > Organization > Storage > Re- the student is CURRENTLY ENROLLED OR
trieval > Security > Maintenance NOT?
D. Data Collection > Security > Organi- A. Auto number
zation > Storage > Maintenance > In- B. Date / Time
tegrity and testing > Retrieval
C. Numeric
224. The record is a field unique identifies ev- D. Yes/No
ery record in a table
229. A series of characters in the Python lan-
A. Query guage which can be letters, digits, or sym-
B. Primary Key bols, whose writing begins and ends with
C. Record quotation marks is called
A. Statement
D. Secondary Field
B. Syntax
225. In the following Query, which of the fol- C. String
lowing can be placed in the Query’s blank
portion to display the salary from highest D. Program
to lowest amount, and sorting the employs E. Scratch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1192

230. The column in a table is called D. column (field or attribute)


A. Record E. format rows (records) and columns
B. Row (fields or attributes)

C. Field 236. The features of MS Access builds to pro-


vide helps topics and topics on tasks per-
D. none of above
form while working with Access.
231. The number of columns in a table is called A. Index

NARAYAN CHANGDER
B. Office Assistant
A. Domain C. Query
B. Relation D. Report
C. Degree
237. Which of the following is a top-down
D. Metadata approach in which the entity’s higher
232. print (”Hello”) then the output is level can be divided into two lower sub-
entities?
A. Helo
A. Aggregation
B. Two
B. Generalization
C. Hello
C. Specialization
D. hello
D. All of the above
E. Helo
238. Which of the following in not a function
233. The following are not included in the of DBA?
virtuemart feature, namely . A. Network Maintenance
A. Chatting B. Routine Maintenance
B. catalog C. Schema Definition
C. Check out D. Authorization for data access
D. Payment
239. Consider attributes ID, CITY and NAME.
234. In database table, rows are called which one of these can be considered as a
primary key?
A. field
A. NAME
B. column
B. ID
C. record
C. CITY
D. none of above
D. ID, NAME
235. A table is a collection of data arranged
240. What does DBMS stand for
in
A. Database Multiple System
A. row formats (records) and attributes
B. Database Manager System
B. tables and columns (fields or at-
tributes) C. Database Management System
C. columns (fields or attributes) and rela- D. Database Management Supply
tions E. All Answers Salan

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1193

241. The following are the data types of the 246. Which one of the following commands is
Python programming language, except used for removing (or deleting) a relation
forms the SQL database?

PRACTICE BOOK» NOT FOR SALE


A. integer
A. Delete
B. number
B. Drop
C. tuple
C. Remove
D. float
D. All of the above
E. string
247. Database management system is
242. What is the program that enables you software
to create, access and manage electronic A. System
database called?
B. Relational
A. Database C. Application
B. Data Structure D. Game
C. Operating system
248. Which of the following is a function of the
D. Database Management System. DBMS?
A. Storing data
243. . The term attribute refers to a of a
table. B. Providing multi-users access control

A. Record C. Data integrity


D. All of the above
B. Column
C. Tuple 249. In the normal form, a composite
attribute is converted to individual at-
D. Key tributes

244. The data type that represents a decimal A. First Normal Form
number is B. Second Normal Form
A. string C. Third Normal Form
B. float D. Fourth Normal Form

C. integer 250. The data source for the data warehouse


is
D. boolean
A. Operational data within the organiza-
E. long integer tion
245. Why we need database? B. Obtained external sources
A. To store a particular picture C. Statements 1 and 2 are correct
D. Statements 1 and 2 are wrong
B. To store a particular text
C. To store a particular collection of data 251. DBMS stands for
. A. Database Management System
D. To store a particular audio B. Database Management Sistem

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1194

C. Database Management System 257. A branching structure that has more than
D. Database Management System 2 (two) conditions can use the command

E. Database Management System


A. for atau while
252. helps you retrieve information from B. if
table as when required.
C. if-else
A. Report
D. if-elif-else

NARAYAN CHANGDER
B. Database E. elif
C. Record
258. Types of Database System where sup-
D. Query ports data located at single site.
253. Data resulting from questions you asked A. Centralized Database
from one or more tables B. Enterprise Database
A. Form C. Workgroup Database
B. Report D. none of above
C. Queries
259. is responsible for the management of
D. Field the data resource.

254. Which of the following is NOT example A. Data Administrator (DA)


of data? B. Database Administrator (DBA)
A. RM10 C. Database Designers (Logical & Physi-
cal)
B. The
D. Application Programmers
C. The boy received RM10
D. Boy 260. Dbms stands for
A. Database management system
255. Which one of the following commands is
used to restore the database to the last B. Database management storage
committed state C. Data base manipulation system
A. Roll back D. Database manipulation storage
B. Save point 261. represents a “tuple” in a relational
C. Committ database?
D. Both A and B A. TABLE
B. ROW
256. Using which language can a user request
information from a database? C. COLUMN
A. Compiler D. OBJECT
B. Query 262. What is DBMS?
C. Structural A. DBMS is a collection of queries
D. Relational B. DBMS is a high-level languages

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1195

C. DBMS is a programming languages B. Field size


D. DBMS stores, modifies and retrieves C. Field Description

PRACTICE BOOK» NOT FOR SALE


data
D. All of the above
263. In making an online web shop we need
a database, the purpose of creating a 268. Which is not a property of data ware-
database is . house?
A. To open the built web view A. subject oriented
B. To upload a product catalog B. time variant
C. To accommodate online store data
C. collection from heterogeneous
D. To download images from the internet sources
264. The diagram gives a logical structure D. volatile
of the database graphically?
A. ENTITY-RELATIONSHIP 269. When a join is based on equality of value,
it is known as a
B. ENTITY
A. Outer join
C. ARCHITECTURAL REPRESENTATION
D. DATABASE B. Natural join
C. Self Join
265. So that the data that has been processed
is easily understood by other people, the D. Equi join
data is usually presented in the form of
270. Tujuan Basis data:
A. video A. Speed, Availability, Sharability, Space,
B. chart Completeness, Accuracy, Security
C. sketch B. Data, Informasi, Knowladge Manaje-
D. text men
E. raw data C. Normalization, Cardinality, Complete-
ness.
266. Which of the following is the disadvan-
tages of DBMS? D. none of above
A. Cost of setup of DBMS is relatively
271. Programs that provide other data ser-
cheap
vices to computers or computer programs,
B. Database systems are complex as defined by the client-server model, are
C. Database will not be corrupted called
D. Database systems are fast to be de- A. DNS Server
signed
B. Mail Server
267. A describes what is in the field. This C. Database Server
description is displayed in the status bar
when you select this field on the form. D. Web Server
A. Field type E. Remote Server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1196

272. This server is based on the internet that 277. a computer program that provides
responds to requests from clients such as database management services and
web browsers serves computers or database application
programs that use a client/server model
A. File Server
is the notion of
B. Media Server
A. Phpmyadmin
C. Game Server
B. Database Client
D. Web Server

NARAYAN CHANGDER
C. Database server
273. The abbreviation for CMS is . D. MySQL
A. Communications Management System
278. The following attributes are most appro-
B. Content Management Security priate for the student entity:
C. Content Message System A. name, class, no hp, address, email
D. Content Management System B. nis, name, class, address,
gender gender
274. Data Manipulation Language enables
C. name, class, name book, address,
users to
gender gender
A. Retrieval of information stored in
D. nis, code book, address, nik, e-mail
database
E. name, address, sex gender, class,
B. Insertion of new information into the
code medication
database
C. Deletion of information from the 279. Pay attention to the following steps:(1)
database Identify the data and group them based
on their characteristics. (2) Normalize the
D. All of the above
data (3) Collect the required data (4) Data
275. The key that can be used for data re- analysis The proper sequence of data anal-
trieval is known as ysis procedures is

A. Foreign key A. -(2)-(3)-(4)

B. Surrogate key B. -(1)-(3)-(4)

C. Primary key C. -(4)-(1)-(3)

D. Secondary key D. -(4)-(2)-(1)


E. -(1)-(2)-(4)
276. something that concerns goods, events,
activities, and transactions that have been 280. In a relational model, a row is known as
recorded, is classified as known
A. Entity A. Domain
B. Attribute B. Degree
C. Data C. Tuple
D. Information D. Attributes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1197

281. . A in a table represents a relation- 286. The following are purpose of a database,
ship among a set of values which is NOT true?

PRACTICE BOOK» NOT FOR SALE


A. Column A. To store data
B. Key B. To create a responsive web page
C. Row C. To provide an organizational structure
for data
D. Entry
D. To provide a mechanism for CRUD data
282. The following is an example of manual
data processing, except 287. Formatted summaries suitable for print-
ing
A. ledger bookkeeping
A. Table
B. interview
B. Form
C. direct observation
C. Report
D. oracle
D. Field
E. spreadsheet
288. Providing data services that will later be
283. Proponent of Entry-Relationship (ER) channeled into other computer or PC pro-
Model grams by utilizing a client-server system
is the notion of
A. Ted Codd
A. How Database Servers Work
B. Bill Gates
B. Database Server Configuration
C. Peter Chen
C. How it Works Client database
D. none of above
D. Client Database Configuration
284. Which of the following is not a tangible
cost? 289. Data that has been managed in a certain
form to provide meaning or significance for
A. Salary the recipient
B. software purchase A. Data
C. hardware purchase B. Attribute
D. overtime honors C. Entity
E. soft skills training D. Information

285. A computer system that provides certain 290. To be able to access localhost in a web
services in a computer network is an ex- browser with XAMPP, you can do this by
planation of
A. Server A. Enabling the Mercury start button in
XAMPP
B. Client
B. Enables the FileZilla start button in
C. Host
XAMPP
D. Computer C. Enable the Tomcat start button in
E. User XAMPP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1198

D. Enabling the Apache start button in E. The amount of raw materials that must
XAMPP be ordered according to the level of pro-
E. Enabling the MySQL start button in duction and when to order?
XAMPP
295. What does the acronym DBMS stands
291. An is an item in the real world that is for?
represented in a database. A. Data Bypass Management System
A. Manual Database B. Database Management System

NARAYAN CHANGDER
B. Field name C. Digital Base Management System
C. Entity D. All of the above
D. Records
296. The software used to manage database
292. Helping users to understand patterns, applications and the use of computer re-
trends, relationships, and outliers hidden sources which is one of the database com-
in big data is the benefit of data ponents is
techniques A. Operating system (operating system).
A. visualization B. Hardware
B. collection C. Users (users)
C. processing
D. Application Software (software)
D. integration
E. Database Management System
E. documentation
297. Which part of the database is included?
293. A peer-to-peer network:
A. Sistem database
A. usually links just two computers
B. User
B. allows computers on the network to ex-
change files with each other C. Operating system

C. is often used by people working in a D. All true


large organisation
298. is a database management package
D. is not vulnerable to hacking
A. MS Excel
294. Mention 2 things that need to be consid- B. MS Word
ered in the implementation of the manufac-
turing process C. Ms Access

A. How many kinds should be produced, D. MS Paint


and when?
299. It is a collection of data that is related to
B. How many people should be involved a particular subject or purpose
in the production process
A. Field
C. The price that must be priced from the
B. Row
product produced
D. When will the distribution of finished C. Column
goods be carried out? D. Database

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1199

300. is a database that supports data dis- D. date


tributed across several different sites
E. information

PRACTICE BOOK» NOT FOR SALE


A. Centralized database
B. Distributed database 306. Below are included the uses of MySQL
are
C. Enterprise database
A. Quick access
D. Discipline specific database
B. A database management system
301. A database management system is
C. Easy to use
A. MySQL
D. Fast connection
B. Proxy
E. Efficient
C. Apache
D. Php 307. Which of the following operations on a
database is a database creation?
302. The linking of tables and files to share
records is known as a A. Create a table of student information
including:Full name, date of birth, place
A. Form
of birth, gender, address, grade. Binding
B. Relationship points between 0 and 10
C. Foreign key B. New transfer student Ngo Ngoc Ha has
D. None of the above been added to the school

303. Data types where we can store files like C. Sort the list of students by block, in
digital photos each block by class, in class in ascending
order by name
A. OLE Object
D. Detect and disallow student access to
B. Hyperlink
edit grades in the database
C. Attachment
D. Lookup Wizard 308. The fact of an object is called
A. Information
304. Command is used to delete a
database. B. Data
A. DELETE DATABASE DATABASE NAME C. meta data
D. Database
B. DELETE DATABASE NAME
E. DBMS
C. DROP DATABASE DATABASE NAME
D. DROP DATABASE NAME 309. a group of related data organized in
columns and rows in a datasheet.
305. In terms of language, the word data
comes from the Roman language, namely A. Record

A. dates B. Fields
B. datum C. Tables
C. data D. Report

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1200

310. To which of the following the term “DBA” D. Byte


referred? E. Record
A. Database administrator
315. Communication is established with
B. Data bank administrator
MySQL using
C. Data Administrator
A. SQL
D. None of the above
B. NETWORK CALLS

NARAYAN CHANGDER
311. One of the key factors in the success of a C. JAVA
business is
D. API’S
A. depend on quality
B. the ability of a hardware to support the 316. Which of the following is not involved in
business DBMS?
C. the ability of a software to support A. End Users
quality B. Data
D. computer based solution C. Application Request
E. depending on the software product D. HTML
312. Functions return values in the Python lan- 317. Types of Database System designed to
guage when implementing or calling the support companies day-to-day operations
function
A. Data Warehousing database
A. def
B. Distributed Database
B. return
C. Operational Database
C. then
D. none of above
D. if
E. while 318. Each item from this list is classified
as Name, Birthdate, Street, County,
313. Objects that represent something in the PostCode
real world and can be distinguished from
one another (unique) are called A. Table

A. Files B. Record

B. Tuple C. Field

C. Entity D. none of above


D. Column 319. A set of fields that are related to a par-
E. Attribute ticular object is called
A. Record
314. A group of data items/fields with certain
characteristics and named are called B. Entities
A. Data Agregrate C. File
B. Bit D. Attribute
C. Tuple E. Tuple

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1201

320. . A relational database consists of a col- B. Database Designer


lection of C. Application Programmer

PRACTICE BOOK» NOT FOR SALE


A. Tables D. Database Administrator
B. Fields E. Application Programmers (Software
C. Records Engineering)
D. Keys 326. software developments namely
321. A branching structure that has 2 (two) A. Pioneer Era (First Era), Stable Era (Sec-
conditions can use the command ond Era), Micro Era (Third Era), Modern
A. for atau while Era (Fourth Era)

B. if B. Pawn Era(First Era), Stable


Era(Second Era), Micro Age(Third Era),
C. if-else Modern Era(Fourth Era)
D. if-elif-else C. Pioneer Era(First Era), Stable
E. elif Era(Second Era), Micro Era(Third Era),
Modern Era(Fourth Era)
322. The term “TCL” stands for
D. Pioneer Era (First Era), Ancient Era
A. Ternary Control Language (Second Era), Micro Era (Third Era), Mod-
B. Transmission Control Language ern Era (Fourth Era)
C. Transaction Central Language E. Pioneer Era (First Era), Stable Era (Sec-
ond Era), Micro Era (Third Era), Macro Era
D. Transaction Control Language
(Fourth Era)
323. The term is used to refer a row
327. The first technique in the data processing
A. Record cycle is data
B. Primary key A. visualization
C. Foreign key B. analysis
D. Field C. collection
324. Which is the example of File Based Sys- D. interpretation
tem? E. processing
A. Using MySQL to find specific data
328. What are databases mainly used for?
B. Using MS Access to control users ac-
cess A. To store archived data

C. Using spreadsheet software to man- B. To store and organise data


age data of employee C. To analyse data
D. Using OpenOffice.org Base to create D. none of above
new table
329. Which one of the following is commonly
325. Humans in charge of designing and devel- used to define the overall design of the
oping databases, is the task of database
A. System Analyst A. Application prgm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1202

B. DDL C. Report
C. Schema D. Query wizard
D. Source code
335. In which of the following formats data is
330. An arrangement of data in a row and col- stored in the database management sys-
umn tem?
A. Record A. Image

NARAYAN CHANGDER
B. Table B. Text
C. Field C. Table
D. Form
D. Graph
331. Here which of the following displays the
unique values of the column? SELECT 336. In the Pioneer Era A distribution of soft-
dept name FROM instructor; ware that was limited to certain compa-
nies was called
A. All
A. Customer Software
B. From
C. Distinct B. Limited Distribution

D. Name C. Batch Orientation

332. Records or Rows are data sets that con- D. Customer Orientation
sist of one or more fields. Another name E. Batch Distribution
for Record or Row in the relational model
is 337. In the value chain, the parameters used
A. Field to measure all activities needed to convert
the inputs provided by logistics into the
B. Attribute final product form. This includes machin-
C. Column ing, packaging, assembling, and maintain-
D. Tuple ing equipment

E. Entity A. Inbound logistics


B. Operators
333. Type of Data types to stores expression
that uses data from one table or more ta- C. Outbound logistics
bles
D. Marketing and sales
A. Numeric
E. services
B. Currency
C. Short Text 338. A computer that serves up information to
other computers on a network
D. Calculated
A. Server
334. Which of the following is a database ob-
ject? B. Network
A. Record C. Operating System
B. Field D. Personal computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1203

339. The model used to determine how the 344. The format of displaying the information
system should be implemented regard- from a particular table is called
less of the database management system

PRACTICE BOOK» NOT FOR SALE


(DBMS) is the . model. A. Report

A. conceptual B. Record
B. logical C. Forms
C. physique D. Database
D. qualitative
E. quantitative 345. Entity-Relationship Diagram (ERD) is
a
340. What an HTTP method is not is
A. a diagram that describes the relation-
A. GET
ship (relationship) between relationships
B. INPUT
B. a diagram that describes the relation-
C. POST
ship (relationship) between attributes
D. DELETE
C. a diagram that describes the relation-
341. All of the following are examples of ship (relationship) between entities (en-
Database Management System software tity)
except?
D. a diagram that describes the relation-
A. Microsoft Access
ship (relationship) between multivalued
B. MySQL attributes
C. Oracle E. a diagram that describes the relation-
D. FaxBass ship (relationship) between derivative at-
tributes
342. decides how the logical DB design is
to be physically realised
346. data warehouse is based on
A. Data Administrator (DA)
A. two dimensional model
B. Database Administrator (DBA)
C. Database Designers (Logical & Physi- B. three dimensional model
cal)
C. multidimensional model
D. Application Programmers
D. unidirectional model
343. A group of objects that are defined have
the same characteristics and can be distin- 347. Course(course id, sec id, semester)Here
guished from one another, can be goods, the course id, sec id and semester are
people, or an event. and course is a
A. Attribute
A. Relation, attribute
B. Entity
B. Attribute, relation
C. Relation
D. Data Value C. Tuples, relation
E. Record D. Tuple, attribute

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1204

348. What is Database Management Sys- 353. Which of the following is not a Storage
tem? Manager Component?
A. A software system that enables users A. Transaction Manager
to access to the database.
B. Logical Manager
B. A software system that enables users
C. Buffer Manager
to create access to the database.
C. A software system that enables users D. File Manager
to define, create, maintain and control ac-

NARAYAN CHANGDER
354. The process of processing data with the
cess to the database.
aim of finding useful information that can
D. A software system that enables users be used as a basis for making decisions for
to maintain and control access to the the solution of a problem is called .
database. data.
349. Data mining means A. analysis
A. data fetching B. processing
B. data accessing C. modeling
C. knowledge discovery D. publication
D. none of above E. interpretation
350. Who is the inventor of IOT technology?
355. How many types of data models are
A. Kevin Ashmad there?
B. Kevin April A. 1
C. Kevin Ashton B. 2
D. Kevin Henry
C. 3
351. The basic operations that we can do with D. 4
respect to databases include:Creating a
new database is a process that is identi- 356. An attribute that has only one value is
cal to creating a new filing cabinet. The the meaning of
basic operations used are A. Single value Attribute
A. create database
B. Composite attribute
B. create table
C. Derived Attribute
C. drop table
D. Simple Attribute
D. insert
E. Multi Value attribute
E. delete
352. Which is the MySQL instance responsible 357. Each of these objects interacts with the
for data processing? records stored in your database’s

A. MYSQL CLIENT A. Table, Form, Query, Report


B. MYSQL SERVER B. Table, Query, Form
C. SQL C. Form, Report, Query
D. SERVER DAEMON PROGRAM D. Report, Query, Table

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1205

358. Database objects that function to display, 363. In general, the understanding of the
edit and filter data according to the desired database can be viewed from two sides,
criteria are the notions of the literal understanding and the term un-

PRACTICE BOOK» NOT FOR SALE


derstanding. The literal meaning comes
A. Tables
from 2 words, namely
B. Form
A. Base and Data
C. Report B. Bases and Words
D. Queries C. Archives and Books
E. hard drive D. Date and Base
E. Base and emitter
359. is the bridge between machine and
human in a DBMS environment 364. Existing ERP processes in ES except
A. People A. Master Production Scheduling
B. Hardware B. Distribution Requirement Planning
C. Software C. Production Scheduling Process
D. Data D. Material Requirement Planning
E. Rough-cut Capacity Planning
E. Procedure
365. The DBMS that most difficult to use is
360. The commands for accessing data on the
database system are A. Microsofts SQL Server
B. Oracle Corporation Oracle
A. SQL
C. Microsoft Access
B. Database
D. IBM DB2
C. DDL
366. Which of the following keys is generally
D. MDL
used to represents the relationships be-
E. Query tween the tables?
A. Primary key
361. Which field in a database table is an au-
tomatic field? B. Foreign key
A. ID C. Secondary key

B. Name D. Non of the above

C. Address 367. What is the use of the WampServer ap-


plication?
D. Date of Birth
A. Surfing the internet or to find informa-
362. One of OLAP capabilities is? tion from a web
A. Drill Down B. To create a local network that is in-
tended to create websites offline without
B. Transform an internet connection
C. Extract C. Connect computers globally
D. Load D. As promotional media

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1206

368. The following does not include activities 373. The Python programming language is a
in data analysis, namely data type of
A. grouping A. interpreter
B. cleaning B. compiler
C. deletion C. Machine
D. transformation D. Compile
E. Assembly

NARAYAN CHANGDER
E. modeling

369. Data types to store audio, video or other 374. Update the data of the database includ-
BLOBs files ing
A. Import, edit, delete data
A. OLE Object
B. Arrange
B. Hyperlink
C. Search
C. Attachment
D. Report
D. Lookup Wizard
375. Field or Column is the same/similar data
370. Which is not a benefit in dbms is set for each table. Another name for Field
A. Speed and convenience or Column in the relational model is
B. Multi-user A. Attribute key
C. Device cost savings B. Attribute

D. Difficult to make applications C. line


D. Tuple
371. The expertise of the IT division person
E. Entity
who functions to be responsible for infor-
mation system security is? 376. The rhombus symbol in the E-R Diagram
A. programmer depicts
B. tester A. Key
C. system administrator B. object

D. Business process analysis C. Relation

E. analyst system D. Attribute


E. Entity
372. The concept of finding hidden pat-
terns and relationships contained in large 377. To rename a column (field) in a table, you
databases and generating rules that are can use one of the methods, namely
used to predict future behavior is: A. Rename Field
A. Alternate Mining B. Moving Fields
B. Text Mining C. Deleting Fields
C. Data Mining D. Changing Places
D. Knowledge Management E. Adding Fields

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1207

378. In what year was the concept of IoT D. none of above


sparked?
383. What isn’t File Transfer Protocol is

PRACTICE BOOK» NOT FOR SALE


A. 1989
A. HTTPS
B. 1980
B. CFDP
C. 1999
D. 1992 C. FOTP
D. SFTP
379. Pay attention to the program code below,
the output of the program above is 384. Types of Database System used by the
A. variable a:10 entire organization (100s of users) across
many departments
B. variable b:16
A. Centralized Database
C. variable c:25
B. Enterprise Database
D. variable d:25
E. variable d:26 C. Workgroup Database
D. none of above
380. For each attribute of a relation, there is
a set of permitted values, called the of 385. The following are not included in the char-
that attribute. acteristics of the primary key
A. Domain A. Column values are unique
B. Relation B. Can’t be null
C. Set C. May have more than one primary key
D. Schema D. Values in the primary key cannot be
381. Is an arrangement (integrity) consisting deleted from the parent table
of a number of functional components
386. Technology that uses computers to find,
(computers) that are interconnected to-
explore, and analyze information from
gether, aiming to fulfill a particular pro-
business data, for example the sales of a
cess or job is the notion of
product or the income/expenses of a sub-
A. Database management system sidiary company:
B. School management system A. Decision Support System
C. Database Management System B. Executive Information System
D. Bandwidth management system C. Data Warehouse
E. Information management system D. Business Intelligence
382. Types of Database System where focus
387. Which of the following PHPstatements
on storing data used to generate informa-
will output Hello Worldon the screen?
tion required to make tactical or strategic
decision A. ECHO(”HELLO WORLD”);
A. Data Warehousing database B. PRINT(”HELLO WORLD”);
B. Distributed Database C. PRINTF(”HELLO WORLD”);
C. Operational Database D. SPRINTF(”HELLO WORLD”);

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1208

388. An entity set that does not have enough D. Organized collection of data that can-
attributes to form primary key is known not be updated
as
393. It is the use sophisticated statistical anal-
A. STRONG ENTITY SET ysis, including artificial intelligence tech-
B. WEAK ENTITY SET niques such as neural networks, to “dis-
cover” unhypothesized relationships in
C. IDENTITY SET
the data. For example, credit card com-
D. OWNER SET panies use this to identify usage patterns

NARAYAN CHANGDER
indicative of fraud.
389. Why would you create a primary key?
A. Data integration
A. To make each record in a database
unique B. Data Sharing
B. To make each field in a database C. Data Mining
unique D. Database system
C. To make each query in a database 394. is where information is stored in a
unique database.
D. none of above A. Query
390. How data is stored in relational B. Report
database? C. Tables
A. Stored in the form of objects D. Microsoft Access
B. Stored hierarchically 395. The following are not included in the var-
C. Stored in fixed structures ious CMS, namely .
D. none of above A. CMS Drupal
B. CMS Lycos
391. This type of server provides clients with
network connections and other communica- C. CMS Joomla
tions such as voice. D. CMS Moodle
A. Application Server
396. Rows in a database tables are called
B. Media Server A. Fields
C. Communication Server B. Records
D. Web Server C. Tables
392. What is a database? D. none of above
A. Organized collection of information 397. The important thing in the data collection
that cannot be accessed, updated and process is to ensure that .
managed
A. get a lot of data
B. Collection of data or information with-
B. data comes from well known sites
out organizing
C. data is well known
C. Organized collection of data or infor-
mation that can be accessed, updated and D. data sourced from reliable sources
managed E. get complete data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.3 Database Management Systems 1209

398. A column in a table that contains particu- 403. ERP information system consists of?
lar information about a record (more than 1 answer)
A. System person in charge

PRACTICE BOOK» NOT FOR SALE


A. Record
B. Primary Key B. DBMS (Database Management Sys-
tem)
C. Table
C. application program
D. Field D. Company business processes
399. This type of server provides access to E. GUI (Graphical User Interface)
files 404. What is the full form of DBMS?
A. File Server A. Data of Binary Management System
B. Media Server B. Database Management System
C. Game Server C. Database Management Service
D. Web Server D. Data Backup Management System
405. What does PHP stand for?
400. Professions in the field of data that are
demanded to have good data analysis A. PERSONAL HOME PAGE
skills are B. HYPER TEXT PREPROCESSOR
A. programmer C. PRE TEXT HYPER TEXT PROCESSOR
D. PRE-PROCESSOR HOME PAGE
B. software developer
C. UI/UX designer 406. Data Definition Language is used to
the DBMS.
D. data analyst
A. create
E. technician B. define
401. offer you the ability to present your C. control access
data in print. D. manage
A. Report 407. Which of the following is a software
B. MS Word package of Database management Sys-
tem?
C. Form
A. Visual Fox Pro
D. MS Access B. Microsoft SQL-Server
402. Subject-oriented, integrated, time vari- C. Oracle
ant, and non-volatile data collection to D. All of the above
support the decision-making process is the
meaning of 408. An ordered set of data constituting a
record is called
A. Data mining
A. Attribute
B. Data warehouse B. Row
C. Data mart C. Tuple
D. Basis data D. Field

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1210

409. In the value chain, the parameters used 411. The elements in the database are except.
to measure the activities carried out to A. Entity
purchase the inputs needed to produce the
company’s products. Purchase inputs in- B. Attribute
clude items that are all used during the C. Data value
product manufacturing process. called? D. RDBMS
A. Firm Infrastructure E. Table
B. operations

NARAYAN CHANGDER
412. A collection of objects or things that can
C. Procurement be distinguished or uniquely identified
D. Technology development A. Entity
E. Human resource development B. Attribute
C. Relationship
410. One of the main components of the
database is the hardware in the computer D. Indicator
system. The main device in the data pro- E. Cardinality
cessing system is
413. Which of the following is not a level of
A. Computer data abstraction?
B. Windows 10 A. Physical Level
C. Keyboard B. Critical Level
D. Accounting information system C. Logical Level
E. Memory D. View Level

13.4 Enterprise Resource Planning (ERP) Software


1. The long term use of ERP could change the A. Operation
border organization in terms of its B. Drill-down
A. enterprise C. Consiliation
B. structure D. Slicing and Mining
C. function
4. Who are the primary users of SCM sys-
D. structure and function
tems?
2. The heart of data warehouse is its A. Sales, marketing, customer service
where the bulk of data resides
B. Accounting, finance, logistics, and pro-
A. current data duction
B. raw data C. Customers, resellers, partners, suppli-
C. new data ers, and distributors
D. reports D. All of the above

3. Olap servers support common analytical 5. The reason why data warehouse has to be
operations such as? separated, except

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1211

A. Internal efficiency C. Task


B. Integration of legacy system D. Point of decision

PRACTICE BOOK» NOT FOR SALE


C. Internal Inefficiency E. Outcomes
D. Consolidation of global data 11. How much small businesses spend per user
to implement ERP?
6. Below are the inputs from Account-
ing/Finance except A. $7413
A. Production B. $7143
B. Data hutang (Accounts payable data) C. $7314
C. Payments from customers (Payments D. $7257
from customers) 12. Which evolution of ERP contains project
D. Data piutang (Accounts receivable management, knowledge management,
data) workflow management, CRM, human re-
sources management, portal capability,
7. How many stage in the data warehouse? and integrated financials?
A. 5 A. ERP
B. 4 B. Extended ERP
C. 3 C. ERP II
D. All wrong D. None of the above
8. The following are included in the SCM Out- 13. it is not an element to evaluate the com-
put, except: plexity of an ERP implementation
A. Packaging orders A. El hardware
B. Raw material orders (Raw material or- B. the processes
ders) C. the company
C. Production and inventory reports (Pro- D. the strategy
duction and inventory reports)
14. The frequent monitoring will be done by
D. Material Production
committee.
9. The training is a process. A. company representative
A. ongoing B. executive
B. new C. project planning
C. difficult D. implementation
D. time oriented 15. Duties related to employee recruitment,
benefits, training, and obligations to gov-
10. Activities (activities or actions) that arise
ernment are the responsibility of
as a result of events and usually require
time to carry out in the process are re- A. Accounting/Finance
ferred to as: B. Human Resources
A. Events C. Marketing Sales
B. Activity D. Production

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1212

16. If you have doubts, you can ask your 21. Which evolution of ERP contains materi-
teacher in the next class, and only today als planning, order entry, distribution, gen-
with me, I thank you for the time and I ask eral ledger, accounting, and shop floor con-
you Does anyone have a doubt? trols?
A. And A. ERP
B. No B. Extended ERP
C. We asked the teacher later. C. ERP II

NARAYAN CHANGDER
D. none of above D. None of the above

17. Which application’s primary business bene- 22. Customer specific products are also known
fits include forecasting, planning, purchas- as
ing, material management, warehousing, A. make-to-stock.
inventory, and distribution? B. make-to-order
A. CRM C. goods.
B. SCM D. expected products
C. ERP
23. A collection of interrelated events, activ-
D. All of the above ities, and decision points that involve a
number of actors and objects, and which
18. What are several different types of soft-
collectively lead to an output that is of
ware, which sit in the middle of and pro-
value to at least one customer is the defi-
vide connectivity between two or more
nition of:
software applications?
A. Process
A. Middleware
B. Business Process
B. Enterprise application integration mid-
dleware C. Business Process Management

C. Automated business process D. Improvement


E. Operational Management
D. e-business infrastructure
24. What is the example for company that im-
19. There are 4 dimensions of scalability,
plemented bolt-on software in the slide?
which one is not?
A. ASP and Domino Pizza
A. Size
B. Domino Pizza and SCM
B. Speed
C. SCM and Pizza Hut
C. Workload
D. Domino Pizza and CRM
D. Transaction slip
25. Which is the first phase in ERP implemen-
20. What is not a feature of ERP in the cloud? tation?
A. business uniformity A. Understanding the problem
B. Integration capacity B. Defining solutions
C. hierarchy and availability of data C. Getting down to work
D. administration and planning D. Going live

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1213

26. The traditional business system is called as 31. Below are SAP ERP Features except:
A. Software that can provide real-time

PRACTICE BOOK» NOT FOR SALE


A. modern method ERP integration
B. advanced method B. High cost

C. effective method C. Separate database module


D. Usability by large companies
D. legacy method.
32. The company’s objective is to make the
27. A series of actions or events that are car- package work successfully as documented
ried out to make something or achieve a in the manual.
certain result, or a series of changes that
occur naturally is the meaning of: A. vendor’s.

A. Business B. consultant’s.
C. management’s.
B. Process
D. technical support team’s.
C. Business Process
D. Business Process Management (BPM) 33. approaches reduces data redundancy
and provide update information.
E. Business Cycle
A. Legacy system.
28. Employee recruitment information (Hiring B. Information system.
information), is the output of C. Integrated data model.
A. Production D. Data base.
B. Marketing Sales
34. The elapsed time between placing an order
C. Human Resources and it receiving it is also known as
D. Supply Chain Management A. elapsed time.
B. waiting time
29. Production and inventory data (Production
and inventory data) is part of the input C. time interval

A. Production D. expected time

B. Human Resources 35. In , entire organization is considered as


a system and the departments are its sub-
C. Marketing Sales system
D. Accounting/Finance A. business way.

30. Which typical core applications is include? B. general


Sales or shop floor control? C. enterprise way.
A. Sales D. planning
B. Shop floor control 36. SAP stands for
C. Both are correct A. System Analyst and Processing
D. Both are wrong B. Application Systems and Processes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1214

C. System Application And Product In C. Getting down to work


Data Processing
D. Going live
D. System Analyst and Product
42. Which application’s primary business ben-
37. The strategy for implementing all the mod- efits include market demand, resource
ules in the ERP package simultaneously and capacity constraints, and real-time
across all company functions is part of the scheduling?
ERP concept approach
A. CRM

NARAYAN CHANGDER
A. Small Bang
B. SCM
B. Big bang
C. Phased Approach C. ERP

D. Step-by-step D. All of the above

38. In conditions where the information sys- 43. During the session the re-engineering
tem in a company is separated and not in- must also consider new technologies.
tegrated between (functional) parts, then
A. planning
an effect arises which is called the effect of
indifference / not wanting to know about B. implementing
other parts, called: C. brainstorming
A. Disintegrated Effect
D. training
B. Miscommunication effect
C. Silo Effect 44. Client computers are responsible for pre-
senting data to the user and passing user
D. Uncoordinated Effect input back to the server are the operating
E. Decentralization Effect of Three-Tier Model

39. Which is the risk of implementing ERP? A. True


A. Choosing wrong ERP B. Not Correct
B. Choosing wrong consultant C. Correct
C. A, B and D not false D. Not False
D. High cost and cost overrun
45. Below are the objectives of SAP, Except:
40. ERP supports currency value.
A. Build standard software products that
A. multiple can be configured to meet the needs of
B. single. each company
C. three B. Software modules:individual pro-
grams that can be purchased, installed,
D. five
and run separately, but all data is ex-
41. Which is the most critical phase in ERP im- tracted from a common database
plementation? C. Availability of data in real time
A. Understanding the problem D. Users work in front of a computer
B. Defining solutions screen, not in front of a pile of paper

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1215

46. The following is not the Current SAP ERP C. inventory.


system:SAP ECC 6.0 (Enterprise Central D. integrated inventory.
Component 6.0):

PRACTICE BOOK» NOT FOR SALE


A. Materials Management (MM) module 51. Which of the following is a reason for ERPs
explosive growth?
B. Financial Accounting (FI) module
A. Which of the following is a reason for
C. Personal digital assistant ERPs explosive growth?
D. Sales and Distribution (SD) module B. B. ERP addresses the need for global
47. SAP expanded software capabilities and information sharing and reporting
expanded into international markets, C. C. ERP is used to avoid the pain and ex-
sales boomed in pense of fixing legacy systems
A. 1992 D. D. All of the above
B. 1988 52. The primary concept of is that storing
C. 1990 huge amount of data.
D. 1980 A. data mining

48. The definition of a process is a Sequence B. OLAP


of interdependent and related procedures C. supply chain management
that at each stage consumes one or more D. data warehousing
resources (employee time, energy, ma-
chine, money) to transform inputs (data, 53. Using system, business can gain ef-
materials, parts, etc.). All of this is done fective control over engineering change or-
to produce: ders.
A. Transformation A. engineering change control
B. Input B. engineering change order
C. Output ataupun outcome C. inventory.
D. Profit D. production planning.
E. Survival in business 54. What is at the heart of any ERP system?
49. Who is responsible to check and verify the A. Information
work that is being done satisfactory? B. Employees
A. Project development team. C. Customers
B. Executive committee. D. Database
C. Vendor.
55. The form of input used in a process is
D. Consultant. sometimes in the form of not being phys-
50. In order to reduce the lead times, the orga- ical/material (touchable, countable), for
nization should have an efficient sys- example:
tem. A. Information
A. purchasing. B. Machine
B. production planning C. Method

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1216

D. Information and Methods 61. A data warehouse is a collection of


E. Money (money) that is critical to the successful execution
of enterprise initiatives.
56. What is not an ERP function?
A. raw data
A. Business management
B. tables
B. Quality management
C. computer based information
C. Commercial management
D. reports

NARAYAN CHANGDER
D. Project management
E. Financial management 62. The other name of core application is
A. Online analytical perspective
57. When several groups of resources are
used as input in a process to become out- B. Online transaction processing applica-
put, then all of the input elements will: tions
A. changes and should provide value to C. Online transfer processing applica-
the process tions
B. experience an increase in price D. Online analytical processing
C. experienced a decrease in price 63. An enterprise is a group of people with
D. become more numerous (increase) A. common goal.
E. the amount remains the same or does
B. separate goal for each department
not change
C. multiple goals.
58. is the people who will be using the ERP
D. two or more goals.
system once it is in place.
A. Management 64. The role of Information Systems in relation
B. End-user to the implementation of ERP in a business
organization is:
C. Consultant
A. IS integrates all information in busi-
D. Vendor ness processes
59. should determine the characteristic of B. IS improves communication and work-
the current system before implementation. flow in business processes
A. Decision makers C. IS integrates people, procedures, soft-
B. Project team members ware, computer storage (database), orga-
C. Decision makers and project team nizational analysis and information shar-
members ing (delivery).

D. Management D. All answer choices are correct

60. Which is not the system that IFS have for 65. An information system produces informa-
their ERP? tion using the cycle.
A. Manufacturing A. data analysis
B. Financials B. input-process-output.
C. Tourism C. input-output.
D. Human Capital Management D. process-input-output.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1217

66. In order to make a business process run ef- C. marketing


fectively and efficiently, it is necessary to D. assessment.
carry out Business Process Management

PRACTICE BOOK» NOT FOR SALE


(BPM). The goals of BPM are: 71. Which of the following method is used to
produce reports about data.
A. produce improvements in the effi-
ciency and effectiveness of business pro- A. Decision Support Systems.
cesses B. Executive Information Systems
B. improve the performance of an individ- C. Query/Report Writing Tool.
ual or a single step in a business process D. All the above
C. the priority is to break the various
steps in the process, efficiency and effec- 72. Which of the following describes an ERP
tiveness is another matter system?
A. Which of the following describes an
D. generate high profits in various ways
ERP system?
even though they violate legal aspects and
legal aspects B. B. ERP systems enable people in differ-
ent business areas to communicate
67. How to get ERP implementation cost esti-
C. C. ERP systems have been widely
mated?
adopted in large organizations to store
A. Pricing based on user, modules and critical knowledge used to make the deci-
add-ons sions that drive the organization’s perfor-
B. Pricing by quote mance

C. Pricing based on feature bundles D. D. All of the above

D. Pricing by deployment 73. What company that we used to be an ex-


ample on supply chain decision from the
68. Which evolution of ERP contains schedul- data warehouse
ing, forecasting, capacity planning, e-
A. Oracle
commerce, warehousing, and logistics?
B. General motors
A. ERP
C. SAP
B. Extended ERP
D. All true
C. ERP II
74. What represents a new approach to mid-
D. None of the above
dleware by packaging together commonly
69. The company that took over PeopleSoft is used functionality, such as providing pre-
built links to popular enterprise applica-
A. IBM tions, which reduces the time necessary
B. Microsoft to develop solutions that integrate appli-
C. Oracle cations from multiple vendors?
A. Middleware
D. IBM and Microsoft
B. Enterprise application integration mid-
70. The first step in business strategy is dleware
A. planning. C. Automated business process
B. develop blueprint D. e-business infrastructure

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.4 Enterprise Resource Planning (ERP) Software 1218

75. Before engaging an outside consultant, 80. Below is the Output section of Account-
management should: ing/Finance:
A. Conduct reference A. Production
B. Set a firm termination date B. Data piutang (Accounts receivable
C. Establish in writing how staff changes data)
will be handled C. Data kredit customer (Customer credit
D. Interview all the staff in the company data)

NARAYAN CHANGDER
76. is the last phase in ERP implementa- D. Data hutang (Accounts payable data)
tion life cycle
81. What concept best defines an ERP?
A. Testing
A. materials planning and management
B. End user training system
C. Post implementation
B. computer software for work order and
D. Going live materials management
77. used to support the old process to be- C. information management system that
come useful in the new process, involves integrates all business processes of a
reducing some requirements while expand- company
ing others. D. management tool that determines how
A. Transitioning the information much and when is going to be produced
B. software management.
82. Is a list of the number of components,
C. front-office software. mixture of ingredients, and raw materials
D. information system. needed to make a product:

78. In carrying out the business process cycle, A. Leadtimes


the analysis steps of what and how the B. Bill of Material (BoM)
current process is, are often referred to as:
C. Production Planning
A. “as is” analysis
D. Master Production Schedule (MPS)
B. “to be” analysis
E. Inventory Management
C. “improvement” analysis
D. “re-design and Rethinking” analysis 83. A computer-based production planning sys-
tem that determines what, how much, and
79. What do you know about Drill-down capa- when materials (parts) are needed to pro-
bility ? duce the end item of a product, is known
A. Data warehouse is to optimize the busi- as:
ness performance A. Material Requirement Planning (MRP)
B. Data contained in it are nonvolatile and B. Enterprise Resource Planning (ERP)
stable state
C. Manufacturing Resource Planning
C. Data from operational databases, flat
(MRP II)
files, archives, and external data sources
D. Data analysis technique that associ- D. Supply Chain Management (SCM)
ated with data mining E. Production Planning (PP)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1219

84. Material Requirement Planning(MRP) uti- C. Central database for all departments
lizes software applications for scheduling D. All of the above

PRACTICE BOOK» NOT FOR SALE


A. sales management. 88. What must a system do to qualify as a true
ERP solution?
B. production processes.
A. Be flexible
C. marketing techniques
B. Be modular and closed
D. human resource management.
C. Extend within the company
85. When implementing the ERP, what is the D. Extend within the company
top consideration?
A. License Fees 89. Integration of activities related to the pro-
curement of materials and services, trans-
B. User Numbers forming them into semi-finished goods
C. Testing or finished goods (final product/finished
D. Data Migration good), and sending them to consumers
(Customers) is the meaning of:
86. is one of the benefits of supply chain A. Enterprise Resource Management
management (ERP)
A. Easy process B. Supply Chain Management( SCM)
B. Manufacturing make-to-stock prod- C. Customer Relationship Management
ucts (CRM)
C. Minimum time D. Operational Management
D. Faster response-to-market changes E. Production Management
87. What is the primary difference in an orga- 90. ERP package will handle business func-
nization before and after an ERP installa- tionalities.
tion?
A. one
A. Employees work across different de-
partments B. two

B. Databases across departments are C. three


separate D. all

13.5 E-commerce and E-business Applications


1. HTML, XML, email, HTP are e-commerce 2. The majority of companies will usually go
infrastructure of ? through the 6 stages of E-Business devel-
opment as below, except
A. Information superhighway
A. Real time organizations
B. Messaging and information distribu-
tion B. One-to-one relationship
C. Common business C. Communities of interest
D. Web architecture D. Transaction supplier

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1220

3. Who do firewalls protect against? 8. Select 2 types of server


A. Trojans A. Web server
B. Spyware B. Computer system server
C. Viruses
C. Hardware server
D. Hackers
D. File server
4. Refers to those mechanisms which convert
the paper processes in a traditional office 9. When can a customer receive a product re-

NARAYAN CHANGDER
into electronic processes, with the goal to fund?
create a paperless office.
A. They damaged a product by accident
A. E-Administrator
B. They decided that they don’t want it
B. E-Democracy
now, but initially did
C. All of the above
C. The product arrived damaged
D. None of the above
D. none of above
5. What is a key negative impact of eCom-
merce 10. The combination of these independent com-
A. Job Losses ponents according to the desired business
B. Cheaper Goods process blueprint is called?
C. More Choice of Goods A. Tailor-made
D. Shopping 24/7 B. Technology Infrastructure
6. are the most used software on the In- C. Component Based Applications
ternet. They are the starting step for
D. Inter-Enterprise Business Process
many Internet-based activities, not only
but, of course, also if somebody is looking 11. Which is below is the components in the
for a business opportunity dimension of e-commerce?
A. Search engines
A. Choose, Process, Delivery
B. Online Shops
B. Order, Process, Delivery
C. Content provider
D. Portal C. Order, Payment, Delivery
E. Electronic mall D. Order, Process, Infrastucture

7. There are 3 things that drive e-commerce, 12. Requests for checks and cards, informa-
one of which is business pressure, espe- tion on ATM locations, and sending data
cially technology pressure. The following via email are mobile banking services that
are included in the criteria for technological fall into the category of
pressure are
A. Investment
A. Reduced government subsidies
B. Increasing technological innovation B. Support

C. Changes in the nature of the workforce C. Account Information


D. Tough competition D. Customer service

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1221

13. allows a business application on the 17. setting up a network so that employees
computer of one organization to communi- can view other employees’ data but can-
cate directly with the business application not view anything outside the company

PRACTICE BOOK» NOT FOR SALE


on the computer of another company. network
A. EDI A. Extranet

B. Protocols B. Intranet
C. LAN
C. Standards
D. WAN
D. none of above
18. It is a type of e-commerce in which con-
14. The meaning of the market is sumers trade products, services and infor-
mation with each other online.
A. Place of entertainment between con-
sumers A. Business-to-business

B. A place where assistance is given to B. Business-to-consumer


those who can’t afford it C. Consumer-to-consumer
C. Sellers and buyers do not negotiate for D. Consumer-to-business
a certain price 19. Which is NOT a negative impact of e-
D. A network of interactions and relation- Commerce
ships where information, products, ser- A. Availability of products 24/7/365
vices and payments are exchanged
B. You never have to pay shipping
charges
15. It is server that sits between a client ap-
plication(web browser), and a real server. C. Receive product immediately
It intercepts all requests to the real server D. Potential for scamming
to see if it can fulfill the requests itself.
If not, it forwards the request to the real 20. What is not included in the EPS (Electronic
server. This refer to Payment System) is
A. Electronic Gift
A. firewall
B. E-Wallet
B. SSL
C. Macropayment
C. proxy server
D. Electronic Funds Transfer
D. VPN
21. grants the possessor permission to
16. Electronic business goes beyond buying transmit on the medium, is an advance-
and selling. Electronic commerce can in- ment of FDDI and is defined by the stan-
volve the events leading to a purchase, as dard IEEE 802.5 (IEEE = Institute of Electri-
well as after the sale. cal and Electronics Engineers),
A. Transmission Control Proto-
A. marketing
col/Internet Protocol.
B. management B. Fiber Distributed Data Interface
C. communication C. Token Ring
D. customer service D. Ethernet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1222

22. Which device has the Largest CPU size? B. One to One Relationship
A. Smartphones C. Communities of Interests
B. Desktop D. Real Time Organizations
C. Tablets
28. has a ring structure, provides a trans-
D. Smart watches mission rate up to 100 MBit/sec and is
defined in the ANSI standards X3T9.5,
23. is a central entry and navigation point
X3.139 and X39.5 (ANSI = American Na-

NARAYAN CHANGDER
to provide access to a virtual area (of ap-
tional Standards Institute),
plications or services) and to deliver addi-
tional information to the user. It works as A. Transmission Control Proto-
an interface between user and system(s). col/Internet Protocol.
A. portal B. Fiber Distributed Data Interface
B. Vertical portal C. Token Ring
C. enterprise portal D. Ethernet
D. none of above
29. Meaning of Cloud computing
24. It is also called E-tailing A. Virtual storage services
A. Consumer to business B. Virtual site focus on “development of
B. Business to Consumer apps”
C. Business to Business C. Cover a vast range of options, from
D. Consumer to Consumer the basics of storage, networking, and
processing power through to natural lan-
25. Smart card is better than other cards using guage processing and artificial intelli-
A. Encryption gence as well as standard office applica-
tions.
B. Firewall
D. none of above
C. Hub
D. All of the above 30. Rules stated in a Returns Policy

26. A connector used to allow a computer to A. Items can be used and returned as
network with other types of hardware long as the customer has the receipt
such as printers, keyboards, and speakers B. Perishable items can be returned
is called a C. Items must be unused and contain a
A. USB Port receipt as a proof of purchase
B. Printer D. Returned within 30 days after pur-
C. USB Cable chase
D. Hardware 31. What is the acronym of ICT?
27. The company’s ability to form a commu- A. Information Communication Transmis-
nity in cyberspace in e-commerce is also sion
called? B. Information Communication Technolo-
A. Brochurware gies

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1223

C. Information Communicate Technolo- 37. Another approach to define and explain,


gies what E-Commerce is, comes from the so
called (Zwass 2014). It defines E-

PRACTICE BOOK» NOT FOR SALE


D. Information Communicate Technolo-
gies Commerce by five activity domains whose
denominations start with the letter “C”:
32. All of the following are examples of social A. 3-C Model
networks except:
B. 4-C Model
A. Y Combinator.
C. 5-C Model
B. Pinterest.
D. 6-C Model
C. Twitter
D. Instagram 38. What is e-Commerce
A. Any type transaction, that involves the
33. A computer that manages access to differ- transfer of good and/or services across
ent resources and services over a network the Internet.
is called
B. Any type of transaction that requires
A. Computer system business to have a physical store
B. Desktop with high RAM C. Business that are powered electrically
C. A fast PC D. Electronic money such as credit cards,
D. Server debit cards, Pay Pal, Apple Pay

34. Self-serve payment systems (gas stations, 39. is a standard network protocol used to
kiosks, etc.) are common targets for transfer computer files from one host to
another host over a TCP-based network,
A. credit card theft
such as the Internet.
B. spoofing
A. Hypertext Transfer Protocol
C. phishing
B. File Transfer Protocol
D. hacking
C. Simple Mail Transfer Protocol
35. How the transactions occur in e- D. World Wide Web
commerce?
40. Security, authentication, electronic pay-
A. Using e-medias
ment, directories catalogs are e-commerce
B. using Computers only infrastructure of ?
C. Using mobile phones only A. Information superhighway
D. None B. Messaging and information distribu-
tion
36. A small portable hard drive designed to
hold digital files and data; also called a C. Common business
thumb or flash drive is also called a D. Web architecture
A. USB Cable 41. is preparation of information for indi-
B. CD/DVD Drive vidual consumers.
C. USB Port A. Personalization
D. Portable Storage B. Ubiquity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1224

C. Localization B. Time line


D. Interactivity C. Threats
42. The E-Business model chosen by the com- D. Total income
pany by offering high-value data, informa-
tion, knowledge (content) creation and dis- 46. Below is a correct of vulnerability point
tribution services to customers is with example of threat?
A. Virtual Community A. Internet communication-Malicious

NARAYAN CHANGDER
B. Content Provider code attack, tapping and sniffing
C. Whole of Enterprise B. Server-Dos attack, hacking, theft and
fraud
D. Direct to Consumer
C. Client-Malicious code attack, vandal-
43. According to Tucci in 2003 there are four ism, theft and fraud
business models that are most widely ap-
plied or carried out in e-business where D. none of above
revenue is obtained from membership fees
for a service, namely 47. An online marketplace is a website,
where suppliers and potential customers
A. Advertising can come together like on a real market-
B. Sales revenue place in a small town.
C. Subscription A. Search engines
D. Model B. Online Shops
44. is a website, where you can buy prod- C. Content provider
ucts or services, e.g. books or office sup-
D. Portal
plies. Traditional and similar business mod-
els are direct mail selling (no shop facility, E. Electronic mall
offering of goods via a printed catalogue,
ordering by letters or telephone calls) and 48. To protect network, the solutions we can
factory outlets (producer has own shop fa- use are and
cility, does not sell his products via mer-
A. Firewall, Proxy server
chants).
B. anti virus, patches
A. Search engines
B. Online Shops C. Proxy server, antivirus
C. Content provider D. SSL, antivirus
D. Portal
49. is concerned with the buying and
E. Electronic mall selling information, products and services
over computer communication networks
45. A SWOT analysis is a simple but effec-
tive technique to help organisations anal- A. Commerce
yse their internal resources in terms of B. E-Commerce
strengths and weaknesses to identify op-
portunities and C. E-Business
A. Technological status D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1225

50. There are significant factors that man- 54. A hand-operated device that allows con-
agers should appreciate in the adoption of trol of the cursor on a computer screen.
any e-commerce service. Which of the fol-

PRACTICE BOOK» NOT FOR SALE


A. Mouse
lowing refers to the perception that your
personal details may not be secure when B. Keyboard
connected to the Internet? C. Printer
A. No perceived benefit D. Hardware
B. Security 55. Placing Auctions of various types to the in-
C. Ease of use ternet
D. Fear of the unknown A. Product customization
B. Viral Marketing
51. The is one of the best examples of im-
pacting site availability. It involves get- C. Online Auctions
ting the server to perform a large num- D. Deep Discounters
ber of mundane (ordinary) tasks, exceed-
ing the capacity of the server to cope (han- 56. In general E-Commerce infrastructure,
dle) with any other task there are various support services as be-
low, except?
A. sniffing
A. Multimedia content
B. Denial of service(DoS) attack
B. Business partnership
C. Insider attack
C. Public policy
D. spoofing
D. People
52. En Abu think he received an email from
someone he know and click on what looks 57. Standard protocols that can be used in e-
like a legitimate attachment. But he don’t commerce are, except
know that the email is from a cybercrim- A. Open Buying on the Internet (OBI)
inal. When En Abu execute the program,
B. Electronic Wallet
the malware can spread to other files and
damage his computer. What type of mali- C. Open Trading Protocol (OTP)
cious code that En Abu faced? D. Electronic Data Interchange (EDI)
A. Macro virus
58. Web servers, application servers,
B. Trojan Horse database servers, scalability. are e-
C. Worm commerce infrastructure of ?
D. script virus A. Information superhighway
B. Messaging and information distribu-
53. are central points where output from tion
various senders is collected and then dis-
tributed to the receivers C. Common business
A. Hubs D. Web architecture
B. Cloud Computing 59. What is the full form of E-mail?
C. Application Service Providing A. Elect Mail
D. Portals B. Electronic Mail

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1226

C. Exact Mail C. B2B


D. Empty Mail D. B2G
60. What are the aspects found in E-Commerce 65. An e-commerce transaction primary in-
Business Strategy? volves:
A. Vendor Management, I-market, Ex- A. Cash
tended Supply Chain, Customer Care
B. Checks
B. Distributed Object Infrastructure,

NARAYAN CHANGDER
C. Credit cards
Legacy Applications and Assets
D. Smart cards
C. Strengths, Weaknesses, Opportuni-
ties, Threats, Goals, Requirements, Con- 66. is a platform for communication and
straints exchange of experience. It is similar to a
D. Distributed Object Infrastructure, virtual club or association.
Legacy Applications and Assets A. Search engines
61. What does the term eCommerce mean? B. Online Shops
A. Buying goods and services over the in- C. Content provider
ternet D. Portal
B. Buying Goods over the internet E. virtual community
C. Selling goods and services over the in-
ternet 67. is a framework for integrating informa-
tion, people, and processes across organi-
D. Buying and Selling goods over the in- zational boundaries,
ternet
A. portal
62. The lowest bidder will wins is using B. Vertical portal
A. Normal auction
C. enterprise portal
B. Reverse auction
D. none of above
C. Forward auction
68. Below are tools that can be utilized at the
D. Backward auction
analysis stage of an e-commerce develop-
63. Which of the following is example of Social ment, except?
Network Services (SNS)? A. Making samples
A. facebook B. Conducting interviews
B. instagram C. Create a web
C. twitter D. Make observations
D. youtube
69. Is broker is a person or an organization
64. The most commonly discussed type of com- to execute sales transactions. Sometimes
merce is in which online business at- those brokers are used to hide the real cus-
tempts to reach individual consumers. tomer to the supplier.
A. B2C A. Information Broker
B. C2C B. Transaction Broker

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1227

C. Virtual Broker 74. All of the following are basic functionality


provided by e-commerce merchant server
D. Portal Broker
software except:

PRACTICE BOOK» NOT FOR SALE


70. is a website, which provides a set of A. a product catalog
services to the user so that he/she some- B. marketing software
times thinks that he/she is using a single
but very complex software system. C. shopping cart

A. Search engines D. credit card processing.

B. Online Shops 75. collects, aggregates, and provides in-


formation, e.g. information with respect
C. Content provider
to products, prices, availabilities or mar-
D. Portal ket data, economical data, technical infor-
E. Electronic mall mation.
A. information broker
71. Internet infrastructure enables large-scale
B. transaction broker
sharing of computational and storage re-
sources, thus leading to the implementa- C. Content provider
tion of the decades-old idea of utility com- D. Portal
puting.
E. virtual community
A. Computation
76. A is a piece of software with compre-
B. Connection hensive E-Commerce functionality.
C. Communication A. marketplace
D. Collaboration B. digital

72. The following is the sequence of stages of C. Hubs


true e-business evolution D. none of the above
A. Inform-Automate-Integrate-Reinvent 77. Which of the following cannot be used to
B. Reinvent-Automate-Infor-Integration retrieve objects from a database?
C. Integrate-Reivent-Automate-Inform A. CGI
D. Automate-Integrate-Reinvent-Uniforms B. ASP
C. JSP
73. What are the main elements that a web-
site design brief should include? D. HTML

A. All of the above options 78. Its objective is to run a marketplace for
goods and values. Examples are e bay and
B. The set of priority keywords and
yahoo
phrases for Search Engine Optimisation
(SEO) A. Business web agora

C. The organisational purpose of the web- B. business web aggregator


site C. Business web integrator
D. The target market D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1228

79. is a digital mobile phone technology 84. It is features online sales transactions
that allows improved datatransmission made via mobile devices, such as smart-
rates as a backward-compatible extension phones and tablets.
of GSM. A. E-Commerce
A. EDGE B. E-Business
B. HTML C. Mobile E-Commerce
C. Transmission ControlProtocol/Internet D. Commerce

NARAYAN CHANGDER
Protocol.
85. Reasons Business should use Cloud Ser-
D. UMTS (Universal Mobile Telephone vices
System)
A. Makes collaboration easy & cheaper.
80. E-Commerce is bigger than E-Business B. It can support variety of business
A. True needs & offers better insights and visibil-
ity.
B. False
C. Cheaper technology & easy to use.
C. Same in Size
D. Fast connection to internet & easy ac-
D. Hard to say cess to content.

81. The term used for scrambling/translating 86. One of the drivers of m-commerce, , is
data into a secret code that can only be the widespread use of cell phones, which
decoded by authorised users? is a social phenomenon, especially among
the 15-to-25-year-old age group.
A. Anti-virus
A. vendor push
B. Encryption
B. bandwidth improvement
C. Firewall
C. device availability
D. Password Protection
D. handset culture
82. This process describes the general pattern 87. Every business model run by e-commerce
of making business indelivering goods or actors must at least consider several
providing services and getting payments. things. one of which is Buyer Side. What
A. Primary Process is meant by Buyer Side is.
B. Secondary process A. Looking for websites with attractive
buying and selling facilities
C. Initial process
B. Look for items with the highest dis-
D. Last process counts
83. Internet commercialization began in? C. How to attract buyers to buy the prod-
ucts offered
A. 1960-an
D. Choose cheap
B. 1990-an
88. Is broker collects, aggregates and pro-
C. 1980-an
vides information, e.g. information with
D. 1970-an respect to products, prices, availabilities

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1229

or market data, economical data, technical C. Value proposition


information. D. Business model

PRACTICE BOOK» NOT FOR SALE


A. Information Broker
93. Which of the following is NOT a pricing
B. Transaction Broker strategies in the eCommerce?
C. Virtual Broker A. “take-it-or-leave-it”
D. Portal Broker B. Auction
89. The act of illegally copying legitimate web- C. Individual Negotation
site content to another website designed D. None
to replicate the original website.
A. Phishing 94. refers to those mechanisms which con-
vert the paper processes in a traditional
B. Pharming office into electronic processes, with the
C. Pagejacking goal to create a paperless office
D. Hacking A. E-Procurement
B. Electronic Government
90. What is security attack?
C. Electronic Democracy
A. A process that is designed to detect,
prevent, or recover from a security attack. D. Electronic Administration
B. It make use of one or more security 95. Criteria for decision makers in EC?
mechanisms to provide the service.
A. Information search
C. Attack uses vulnerability to enter into
B. Alternatives evaluation
the IS
C. Testament service, Prioritizing orders
D. Any action that compromises the secu-
rity of information owned by an organiza- D. Prioritizing value, Personalized ser-
tion. vice, Convenience

91. What is network Architecture? 96. offer content, a completely digital


good, e.g. information, news, documents,
A. The design of computers, devices, and music. A specific variant of a content
media on a network to communicate provider is the information broker, who is
B. The layout of the computers and de- a trader of information.
vices in a communications network A. Search engines
C. The physical location of all the device B. Online Shops
and communication devices on a network
C. Content provider
D. The shape of the network, either bus,
star or ring. D. Portal
E. Electronic mall
92. The unique value the product provides over
its competitors and why a customer should 97. Which of the following is NOT a benefit of
pick one product over another, is called: e-Commerce
A. Revenue A. Faster to buy/sell
B. Customer service B. Easier to find products

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1230

C. Geographic limitations C. Transactions occur between two par-


D. Can purchase goods from any location ties
D. Bought without meeting the seller
98. Decathalon sells its products on its own
website. What kind of a business model 103. Connecting every HR in a company is the
is it? principle of?
A. Merchant Model A. E-business
B. Direct Model B. Ecommerce

NARAYAN CHANGDER
C. Community Model C. Internet
D. Affiliation Model D. Intranet

99. *Sales*Subscription fees*Membership 104. Below are five aspects of the benefits
feesThese fall under? offered by e-business (spectrum value e-
A. Cost structure business), except?

B. Value proposition A. Aspects of effectiveness


C. Key resources B. efficiency aspect
D. Revenue streams C. activity aspect
D. range aspect
100. What are the two basic type of network
architecture that you know? 105. Is a virtual community whose members
A. 1. STAR2. RING interact with each other primarily via the
Internet.
B. 1. Client/ Server2. Peer to peer
A. Chatroom
C. 1. Server/ Customer2. PC to PC
B. Chatbox
D. 1. Stand Alone network2. Intercon-
nected network C. Online
D. Online Community
101. The network of interactions and relation-
ships where information, products, ser- 106. The technology in the intranet, among
vices and payments are exchanged, the others
meaning of?
A. HTML, Internet
A. Market
B. External, XML
B. Promotion
C. HTML, TCP/IP
C. E-business
D. SMTP, Activex
D. Marketing
107. To select a suitable web server for E-
102. State the characteristics of E-Commerce, Commerce operations using
except
A. Bench tools
A. The Internet is the main medium in the
trading process or mechanism B. Benchmarking tool

B. There is an exchange of goods, ser- C. Application tools


vices or information D. Trans tools

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1231

108. Traditional and similar business models B. Facebook


are direct mail selling (no shop facility, of- C. Wikipedia
fering of goods via a printed catalogue, or-

PRACTICE BOOK» NOT FOR SALE


dering by letters or telephone calls) and- D. ebay
factory outlets (producer has own shop fa- 114. One of the attributes of m-commerce is
cility, does not sell his products via mer- , which means being everywhere, es-
chants). pecially at the same time.
A. Access Provider A. personalization
B. Search Engine B. ubiquity
C. Online Shop C. localization
D. Content Provider D. interactivity
109. Apa definisi E-commerce menurut Associ- 115. It is when businesses sell products, ser-
ation for Electronic Commerce? vices or information directly to consumers.
A. Mekanisme bisnis secara elektronis A. Business-to-business
B. Membeli tanpa bertemu penjual B. Business-to-consumer
C. Jual beli lewat internet C. Consumer-to-consumer
D. Semua benar D. Consumer-to-business
110. Which of the following would you need 116. Both sellers and the buyers are business
to create an online shop organization
A. Digital Catalogue of products A. Consumer to business
B. Shop Front B. Consumer to Consumer
C. Sales Assistants C. Business to business
D. A location in a prominent area D. Collaborative Commerce
111. is an early form of E-commerce 117. The leading Web server software is:
A. SCM A. Apache.
B. EDI B. Microsoft Internet Information
C. Both of these Server.
D. none of above C. Sun.
D. Zeus.
112. What is the principle of the intranet?
A. Looking for friends 118. is an open source information space
where documents and other Web re-
B. Connecting every HR in a company sources are identified by URLs (URL = Uni-
C. Searching for information form Resource Locator),
D. Adding relationships A. Hypertext Transfer Protocol

113. Which of the following is an example of B. File Transfer Protocol


social e-commerce? C. Simple Mail Transfer Protocol
A. Amazon D. World Wide Web

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1232

119. Another name for Income is A. developing a clear understanding of


A. Coins business objectives and knowing how to
choose the right technology to achieve
B. Value those objectives
C. Costs B. having an accurate understanding of
D. Revenue your business environment and an achiev-
able business plan
120. Which one is not an online payment
C. building a team with the right skill sets

NARAYAN CHANGDER
mode?
and closely managing the development
A. Cash on Delivery process
B. Debit card D. identifying the key components of your
C. Credit card business plan and selecting the right soft-
ware, hardware, and infrastructure for
D. e-cheque your site
121. What is a Business Model? 125. Its objective to establish an optimized
A. A paper model of your business. value creation chain. Examples are Cisco
and Dell
B. A story of how your enterprise will cre-
ate, deliver, and capture value. A. Business web agora
C. A model made out of bricks B. business web aggregator
C. Business web integrator
D. None of the above.
D. none of above
122. There are 7 types of portals namely com-
mercial portal, publishing portal, personal 126. Is the automation of an organization’s
portal, affinity portal, mobile portal, cor- procurement processes using Web-based
porate portal and applications.
A. Language portal A. E-Procurement
B. E-Commerce
B. Voice portal
C. M-Commerce
C. Intranet portal
D. M-Procurement
D. Business portal
127. methods of firewall including and
123. That means a form of government in
A. SSL, packet filter
which all adult citizens are presumed to be
eligible to participate equally in the pro- B. application gateway, proxy server
posal, development, and creation of laws. C. proxy server, packet filter
A. E-Administrator D. packet filter, application gateway
B. E-Democracy 128. All of the following might be part of a
C. All of the above Web site’s middle-tier layer except:
D. None of the above A. a database server.
B. an ad server.
124. What are the two most important man-
agement challenges in building a successful C. legacy corporate applications.
e-commerce site? D. a mail server.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1233

129. is a network inside an organization C. Cheaper


that uses Internet for Information shar-
D. Better
ing, communications, collaboration, and

PRACTICE BOOK» NOT FOR SALE


the support of business process. 134. Which one of the following is called plas-
A. Intranet tic money?
B. Internet A. Credit Card
C. Extranet B. Master Card
D. Telnet C. Debit Card
130. Is the application of information andcom- D. All of the above
munication technologies (ICT) in support of
all the activities of business. 135. What is a key advantage of online shops
A. M-Commerce A. Shop 24/7
B. E-Commerce B. Wide Choices of Goods
C. E-Business C. Cheaper Prices
D. None of the above D. All other answers

131. It is a virtual computer (a piece of soft- 136. What includes Web Authoring Tools are,
ware), which helps to deliverWeb content except
that can be accessed through the Internet.
A. HTML
A. Webserver
B. Microsoft FrontPage
B. WSDL (Web Services Description Lan-
guage) C. Netscape Navigator Gold
C. SOAP (Simple Object Access Protocol) D. Macromedia Backstage Designer
D. None of the Above 137. How does e-Commerce impact the US
economy?
132. It is a benefits of e-commerce avoid the
cost associated with physical stores, such A. Consumers only visit physical loca-
as rent, inventory and cashiers, although tions to purchase goods
they may incur shipping and warehouse
B. Businesses experience decreased
costs.
rent expense
A. Availability
C. Consumers have fewer choices
B. Speed of Access
D. Businesses can sell to a larger market
C. Lower Cost
D. none of above 138. What is the term for a shop that is both
online and on the high street?
133. The following is not a way for company
A. Click & Brick
transactions to offer their products or ser-
vices, namely by: B. Brick & Click
A. Faster C. Brick & Brick
B. Switching cost D. Click & Click

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1234

139. Which of the following is used to process C. enterprise portal


certificates and private/public key infor- D. none of above
mation?
A. HTTP 144. Internet Makes our life
B. SSL A. Difficult
C. FTP B. Complex
D. data capture tools C. Easy and Better

NARAYAN CHANGDER
D. Hard
140. State the 4 types of relationships in the
business world that are usually carried out 145. A universal serial bus that supports data
by a company, except transfer to and from other devices is called
A. Relations with suppliers the
B. Relations with distributors A. USB Cable
C. Relations with consumers B. Printer
D. Relations with companies C. Portable Storage
D. USB Port
141. People order things just fun and never
plan to pay and accept the delivered 146. Traditional business models, which are
goods. somehow similar to the business of an ac-
A. Junk orders cess provider, are operators of a technical
infrastructure, e.g. telephone networks,
B. Waste Order
carhighways, or railways.
C. Order of Digital Goods
A. Access Provider
D. none of above
B. Search Engine
142. has the widest propagation now ac- C. Online Shop
tually is the primary technology and
D. Content Provider
provides transmission rates up to 10
Gigabit/sec (Access is carried out via 147. It is a benefits of e-commerce sites
CSMA/CD = Carrier Sense Multiple Ac- are available 24x7, allowing visitors to
cess/Collision Detection; technology is browse and shop at any time.
based on standard IEEE 802.3).
A. Availability
A. Transmission Control Proto-
B. Speed of Access
col/Internet Protocol.
B. Fiber Distributed Data Interface C. Lower Cost

C. Token Ring D. none of above

D. Ethernet 148. Examples of products and services that


can be offered on the internet are
143. is a specialized entry point to a spe-
cific market or industry niche, subject area, A. Telemedicine
or interest. B. Electronic publishing,
A. portal C. Virtual book store,
B. Vertical portal D. All true.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1235

149. The viruses are activated simply by C. Script virus


double-clicking an infected *.vbs or *.js file.
D. Trojan hourse
This refer to

PRACTICE BOOK» NOT FOR SALE


A. macro virus 154. What is the acronym of PDA?
B. script virus A. Public Display Affection
C. file infecting virus B. Personal Digital Assistants
D. worm C. Personal Display Assistants
150. Some of the things that affect the D. Public Digital Assistants
decision-making process through the “mar-
keting mix” are 155. Which best describes a server?
A. Product-availability of goods A. A computer that stores data
B. Packaging and delivery / packing and B. A computer that stores software
delivery C. Central computer-provides clients
C. Promotion of products (advertise- with functionality
ments and giveaways) / promosi produk D. A computer within a network
D. All true
156. is a form of government in which all
151. Which of the following is not one of the adult citizens are presumed to be eligible
nine basic business objectives for an e- to participate equally in the proposal, de-
commerce site? velopment, and creation of laws.
A. display goods A. E-Procurement
B. execute a transaction B. Electronic Government
C. provide production and supplier links C. Electronic Democracy
D. optimize system architecture
D. Electronic Administration
152. Encrypted data is commonly referred to
157. WebTrends is an example of which of the
as , while unencrypted data is called
following?

A. plaintext, plaintext A. search engine

B. plaintext, ciphertext B. site management tool

C. ciphertext, plaintext C. web browser


D. ciphertext, ciphertext D. security services tool

153. This virus is application specific.Meaning 158. is the process where different parts
that the virus affects only the application of the CPU are used for performing tasks
for which it was written, such as Microsoft
A. Caching
Word, Excel, PDF, or PowerPoint. This re-
fer to B. Pipelining
A. Macro virus C. Core
B. File-infecting virus D. Clock speed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1236

159. There are 4 (four) types of relationships 164. On what platform may an online user ex-
in the business world that are usually es- perience Phishing?
tablished by a company, except A. Gaming sites
A. Relations with suppliers (suppliers) B. Email applications
B. Relations with internet users C. Social media
C. Relations with partners (partners) D. E-commerce sites
D. Relations with consumers (customers)

NARAYAN CHANGDER
165. Which of the following is an example of
B2B e-commerce?
160. If a seller entertains bids from multiple
buyers known as . A. Facebook

A. many seller, many potential buyers B. Groupon


C. Go2Paper
B. one buyer, many potential sellers
D. none of above
C. one seller, many potential buyers
D. one seller, one buyer 166. Which of the following features of e-
commerce technology enables merchants
161. Below are included in the e-commerce to market and sell “complex” goods and
framework, namely services to consumers via marketing mes-
sages that can integrate video, audio, and
A. E-Commerce Application text?
B. Infrastructure A. richness
C. Support service B. ubiquity
D. All True C. information density
D. personalization
162. The portion of an e-seller’s business pro-
cesses through which customers interact, 167. “A broader definition of EC that includes
including the seller’s portal not just the buying and selling of goods
A. Back end and services, but also servicing customers,
collaborating with business partners, and
B. Front end conducting electronic transactions within
C. Intermediaries an organization. “The above statement re-
fer to
D. Infrastructure
A. E-Business
163. What is SWOT? B. E-Marketplace
A. (Strong, Weak, Opportunities, C. E-Commerce
Threats) D. E-Tailing
B. (Strengths, Weaknesses, Opportuni-
168. More consumers than ever are purchas-
ties, Threats)
ing products on-line. Which is the MOST
C. (Strengths, Weaknesses, Opportuni- needed improvement on e-commerce web-
ties, Threats) sites?
D. (Strong, Weak, Opportunitis, Thread) A. Design

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1237

B. Graphics B. A process of transforming information


C. Scheduling from various forms into digit format.

PRACTICE BOOK» NOT FOR SALE


D. Security C. The process of cooperating with other
companies.
169. What is security Mechanism? D. business can be done anytime any-
A. It enhances the security of the data where for 24 hours per day and 7 days a
processing systems and transfer of the in- week on-line and real time.
formation an organization.
174. Online, select goods, hub. contact,
B. It is designed for detecting, preventing payment, goods coming these are the
or recovering from a security attack. ways
C. Actions that compromises the security A. Making dark purchases
about information owned by an organiza-
tion. B. Make transactions in cyberspace

D. None of the above C. Export-import transactions


D. Make transactions in the market
170. Who is the founder of WWW?
A. Narayan Murthy 175. consists of the digital interactions
between citizens and their government
B. Mark Zuckerberg (C2G), between governments and govern-
C. Sabeer Bhatia ment agencies (G2G), between govern-
D. Tim Berners Lee ment and citizens (G2C), between govern-
ment and employees (G2E), and between
171. What is the full meaning of CPU? government and businesses/commerce
(G2B).
A. Center Process Unit
A. E-Procurement
B. Central Processing Unit
B. Electronic Government
C. Centralized Process Unit
C. Electronic Democracy
D. Central Processing Uniform
D. Electronic Administration
172. Which of the following might include a
data flow diagram to describe the flow of 176. It refers to transactions conducted online
information for a Web site? between companies and public administra-
tion or government bodies.
A. physical design
A. Business-to-business
B. logical design
C. testing plan B. Business-to-consumer

D. co-location plan C. Consumer-to-consumer


D. Business-to-administration
173. What is meant by the term virtualiza-
tion? 177. (Chen & Vargo 2014) describes World
A. A system where organizations apply Wide Web sites that emphasize user-
molecular shapes to their systems so that generated content, usability, and interop-
they can easily adapt to the corporate en- erability.
vironment. A. Web 1.0

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1238

B. Web 2.0 183. Which of the following is not an advan-


C. Web 3.0 tage to customers when buying online

D. Web 4.0 A. Compare prices between different


sites
178. What information should you share on
B. Buy from other countries
the Internet?
A. Your school address C. Goods take a few days to arrive
D. Shop 24/7

NARAYAN CHANGDER
B. Your full name
C. Your phone number 184. What is the meaning of digitization based
D. Your favourite color on the economic concept

179. What is the acronym of WWW? A. Products and services forms are trans-
formed into ones and zeros format
A. Web World Wide
B. Replacement of the mass media into
B. World Wide Web
molecular media
C. Wide Web World
C. Physical things (institution and rela-
D. World War Web tionship) can become virtual
180. eCommerce is short for D. Convergence of computing, communi-
A. Email Commerce cation, and content

B. Electronic Commerce 185. You receive a e-mail contain message


C. Essential Commerce you won a lottery but first deposit some
amount in the following account a/c
D. Ebay Commerce
This refer to
181. Identity theft can be described as A. hacking
A. receiving numerous spam emails B. phising
B. using another person’s name and per-
C. adwares
sonal information in order to obtain finan-
cial gain e.g. credit, loans, etc. D. cybervandalism
C. a user’s online activity being tracked
186. Four web designers from different parts
D. gaining unauthorised access to a per- of the United States are consulting with
son’s computer files their client on her new website. Their
client and her company are based in Ire-
182. Yakshi’s children live in USA.She wants
land. What is the MOST prodcutive way
to talk to them face to face.Which inter-
for all of them to meet privately to discuss
net service you will suggest her to use for
the progress on the new website design?
communication?
A. internet free calls A. Chat room

B. video conferencing B. Email


C. flipkart C. Instant messenger
D. chatting D. Teleconferencing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1239

187. Tailoring e-commerce services for individ- A. Collaboration


ual countries or regions is known as: B. Commerce

PRACTICE BOOK» NOT FOR SALE


A. Regionalisation C. Communication
B. Localisation D. Connection
C. Nationalisation
193. A is a very reason why customers
D. Globalisation choose your company over another and
188. Who is founder of Google? buy a product or service only from you.
A. customer segment
A. Larry Page & Sergey Brin
B. revenue streams
B. Bill Gates
C. value proposition
C. Steve Jobs
D. costs
D. Sabeer Bhatia
194. Which of the following details the actual
189. Some General Business Models in e-
hardware components to be used in a sys-
commerce systems are as follows ex-
tem?
cept?
A. architecture plan
A. Intermediaries
B. system functionalities plan
B. Direct to Customer
C. logical design
C. Auctions/Auctions
D. physical design
D. Email Marketing
195. People use social networks to spread
190. How many Key Ingredients of a Business
Word of Mouth advertising
Model?
A. Viral Marketing
A. 8
B. Group Purchasing
B. 3
C. Online direct marketing
C. 7
D. Membership
D. 10
196. Sender uses recipient’s public key to en-
191. A completely digital good, e.g. informa- crypt message; recipient uses his/her pri-
tion, news, documents, music. A specific vate key to decrypt it. This refer to
variant of a content provider is the infor-
mation broker, who is a trader of informa- A. symmetric encryption
tion. B. private key encryption
A. Access Provider C. asymmetric encryption
B. Search Engine D. single encryption
C. Online Shop 197. Every business model run by e-commerce
D. Content Provider actors must attract buyers to buy the prod-
ucts offered, is the meaning of?
192. As an interactive medium, the Web has
given rise to a multiplicity of media prod- A. Sell side
ucts. B. Buyer side

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1240

C. Consumer side 203. The Web is a vast nexus, or network,


D. Product or Service Type of relationships among firms and individ-
uals. More or less formal are created
198. Listed below are the three categories of or emerge on the Web to bring together in-
cloud services EXCEPT: dividuals engaged in knowledge work in a
manner that limits the constraints of space,
A. SaaS = Software as a Service time, national boundaries, and organiza-
B. Paas = Platform as a Service tional affiliation.

NARAYAN CHANGDER
C. IaaS = Infrastructure as a Service. A. Commerce
D. None of the above B. Communication
C. Collaboration
199. It is a disadvantage of e-commerce, there
D. Connection
is a wait time for the product to be shipped
to the customer’s address. 204. What is included in mobile computing?
A. Limited customer service A. Mobile with 2G
B. Not being able to touch or sale B. LAN with bandwidth
C. Wait time C. notebooks with PDAs
D. Security D. PDA with IRDA
205. Which legal legislation/act protects
200. E-Commerce applications began in the
users who’s data has been accessed with-
early
out authorisation?
A. 1960
A. Data Protection act
B. 1970 B. GDPR
C. 1990 C. Computer Misuse Act
D. 1940 D. Copyright, Designs and Patent Act
201. The advantages of E-commerce are (any 206. Online word-of-mouth marketing is re-
3) ferred to as:
A. Global scope A. Permission marketing
B. Anytime shopping B. Search engine marketing.
C. Security C. E-mail marketing

D. Cost saving D. Viral marketing


207. It is the buying and selling of goods and
202. In the E-commerce system, what needs to services, or the transmitting of funds or
be considered is that the seller must have, data, over an electronic network, primar-
except ily the internet.
A. Cash A. E-Commerce
B. Corporate knowledge B. E-Business
C. Corporate database C. Mobile E-Commerce
D. Interaction between seller and buyer D. Commerce

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1241

208. Is commonly understood as the usage of 213. By connecting their businesses to the on-
mobile devices for business purposes, es- line infrastructure of the Internet, compa-
pecially mobile phones and PDA’s. nies can generally do all of the following,

PRACTICE BOOK» NOT FOR SALE


A. E-Commerce EXCEPT:

B. M-Commerce A. Expand their markets


B. Improve their profit margins without
C. C-Commerce
massive outlays for new telecommunica-
D. G-Commerce tions facilities.
209. In the electronic marketplaces there is a C. Reduce communications and distribu-
matching of customers and suppliers, an tion costs.
establishing of the transaction terms, and D. Reduce the number of direct competi-
the facilitation of exchange transactions. tors.
A. Commerce
214. The benefits of e-commerce for the sup-
B. Communication ply chain include, except?
C. Collaboration A. Reducing waiting time (idle time) be-
D. Connection cause both raw goods and finished goods
have a faster time
210. An Internet forum, or message board, is B. Add other costs, such as communica-
an online discussion site where people can tion costs
hold conversations in the form of posted
C. Can improve relationships or relation-
messages.
ships with consumers directly
A. Forums
D. Reducing costs in shipping or distribut-
B. Bulletin Boards ing goods from consumer producers
C. Blackboard
215. What is the acronym of MRO?
D. Chatroom
A. Maintenance Repair Operations
211. The highest bidder will wins is using B. Maintenance Repair Organizations
A. Normal auction C. Maintenance Repair Overhaul
B. Reverse auction D. Maintenance Repair Overcharge
C. Forward auction 216. Common software development plat-
D. Backward auction forms, many of them in the open-source
domain, enable a wide spectrum of firms
212. Posing as someone from an official organ- to avail themselves of the benefits of
isation such as a bank in order to get an the already developed software, which is,
individual to hand them over their account moreover, compatible with that of their
details, is an example of trading and collaborating partners.
A. Identity theft A. Collaboration
B. Fraud B. Commerce
C. Spam C. Communication
D. Hacking D. Connection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1242

217. The digital economy is also sometimes A. Computer Misuse Act 1990
called the Internet Economy, the New Econ- B. Copyright and Patents Act 1988
omy, or Web Economy.
C. Data protection Act 1998
A. M-Commerce
D. none of above
B. E-Commerce
C. Digital Economy 222. Brochureware is

D. All of the above A. Customers to meet face to face with

NARAYAN CHANGDER
company management through the cam-
218. Supply chain management refers to the era
coordination of all supply activities of an B. Development of an application that al-
organisation from its suppliers and de- lows business transactions to occur elec-
livery of products to its customers. E- tronically (E-Commerce)
commerce transactions between a com-
pany and its stakeholders, be their con- C. Internet as a means to develop elec-
sumers or businesses are often referred to tronic brochures
as: D. The company’s ability to form a com-
A. B2C, B2B munity in cyberspace.

B. C2C, C2B 223. A data file that is stored on your com-


puter or device when you visit a website
C. B2B, C2B
as well as it remembers your activities on
D. B2C, C2C a website.
219. This twin protocol describes the trans- A. Recommendation Engines
portation of data in the Internet and was B. Customer Relationship Management
introduced in 1978 by the USA-DoD (De- System
partment of Defence) as a standard for
C. Cookies
heterogeneous networks
D. None of the above
A. Transmission Control Proto-
col/Internet Protocol. 224. The first step that must be taken by
B. Fiber Distributed Data Interface a company when it intends to use an e-
commerce website to help the business it
C. Token Ring
runs is
D. Ethernet
A. Promote websites
220. Primary payment method are listed be- B. Marketing websites
low EXCEPT:
C. Build a work team
A. Cash payment
D. Determine the final goals and objec-
B. Bank transfer tives to be achieved
C. Debit Note 225. Is a website or computer software that
D. Credit card based methods aggregates a specific type of information
from multiple online sources.
221. Individuals who’s information is held by
E-commerce websites are protected by A. Content
which legal act? B. Aggregators

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1243

C. Content Aggregators 231. Benefits of m-commerce to organiza-


D. Social Networks tions:

PRACTICE BOOK» NOT FOR SALE


A. Location-based commerce
226. Which of the following is not a unique fea-
ture of e-commerce technology? B. Wider reach

A. interactivity C. Competitive pricing

B. social technology D. Increases sales


C. information asymmetry 232. Select 2 features of a secure website
D. richness A. ‘https’ in URL
227. This will only use the term “ “, be- B. Domain name in upper case letters
cause every business transaction finally is C. Padlock symbol in URL
involved in selling or buying of products or
services. D. SSL has expired
A. M-Commerce 233. Below are the examples of virtual (Pure-
B. E-Commerce play) organizations EXCEPT:
C. E-Business A. Shopee
D. None of the above B. Lazada

228. Which of the following is NOT required to C. Watson


use e-Commerce? D. Amazon
A. Internet Access
234. Which one incorrect referring to encryp-
B. Digital Cash tion?
C. Cash A. There are 2 types of encryption includ-
D. Computer/Smart device ing asymmetric and symmetric encryption
B. symmetric encryption use 2 digital
229. It is a disadvantage of e-commerce that
keys such as public key and private key.
customer service may be limited.
C. asymmetric encryption use 2 digital
A. Limited customer service
keys such as public key and private key.
B. Not being able to touch or sale
D. symmetric encryption use same digital
C. Wait time key to encrypt and decrypt the message.
D. Security
235. Below are included in the spectrum
230. Which of the following are internet ser- of value e-business (source:Normal Pal,
vice providers? 2001) are
A. Airtel A. E-Business
B. Aircel B. E-tailing
C. Reliance C. Ecommerce
D. Sify D. All True

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1244

236. provides services, which can be run 241. Which type of e-commerce focuses on con-
electronically, e.g. application software sumers dealing with each other?
services or ICT infrastructure services like A. B2B
storage or backup services.
B. C2B
A. information broker
C. C2C
B. transaction broker
D. B2C
C. Content provider
242. is a 13-digit number product identifier

NARAYAN CHANGDER
D. Portal
used by publisher, booksellers, libraries,
E. online service provider internet retailers and other supply chain
participants for ordering, listing, sales
237. you have a small business specializing
records and stock control purposes.
in custom designed silver jewelry. How
should you globalize your business? A. ISBN (International Standard Book
Number)
A. Subscribe to an international publica-
tion B. GTIN (Global Trade Item Number)
B. Establish a website on the internet C. Bar code
C. Buy jurisdiction to sell jewelry in Japan D. None of the above
D. Build an infrastructure in France 243. Below are examples of mediators in eco-
nomic activity except
238. A payment option that doesn’t involve
sharing personal financial details with a A. Convergence
business, during payment? B. Broadcasters
A. Credit Card C. Wholesalers
B. Debit Card D. Retailers
C. Third Party Payment option 244. “The process of buying, selling, or ex-
D. none of above changing products, services, or informa-
tion via computer. “The above statement
239. Features of a strong password refer to
A. Contains a mixture of upper and lower A. E-Business
case letters
B. E-Marketplace
B. Is short
C. E-Commerce
C. Has both Letters and Numbers
D. E-Tailing
D. Contains only numbers
245. It refers to the electronic exchange
240. Auction in which the buyer places an item of products, services or information be-
for bid tender ) on a request for quote tween businesses rather than between
(RFQ) system is also known as businesses and consumers.
A. Normal auction A. Business-to-business
B. Reverse auction B. Business-to-consumer
C. Forward auction C. Consumer-to-consumer
D. Backward auction D. Consumer-to-business

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1245

246. A method where you can place banners 250. One of the 12 characteristics of the digi-
from people’s companies on your site, tal economy that Don Tapscott discovered
where if someone makes a transaction on is

PRACTICE BOOK» NOT FOR SALE


your reference, you will get a commission
A. Virtualization
from the transaction, the amount of which
is in accordance with the initial agreement, B. Organization
is the definition of C. Artificial Intelligence
A. Virtual Marketing D. Process
B. Affiliate
251. Select the 4 different stages to perform-
C. Clickstrem
ing an instruction
D. Opt-in email
A. Fetch
247. The purpose of a security group is B. Opcode
A. To control which AWS users can con-
C. Decode
nect to my cloud resources
D. Execute
B. To control which ports and addresses
can connect to my cloud resources E. Write
C. To control what software is allowed to
252. Online activities and communication per-
connect to my cloud resources
formed by parties to attain same goal
D. To control what services run securely
in your server(s) A. Consumer to business
B. Business to Business
248. Below is the key to the company’s suc-
cess in internet business lies in the level C. Collaborative Commerce
of ability and quality of the company D. Consumer to Consumer
in converging the three industry sectors,
namely: 253. functions as a request-response pro-
A. Internetworking, computing, and con- tocol in the client-server computing model.
tent. A. Hypertext Transfer Protocol
B. Content, computing, and communica- B. File Transfer Protocol
tions.
C. Simple Mail Transfer Protocol
C. Communications, internetworking,
and content. D. World Wide Web
D. Computing, communications, and in- 254. It is a disadvantage of e-commerce,
ternetworking. skilled hackers can create authentic-
249. The term “E-Commerce” obviously is- looking websites that claim to sell well-
more widespread than the term “ ”. known products.

A. M-Commerce A. Limited customer service


B. E-Commerce B. Not being able to touch or sale
C. E-Business C. Wait time
D. None of the above D. Security

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1246

255. An e-commerce model in which business 260. Only members can use the services pro-
actors directly involve sellers (e-commerce vided
service providers) and individual buyers or A. Bartering Online
buyers, this matter is the understanding
of B. Membership
A. Consumer to Consumer (C2C) C. Value Chain Integrators
B. Consumer to Business (C2B) D. Online Auctions

NARAYAN CHANGDER
C. Business to business (B2B) 261. is typically used to call for pop-up
D. Business to Consumer (B2C) ads to display when the user visits cer-
tain sites. It can be downloaded and some-
256. To save a URL, we use: times included in free programs.
A. Copy A. spyware
B. Bookmark B. adwares
C. Save C. phising
D. Paste D. spoofing

257. which are not important characteristics of 262. Prior to the Internet Resolution, most
the digital economy that must be known businesses produced their product compo-
and understood by management practition- nents in-house. Now they depend on many
ers, namely? vendors to supply their component parts.
Which term describes this?
A. Molecularization
A. Dependability
B. Requirements
B. Integration
C. Knowledge
C. Intermeditation
D. Digitization
D. Out-sourcing
258. What is the purpose of a Denial of Ser-
vice attack? 263. At this stage the seller and buyer carry
out various activities or communication,
A. Exploit a weakness in the TCP/IP stack
such as?
B. To execute a Trojan on a system
A. Do not ask and do not ask for informa-
C. To overload a system so it is no longer tion about the product
operational
B. No complains about product quality
D. To shutdown services by turning them
C. Discussion on how to use the product
off
properly
259. is an Internet standard for electronic D. Not informing about the products of-
mail transmission. fered
A. Hypertext Transfer Protocol 264. E-commerce is also referred to as ex-
B. File Transfer Protocol change of business information using EDI
C. Simple Mail Transfer Protocol A. User friendly
D. World Wide Web B. Paperless

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1247

C. Upgraded B. They want the business’s finances to


D. Useless be protected

PRACTICE BOOK» NOT FOR SALE


C. They don’t want their personal infor-
265. Internet, LAN, WAN, routers, Telecom, ca-
mation to be accessed by unauthorised
ble TV, and wireless are e-commerce in-
users
frastructure of ?
D. They want the business’s reputation to
A. Information superhighway
be protected
B. Messaging and information distribu-
tion 270. is the activities that support online
C. Common business order-taking includes inventory manage-
ment, purchasing from suppliers, payment
D. Web architecture
processing, packaging and delivery.
266. What is not included in the benefits of E- A. Back end
commerce for consumers are
B. Front end
A. Provide consumers with many choices
C. Intermediaries
B. Consumers can make other transac-
tions for 24 hours D. Infrastructure
C. Provide consumers with cheaper prod-
271. are the user interface for an access
ucts and services
to different application systems.
D. Consumers make transactions conven-
tionally A. Enterprise Applicaiton Integration
B. Portals
267. is a person or an organization to ex-
ecute sales transactions. C. Hubs
A. information broker D. Cloud Computing
B. transaction broker
272. Is a discussion or informational site pub-
C. Content provider lished on the World Wide Web and con-
D. Portal sisting of discrete entries (“posts”) typi-
cally displayed in reverse chronological or-
E. virtual community
der (the most recent post appears first).
268. is the automation of an organiza- A. Blogs
tion’s procurement processes using Web-
based applications. B. Comments
A. E-Procurement C. Post
B. Electronic Government D. All of the above
C. Electronic Democracy
273. What is the acronym of ATM?
D. Electronic Administration
A. Automatic Transmission Machine
269. Reasons why a customer may want an
B. Automatic Tubig Machine
E-commerce website to be secure?
C. Automated Teller Management
A. Because they are inputting their bank
details D. Automated Teller Machine

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1248

274. Customer is redirect to a fake web site A. EDI


that looks almost exactly like the true
B. Protocols
site. It collect and process orders, credit
card info, usernames/passwords, effec- C. TCP/IP
tively stealing business from the true sites. D. none of above
This refer to
A. spoofing/farming 279. Below are marketplace components EX-
CEPT:
B. hacking

NARAYAN CHANGDER
A. Seller
C. phishing
B. Buyer
D. cybervandalism
C. Intermediaries
275. It is a type of e-commerce in which con-
D. Framework
sumers make their products and services
available online for companies to bid on 280. Unsolicited e-mail is called what?
and purchase.
A. Junk Mail
A. Business-to-business
B. Extra Mail
B. Business-to-consumer
C. Spam
C. Consumer-to-consumer
D. Consumer-to-business D. Mailing

276. Establishes a secure, negotiated client- 281. Type of hacker including all below EXCEPT
server session in which URL of requested A. Black hats
document, along with contents, is en-
B. White hats
crypted. This is type of securing channel
of communication called C. Grey hats
A. Secure Sockets Layer (SSL): D. Red hats
B. S-HTTP
282. Trying to integrate several units within
C. Virtual Private Network (VPN) the company, each of which has imple-
D. Firewall mented a small e-business concept, is the
meaning of?
277. The ability of e-technology in expand-
A. Automated level
ing the range and space of the companies
that use it is one of the advantages of e- B. inform stage
business, namely C. reinvent stage
A. Reach D. observation stage
B. Effectiveness
283. A Website is a collection of
C. Efficiency
A. Home Page
D. Structure
B. First Page
278. is a set of standards developed in the
C. WWW
1960s to exchange business information
and to do electronic transactions D. Web Pages

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1249

284. They are the starting step for many A. The Web is the technology upon which
Internet-based activities, not only but, of the Internet is based.
course, also if somebody islooking for a

PRACTICE BOOK» NOT FOR SALE


B. The Web provides access to pages
business opportunity. written in HyperText Markup Language.
A. Access Provider C. The Web is both a communications in-
B. Search Engine frastructure and an information storage
system.
C. Online Shop
D. none of above
D. Content Provider
290. Which is NOT transaction nature in e-
285. Which is not a way of selling your prod- commerce
uct on-line?
A. B2C
A. Online Shopping Site
B. C2C
B. Your Own Website
C. C2B
C. Social Media D. A2A
D. eMail
291. Advantages of e-commerce for manufac-
286. What is the acronym of EDI? turers except
A. Electronic Data Intercharge A. Make a profit from the goods sold
B. Electronically Data Interchange B. Must have multiple accounts in cy-
berspace
C. Electronic Data Interchange
C. You don’t have to have your own kiosk
D. Electronically Data Intercharge in the real world
287. Web-based selling is a storefront that is D. No need to pay building tax
made in an application to offer goods that
292. E-Commerce has the following character-
will be offered.
istics:
A. Paypal A. The internet is the main medium in the
B. Catalog trade process or mechanism
C. Business to consumer B. A transaction occurs between two par-
ties
D. Business to business
C. There is an exchange of goods, ser-
288. It is a benefits of e-commerce allowing vices, or information
consumers to complete transactions with D. All true
companies via voice or text conversations.
A. Availability 293. Select 2 methods of Alternative Authen-
tication
B. Speed of Access
A. Face recognition
C. Lower Cost
B. Fingerprint recognition
D. none of above
C. Captcha tests
289. Which of the following statements about D. Entering in data twice (e.g. email ad-
the Web is not true? dresses)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


13.5 E-commerce and E-business Applications 1250

294. At what stage do companies usually use B. Server level


the internet as a medium for promotion C. Client level
(marketing)?
D. Networking level
A. Brochurware
B. Transaction enabler 298. Which type of e-commerce is distin-
guished by the type of technology used in
C. Customer interactivity
the transaction rather than by the nature
D. Real time organizations of the market relationship?

NARAYAN CHANGDER
295. Pervasive Security Mechanism A. consumer-to-consumer (C2C)
A. Data Integrity B. social e-commerce
B. Digital Signature C. mobile e-commerce
C. Access Control D. business-to-business (B2B)
D. Trusted Functionality
299. “Organizations that conduct their busi-
E. Enchipherment ness activities solely online”Above state-
ment is refer to.
296. is a standard protocol for business trans-
actions that is designed for transfer of A. brick and mortar
business documents. B. virtual (pure play)
A. cXML (commerce eXtensive Markup C. click and mortar
Language)
D. none of above
B. BMEcat
C. GTIN (Global Trade Item Number) 300. Is a website, where you can buy products
or services, e.g. books or office supplies.
D. ISBN (International Standard Book
Number) A. Access Provider
B. Search Engine
297. Three key points of vulnerability can be
identified as below EXCEPT C. Online Shop
A. Internet communications channels D. Content Provider

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
14. Computer History and Evolution

14.1 Early Computing Devices


1. Hollerith’s company merged with others to B. The Abacus
become which still existing company? C. The slide rule
A. Apple D. The Antikythera mechanism
B. Hewlett Packard (HP)
5. Who is considered the first programmer?
C. IBM A. Babbage
D. Microsoft B. Lovelace
2. Herman Hollerith’s company, known in the C. Leibniz
late 1800’s as the “Tabulating Machine D. Hollerith
Company”, is known today as:
6. Why were the first machines not easily ac-
A. IBM cessible to the public?
B. Apple A. There were not enough resources to
C. Microsoft make enough
D. Google B. Building these machines took too long
C. They were too expensive
3. A “computer” used to be a term that de-
scribed a person who did . D. The public had seen no need for them
A. calculations 7. What was the Step Reckoner machine able
B. computer stuff to do that other devices could not?
A. Add, subtract, multiply, and divide
C. worked in a factory
B. Calculate trigonometric calculations
D. studied engineering
C. Help soldiers send messages to each
4. What machine did Charles Babbage pro- other during war
pose? D. Change numbers and words into bi-
A. The Difference Engine nary code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1252

8. Why was firing artillery shells difficult C. pre-computed tables


when using pre-computed tables? D. paper and pen
A. They were not accurate enough
13. After the invention of the abacus, which of
B. The calculations were wrong the following inventions helped humans to
C. the military did not have access to improve the speed and accuracy of calcula-
them tions?
D. When the shells or machine changed A. slide rule

NARAYAN CHANGDER
shape the whole table had to be changed. B. astrolabe
9. When was the term “computer” first C. clocks
seen?
D. all of these
A. 1989
14. What did the astrolabe help with?
B. 1200
A. It showed the current weather state
C. 1583
B. Sent signals to soldiers during the war
D. 1613
C. Allowed people to receive signals from
10. How would you show the number 2, 345 other countries.
using the abacus that is shown in the
D. Enables ships to calculate their lati-
video?
tude at sea.
A. 2 green, 3 red, 4 white, 5 yellow
15. Who is considered to be the “Father of
B. 2 red, 3 white, 4 yellow, 5 green
Computing”?
C. 2 white, 3 yellow, 4 green, 5 red
A. Charles Babbage
D. 2 yellow, 3 green, 4 red, 5 white
B. Albert Einstein
11. What was the analytical engine capable C. Isaac Newton
of?
D. Galileo Galilei
A. Could be used for more than one com-
putation 16. Why was there a demand for faster and
B. Could be given data and run operations more flexible tools for processing data?
in sequence A. Inventors wanted to make new inven-
C. Had memory and a primitive printer tions

D. All of the above B. There was an explosion in the popula-


tion and rise in globalized trade
12. Before the 20th century, what did people C. People were getting more interested
experience computing through? in computing devices
A. Calculators D. Farmers needed these devices to max-
B. The slide rule imize their crops

14.2 Development of Computers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1253

1. WHO INVENTED FIRST HIGH LEVEL LAN- C. Blaise Pascal


GUAGE AND WHAT IT WAS LATER DEVEL- D. John Napier
OPED INTO?

PRACTICE BOOK» NOT FOR SALE


A. CLIFFORS E. BERRYCOLOSSUS 7. What was the cost of a Cray-1 Supercom-
puter in 1977?
B. JOHN ATANASOFFHARVARD MARK 1
A. $3.9 million US Dollars
C. NONE OF THESE
B. $1.9 million US Dollars
D. GRACE HOPPERCOBOL
C. $11.9 million US Dollars
2. IBM Simon had features like
D. $7.9 million US Dollars
A. A calendar, address book, world clock
B. Calculator, note pad, e-mail client 8. Batch processing was mainly used in this
generation
C. The ability to send and receive faxes
and games. A. 1st generation
D. All of these B. 2nd generation
C. 4th generation
3. is an example of supercomputer.
D. 5th generation
A. Tianhe-2
B. CRAY1 9. UNIVAC stands for
C. IBM-882 A. Universal Automatic Computer
D. none of above B. Universal Automatic Calculator
4. A computer is designed to perform opera- C. Uniform Auto Computer
tions and provides different sets of solu- D. Uniform Augmented Calculator
tions with the application of what compo-
nents? 10. What was the graffiti alphabet?
A. Hardware and peopleware A. Software used to input text into Mobile
B. Peopleware and software Phones

C. Computer and laptop B. Software used to input text into Palm


Pilots
D. Hardware and software
C. Software used to input text into Aba-
5. WHAT IS NOT TRUE ABOUT THE FOURTH cus
GENERATION COMPUTER
D. Software used to input text into Utah
A. THEY ARE CHEAPER Teapot
B. THEY ARE RELIABLE
11. Colossus Mark I used what to get its pro-
C. THEY ARE COMPACT gramming?
D. THEY USE TRANSISTORS A. Switchboard or Plug Board
6. Who is the Father of Computers? B. Punch Tape
A. Joseph Marie Jacquard C. Manually turned dials
B. Charles Babbage D. A keypad

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1254

12. WHO INVENTED THE INTERNET C. Third generation computers


A. Vinton Cerf D. IBM PC
B. Bob Kahn 18. Who invented Differential Engine
C. BOTH OF THESE A. Charles Babage
D. NONE OF THESE B. Joseph Marie Jacquard
C. Gottfried Wilhelm
13. What was the first all electric general pur-

NARAYAN CHANGDER
pose computer that required no manual D. Blaise Pascal
programming? 19. The first device that could be called a ‘per-
A. ENIAC sonal computer’ was the , which de-
B. Colossus Mark I buted in 1975.

C. Automatic Sequence Controlled Calcu- A. Apple I


lator B. MS-DOS
D. Harvard Mark I C. IBM PC
D. Altair 8800
14. These computers are used for weather
forecasting, space research and satellite 20. THIRD GENERATION IS RELATED TO
control A. VACCUME TUBES
A. Super computers B. TRANSISTORS
B. Mainframe computers C. INTEGRATED CIRCUIT
C. Mini computers D. MICROPROCESSOR
D. none of above 21. Choose the correct spelling.
15. Who devised Napier’s bones A. Transisters
A. Christopher Latham Sholes B. Transasters

B. Douglas Engelbart C. Transestors


D. Transistors
C. John Napier
D. Charles Babbage . 22. Where was the Abacus developed?
A. Primitive Times
16. ENIAC stands for
B. MIT
A. Electronic Numerical Integrator and
C. America
Calculator
D. China
B. Electronic Numbers Interval Computer
C. Electronic Numeracy Integrator and 23. He improved the idea to store information
Computer on punched paper or wood in the fabric
weaving industry.
D. None of these
A. Herman Hollerith
17. It has decision making ability B. Ada Lovelace
A. Mark I C. Joseph Marie Jacquard
B. Expert system D. Dr. John Mauchly

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1255

24. She was called the first programmer who 30. What made the Harvard Mark I run?
wrote a program for Analytical Engine.
A. Drive Shaft connected to an electric

PRACTICE BOOK» NOT FOR SALE


A. Lady Augusta Ada Byron motor.
B. Lady Gaga B. It ran off all electricity.
C. Lady Macqueen C. A hand crank at the end of the ma-
D. Lady Princess chine.
D. Mice running on wheels inside the ma-
25. What is the other name for the ASCC?
chine.
A. Colossus Mark I
B. Harvard Mark I 31. What is the name of the company that was
eventually started from the Census tech-
C. Tabulating Machine nology?
D. IBM 1000
A. IBM
26. The first general purpose electronic com- B. Apple
puter was called
C. Microsoft
A. ENIAC
D. Sony
B. MARK I
C. UNIVAC 32. He invented two different engines, one
that used metal cards to store data and
D. Altair 8800
was powered by a steam engine.
27. WWW stands for? A. Charles Babbage
A. Wibble Wobble Wibble B. John Napier
B. World Wide Web C. Steve Jobs
C. World Wide Wise
D. Jacquard Moore
D. Wonderful Willy Wonka
33. technology was used in First Genera-
28. What do you call a glass tube that look tion computers
similar to light bulbs which needed replac-
ing constantly? A. Vacuum tubes

A. Integrated Circuits B. Integrated Circuits


B. Vacuum Tubes C. Transistors
C. Transistor D. Resistors
D. Microprocessor
34. was the first mechanical device for cal-
29. Inventor of tabulating machine culations, developed in China

A. Ada Lovelace A. Analytical engine


B. Charles Babbage B. Napier’s Bones
C. Herman Hollerith C. Abacus
D. Stephen Hawking D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1256

35. What year was the first email sent? C. 1962


A. 1951 D. 1975
B. 1961
41. An invention that can add, subtract, mul-
C. 1971 tiply and divide, and can determine the
D. 1981 square root of a number.

36. The time period of generation-I computers A. Abacus


is from

NARAYAN CHANGDER
B. Jacquard’s Loom
A. 1964-1971 C. Leibnitz Calculator
B. 1971-1980
D. Analytical Engine
C. 1940-1956
D. Present and beyond 42. How many mechanical relays were in the
Harvard Mark I?
37. Who was considered as the “First Com- A. 150
puter Programmer” and worked with
Charles Babbage during the development B. 700
of his two engines? C. 1750
A. Konrad Zuse D. 3500
B. Thomas De Colmar
C. Augusta Ada Byron 43. In which generation did the Integrated Cir-
cuits (ICs) intoduce?
D. Herman Hollerith
A. 1st generation
38. When and who invented the first computer
B. 2nd Generation
mouse?
A. Bill Gates C. 3rd generation

B. Martin Cooper D. 4th generation


C. Charles Babbage 44. Who was the first major customer of the
D. Douglas Engelbart Census machine?

39. What are two ways that innovator Steve A. The US Census Bureau
Roberts incorporated different technolo- B. The UK Census Bureau
gies into BEHEMOTH?
C. The Chinese Census Bureau
A. Wi-Fi
D. The Australian Census Bureau
B. Laptops
C. Mobile Phones 45. Select the era of the first generation of
computers.
D. iPad’s
A. 1959-65
40. In what year was the first mechanical com-
puter invented? B. 1965-71
A. 1822 C. 1940-56
B. 1937 D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1257

46. Select the BEST estimation of when the C. 1940


Abacus was created. D. 1947

PRACTICE BOOK» NOT FOR SALE


A. 300 B.C.E
52. Who used the Cray-1 Supercomputer?
B. 3000 B.C.E
A. Los Angeles National Laboratory
C. 5000 B.C.E
B. Los Alamos National Laboratory
D. 300 B.C
C. Bletchley Park
47. During early counting methods, people D. The CIA
used
A. bones 53. World’s first comuter

B. shoes A. ENEDIK

C. calculators B. ENIAC

D. curcuits C. ENIEC
D. Microprosseors
48. Does IBM Simon had a touchscreen
A. No 54. What was the first design of a ma-
chine that had memory and could be pro-
B. Yes grammed?
C. Maybe A. Hollerith’s Tabulating Machine
D. Never B. Difference Engine
49. language was used in third generation C. Harvard Mark I
of computers. D. Analytical Engine
A. COBOL
55. WHAT WAS THE TIME PERIOD OF GENER-
B. JAVA ATION 1 COMPUTER ?
C. RDBMS A. 1945-1955
D. none of above B. 1820-1845
50. This man is known for starting the com- C. 1920-1945
pany Microsoft back in the year 1975. D. 1818-1830
Since then, he has become one of the rich-
est people in the world. What is the name 56. Computers used Transistors starting in
of this person? 1956, replacing vacuum tubes
A. Konrad Zuse A. First Generation
B. Steve Jobs B. Second Generation
C. Bill Gates C. Third Generation
D. Elon Musk D. Fourth Generation

51. The vacuum tube was invented in what 57. What is the most common Operating Sys-
year? tem for PCs?
A. 1904 A. Windows
B. 1911 B. Linux

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1258

C. Apple 64. The Tabulating Machine Company eventu-


D. Android ally became what company in 1923?

58. A website or web page run by an individ- A. Computing & Tabulating Inc.
ual that is written in conversational style B. Tabulations ‘R’ Us
is called
C. Computing-Recording Company
A. TV
B. Blog D. International Business Machines

NARAYAN CHANGDER
C. YouTube
65. Who is known as the Father of Comput-
D. Facebook ers?
59. Abacus was invented in? A. Herman Hollerith
A. China B. Charles Babbage
B. America
C. Gottfried Leibniz
C. Japan
D. John Fleming
D. India
60. GIGO means 66. are used in homes, schools, shops, of-
A. Go In Go Out fices, banks etc.
B. Garbage In Garbage Out A. MICRO COMPUTERS
C. Get In Get Out B. MINI COMPUTERS
D. none of above C. MAIN FRAME COMPUTERS
61. Which was the first storage device D. none of above
A. DVD
B. Floppy disk 67. First fully electronic digital computer built
in the U.S. It was created at the University
C. Magnetic tape
of Pennsylvania
D. CD
A. UNIVAC
62. Second generation computers used
B. Abacus
A. Vacuum tubes
B. Microprocessors C. Vacuum Tubes

C. Transistors D. Slide Rule


D. Integrated circuits
68. The Start Menu and clock are found on the
63. Which one of the following devices was
created in 1801?
A. Task Bar
A. The abacus
B. Title Bar
B. Pascaline
C. Stepped Reckoner C. Start Menu
D. Jaquard’s Loom D. Window

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1259

69. What does networking computers mean? C. Thomas Edison


A. Computer that work on nets D. There’s Lovelace

PRACTICE BOOK» NOT FOR SALE


B. Computers that can function all by
themselves 75. What gaming company started in 1972
thanks to the advancement of computers?
C. Computers connected together to talk
to each other. A. Nintendo
D. Computers that are designed for one B. Sega
specific task.
C. Atari
70. What is theinventor’s name of Napier’s
D. Sony
Bone?
A. Blaise Pascal 76. Compared to a home computer from 20
B. David Napier years ago, today’s machines are:
C. John Napier A. Larger
D. none of above B. More powerful
71. This machine stored codes for weaving fab- C. More expensive
ric in a pattern. It was the
D. Less complex
A. Stepped Reckoner
B. Pascaline 77. Developed in 1972 by Ray Tonlinson.
C. Difference engine A. Netscape
D. Jaquard’s Loom B. Internet
72. The first commercial computer designed C. Chrome
by John Preser Eckert, John Mauchly and
Grace Hopper in 1951 D. Email

A. ENIAC 78. Which of the following is not an example


B. EDVAC of a first generation computer
C. UNIVAC A. EDSAC
D. COBOL B. ENIAC
73. Who devised the stored program architec- C. UNIVAC II
ture?
D. Burroughs 6700
A. John Von Neuman
B. Charles Babbage 79. Who invented the Punch Card Tabulating
C. Grace Hopper Machine and Sorter?

D. none of above A. Dr. John Napier

74. The First computer Programmer. B. Dr. J, Presper Eckert

A. Steve Jobs C. Dr. John Mauchly


B. Bill Gates D. Dr. Herman Hollerith

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1260

80. This machine was developed by French B. 1947


mathematician-philosopher Blaise Pascal C. 1970
and was limited to perform addition and
subtraction only. what do we call this ma- D. 1961
chine?
86. What does the ‘PC’ stand for?
A. Pascaline
A. Personal Computer
B. Tabulating machine
B. Private Computer

NARAYAN CHANGDER
C. Analytical engine
C. Posh Computer
D. Jacquard Loom
D. Petite Computer
81. Who is the father of the Modern Com-
puter? 87. Also called counting frame, this device per-
forms basic arithmetic operations and was
A. Herman Hollerith
used by human in performing calculations.
B. Charles Babbage what do we call this device?
C. Blaise Pascal A. Pascaline
D. Gottfried von Leibniz B. Slide rule
82. A device that consists of beads divided C. Abacus
into two parts which were removed on the D. Stepped reckoner
rods of the two parts
A. Computer 88. Fourth Generation of computer.

B. Abacus A. Vacuum Tube


C. Jacquard Loom B. Microprocessor
D. Leibnitz’s calculator C. Artificial Intelligence
D. Tansistor
83. Abacus was invented by chinese
E. Integrated Circuit
A. Yes
B. No 89. What do you call the first electronic com-
C. Cant Say puter?

D. None of these A. EDSAC


B. UNIVAC I
84. The main circuit board for the computer
that holds the other circuit boards. C. ENIAC
A. CPU D. Difference Engine
B. Network Card 90. In 1830, designed an ‘analytical en-
C. Modem gine’ that performed calculations.
D. Motherboard A. Albert Einstein
B. Nikola Tesla
85. What year did the second generation of
computing begin C. Benjamin Franklin
A. 1939 D. Charles Babbage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1261

91. IBM Z Series is an example of: 97. The first computer had
A. Mainframe computers A. An input device

PRACTICE BOOK» NOT FOR SALE


B. Super computers B. An output device
C. Micro computers C. A processor
D. none of above D. All of the above.

92. The first computer language is: 98. Invented in 1622 by William Oughtred,
this calculation tool was based on Napier’s
A. Fortran
ideas about logarithms and was the most
B. C++ commonly used calculation tool before the
C. C invention of the modern calculator. What
is this tool?
D. COBOL
A. Abacus
93. Word processor, spreadsheet, and presen- B. Slide Rule
tation software are examples of:
C. Pascaline
A. Application software
D. Arithmometer
B. System software
C. Hardware 99. The stepped Reckoner was invented in

D. Input devices A. 500 BC


B. 1642
94. Who invented the first modern computer?
C. 1673
A. Donald Trump
D. 1801
B. Charles Babbage
100. First mechanical device used for calcula-
C. Bill Gates
tion
D. Steve Hawking
A. Calculators
95. Devices used to put information into the B. Napier’s bones
computer
C. Abacus
A. Output Device
D. Difference engine
B. Input Device
101. Select which computer hardware is for in-
C. Motherboard
put:
D. Optical Drive
A. Keyboard
96. IBM Simon was designed in 1993 and re- B. Operating System
leased in 1994
C. Monitor
A. No
D. Speakers
B. Yes
102. A manual aid to calculating that consists
C. Maybe of beads or disks that can be moved up
D. none of above and down on a series of sticks or strings

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1262

within a usually wooden frame. Today’s C. Anyone


version was first used in China
D. none of above
A. Napier’s Bone
B. Slide Rule 108. The main components of 2nd Generation
computer was
C. Abacus
A. Transistors
D. Pascaline
B. IC
technology was used in Second Gen-

NARAYAN CHANGDER
103.
eration computers C. Transistor

A. Vacuum tubes D. Vacuum tubes


B. Integrated Circuits 109. The Analytical Engine was invented by
C. Transistors A. Bill Gates
D. Resistor
B. Reynold
104. Was the Difference Engine ever built? C. Augusta Ada Lovelace
A. Yes, it was fully built and worked! D. Charles Babbage
B. No, it was only partially built due to
lack of money. 110. What categories come under Evolution of
C. Not fully built. Only part of the machine Computer?
was made. A. Mechanical
D. It was just a design, never actually B. Ultra Modern
built.
C. Primitive
105. First smartphone that could be charged D. Electrical and Electronic
wirelessly
A. Palm Pre 111. Which two devices were invented that
B. Sony Xperia Z would improve the computer field and set
in motion the beginning of the computer
C. Apple iPhone 4S revolution
D. Nokia N 95 A. Transistors and Vaccum tubes
106. These computers are smaller and lighter B. Mouse and keyboard
than laptop generally 7 inch or 10 inch
C. Pen drive and DVD
screen
A. Tablet computers D. CPU and Printer
B. Laptop computers 112. Name the operations performed on
C. Desktop computers Napier Bones
D. none of above A. Addition

107. Who was the IBM PC designed for? B. addition and Subtraction
A. IBM themselves C. Multiplication and division
B. Just for business use D. The four operations

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1263

113. Which was the first computer to handle 119. In this generation, computers were
both numeric and text data? smaller, more powerful, cheaper, more
energy-efficient and more reliable.

PRACTICE BOOK» NOT FOR SALE


A. ENIAC
B. EDVAC A. 1st Generation

C. CRAY-1 B. 2nd Generation

D. UNIVAC I C. 3rd Generation


D. 4th Generation
114. What was ARPANET
A. Wesite 120. who designed the theory of Boolean
Logic?
B. Advance Research Project Agency Net-
work A. Howard Aiken
C. YouTube Channel B. John Mauchly
D. Smartphone C. George Boole
D. all
115. This computer is used by touching with
your finger E. none
A. laptop 121. What year was the Internet invented?
B. tablet
A. 1975
C. desktop
B. 1961
D. mainframe
C. 1988
116. When was the first computer invented? D. 1991
A. 1822
122. In this generation, users became more in-
B. 1722 teracted with computers with the use key-
C. 1922 boards, monitor and interfaced with oper-
ating system. Integrated circuits were the
D. 1622
predominant component of computers dur-
117. The brain of the computer is: ing this generation. In what computer gen-
eration is this?
A. Monitor
A. Fifth Generation
B. Central Processing Unit (CPU)
B. First Generation
C. Mouse
C. Second Generation
D. External Hard Drive
D. Third Generation
118. The first transistor could switch on/off
how fast? 123. First computer created by Apple company
A. 1, 000 times per second A. Mark 1
B. 10, 000 times per second B. Macintosh
C. 1, 000 times per minute C. Alto
D. 10, 000 times per minute D. Apple 2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1264

124. The Loom for weaving elaborate designs 130. In this computer generation, microproces-
used . sor became the most prevalent component
A. Punched Cards of computers. This generation also intro-
duces the use of GUI or Graphical User In-
B. Programs terface, the mouse, and other handheld de-
C. Floppy Disks vices. During what computer generation is
this?
D. Ticker Tape
A. Second Generation

NARAYAN CHANGDER
125. FULL FORM OF A.I.?
B. Fifth Generation
A. AUTOMATIC INTELLIGENCE C. Fourth Generation
B. ARTIFICIAL INTERNET D. First Generation
C. ARTIFICIAL INTELLIGENCE
131. When was the Abacus invented?
D. ADVANCE INTELLIGENCE
A. 1200
126. The first mechanical calculator was devel- B. 1100
oped by
C. 1250
A. Leibniz
D. 1150
B. BLAISE PASCAL
132. How long did it take ENIAC to calculate a
C. Charles Babbage ballistic trajectory?
D. none of above A. Less than 5 seconds
127. Which computer was a secret british com- B. Less than 10 seconds
puter? C. Less than 20 seconds
A. Colossus D. Less than 30 seconds
B. Hardvard Mark I
133. The first mechanical calculating machine
C. The Analythical Engine is called
D. none of above A. Tabulating Machine
128. were used in generation 2 comput- B. Leibniz’s Calculator
ers? C. Abacus
A. Microprocessor D. Pascaline
B. Transistors 134. Who is considered as First Programmer?
C. ENIAC A. Lady Ada Smith
D. None of the above B. Lady Augusta Babbage
129. WHO CREATED TIC-TAC-TOE C. Lady Augusta Ada Byron
A. TIM BERNERS-LEE D. Lady Eva Byron
B. RAY TOMILSON 135. Mar1 was invented by:
C. DONALD DAVIES A. John Von Neumann
D. NONE OF THESE B. Howard Aiken

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1265

C. John Mauchly 141. How well did the IBM PC sell when it was
D. none of above introduced?

PRACTICE BOOK» NOT FOR SALE


A. Increase on projections by 500%
136. A manual aid to calculating that consists
B. Increase on projections by 600%
of beads or disks that can be moved up
and down on a series of sticks or strings C. Increase on projections by 700%
within a usually wooden frame. It has a D. Increase on projections by 800%
roman and Asian Version
142. Where did Pixar get its start?
A. Napier’s Bone
A. New York Institute of Technology
B. Slide Rule
B. University of Calafornia
C. Abacus
C. Harvard University
D. Pascaline
D. MIT-Massachusetts Institute of Tech-
137. What year was Microsoft founded? nology
A. 1822 143. Artificial intelligence is having the capa-
B. 1937 bility to
A. Encode and deny the human languages
C. 1962
B. Encode and respond the human lan-
D. 1975
guages
138. In 1968, Computer Scientist Alan Kay C. Decode and respond the human lan-
wanted to create a computer for children guages
called D. Decode and deny the human lan-
A. HTC G1 guages
B. Palm Pre 144. Which is the first mechanical device used
C. Dynabook for calculation?
D. none of above A. calculator
B. computer
139. All modern computers are based on this
concept C. abacus
D. none of above
A. Pascaline
B. abacus 145. was the first lady programmer who
suggested Binary Data storage
C. Analytical Engine
A. Augusta Ada Lovelace
D. Tabulating machine
B. Augusta Merwin
140. First generation computers C. Augusta Agnes
A. Were very fast computers D. none of above
B. Used Vacuum Tubes
146. Babbage never finished building his Dif-
C. Output devices were scanners ference Engine because
D. Input devices punched cards A. The British government pulled funding

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1266

B. Precise metal parts were hard to get 152. George Boole solved mathematical prob-
C. Babbage ran out of money lems and linked positive results to 1 and
negative results to 0.This was called the:
D. All of these
A. Calculating logic
147. In (1912-1954) this person invented
B. Data storage
Colossus, the worlds first electronic com-
puter . He used it to crack German codes C. Boolean Logic
during World War Two and saved thou- D. none of above

NARAYAN CHANGDER
sands of lives. Who was he?
A. Steve Jobs 153. What is a comprehensive network of com-
puters?
B. Alan Turing
C. Charles Babbage A. Internet

D. Tim Berners-Lee B. World Wide Web


C. Google
148. The first calculator was the
D. Domain Name System
A. integrated circuit
B. punch card 154. How were the generations of computers
C. abacus classified?

D. Z1 machine A. By the speed of the computer


B. By the model of computer
149. What years cover the Third Generation of
Computers? C. By the device used in memory and pro-
A. 1973-1980 cessor

B. 1950-1958 D. By the accuracy of the computer

C. 1959-1964 155. t Century Computing has brought users


D. 1965-1972 which of the following:
A. Great increases in speed, storage, and
150. Mechanical Relays could switch on/off
memory
how fast?
A. 5 times per second B. Increased networking, speed in Inter-
net
B. 50 times per second
C. Wirelesss technology
C. 500 times per second
D. All of the above
D. 5000 times per second

151. What are the names of the two people 156. The circuit used in 1st generation of com-
that started Apple? puters in 1940-56

A. Steve Jobs A. vaccum tubes


B. Alan Turing B. transistors
C. Bill Gates C. integrated circuits
D. Steve Wozniak D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1267

157. Who invented DNS? 163. The first machine to use punch cards in
A. Paul Mockapetris performing its tasks. What do we call this
machine?

PRACTICE BOOK» NOT FOR SALE


B. Steve Jobs
A. Jacquard Loom
C. Bill Gates
B. Stepped Reckoner
D. Tim Berners-Lee
C. Pascaline
158. Who suggested Binary Data storage (0
D. Arithmometer
and 1) instead of decimal number sys-
tem? 164. In the mid 40’s, ENIAC was built by:
A. Charles Babbage A. America
B. Howard Aiken B. Germany
C. Charles Xavier Thomas C. Japan
D. Augusta Ada Lovelace D. France
159. Fifth Generation computers include 165. Microsoft word is used for?
A. Intigrated Circuits A. Painting
B. Artificial intelligence B. Drawing
C. Transistors
C. Typing
D. Vaccum tubes
D. Hunting
160. These computers are used in bank, univer-
166. How fast are transistors today?
sities and in any other big organizations
A. 100s of times per second
A. Mini computers
B. Macro computers B. 1000s of times per second

C. Super computers C. 10, 000s of times per second

D. none of above D. 1, 000, 000s of times per second

161. Mechanical Relays were replaced by 167. The first mechanical calculating device
what technology? was
A. Leibniz Wheel A. Pascal CALCULATOR
B. Vacuum Tubes B. Leibniz calculator
C. Plug Boards C. Charles Babbage
D. Electric Motors D. none of above

162. What gear inside the Stepped Reckoner 168. Computers using are able to take
was an important invention? think and take decisions.
A. The IBM Gear A. Processor Chip
B. The Leibniz Wheel B. Integrated Circuits
C. The Incremental Gear C. Artificila Intelligence
D. The Hollerith Drum D. Vacuum tubes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1268

169. First Generation of computer? 175. Herman Hollerith’s Tabulating Machine


A. Vacuum Tube helped with what?

B. Microprocessor A. The US Census


C. Artificial Intelligence B. The Abacus
D. Tansistor C. Stonehenge
E. Integrated Circuit
D. Tabulation

NARAYAN CHANGDER
170. What is the basic language of all comput-
ers? 176. Analytical Engine is an engine powered
by a huge engine.
A. Binary Code
B. Java Script A. petrol

C. HTML B. diesel
D. They are all different C. steam
171. A calculating machine invented by a D. electrical
French Mathematician to help his father a
tax collector. 177. What year did the first arcade game come
A. Calculating Clock out?

B. Pascaline A. 1942
C. Abacus B. 1952
D. Stepped Reckoner C. 1962
172. Which is the World’s fastest super com- D. 1972
puter?
A. Summit 178. Which is the best definition for a com-
puter?
B. UNIVAC
C. ENIAC A. The human brain

D. none of above B. A machine that manipulates data ac-


cording to a list of instructions.
173. Who helped to end the World War?
C. A mechanical device used to aid in per-
A. Alan Turing forming mathematical calculations.
B. Bill Gates
D. What people use to count
C. Steve Jobs
D. Mr Boden 179. Select which computer hardware is for
output:
174. Blaise Pascal invented the
A. Mouse
A. Pascaline
B. Abacus B. Keyboard

C. Stepped Reckoner C. Speakers


D. Difference Engine D. Central Processing Unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1269

180. Which operating system is considered as C. University of Pennsylvania


the begining of the era of the mordern com- D. UC Davis
puters

PRACTICE BOOK» NOT FOR SALE


A. Mark 1 186. The internet is?
B. Mark 2 A. A place to eat
C. Mark 0.1 B. Millions of computers connected to-
gether
D. Mark 2.0
C. A computer link
181. He used the idea of a punched cards and D. A webpage
invented the card reader and form a com-
pany, which later became IBM. 187. The language written in binary code of:-
A. Gottfried Wilhelm Leibniz A. 0 and 1
B. Joseph Marie Jacquard B. 2 and 4
C. Blaise Pascal C. 1 and 1
D. Herman Hollerith D. 01 and 10
182. Hollerith’s Tabulating Machine was the 188. Used ICs
first to
A. First generation computers
A. Add, Subtract, Multiply, and Divide
B. Second generation computers
B. Use the Leibniz Wheel
C. Third generation computers
C. Use punch cards
D. Fourth generation computers
D. Be programmable
189. Who started the company Google?
183. are sets of instructions loaded each
A. Steve Jobs and Steve Wozniak
time a computer is started
B. Larry Page and Sergey Brin
A. UNIVAC
C. Bill Gates
B. Operating Systems
D. Donald Trump
C. Vacuum Tubes
D. Origination Systems 190. The first Apple Watch was launched in

184. The “father of computing” is A. 2015

A. Ada Byron B. 2016

B. Charles Babbage C. 2014

C. Konrad Zuse D. 1999

D. Steve Wozniak 191. Which stores output from a computer:

185. What university did the inventors of the A. Scanner


first electronic device go to? B. Keyboard
A. University of southern california C. Central Processing Unit (CPU)
B. University of Purdue D. Flash Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1270

192. In which country abacus was devel- C. Sergey Brin


oped?
D. none of above
A. nepal
B. china 198. What device was created to speed up the
1890 Census?
C. USA
A. Hollerith’s Tabulating Machine
D. japan
B. ENIAC

NARAYAN CHANGDER
193. An is a small picture that links to a
C. Stepped Reckoner
file or program
D. None of these
A. Image
B. Icon 199. First electronic computer used stored pro-
C. Wallpaper grams

D. Mouse A. EDSAC
B. EDVAC
194. The device that Charles Babbage and
Lady Augusta invented. C. UNIVAC I
A. Abacus D. Mark I
B. Jacquard’s Loom
200. This person is often called the inventor of
C. Leibnitz Calculator the modern computer. He actually created
D. Analytical Engine the first fully electronic computer.
A. WILLIAM GATES
195. The large program that controls how the
CPU communicates with other hardware B. STEVE JOBS
components. C. KONARD ZUSE
A. Router
D. BYRON LOVELACE
B. Modem
C. Video Card 201. Hollerith’s Tabulating machines were

D. Operating System A. mechanical


B. electronic
196. This woman was an important contribu-
tor to computer programming in the early C. electromechanical
days of high level computer languages. D. None of these
A. Ada Byron
202. A miniaturized electronic circuit that has
B. J. Kilby
been manufactured in the surface of a thin
C. Francis Holberton substrate of semiconductor material.
D. Grace Hopper A. Processor
197. Who invented the first computer? B. Vacuum Tubes
A. Larry Page C. Transistors
B. Charles Babbage D. Integrated Circuit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1271

203. The A* algorithm that was used for 208. Steve Jobs was the Mastermind behind
Shakey the Robot is till used today. Which A. Microsoft Computers
of the following examples of usage are

PRACTICE BOOK» NOT FOR SALE


correct? B. Google

A. The algorithm is used in pathfinding C. Apple Computers

B. The algorithm plots a walkable path be- D. Facebook


tween multiple nodes, or points, on the 209. First man made computing device devel-
graph oped by the Chinese People.
C. The algorithm is used by all computer A. Abacus
programs
B. Napier’s bones
D. The algorithm is used by the Utah
C. Pascaline
Teapot
D. Difference engine
204. Colossus Mark I was used for what?
210. The inventor of the Napier’s bones used
A. Calculating the Atomic Bomb
for multiplication and long Division.
B. Decrypting Nazi Messages
A. John Napier
C. Advanced Military Trigonometry B. Albert Napier
D. Simple Math Equations C. Alex Napier
205. It helps the user to manage files on a com- D. John William Napier
puter
211. Which one is true about early comput-
A. File Manager ers?
B. Network manager A. Fast
C. Disk Manager B. Slim
D. All C. Big
206. A calculating machine invented by Got- D. Portable
tfried Wilhelm Leibnitz. 212. , designed in 1833, can perform sev-
A. Pascaline eral calculations by using a program.
B. Stepped Reckoner A. Pascaline
C. Calculating Clock B. Analytical Engine
D. Arithmometer C. Tabulating Machine
D. Abacus
207. invented the Tabulating machine
where punch cards were used to read, pro- 213. Which device was used to MAINLY assist
cess and output data. with adding and subtracting?
A. George Boole A. The Abacus
B. Dr Herman Hollerith B. The Calculator
C. Howard Aiken C. The Pascaline
D. none of above D. The Tabulating Machine

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1272

214. Together with Steve Wozniak Introduced C. Calculator


the first personal computer from their D. Abacus
newly formed company Apple computer
A. Steve Jobs 220. What’s the name of the inventor of the
first digital computer?
B. Elon Musk
A. Albert Einstein
C. Mark Zuckerberg
B. Stephen Hawking
D. Bill Gates
C. Charles Babbage

NARAYAN CHANGDER
215. Identify the first calculator. D. Professor John Vincent Atanasoff
A. Difference engine
221. is an example of a Super Computer
B. Pascaline
A. IBM PC
C. ENIAC
B. CRAY I
D. UNIVAC
C. ENiAC
216. The world’s first computer programmer. D. all Of The Above
A. Grace Hopper 222. The Difference Engine was
B. Charles Babbage A. mechanical
C. Bill Gates B. electronic
D. Lady Ada Lovelace C. electromechanical
217. How many years would it have taken to D. None of these
program the calculations using a desk cal-
culator? 223. Who developed the first punch card?

A. 100 years A. Joseph Marie Jacquard


B. Blaise Pascal
B. 75 years
C. Charles Babbage
C. 50 years
D. Howard Aiken
D. 25 years
224. Hollerith founded the Tabulating Machine
218. What invention replaced the transistors,
Company in what year?
allowing for another decrease in size and
in speed? A. 1823
A. Transistors B. 1896
B. Integrated Circuits C. 1908
C. Vacuum Tubes D. 1944
D. Mouse 225. Devices used to take information out of
the computer, such as a printer.
219. A simple device for calculating, consisting
of a frame with rows of wires or grooves A. Output Device
along with beads is called B. Input Device
A. Guitar C. Motherboard
B. Telescope D. Optical Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1273

226. Slide rule was used be NASA for what? 232. Tabulating machine was invented by
A. Apollo Mission 1971 A. Charles Babbage

PRACTICE BOOK» NOT FOR SALE


B. Apollo Mission 1960 B. Gottfried Von Leibnitz
C. Apollo Mission 1960 C. Herman Hollerith
D. Apollo Mission 1980 D. Blaise Pascaline

227. Name the device 233. Who invented the Tabulating machine?
A. ENIAC A. Dr. Herman Hollerith
B. UNIVAC B. John Von Neumann
C. ABC C. Howard Aiken
D. none of above D. none of above

228. Grace Hopper found a moth stuck in a re- 234. Who invented the Pascaline?
lay responsible for a malfunction, and re- A. Blaze Pascal
moved it, calling it B. Blaise Pascal
A. Operating C. Blair Pascal
B. Cleaning D. Belle Pascal
C. Hacking
235. What company did Paul Allen and Bill
D. Debugging Gates start
229. The Difference Engine was invented by A. Microsoft
A. Blaise Pascal B. Windows
B. Leibniz C. Apple
C. Sir John Napier D. Minecraft
D. Charles Babbage 236. The was developed in 3000 BC, and
was basically beads on rods to count and
230. What was the first machine to use all vac- was used to calculate, has upper and lower
uum tubes? deck.
A. Harvard Mark I A. UNIVAC
B. Colossus Mark I B. Abacus
C. ENIAC C. Vacuum Tubes
D. Analytical Engine D. Slide Rule
231. What did the Harvard Mark I use for its 237. What invention made microprocessors
programming? possible?
A. Vacuum Tubes A. Vacuum Tubes
B. Switchboards or Plug Boards B. Integrated Circuits
C. Punch Cards C. Magnetic Tape
D. Punch Tape D. RAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1274

238. The 4 steps of computing are: 243. considered by many to be the earliest
A. science, technology, engineering, recorded calculating device.
math A. Internet
B. input, process, output, store B. hardware
C. state hypothesis, collect data, test, C. computer
and conclude D. software
D. prophase, metaphase, anaphase,

NARAYAN CHANGDER
244. The was developed in 3000 BC, and
telophase
was basically beads on rods to count and
239. This person lived between (1791-1871) was used to calculate.
and designed the first automatic computer. A. UNIVAC
He designed a steam powered calculat-
B. Abacus
ing device called the Difference Engine but
couldn’t build his design because he didn’t C. Jacquard Loom
have enough money! Who Was he? D. Slide Rule
A. Alan Turing
245. The first camera phone was created in
B. Charles Babbage
A. 2000
C. Steve Jobs B. 1999
D. Bill Gates C. 2004
240. Used Integrated Circuits D. 2005
A. First generation computers 246. Which of the following word pairs best
B. Second generation computers symbolizes the ones and zeroes in binary
code?
C. Third generation computers
A. Sight and sound
D. Fourth generation computers
B. Yes and no
241. The word COMPUTER was derived C. Red and Blue
from the Latin word “computare” which
means? D. Want and need

A. To create 247. What network became the basis for the


B. To compute Internet?

C. To answer A. UNIVAC
B. ARPANET
D. To execute
C. DEFNET
242. Who designed the CRAY-1 Supercom-
D. USDOD
puter?
A. Anthony Cray 248. Which of the following is TRUE of the Z3
developed by Konrad Zuse from 1935 to
B. Simon Cray
1941?
C. George Cray A. It was the first computer with a screen
D. Seymour Cray monitor and a keyboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1275

B. It was the first analytical engine to use C. Charles Babbage


vacuum tubes
D. none of above

PRACTICE BOOK» NOT FOR SALE


C. It was the first working, pro-
grammable and fully automatic digital 254. First Computer Programmer.
computer
A. Lady Ada Lovelace
D. It was the first generation of comput-
ers B. William Oughtred
C. John Marie Jacquard
249. were used to store data during fourth
generation computers. D. Charles Babbage
A. Magnetic disks
255. What was the name of the software pro-
B. Punched cards gram Pixar used in the 1980s?
C. Paper tapes A. Pixar Slenderman
D. all
B. Pixar Teapot
E. none
C. Pixar Woody
250. Which set below BEST represents the cre- D. Pixar Renderman
ators of the abacus?
A. Greek, Russians, Jamaicans 256. What removable storage device became
B. Babylonians, Chinese, Romans the standard for computers during the
1960s?
C. Japanese, Egyptians, Spanish
A. Compact Disks
D. Americans, Russians, Mexicans
B. Magnetic Tape
251. Together with Presper Eckert built the
ENIAC C. Floppy Disks

A. Howard Aiken D. RAM


B. Lord Kelvin 257. The Inventor of Pascaline which is the
C. Vannera Bush earliest calculator.
D. John Mauchly A. Blaised Pascal
252. Find the odd one out B. Bliss Pascal
A. Speed C. Bless Pascal
B. Accuracy D. Blaise Pascal
C. Humorous
258. was built by two Americans, J.P. Eck-
D. Diligence
ert and John Mauchly.
253. Who invented the first automatic A. Abacus
sequence-controlled calculator, the MARK
I in 1944? B. ENIAC
A. Howard Aiken C. Pascaline
B. John Von Neumann D. Harvard Mark I

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1276

259. Who invented the Pascal’s Calculator or 265. Moore’s Law is named after who?
Pascaline
A. Gordon Moore, co-founder of Intel
A. Thomas de Colmar
B. Gordon Moore, inventor of transistors
B. John Napier
C. Gordon Moore, creator of IBM
C. Charles Babbage
D. Gordon Moore, first computer pro-
D. Blaise Pascal
grammer
260. What year was the first computer game

NARAYAN CHANGDER
introduced? 266. Memory of the Analytical Engine
A. 1822 A. Mill
B. 1937 B. Bank
C. 1962 C. Mile
D. 1975 D. Store
261. What people used to count and calculate
in early days. 267. What does each row on an Abacus repre-
sent?
A. Computer
A. Each row represents a unit ten greater
B. Calculator
than the previous.
C. Pebbles, fingers and sticks
B. Each row represents a unit of ten
D. Microprocessor
C. Each row represents a unit ten greater
262. Dense integrated circuits should be than the next.
placed:
D. none of above
A. As small and far as possible.
B. As large and close as possible. 268. Which type of computers do Indian Rail-
ways use to interact with the customers
C. As small and close as possible.
for the booking and cancellation of ticket?
D. none of above
A. Main frame computers
263. In which generation of computers the con-
B. Micro computers
cept of internet was introduced.
A. Third Generation computers C. Super computers

B. Fourth Generation computers D. none of above


C. First Generation computers 269. What is a collection of web pages fol-
D. Fifth Generation computers lowing the http protocol that can be ac-
cessed via the Internet from any part of
264. How long did it take to build the Apple
the world?
1?
A. Internet
A. 10 years
B. 10 months B. World Wide Web
C. 1 year C. Google
D. 10 days D. Domain Name System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1277

270. UNIVAC stands for 276. Which of these is a third generation com-
A. Universal Automatic Cash puter?

PRACTICE BOOK» NOT FOR SALE


B. Universal Automatic Calculator A. IBM 360
C. Universal Automatic Computer B. PDP-8
D. none of above C. IBM-1401
271. Who was the creator of the Pascaline? D. HP2115
A. Blaise Pascal
277. What was the definition for the word
B. Martin Lawrence computer in the late 1800s?
C. Steve Jobs
A. A machine that makes calculations
D. Herman Hollerith
B. An electronic device that makes calcu-
272. was the first computer to handle both lations
numeric and text data
C. A person that makes calculations
A. UNIVAC I
D. A device with sliding beads used for
B. ENIAC making calculations
C. CRAY-1
D. none of above 278. Who is considered as the world’s first
Computer program programmer
273. A machine that manipulates data accord-
A. Antoine Lavoisier
ing to a list of instruction.
A. VCR B. Charles Babbage

B. Computer C. Ada Lovelace


C. Washing machine D. Charles Cabbage
D. Calculator
279. This machine was used to count and sort
274. What happened in 1971 concerning Texas information for the US census. It was the
Instruments?
A. They were founded A. Abacus
B. They created the first calculator B. Hollerith’s Tabulating Machine
C. They developed their first portable cal-
C. Analytical Engine
culator
D. Difference engine
D. They filed for bankruptcy
275. What information is okay to give out on 280. Fifth Generation of computer.
the internet? A) NameB) AddressC) Phone A. Vacuum Tube
NumberD) None of the above
B. Microprocessor
A. A
B. B C. Artificial Intelligence
C. C D. Tansistor
D. D E. Integrated Circuit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1278

281. Simple Devices that aid humans in calcu- 286. Who is recognized as the first computer
lation programmer?
A. SIDE RULE A. Charles Babbage
B. NAPIER’S BONES B. Howard Aiken
C. both of these C. Blaise Pascal

D. none of these D. Ada Lovelace


287. It was invented by Ancient Chinese

NARAYAN CHANGDER
282. What do the letters BEHEMOTH stand
for? A. Abacus

A. Best Electronic Heavy Energetic Ma- B. Pascaline


chine, Only Too Human C. Tabulating Machine
B. Best Electronical Horse Energy Mode, D. Analytical Engine
One That’s Heavy
288. Select the options that are types of micro
C. Big Electronic Human Energized Ma- computers
chine, Only Too Heavy A. Desktop computers
D. Big Everyday Human Electrical Man Or B. Super computers
Truly Heaven
C. Laptop computers
283. It is the first calculating device. D. Mainframe computers
A. Calculator 289. How many external terminals does a
B. Abacus transistor have?
C. Cellphone A. One

D. Slide Rule B. Two


C. Three
284. This can be burned fast and should be re- D. Four
placed to keep the program going.
A. Integrated Circuits 290. Instead of pins touching mercury to com-
plete and electrical circuit, what did the
B. Transistors Harvard Mark I use?
C. Chips A. Vacuum Tubes
D. Vacuum Tubes B. Transistors
C. Mechanical Relays
285. This man is known for starting the com-
pany Microsoft back in the year 1975. D. None of these
Since then, he has become one of the rich- 291. It is considered as the world’s first com-
est people in the world. His name is: puter.
A. Steve Jobs A. Harvard Mark I
B. Bill Gates B. ENIAC
C. Konrad Zuse C. Abacus
D. Charles Babbage D. Pascaline

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1279

292. On tabulating machines, metal pins 297. IBM stands for


would pass through holes in a punch card A. International Board of Monitors
and make contact with a vial of , com-

PRACTICE BOOK» NOT FOR SALE


pleting an electrical circuit. B. Inside Building Machine
C. International Business Machine
A. Water
D. none of above
B. Mercury
C. Aluminum 298. The first Apple computer was created by
D. Electrons A. Charles Babbage
B. Ada Byron
293. Why was a computer mouse called a
C. Konrad Zuse
‘mouse’?
D. Steve Wozniak
A. Because wire come out of it like a
mouse tail. 299. are used for calculations
B. Because of same size A. Bones
C. Because it’s a real mouse B. Rods
D. None of these C. Stones
D. Pebbles
294. It is a programmable machine that can
store, retrieve, and process data. 300. It is where your software, documents,
A. Television and other files are stored on magnetic
cylinders.
B. Computer
A. Hard Drive
C. Radio
B. Network Card
D. Speaker
C. RAM
295. Any user can download it from the inter- D. Printer
net and use it without paying any fee.
301. Which generation of computers used ma-
A. Open-Source Software chine language?
B. Shareware A. 4th generation
C. Freeware B. 3rd generation
D. Software C. 2nd generation

296. This device actually ran on electricity. It D. 1st generation


was invented in time for the census of 302. These were the first computers where
1890 which only took six weeks to calcu- users interacted using keyboards and mon-
late the US population which at the time itors which interfaced with an operating
was 63 million. system
A. Hollerith’s Tabulating Machine A. Third Generation Computers
B. Mark I B. Second Generation Computers
C. Difference Engine C. Fourth Generation Computers
D. Analytical Engine D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1280

303. First mechanical calculator C. Tabulating machine


A. Difference engine D. Genius
B. Pascaline
309. If you wanted to enter data on a 19th
C. ENIAC century computer, you would do it with:
D. EDVAC
A. Disks
304. The three basic functions of a computer in B. Gears

NARAYAN CHANGDER
their order are are
C. Cards
A. output, process and input
D. Tape
B. process, output, and input
C. input, process and output 310. Raman works in the national weather
D. input, output and process forecasting agency. Which type of com-
puter does he use to forecast weather con-
305. What devices do microprocessors con- ditions?
tain? A. Micro computer
A. Calculators
B. Super computer
B. Transistors
C. Main frame computer
C. Gears
D. computer
D. Tubes
311. First calculating device
306. Which university had the first computer
graphics program in the country? A. Abacus
A. University of Utah B. Napier’s bones
B. University of Calafornia C. Pascaline
C. Harvard University D. Difference engine
D. MIT-Massachusetts Institute of Tech-
nology 312. Abacus did

307. Recipient of Computer Science’s first A. programming


“Man of the Year Award B. calculations
A. Jacquard Moore C. computing
B. John Napier D. science
C. Charles Babbage
313. The first “read only memory device” was
D. Grace Hopper

308. What was the job title for persons who A. Difference Engine
carried out calculation and computations.
The first recorded used was in 1613. B. Jacquard Loom
A. Computer C. Z3
B. Calculator D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1281

314. What famous company in Seattle created 320. When was the Internet made available to
the operating system for the IBM PC? the general public?

PRACTICE BOOK» NOT FOR SALE


A. Apple A. 1988
B. Microsoft B. 1991
C. Oracle C. 1965
D. SAP D. 1999

315. Which among the following generation 321. Where was the mouse invented?
had expensive operation cost? A. Stanford Research Institute
A. 3rd generation B. MIT-Massachusetts Institute of Tech-
B. 2nd generation nology

C. 4th generation C. Harvard University

D. 1st Generation D. University of California

322. Microcomputers were developed on this


316. First Apple computer was launched in
generation of computer. Miniaturization
A. 1984 of circuits reduced the size of a pin head
B. 2004 and multiprogramming is increase.
C. 1947 A. Third Generation computers
D. 1993 B. Fourth Generation computers
C. First Generation computers
317. What were the two parts of the abacus
D. Fifth Generation computers
A. heaven and earth
323. which one of these is the least expensive
B. earth and sky
A. laptop
C. trees and plants
B. desktop
D. heaven and sky
C. server
318. The processor of the computer. Also D. mainframe
known as the brain of the computer
A. CPU 324. The 2nd generation computers were
based on
B. Network Card
A. Vacuum tubes
C. RAM
B. Intergrated circutes
D. Modem
C. Transistors
319. The development of the computer starts D. VLSIC
with the development of
325. Why did Pascal invent the first calcula-
A. Mark-I
tor?
B. Slide Rule A. To help determine the current French
C. Abacus population.
D. Napier’s Bone B. To help with collecting taxes.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1282

C. To teach his children how to add and 331. What invention replaced vacuum tubes in
subtract. computers?
D. none of above A. Silicon
B. Mechanical Relays
326. What is the name of the man who in-
vented the Census Machine? C. Switches
A. Herman Hollerith D. Transistors

NARAYAN CHANGDER
B. Hollerith Herman 332. What was the first digital Computer
C. Dimitrios Kontos called?

D. Seymour Cray A. Difference Engine


B. ABC(Atanasoff-Berry Computer)
327. Who built Pascaline?
C. ENIAC
A. Stepped Reckoner
D. Apple
B. Schickard
333. Who created the game of Pong?
C. Steve
A. Allan Alcorn
D. Pascal
B. The Chinese Emperor, Ping Pong
328. What was used in the second generation
C. Ellen Pong
of computers.
D. Allan Ping
A. Vacuum tubes
B. Transistors 334. who is father of modern computers

C. Integrated Circuits A. john w mauchly

D. None B. charles babbage


C. john napier
329. Ada Lovelace is considered the world’s
D. none of above
first what?
A. computer language 335. Computers cannot be used to
B. smart lady A. Play music
C. computer programmer B. Play games
D. mathmatician Q. Ada Lovelace is con- C. Control traffic lights
sidered the world’s first what? D. Change diapers
330. In which century were modern computers 336. Who is considered the “Father of the In-
created? ternet”?
A. XIX / XX A. Vinton Cerf
B. XXI B. Steve Jobs
C. XV / XVI C. Bill Gates
D. XVII / XVIII D. Zendaya

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1283

337. circuitry was used in the 2nd genera- B. Electric Digital Storage Automatic Cal-
tion of computers. culator

PRACTICE BOOK» NOT FOR SALE


A. Transistors C. Electronic Discrete Variable Automatic
B. Integrated circuits Computer
C. Vacuum Tubes D. all
D. none of above E. none

338. What is the modern definition of the 343. What’s the name of the inventor of the
word computer? Difference Engine?
A. A machine that makes calculations A. Albert Einstein
B. An electronic device that stores and
B. Stephen Hawking
processes data
C. Charles Babbage
C. A person that makes calculations
D. A device with sliding beads used for D. Konrad Zuse
making calculations
344. is the capacity of a computer to store
339. Ever since the first tabulating machine, data.
computers have functioned by turning A. Storage
what ON and OFF?
B. Speed
A. Mechanics
C. Accuracy
B. Electric Motors
C. Electricity D. all

D. Computers E. none

340. What was The Antikythera used to pre- 345. It is a software application capable of
dict? organizing, storing and analyzing data in
A. The tides tabular form.

B. The timing of eclipses A. Word Processor


C. Time B. Spreadsheet Software
D. The cycle of the Moon C. Simulation Software

341. The word Computer was used for the D. Presentation Software
first time to describe
346. Software used to create a sequence of
A. the iPad text and graphics, and often audio and
B. A calculator video, to accompany a speech or public pre-
sentation.
C. A person
D. none of above A. Word Processor
B. Spreadsheet Software
342. Full form of EDVAC is
C. Simulation Software
A. Electronic Delay Storage Automatic
Calculator D. Presentation Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1284

347. Microprocessor were used in ? 353. Second Generation of computer.


A. 1st generation A. Vacuum Tube
B. 5th generation B. Microprocessor
C. 9th generation C. Artificial Intelligence
D. 4th generation D. Tansistor
348. Which one is true about modern comput- E. Integrated Circuit

NARAYAN CHANGDER
ers?
354. what does the acronym AI stands for?
A. Slow
A. artificial Intelligence
B. Has many parts
B. attending Intelligence
C. Big
C. art interlligence
D. Portable
D. none of above
349. What was the name of the first computer
game? 355. Which one of the following is an example
A. Donkey Kong of Supercomputer

B. Spacewar A. IBM PC

C. Frogger B. IBM system 360


D. Minesweeper C. CRAY CS300
D. MARK I
350. The word “Computer” was first assigned
to 356. Abacus is also called as
A. A person who conducts calculations A. Computing frame
B. A person who is very loud B. Beads tray
C. A person who doesn’t sleep C. Beads rach
D. A person who lies
D. None of these
351. What is the name of the inventor of ana-
357. Who invented the UNIVAC?
lytical engine
A. Helen Keller
A. Charles Babbage
B. Christopher Columbus B. J. Presper Eckert

C. Albert Einstein C. Lady Ada Lovelace

D. Stephen Hawking D. John Mauchly

352. What does an Abacus do? 358. Smaller computer parts allowed us to
have what?
A. It calculates numbers
A. home computers
B. It calculates Chinese letters and num-
bers B. computers in rockets
C. You can learn to spell with it C. both
D. Its a toy that you play with D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1285

359. the Second Generation of computers 365. An electronic device for storing and pro-
used? cessing data and it comes from the root
word “compute” meaning to calculate.

PRACTICE BOOK» NOT FOR SALE


A. VACUUM TUBES
B. Transistors A. Computer
B. Compass
C. Beads
C. Cooler
D. PILES OF ROCKS
D. Chain An electronic device for storing
360. When was the first email sent and processing data and it comes from
A. 1952 the root word “compute” meaning to cal-
culate.
B. 1962
C. 1982 366. First CALCULATOR
A. Pascaline
D. 1972
B. ABACUS
361. what is a generation?
C. UNIVAC
A. Getting older D. Smartphone
B. The state of improvement in the devel-
opment of advanced technology. 367. The creator of the Pascaline was said to
be a
C. going into a new generation of family
A. Doctor
D. all of the above
B. Lawyer
362. Which of the following is a a fifth gener- C. Chemist
ation computer? D. Mathematician
A. IBM1401
368. This person:Founded Apple Computers in
B. ICL 2950 1976. In 1984 they were the first com-
C. PDP-8 pany to use the idea of using Windows,
Icons, Menus and a mouse to control a com-
D. PIM/m
puter. Before this computers had to be con-
363. The first computer to beat a human at trolled by writing instructions. Who were
chess was called they?
A. Colussus A. Bill Gates
B. Deep Blue B. IBM computers
C. Apple 2 C. Scott McNealy
D. Turing D. Steve Jobs
369. Steve Jobs and Steve Wozniak built their
364. When was the first digital computer in-
first computer using a wooden box. Their
vented?
company has grown and is still around to-
A. 1822 day. The name of the company is:
B. 1937 A. Microsoft
C. 1962 B. Linux
D. 1975 C. Apple

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1286

D. Windows Steve Jobs and Steve Woz- 375. The first transistor was created in
niak built their first computer using a A. 1940
wooden box. Their company has grown
and is still around today. The name of the B. 1943
company is: C. 1947

370. RCA 501 D. 1949

A. First generation computers 376. If you were one of the first people to op-

NARAYAN CHANGDER
erate ENIAC, what information would you
B. Second generation computers
likely have computed?
C. Third generation computers
A. Planetary movements
D. Fourth generation computers
B. Bombing targets
371. A computer is an machine that gathers, C. Stock prices
processes, and stores D. Census data
A. household.
377. Who in vented Napier bones
B. information.
A. Charles Napier
C. objects.
B. John Napier
D. keyboards.
C. Oliva Napier
372. In which year 3rd generation of modern D. Christano Napier
computer started
378. Why were mechanical devices devel-
A. 1999-2004 oped?
B. 1657-1945 A. To assist tedious
C. 1963-1970 B. For repetitive calculations
D. 1964-1971 C. For generating calenders
373. What is the technology that was used in D. All of these
first generation computers?
379. What part of the computer processes in-
A. Transistors formation?
B. Integrated circuits A. memory
C. Artificial Intelligence B. input
D. Vacuum tubes C. central processing unit (CPU)
D. software
374. The Stepped Reckoner was the first de-
vice that could 380. What is the language of the internet?
A. Read punch cards A. HTML
B. Print calculations B. English
C. Add, Subtract, Multiply, & Divide C. Spanish
D. Add decimals D. Tech

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1287

381. These computers are very expensive and C. UNIVAC


are used in large business organisations
D. Punch Card
like railway ticket reservation and stock

PRACTICE BOOK» NOT FOR SALE


exchange markets
387. Which generation of computers used the
A. Micro computers most electricity, were very large and ex-
B. Super Computers pensive?

C. Mainframe computers A. 2nd generation


D. none of above B. 5th generation

382. The history of computers is often re- C. 3rd generation


ferred to as D. 1st generation
A. year of
388. In 1822, Charles Babbage invented a ma-
B. inventions chine called
C. generations
A. Computer
D. none
B. Abacus
383. On a computer, You put things in the C. Babbage Difference Engine
that you no longer need or want
D. none of above
A. Trash
B. Modem 389. Graphic User Interface (GUI) made com-
C. Recycle Bin puters more user-friendly because:

D. RAM A. they became faster.


B. they became smaller.
384. How much wire was used in the Harvard
Mark I? C. they used icons instead of commands.
A. 500 feet D. they used a mouse.
B. 500 yards
390. What generation began using transis-
C. 500 inches tors?
D. 500 miles A. Second-Generation
385. What does WWW stand for? B. First Generation
A. World Wide Web C. Third-Generation
B. World Without Web D. Fourth-Generation
C. World Wide Water
391. The Analytical Engine was designed by
D. World Web Watchers
A. Charles Babbage
386. It is the first general purpose electronic
computer. B. Sir John Napier
A. Abacus C. Leibniz
B. ENIAC D. Blaise Pascal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1288

392. How long did it take to complete the 398. Father of the computer.
1880 Census? A. William Oughtred
A. 23 years B. John Napier
B. 14 weeks C. Charles Babbage
C. 7 years D. Tommy Flowers
D. 3 years 399. Moore’s Law states that the number of
transistors on an integrated circuit will

NARAYAN CHANGDER
393. When was the term “microprocessor”
first used? what every 2 years?
A. decrease
A. 1950
B. double
B. 1955
C. stay the same
C. 1968
D. triple
D. 1973
400. One of the benefits to vacuum tubes were
394. A device that can count fast and is similar that they
to an abacus.
A. Were faster than mechanical relays
A. Pascaline
B. Had no moving parts
B. Jacquard’s Loom C. Lasted longer than mechanical relays
C. Tabulating Machine D. All the above
D. Automatic Loom
401. computers used Integrated Circuits
395. Who built the Mark I Computer? (chips)
A. Charles Babbage A. First Generation

B. Howard Aiken B. Second Generation


C. Third Generation
C. Blaise Pascal
D. Fourth Generation
D. John Napier
402. How did Shakey the Robot get its name?
396. computers used Vacuum Tubes.
A. Shakey was a tall and it shook when it
A. First Generation was switched on
B. Second Generation B. Shakey was small and square and vi-
C. Third Generation brated when it was switched on
D. Fourth Generation C. Shakey was the first drone and used to
shake when taking photographs of differ-
397. What eventually replaced floppy disks? ent routes
A. Flash Drive D. It was the nickname of his inventor
B. Cassette Tape 403. Who developed the Mark I/IBM?
C. CD A. Joseph Marie Jacquard
D. Micro SD Cards B. Herman Hollerith

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1289

C. Charles Babbage B. Herman Hollerith


D. Howard Aiken C. Blaise Pascal

PRACTICE BOOK» NOT FOR SALE


404. One major technological development of D. Charles Babbage Gottfried Leibnitz
this generation are microprocessors.
410. What year was the first generation of
A. 2nd Generation modern computers started?
B. 3rd Generation
A. 1939
C. 1st Generation
B. 1947
D. 4th Generation
C. 1961
405. Which one of the following is a feature
D. 1970
of 1st generation computers
A. Calculates data in millisecond 411. The first mechanical calculator was
B. it is not easily available A. Napier’s Bones
C. does not work properly B. Abacus
D. it is useless C. Difference Engine
406. became the fundamental principle for D. Pascaline
the design of computer circuits
412. What year was Intel founded?
A. Boolean Logic
B. Herman Logic A. 1948

C. Presper Logic B. 1958


D. none of above C. 1968
D. 1978
407. WHO INVENTED COMPILER
A. ALAN TURING 413. It is responsible for what you see on the
B. KONRAD ZUSE monitor, and essential for playing graphic-
intensive games.
C. GRACE HOPPER
A. Video card
D. NONE OF THESE
B. Motherboard
408. Third Generation of computer.
C. RAM
A. Vacuum Tube
D. Network Card
B. Microprocessor
C. Artificial Intelligence 414. In 1801, who invented a new type of
D. Tansistor loom for weaving cloth in elaborate de-
signs.
E. Integrated Circuit
A. Joseph Marie Jacquard
409. He built a company named International
B. Charles Babbage
Business Machine or IBM and the inventor
of Tabulating Machine? C. Blaise Pascal
A. Gottfried Leibnitz D. John Napier

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1290

415. Also known as IBM Automatic Sequence B. 3000 BCE


Controlled Calculator (ASCC), considered C. 1000 BCE
as the first electro-mechanical computer
that was conceived by Howard Aiken in D. 500 BCE
1943.
421. Which computers are used for weather
A. Napier’s Bone forecast?
B. Harvard Mark I A. Mainframe Computer

NARAYAN CHANGDER
C. Z1 B. Micro computers
D. Atanasoff-Berry Computer (ABC) C. Mini Computer
416. is believed to be the first calculating D. Super Computer
device.
422. BIOS stands for
A. Napier’s Bones
A. Basic Input/Output System
B. Abacus
B. Basic Input/ Output Software
C. Pascaline
C. Basic Indoor/ Outdoor Standards
D. Leibniz Calculator
D. none of above
417. Which was the vacuum tube primarily
made for? 423. Herman Hollerith invented an Electronic
counting device which used
A. Personal use
A. Vacuum tubes
B. Business use
B. Punch-cards
C. family use
C. rods
D. none of above
D. none of above
418. computers are most powerful and are
used for weather forecasting and space re- 424. In 1958, the first integrated circuit was
search. created
A. Mainframe computers A. From material whose properties can
be altered to control the flow of electric-
B. Super computers
ity
C. Mini computers
B. from pieces of computer hardware
D. none of above used to transfer elements between vari-
ous components
419. Who invented the Analytical engine
A. Charles Babbage C. by gluing a magnetic strip onto a stor-
age device
B. Tomas de Colmar
D. by combining components and the cir-
C. Blaise Pascal cuitry connecting them on a single piece
D. John Napier of silicon

420. Abacus was invented by Mesopotamians 425. Integrated circuits were used in which
in generation?
A. 5000 BCE A. Generation I

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1291

B. Generation II C. 1940s
C. Generation III D. 1860s

PRACTICE BOOK» NOT FOR SALE


D. Generation IV
432. How was the Apple I different from the
426. The contains basic operations such as computers that came before it?
run, shut down, log off and find A. It was designed for use by corpora-
A. Task Bar tions
B. Title Bar B. It was designed for use in people’s
homes
C. Start Menu
C. It allows users to communicate with
D. Window
one another online
427. First modern smrtphone D. It could perform more complex mathe-
A. Nokia matical calculations
B. IPhone 433. What was the first full-length animated
C. SPC feature film?
D. MI A. Pinocchio
B. Lady and the Tramp
428. We are mobile devices.
C. Mickey Mouse
A. Laptop
D. Snow White and the Seven Dwarfs
B. Desktop PC
C. Smart phone 434. Electronic Delay Storage Automatic Calcu-
D. Xbox 360 lator (EDSAC) was invented by
A. John Mauchly
429. Pascaline was invented in
B. J. Presper Eckert
A. 1842
C. Sir Maurice Wilkes
B. 1742
D. Charles Babbage
C. 1642
D. 1542 435. . is the father of computers
A. Steve Jobs
430. was the first general purpose elec-
tronic digital computer, invented in 1946 B. Howard Aiken
A. ENIAC C. Sir John Naiper
B. UNIVAC I D. Charles Babbage
C. PARAM 436. Who is known as the father of the disk
D. none of above drive?
A. Reynold.B.Johnson
431. The slide rule was even used by NASA
engineers in the Apollo missions in the B. Mac Milan
A. 1920s C. John Napier
B. 1960s D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1292

437. What was the first calculator? 443. Who introduced the first microprocessor
A. ENIAC in 1971 for Intel?

B. Stepped Reckoner A. Jacquard ‘s Loom


B. Ted Holf
C. TI-84
C. Trio John
D. Abacus
D. all
438. In binary code, .
E. none

NARAYAN CHANGDER
A. 1 means electricity is ON
444. Univac was developed in the year
B. 0 means electricity is OFF
A. 1951
C. electricity turning ON and OFF is rep-
resented by 1s and 0s B. 1941

D. All of these C. 1931


D. none of above
439. How did Apple products change the way
people use computers? 445. Which calculating device was made in
2700 BC
A. Graphical User Interface (GUI)
A. Napier’s bone
B. Keyboard
B. Computer
C. Stylus
C. Abacus
D. Mouse
D. All
440. Who invented the calculator for the first
time? 446. The Inventor of the slide rule that per-
forms calculation faster.
A. Blaise Pascal
A. John Napier
B. Albert Einstein
B. Blaise Pascal
C. Ada Lovelace
C. William Oughtred
D. Charles Babbage
D. Charles Babage
441. The computing device that was powered 447. How many records a day could the Cen-
by steam. sus machine calculate?
A. Analytical Engine A. 7, 000
B. Calculating Clock B. 700
C. Difference Engine C. 7, 000, 000
D. Arithmometer D. 70
442. Which years was the first generation? 448. Who invent difference engine?
A. 1956-1963 A. Sir Isaac Newton
B. 1945-1956 B. Thomas Alva Edison
C. 1964-1970 C. Nikola Tesla
D. none of above D. Charles Babbage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1293

449. Who is the founder of Microsoft? C. The IBM corporation


A. Bill Gates D. The U.S. Government

PRACTICE BOOK» NOT FOR SALE


B. Steve Jobs
455. What year was the 4th generation of
C. Charles Babbage
modern computers started?
D. Professor John Vincent Atanasoff
A. 1970
450. The essence of this computer generation B. 1961
is to use technologies to create a machine
that can respond to the natural language C. 1947
and have the capability to organize them- D. 1939
selves. In what computer generation is
this? 456. What is the building block of all PC’s? A
A. Fifth Generation special kind of electrical switch.
B. First Generation A. Computer
C. Second Generation B. Transistor
D. Fourth Generation C. Hard Drive
451. name the first calculating device D. none of above
A. napiers bones
457. When did Babbage begin construction of
B. abacus
the Difference Engine?
C. pascaline
A. 1823
D. none of above
B. 1907
452. Charles Babbage invented Analytical en-
C. 1765
gine in which year?
A. 1822 D. 1890

B. 1833 458. What was the products that IBM became


C. 1765 well known for before computers?
D. 1978 A. Calculators
453. These computers are used in homes, B. Typewriters and business machines
schools, offices and shops C. Keyboards
A. Micro computers
D. none of above
B. Mini computers
C. Super computers 459. Which computers are used in homes,
schools, shops, banks?
D. none of above
A. Micro computers
454. What organization was the first to bene-
fit from Herman Hollerith’s machines? B. Super computers
A. The Union Pacific Railroad C. Main frame computers
B. The Patent Office D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1294

460. Web browser first used in 2003 466. What was the first graphical web
browser?
A. Netscape
A. Apple
B. Internet Explorer
B. Mosaic
C. Safari
C. Google
D. Google Chrome
D. Yahoo
461. First super computer made in India

NARAYAN CHANGDER
467. Which of the following is not an example
A. CRAY CS300 of 2nd generation computer
B. PARAM 8000 A. IBM 1620
C. IBM 1401 B. CDC 1604
D. RCA 501 C. Vacuum tube
D. UNIVAC 1108 .
462. WHAT WAS USED IN JACQUARD LOOM
A. PUNCHED CARDS 468. was the first commercially available
computer.
B. VACUUM TUBES
A. ENIAC
C. MICROPROCESSORS
B. UNIVAC
D. NONE OF THESE
C. EDAVC
463. In what year was the Pascaline in- D. none of above
vented?
469. The Analytical engine was designed in
A. 1876
A. 1801
B. 1633
B. 1833
C. 1642
C. 1890
D. 1842
D. 500 BC
464. What’s the name of the inventor of the
Analytical Machine? 470. He perfected the light bulb which has a
direct effect on the computer.
A. Albert Einstein
A. Tesla
B. Stephen Hawking
B. Benjamin Franklin
C. Charles Babbage C. Alesandro Volta
D. Konrad Zuse D. Thomas Edison
465. First Android Tablet 471. Examples for search engines are
A. Apple iPad A. Opera
B. Fujitsu Stylistic 2300 B. Google Chrome
C. Samsung Galaxy Tab C. Mozilla Firefox
D. none of above D. Google or Bing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1295

472. What year was the computer mouse in- 477. The first computer to use stored pro-
vented? grams. Invented by John von Neumann.

PRACTICE BOOK» NOT FOR SALE


A. 1946 A. EDVAC
B. 1964 B. ENIAC
C. 1975 C. UNIVAC

D. 1812 D. COBOL
478. is a machine invented by Gottfried
473. It is the software that can play, create or
von Leibniz that could calculate square
record images, audio or video files.
roots.
A. Educational Software A. Tabulating Machine
B. Multimedia Software B. ENIAC
C. Graphics Software C. Leibniz’s Calculator
D. Web Browsers D. Pascaline

474. What was the role of women in program- 479. Name one early computing device.
ming ENIAC? A. Calculator
A. They physically hand-wired the ma- B. Abacus
chine
C. Slide Rule
B. They designed the hardware for the D. All of the above
machine and put it together
C. They wrote the software to be used on 480. Who gave the concept of stored pro-
the machine grams?
A. Howard Aiken
D. They designed the switches and cables
used on the machine B. John Von Neumann
C. George Boole
475. The computers in this generation used ma-
chine code as the programming language D. Augusta Ada

A. 2nd generation 481. Full form of UNIVAC-I.


B. 5th generation A. Universal Automatic Calculator
C. 1st generation B. Uniform Auto Computer

D. none of above C. Uniform Augmented Calculator


D. Universal Automatic Computer
476. refers to the degree of perfection of
operations performed by a computer. 482. The company was founded by Bill Gates.
Created the first easy to use computer
A. speed software for personal computers.
B. reliability A. Apple
C. accuracy B. Microsoft
D. all C. Google
E. none D. IBM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1296

483. Who invented Computer? 489. Which of the following is an improvised


A. Isaac Newton version of Pascaline?

B. Charles Babbage A. Difference Engine

C. Thomas Edison B. Analytical Engine

D. Elisha Otis C. Napier’s Bones


D. Leibniz Calculator
484. Company that created the first smart-

NARAYAN CHANGDER
phone 490. This person created a machine called ‘The
A. Microsoft Analytical Engine.’ His ideas were some
of the first that led to the creation of com-
B. Apple
puters. Guess the name of this person.
C. IBM
A. Simon Konrad
D. Samsung
B. Charles Babbage
485. The fourth generation computers used C. John Lovelace
as its basic circuitry.
D. William Howard
A. Vaccum tubes
B. Transistors 491. VLSI were used in generation of com-
puters
C. Microprocessors
A. Generation I
D. Artificial Intelligence
B. Generation II
486. Analytical engine was invented by
C. Generation III
A. Charles Babbage
D. Generation IV
B. Augusta ada lovelace
C. Reynold 492. This is an electromechanical machine
that was designed to assists information
D. none of above stored on a punch cards. This machine
also helps process the U.S. Census of 1890.
487. h Generation computers had , and are
what do we call this machine?
getting smaller and smaller
A. Transistors A. Atanasoff-Berry Computer

B. Integrated Circuits B. Arithmometer

C. Microchips C. Stepped Reckoner

D. Vacuum Tubes D. Tabulating machine

488. The most common material found in tran- 493. who made the first mechanical calculator
sistors is what? in 1642?
A. Silicon A. Gottfried Leibniz
B. Mercury B. John Napier
C. Copper C. Blaise Pascal
D. Plastic D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1297

494. The First Generation of Computers used 500. main component of first generation
what? A. IC

PRACTICE BOOK» NOT FOR SALE


A. Transistors B. transistors
B. Vacuum Tubes C. microprocessor
C. Integrated Circuits D. Vacuum tubes
D. Mechanicals
501. COBOL, ALGOl, FORTRAN are the
495. Who invented the computer mouse? A. Computers
A. Dr. Douglas Engelbart B. Processors
B. Ade Lovelace C. Programming languages
C. Steve Jobs D. Semi-conductors
D. Bill Gates
502. In this generation, computer systems are
496. What are the 4 stages of computing in going to be based on principles of Artificial
order? Intelligence.
A. input, output, storage, processing A. 5th Generation
B. input, processing, output, storage B. 3rd Generation
C. output, input, storage, processing C. 2nd Generation
D. output, storage, input, storage D. 4th Generation

497. The first general purpose electric digital 503. First electronic, general purpose com-
commercial computer that was used by a puter. It was used for military research
television station in predicting the result of and took up a whole room.
the 1952 US Presidential Elections. what A. UNIVAC
do we call this computer?
B. CSIRAC
A. ENIAC
C. ENIAC
B. EDVAC
D. ASCI Red
C. UNIVAC
504. Which computer is the most powerful?
D. ABC
A. Supercomputers
498. Who discovered The Antikythera? B. Minicomputers
A. Captain Dimitrios Kontos C. Worstation
B. People diving for pearls D. Mainframe
C. Captain John Sparrow E. Personal Computer
D. A crew of sponge divers
505. WHO CREATED SPACEWAR AND IN
499. were used in generation-II computers WHICH YEAR IT WAS CREATED
A. Vacuum tubes A. STEVE RUSELL1962
B. Transistors B. LINUS TORVALDS1959
C. Integrated circuits C. WILLIAM HIGINBOTHAM1958
D. Artificial intelligence D. DONALD DAVIES1952

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1298

506. What calculating device was created by 511. What do we call a programmable device
Gottfried Leibniz? that accepts data for processing, perform
prescribed operations and display the re-
A. Stepped Reckoner
sult of this operation?
B. Havard Mark I
A. Computer
C. Tabulating Machine
B. Abacus
D. Analytical Engine C. Washing machine

NARAYAN CHANGDER
507. What company did Steve Jobs & Steve D. Thermometer
Wozniack start?
512. Who invented the ‘Difference Engine’?
A. Apple
A. Mr MacGregor
B. Orange
B. Charles Babbage
C. Microsoft C. Steve Jobs
D. Dell D. Charles Totten
508. Who built the Difference engine? 513. What are abacus?
A. Herman Hollerith A. a simple device for calculating, con-
B. Blaise Pascal sisting of a frame with rows of wires or
grooves along which balls slide
C. Charles Babbage
B. slips of ivory or other material divided
D. Howard Aiken into sections marked with digits, devised
by John Napier and formerly used to facil-
509. Many devices were created throughout itate multiplication and division.
the ages and helped to build up to what
we now know as a computer. Which is C. a ruler with a sliding middle strip,
the oldest representative? marked with numerical scales and used
for making quick calculations, especially
A. The Pascaline multiplication and division.
B. The Mouse D. none of above
C. The Abacus
514. Alan Turing was responsible for creating
D. The Ipod the first?
A. Steam Powered Computer
510. Developed by Charles Babbage from
1822 to 1834, an automatic and mechan- B. Electronic Computer
ical calculator that tabulates polynomial C. Desktop Computer
functions that was named after the math-
ematical principle-the method of finite dif- D. Computer Tablet
ferences. What do we call this engine? 515. Napier Bones is a device invented by
A. Differential Engine A. John Napier
B. Difference Engine B. Charles Babbage
C. Analyzation Engine C. James Napier
D. Analytic Engine D. Alan Turing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1299

516. The first mechanical device for calcula- 522. Who were the first computers?
tions developed in china. A. Animals

PRACTICE BOOK» NOT FOR SALE


A. Pascaline
B. Plants
B. Abacus
C. Microprocessors
C. Leibniz Calculator
D. People
D. none of above
523. Who invent PC ( Personal Computer)
517. The first mechanical calculating device
was A. Konrad Zuse
A. EDVAC B. Galileo Galilei
B. ENIAC C. Archimedes
C. ABACUS D. Louis Pasteur
D. none of above 524. Binary is represented by what 2 numeri-
518. Who invented the World Wide Web in cal characters?
1989? A. 0, 1
A. Steve Jobs B. 1, 2
B. Tim Berners-Lee C. 2, 3
C. Zendaya D. 3, 4
D. Bill Gate
525. Who is known as the “Father of the Com-
519. What is the world largest maker of com- puter”?
puter chips?
A. Herman Hollerith
A. IBM
B. Charles Babbage
B. Intel
C. John Eckert
C. Dell
D. John Atanasoff
D. Apple
526. Which of the following is a presentation
520. The circuitry used in 2nd generation of program?
computers in the year 1956-64
A. MS Word
A. Transistors
B. MS Excel
B. Vaccum tubes
C. micro processors C. MS PowerPoint

D. none of above D. None of the above

521. What is first commercial microproces- 527. The first computer game made in 1972
sor? was called
A. Intel 8008 A. Pong
B. Intel 4004 B. Space invaders
C. Intel 8085 C. Pac Man
D. Zilog Z80 D. Chess

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1300

528. is a perfect example of a mechanical 533. Why did Martin Newell choose the teapot
calculator. model?
A. Pascaline A. He was having tea with his wife when
the idea came to him
B. Taxi meter
B. He was having dinner when the idea
C. Abacus came to him
D. all C. He was having lunch with his wife

NARAYAN CHANGDER
E. none when the idea came to him
D. He asked his team for ideas and they
529. Who invented a machine to add long came up with it
columns of numbers quickly?
534. During this computer generation, comput-
A. Charles Babbish
ers were mostly built with vacuum tubes
B. Blaise Pascal and as a result, computers were enormous
and usually takes up an entire space of a
C. John Napier
room. what computer generation is this?
D. Bill Gates
A. Second Generation
530. This invention replaced vacuum tubes and B. Fifth Generation
made computers much smaller and faster. C. Third Generation
However, it was eventually replaced by
another invention. D. First Generation

A. RAM 535. World’s first electronic digital computer


that was programmable developed by
B. ENIAC Tommy Flowers.
C. Transformer A. COBOL
D. Transistor B. Colosseum

531. What technology will the 5th generation C. Colossus


computers use? D. ENIAC
A. Artificial Intelligence 536. In this generation Time sharing, Real
B. Transistor time, Networks, Distributed Operating
System was used.
C. Vacuum Tubes
A. 1st generation
D. Microprocessor
B. 3rd generation
532. The Harvard Mark I was created in what C. 4th generation
year? D. 5th generation
A. 1907
537. Pascaline was invented by a French math-
B. 1919 ematician named
C. 1944 A. Howard Aiken
D. 1947 B. Blaise Pascal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1301

C. J.P. Eckert and John Mauchly 544. Which of the following statements is true
D. Charles Babbage for Fourth Generation Computers?

PRACTICE BOOK» NOT FOR SALE


A. They are very slow, expensive and
538. What successful company purchased the
large in size.
Cray-1 to help design one of their own
computers? B. They rely on magnetic taped.
A. IBM C. They are portable, reliable and cheap-
B. Hewlett Packard Enterprise est among all other generations of com-
puters.
C. Samsung
D. Lenovo D. They are still in development.

539. It is considered as the first computing de- 545. Tabulating Machine was invented by Her-
vice. man Hollerith in
A. Laptop A. 1990
B. Desktop B. 1890
C. Abacus C. 1820
D. Altair
D. 1819
540. Who invented the Internet?
546. The circuit used in 1st generation of com-
A. Steve Jobs puters.
B. Vinton Cerf and Bob Kahn
A. Transistors
C. Al Gore
B. Integrated Circuit
D. William Shockley
C. Vacuum tubes
541. WHEN WAS TIC-TAC-TOE CREATED
D. Microprocessors
A. 1932
B. 1945 547. language was used in first generation
of computers
C. 1969
D. 1952 A. COBOL
B. Machine
542. Abacus is used to perform ?
A. Four operation C. RDBMS
B. Only Addition D. none of above
C. Only Subtraction 548. This invention was 1, 000 times faster
D. Both Addition and Subtraction than any machine built before it. It was
so big that it could fill up a house.
543. The Apple II was first produced in
A. 1977 A. APPLE I

B. 1975 B. ENIAC
C. 1973 C. WINDOWS
D. 1976 D. Z3

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1302

549. Who invented the first computer program 554. Who invented the mouse?
was used to help the Analytical Engine cal- A. Steve Engelbart
culate number?
B. Douglas Meece
A. Steve Jobs
C. Steve Mouse
B. Ade Lovelace
D. Douglas Engelbart
C. Bill Gates
555. Personal Computers (PCs) became acces-
D. Dr. Douglas Engelbart

NARAYAN CHANGDER
sible in:
550. The second generation of computers was A. 1960s
based on
B. 1970s
A. Transistors
C. 1980s
B. Silicon chips D. 1990s
C. Vacuum chips
556. Which was the first CPU ever made?
D. Bio chips
A. Intel Celeron
551. This important invention began the de- B. Intel 4004
velopment of the second generation com-
puters, which no longer required vacuum C. Intel Pentium
tubes, and were much more efficient and D. Intel Xenon
less expensive.
557. The inventor of difference engine 1 the
A. CPU first mechanical computer made of hand-
B. Transistor made brass parts.
C. Silicon chip A. Joseph Marie Jacquard
D. Integrated circuit B. Charles Babbage
C. Blaise Pascal
552. Why didn’t vacuum tubes get used in
computers until the 1940s? D. Thomas Edison

A. The technology didn’t exist 558. Which is designed to run for a long time
B. No one had thought about it until then without turning off.
A. motherboardf
C. They had been too expensive up to that
point B. Server
D. They were too fragile C. Personal Computers
D. flash drive
553. What was the average size of an ENIAC
computer 559. Identify the odd one out.
A. As small as an ant A. Battery
B. As big as an elephant B. Accuracy
C. As small as a monquito C. Diligence
D. As big as a room D. Versatility

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1303

560. Who sent the first email? C. Transistors made computers heavier
A. Herman Hollerith and more substantial

PRACTICE BOOK» NOT FOR SALE


B. Charles Babbage D. Vacuum tubes consumed a lot of en-
ergy and generated excessive heat
C. Steve Jobs
D. Ray Tomlinson 566. The Heaven part of Abacus has beads
on each rod.
561. Which generation of computers used ICs A. two
A. First generation computers B. three
B. Second generation computers C. four
C. Third generation computers D. all
D. Fourth generation computers E. none
562. DEVICES WHICH USE GEARS AND FLUTES 567. The father of computers, Charles Bab-
AND ARE USE FOR CALCULATION bage invented:
A. CALCULATING CLOAK built by Wilhelm A. Leibniz calculator and Difference en-
Schickard’s gine
B. PASCALINE built by Blaise Pascal B. Difference engine and Analytical en-
C. STEPPED RECKONER built by Wilhelm gine
Leibniz C. Abacus and Pascaline
D. ALL OF THESE D. none of above
563. The engine had five units to work. 568. How big was the Mark I?
A. difference A. the size of a gymnasium
B. tabulating B. The top of a Table
C. analytical C. The eye of a needle
D. all D. The palm of your hand
E. none
569. What was the first mechanical Computer
564. Choose an example of an Input Device? called?
A. Speakers A. Difference Engine
B. The Screen B. ABC(Atanasoff-Berry Computer)
C. The Keyboard C. ENIAC
D. none of above D. Apple

565. The first generation of computers used 570. What was the definition for the word
vacuum tubes. Why were they replaced computer in the 1600s?
by the transistor? A. A machine that makes calculations
A. Transistor technology was fully mature B. An electronic device that makes calcu-
B. Vacuum tubes are too small to work lations
with and were expensive C. A person that makes calculations

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1304

D. A device with sliding beads used for B. It was used to store recipes
making calculations C. It was used to program times used for
571. This allowed a CPU to be built on a single cooking products
chip, thus allowing computer engineers to D. It was the first Dish Washer
design the first fourth generation comput-
ers 576. What computer was built over 5000
years ago?
A. silicon chip
A. Apple Watch

NARAYAN CHANGDER
B. integrated circuit
B. Stonehenge
C. microprocessor
C. IBM
D. SRAM
D. ENIAC
572. June 1943 two men built a first gener-
ation computer at the University of Penn- 577. He was the founder of of the Interna-
sylvania which was built to project the tra- tional Business Machines (IBM).
jectory of military missiles during WWII. A. Charles Babbage
Although it was not build until after the
B. Blaise Pascal
war, it was able to calculate a problem
that would take a team of humans 3 days C. Howard Aiken
in 20 seconds. D. Hernan Hollerith
A. Hollerith’s tabulating machine
578. I was known as the father of computing.
B. Mark I I am
C. ABC Computer A. Blaise Pascal
D. ENIAC B. Herman Hollerith
573. Which of the following is known as the C. Marie Jaquard
world’s first general-purpose computer? D. Charles Babbage.
A. Difference Engine
579. When was the Napier’s Bone invented
B. Analytical Engine
A. 1820
C. Pascaline
B. 1975
D. Abacus
C. 1618
574. Who designed what is commonly known D. 1617
as the first version of the internet?
A. Harvard 580. This invention replaced the transistor and
led to the development of third generation
B. Intel computers. Processing speed increased to
C. IBM millions of calculations per second.
D. US Department of Defense A. Vacuum tube

575. What was the purpose of The Kitchen B. Integrated circuits


Computer? C. CPU
A. It was the first Microwave Oven D. Cicuitry

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.2 Development of Computers 1305

581. First device that stored programs and 587. is the world’s fastest supercomputer
used metal cards A. Tianhe-2

PRACTICE BOOK» NOT FOR SALE


A. UNIVAC
B. PARAM
B. Abacus
C. CRAY-1
C. Jacquard Loom
D. none of above
D. Slide Rule
588. WWW stands for ?
582. Short term memory. Disappears when
A. World wide work
computer turns off.
A. Hard Drive B. Word wide web

B. Network Card C. World wide web

C. RAM D. Wrong wide war

D. Printer 589. Who is the father of computers?


583. Years Ago One of first tools used to ex- A. John Napier
press numbers was the B. Charles Babbage
A. Maracca C. George boole
B. Abacus D. none of above
C. Lines on Stone
590. The word for computers carrying out cal-
D. Sticks in a Pile culations is called
584. made up of wooden frame with rods, A. Calculation
each having beads. B. Storing
A. Analytical engine C. Processing
B. Napier’s Bones D. Typing
C. Abacus
591. What new idea did Pong introduce to peo-
D. none of above
ple?
585. Father of Computer? A. Playing a game on a device
A. Charles Babbage B. Watching Video’s
B. Charles Babbage C. Table Tennis
C. None of the above D. Ping Pong
D. none of above
592. In Primitive Times counting was done
586. First mechanical computer on .
A. Pascaline A. Fingers
B. Analytical engine B. Toes
C. Mark I C. 10
D. None D. Metric

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.3 Evolution of Computer Software 1306

593. This invention replaced the vacuum tube C. Electric cars


and led to the development of Second Gen- D. None of these
eration computers.
A. Motherboard 596. CPU of the Analytical Engine

B. Integrated circuit A. Bank

C. CPU B. Mill

D. Transistor C. Store

NARAYAN CHANGDER
D. Mile
594. The second generation computers used
in place of vacuum tubes. 597. Which was the first smartphone
A. Transistors A. Apple 6
B. microprocessors B. Realmi 2 pro
C. punched cards C. IBM Simon
D. all D. Samsung A1
E. none 598. Example of supercomputer
595. Some types of technology we see around A. Cray cs 300
us are: B. RCA501
A. Microwaves C. IBM1401
B. Mobile phones D. none of above

14.3 Evolution of Computer Software


1. Which one of these is the most expen- A. Difference engine
sive? B. Pascaline
A. Desktop C. ENIAC
B. Laptop D. EDVAC
C. Mini computer
4. What did the second generation of comput-
D. Super computer ers replace the vacuum tubes with?
2. are the fastest computing systems, A. Keyboard and Monitors
used to perform a huge number of calcu- B. Transistors
lations at the same time C. Integrated Circuits
A. Micro computers D. Mouse
B. Supercomputers
5. The Intel 4004 Chip was the first de-
C. Mini computers veloped.
D. Desktops A. Transistor
3. This was the first programmable, elec- B. Microprocessor
tronic, general-purpose digital computer. C. Vacuum Tube

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.3 Evolution of Computer Software 1307

D. Magnetic Drums 11. What computer piece caused the first gen-
eration of computers to overheat?
6. Select the portable types of computers

PRACTICE BOOK» NOT FOR SALE


A. Keyboard
from the list below
B. Transistor
A. laptop
C. Vacuum Tube
B. desktop workstation
D. Magnetic Drums
C. Smartphones
D. Notebook 12. First Mechanical Calculator is
A. Engine
E. Tablet PCs
B. ENIAC
7. During which generation of computers C. Pascaline
were keyboards and monitors intro-
duced? D. EDVAC

A. 1st Generation 13. Why is Read-Only Memory considered to


B. 2nd Generation be non-volatile memory?
A. Data is lost when the computer is off
C. 3rd Generation
B. More speed is needed to run the com-
D. 4th Generation
puter
8. What are the facts about computers C. More space is needed to store files
A. he First Computer Weighed More Than D. Data is saved when the computer is off
27 Tons.
14. The first Colossus was built in
B. About 90% of the World’s Currency
A. 1884
Only Exists on Computers.
B. 1972
C. Both A & b
C. 1932
D. None of these
D. 1943
9. The first computer used while world wars
15. First mechanical calculator is
A. Konrad Zuse
A. Pascaline
B. Universal Automatic Computer 1
B. AI
C. Ferranti Mark 1
C. Enginer
D. Manchester Mark 1 D. None
10. Why is Random Access Memory (RAM) 16. Which form of computer memory houses
considered volatile memory? data that does not need to be altered?
A. Data is saved when the computer is off A. Random Access Memory
B. Data is lost when the computer is off B. Secondary Memory
C. More memory is needed C. Read-Only Memory
D. More storage space is needed D. External Hard Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.3 Evolution of Computer Software 1308

17. The fifth generation of computers is de- C. DTP


fined by
D. none of above
A. Vacuum tubes
B. Parallel processing hardware and AI 23. When was the first full-sized computer cre-
(Artificial Intelligence) software. ated?

C. Integrated circuits A. 1944


D. Transistors and punch cards B. 1945

NARAYAN CHANGDER
18. Pascaline was invented by C. 1970

A. Sir John Napier D. 1969


B. Blaise Pascal 24. are used mostly in home, schools,
C. Thomas Alfa Edison shops, offices, and banks.
D. Herman Hollerith A. Micro computer
19. How did the integrated circuit improve the B. Main Frame computer
third generation of computers? C. Mini computer
A. It made them slower D. none of above
B. It enabled people to connect to the in-
ternet 25. was the first computer programmer
C. It made them more expensive A. Ada Byron
D. It made them much faster B. Bill gates
20. Which one of these is the most expensive C. Herman Hollerith
and fast computer?
D. Jimmy Brilliant
A. desktop
B. laptop 26. Who is known as the “father of comput-
ing”
C. supercomputer
A. Charles Babbage
D. mainframe
B. Blaise Pascal
21. What was the name of the first computer
created? C. Bill Gates

A. Apple II D. Steve Wozniak


B. Mark 1 27. What is a type of computer program that
C. Commodore PET performs a specific personal, educational,
or business function?
D. Mark II
A. Random Access Memory
22. A program helps you to perform calcu-
lations and analyse data in a better way. B. Application Software
A. Spreadsheet C. Operating System
B. Word processor D. Volatile Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.3 Evolution of Computer Software 1309

28. What is the focus of the fifth generation 34. Software which are designed to meet the
of computers? specific needs of users are called soft-
ware.

PRACTICE BOOK» NOT FOR SALE


A. Improving the vacuum tube
B. Making computers more expensive A. System
B. Specific purpose
C. Growing artificial intelligence
C. General purpose
D. Expanding Wi-Fi capabilities
D. none of above
29. Much of the computer revolution took
place during which generation of comput- 35. Which computer was the first computer
ers? sold to individuals in 1975?

A. 2nd Generation A. The ENIAC


B. The Altair
B. 3rd Generation
C. The Analytic machine
C. 4th Generation
D. Apple II
D. 5th Generation
36. First calculating device is
30. Who is credited with the creation of the
A. Abacus
World Wide Web (WWW)?
B. Pascaline
A. Jimmy Neutron
C. Napier’s Bones
B. Tim Berners-Lee
D. Engine
C. Elon Musk
D. Charles Darwin 37. In a/an all the components and the chip
are made out of the same block of semicon-
31. A system that uses marks or sticks for ductor material.
counting. A. output device
A. Checking system B. input device
B. Barter system C. integrated circuit
C. Tally system D. power supply
D. Sticks system 38. Which type of memory is used to store
32. is an example of Anti-virus utility. data and information the computer is cur-
rently working on?
A. AVG
A. Primary Memory
B. bZip2
B. Secondary Memory
C. WinZip C. Hard Drives
D. none of above D. Flash Drive
33. Second generation computers are used 39. Who invented computers
A. Vacuum tube A. Charles Babbage
B. Transistors B. Herman Hollerith
C. Microprocessors C. Alan Turing
D. Integrated Circuit D. Blaise Pascal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.3 Evolution of Computer Software 1310

40. Computer memory is broken down into 45. A system with 10 numeric values, 0
what two types? through 9.
A. Primary and Secondary Memory A. Decimal number system
B. RAM and ROM B. Binary number system
C. Hard Drive and Flash Drive C. Counting number system
D. Operating Systems and Application D. none of above
Software

NARAYAN CHANGDER
46. The era of first generation computers
41. In 1976 created the first personal com-
was
puter, called the Apple 1, with a built-in
keyboard, display screen, and storage unit A. 1920-1936
A. Peter Andrews B. 1940-1956
B. Mark Zuckerberg C. 1950-1958
C. Bill Gates D. none of above
D. Steve Wozniak
47. Which intention led to the age of the per-
42. What is computers sonal computer?
A. A computer is an electronic device for A. The microprocessor
storing and processing data, typically in bi- B. The vacuum tube
nary form, according to instructions given
to it in a variable program. C. The keyboard and monitor
B. code used in digital computers, based D. None of these are right
on a binary number system in which there
48. A is a device or computer connected to
are only two possible states, off and on,
a multi-user computer such as a minicom-
usually symbolized by 0 and 1.
puter or mainframe computer while a A
C. Both A & B single-user computer more powerful than
D. None of These a microcomputer; commonly used by engi-
neers, scientists, and graphic artists.
43. The size and shape of a computer or de-
vice. A. Terminal
A. Computer standard B. workstation
B. Ergonomics C. Server
C. form factor D. Router
D. none of above 49. Primary memory is divided into what two
44. A system with two numeric values of 0 types of memory?
and 1, which are also referred to as off or A. Semiconductors and Flash Drives
on.
B. Integrated Circuit and Random Access
A. Counting System Memory
B. Binary number system C. Random Access Memory and Read-
C. Electronic system Only Memory
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.4 Future Trends in Computing 1311

50. technology was used in second gener- B. Leibniz Leonard


ation of computers. C. Charles Babbage

PRACTICE BOOK» NOT FOR SALE


A. Vacuum tubes D. Konrad Zuse
B. Transistors
54. What is a program that communicates be-
C. Integrated circuits
tween the user and the computer system?
D. none of above
A. Operating System
51. They are designed to run for a long time B. Application Software
without turning off and they work on a
C. Transistors
network
A. CPU D. Multimedia Software

B. Computers 55. An early form of electrical memory using


C. HDMI glass bulbs.

D. Servers A. Circuity system


B. Fiber optics
52. Which type of computer memory can be ac-
cessed from any physical location and al- C. Vacuum tubes
low for quick access and manipulation? D. Light bulbs
A. Random Access Memory
56. software helps us to arrange and store
B. Read-Only Memory a large amount of information in an organ-
C. Operating Software ised manner.
D. Secondary Memory A. Word processor

53. Made the first programmable digital com- B. Spreadsheet


puter C. Database
A. Blaise Pascal D. none of above

14.4 Future Trends in Computing


1. Which of the following is a characteristic B. Brad Pitt
of Virtual Reality?
C. Robert Downey Jr
A. Simulates partial or complete real-
D. Beyonce Knowles
world experience
B. Created by a computer 3. Which city tops list of 27 new smart cities
C. Simulates senses like Sight, hearing, announced by Ministry of Urban Develop-
and touch ment?

D. All of the answers are correct A. Amritsar


B. Ajmer
2. In 2009, who was the first celebrity to be
brought to life in AR in a print magazine? C. Madurai
A. Taylor Swift D. Varanasi

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.4 Future Trends in Computing 1312

4. Robot is derived from Czech word 9. Which of the following includes in Immer-
A. Rabota sive experience?

B. Robota A. Augmented reality

C. Rebota B. Arcade Gaming

D. Ribota C. Virtual Reality


D. 2d games
5. In Robotics, what is meant by an An-

NARAYAN CHANGDER
droid? 10. Which industry can use blockchain technol-
A. A software program used to control a ogy for cybersecurity?
robot A. Critical infrastructure
B. A robot with a human like appearance B. Healthcare
C. A type of operating system C. Logistics
D. A human with a robot like appearance D. All of the above

6. A new user has joined an organisation and 11. Which decade saw the debut of augmented
needs access to IT resources. To give them reality technology?
access, what would an infrastructure tech- A. 1960s
nician need to do?
B. 1970s
A. Give the new user a test account
C. 1980s
B. Give the new user an account with
their name D. 1990s

C. Give the new user the infrastructure 12. “In AI, we study the whole universe by di-
technicians login name and password viding it into two components. “What are
D. Give the new user access to a guest these two components?
account. A. Sky and Land

7. Which of the mentioned human behavior B. Agent and Environment


does the AI aim to mimic? C. Yes or No
A. Thinking D. None of the above
B. Sleeping 13. Which of the following is a characteristic
C. Eating of Grid Computing?
D. None of the above A. Uses Networking

8. Leonardo da Vinci sketched plans fora hu- B. Combines the Resources of Several
manoid robot in the late Which Year Computers
did Leonardo da Vinci sketch plans for the C. Looks like a Single Computer
robot? D. All of the answers are correct
A. 1200s
14. In this type of cloud, an organization rents
B. 1400s cloud services from cloud providers on-
C. 1100s demand basis.
D. 1300s A. Private

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


14.4 Future Trends in Computing 1313

B. Public A. Auto
C. Protected B. Fashion

PRACTICE BOOK» NOT FOR SALE


D. Hybrid C. Film
15. Which of the following is the example of D. Food
Machine Learning
A. Electric scooter 18. Autocorrect option is an example of?
B. Youtube A. Computer Language Program
C. Door bell B. Automatic Language Reading
D. none of above C. Natural Language Processing
16. A game based on which animated franchise D. none of above
propelled AR into the mainstream in recent
years? 19. Which popular Netflix show also put AR on
A. Pokemon the mainstream map, with one particularly
spooky episode featuring AR in gaming?
B. Super Mario
A. House of cards
C. Legend of Zelda
D. Sonic the Hedgehog B. Black Mirror
C. Master of None
17. Which industry was the first to use aug-
mented reality for commercial purposes? D. Sense8

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


15. Computer Ethics and

NARAYAN CHANGDER
Professionalism

15.1 Ethical and Social Issues in Computing


1. The correct way of communicating on the B. To make reliable data generation, com-
internet is called munication and transmission
A. Netiquette C. To make a secured and authentic
means of electronic communication
B. Etiquette
D. All of the above
C. Acceptable Use Policy
D. Encryption 5. Rules governing net neutrality are set by
. which was determined by .
2. Kind of issues of IoT, except .
A. FFC, communication act of 1934
A. System reliability B. FFC, communication act of 194
B. Security concerns C. FCC, communication act of 1934
C. Data privacy matters D. FCC, communication act of 1944
D. Data integrity
6. Here are 5 principles of code of fair infor-
3. refers to the internet connectivity of mation .
everyday objects. A. Redress
A. Internet B. Choice
B. Network C. Notice
C. Internet of Things D. Access
D. World Wide Web
7. A computer program that can copy itself
4. Which of the following is objective of Elec- and infect a computer without permission
tronic Transaction Act 2063? or knowledge of the user

A. To make legal provision for authentica- A. Headache


tion and regulation of electronic data B. Sinus Infection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


15.1 Ethical and Social Issues in Computing 1315

C. Phishing 13. List of information of people that usually


gather by organizations .
D. Virus

PRACTICE BOOK» NOT FOR SALE


A. Financial data
8. The process of encoding or scrambling data B. Work history
to prevent unauthorized people from open-
C. Medical record
ing or accessing it.
D. Police record
A. Authentication
B. Encryption 14. Identify the Vision of the following:to
transfer Nepal into an information and
C. Phishing knowledge based society and economy.
D. Cryptography A. NICT Policy 2020
B. NICT |Policy 2015
9. Association for Computing Machinery was
founded in . C. NICT Policy 2010

A. 1974 D. NNICT Policy 2012

B. 1947 15. The software intentionally designed to


cause damage to a computer, server,
C. 1957 client, or computer network.
D. 1874 A. Malware
B. Hardware
10. What kind of information should you never
give out in an unauthenticated email? C. Application Software
A. Birthdate D. All of the above

B. Full name 16. The largest global network of computers


is called
C. Any account information
A. Internet
D. All of the above
B. Internet of Things
11. T he gaining of unauthorized access to data C. Network
in a system or computer is called D. None of the above
A. Phishing
17. Below are the steps involved in desicion
B. Waterhole Attack making, except .
C. Hacking A. Choose Option
D. Software Piracy B. Implement Option
C. Identify Option
12. Bill of Right have amendments
D. Develop Option
A. 7
18. Digital Foot print includes the activities
B. 8 like that we perform using internet
C. 9 A. Website we visit
D. 10 B. Email we send

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


15.1 Ethical and Social Issues in Computing 1316

C. The information we submit C. Data privacy


D. All of the above D. Data privacy

19. The person who uses ICT in every steps of E. Regulations


life is 24. What do the Net Neutrality want the in-
A. Virtual Citizen ternet to be like, except
B. Digital Citizen A. The internet service provider should
be a public service that everyone can ac-

NARAYAN CHANGDER
C. Advance Citizen
cess
D. Intelligent Citizen
B. The distribution of internet access is
20. Based on the data presented, how many fair and equal to everyone
active social media users in Indonesia in C. The ISP can not control the speed of
the beginning of 2018? download and uploading things
A. 130 million D. The ISP can charge the users and can
B. 120 million block the content
C. 103 million 25. Which of the following is not threats in so-
D. 132 million cial media?
A. Leakage of personal information
21. A type of malicious software designed to
block access to a computer system until a B. Malicious Apps
sum of money is paid C. Social Scams and Phishing Attacks
A. Malware D. effective way of marketing campaign
B. Ransomware
26. A set of beliefs about right or wrong, is
C. Spyware the meaning of
D. Virus A. Morals
22. The full name of Education Rate Program B. Ethics
is . C. Law
A. The Schools and College Program of D. Legal
the Universal Service Fund
B. The Schools and Libraries Program of 27. Here are some pros of having workplace
the United Source Fund monitoring, except

C. The Schools and Libraries Program of A. Increasing productivity


the Universal Service Fund B. Decreasing data breaches
D. The Schools and College Program of C. Improved country culture
the Unity Service Fund D. Improving objectivity of employees’
23. What are the challenges faced by the soci- evaluation
ety in implementing the IoT? 28. What is the art of writing or solving
A. Reliability codes?
B. Security A. Authentication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


15.1 Ethical and Social Issues in Computing 1317

B. Encryption 33. Examples of IoT, except


C. Decryption A. Nest thermostat

PRACTICE BOOK» NOT FOR SALE


D. Cryptography B. Evolution locomotive built by General
Motors
29. Which of the following is objective of NICT
Policy? C. Polo tech shirt by Ralph Lauren

A. To deploy ICTs at all levels of Nepal ed- D. Amazon dash implement


ucation system in order to improve educa- 34. What is the CIA Triad?
tional outcomes while expanding access
to education and training facilities A. Confidence, Integrity, and Assumption

B. To create an innovative, market re- B. Confidence, Integrity, and Availability


sponsive, highly competitive and well reg- C. Communication, Integrity, and As-
ulated ICT industry. sumption
C. To empower and facilitate Nepal’s par- D. Central Intelligence Agency
ticipation among the sector that is key
drives of the national economy. 35. A document stipulating constraints and
practices that users must agree to for ac-
D. All of the above cess to a corporate network, the internet
30. A cyberattack carried out by sending or other resources .
emails to large numbers of people asking A. Netiquette
for sensitive information. B. Acceptable Use Policy
A. Authentication C. Authentication
B. Encryption D. Cryptography
C. Phishing
36. is the way of data we create while us-
D. Cryptography ing the internet.
31. Countries that not include as country with A. Digital Foot print
strict Internet Censorship B. Digital Society
A. Russia C. Digital government
B. Cuba D. Digital Citizenship
C. Turkey
37. True fact about Association for Computing
D. Saudi Arabia Machinery
32. is an authentication method that re- A. the youngest computing society
quires the user to provide two or more B. boasts more than 100, 000 members
verification factors to gain access to a re-
source such as an application, online ac- C. have eight general moral imperatives
count, or a VPN. D. there are in more than 100 countries
A. Security lock 38. A system of interconnected people and/or
B. Life 360 things is called a
C. Watering Hole Attack A. Network
D. Multi-factor authentication B. Prototype

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


15.1 Ethical and Social Issues in Computing 1318

C. Netflix C. Authentication
D. Neotype D. Cryptopgraphy

39. Who will be the chairperson of NICT pol- 44. Ways that computers and information
icy? shared via computer can be made more se-
A. Hon, Minister, Minister of Information cure.
and Communication Technology A. Encryption
B. Member of National planning Commis- B. Authentication

NARAYAN CHANGDER
sion C. Passwords
C. Secretary, minister of education D. All of the above
D. Secretary, Minister of Health
45. A file or code, typically delivered over
40. A cyberattack carried out by creating a a network, that infects, explores, steals
fake website, or compromising/corrupting or conducts virtually any behavior an at-
a real one, in order to gather information tacker wants .
or data on visitors. A. Hacking
A. Phishing B. Malware
B. Encryption C. Ransomware
C. Watering hole attack D. Spyware
D. Cryptography
46. Terms used to describe the gulf between
41. How many members are there under NICT those who do and those who don’t have
Policy? access to modern information and commu-
nications technology, called as
A. 11 Members
A. Internet of Things
B. 9 members
B. E-Rate Program
C. 12 Members
C. The Digital Divide
D. 10 Members
D. Net Neutrality
42. The person who gain an unauthorized ac-
cess to others information system to steal 47. The interactive computer mediated tech-
other sensitive data for personal benefit is nologies that facilitate the creation sharing
of information, ideas, career interest and
other forms of expression through virtual
A. Hacker
communication and network is
B. Cracker
A. Digital Society
C. Programmer B. Social Media
D. All of the above C. Electronic Media
43. A process that proves the identity of the D. None of the above
user.
48. The transaction of electronic records, data
A. Encryption by using any types of electronic means is
B. Phishing termed as

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


15.1 Ethical and Social Issues in Computing 1319

A. It Policy A. To define, implement, and oversee a


set of data privacy policies
B. Cyber Law

PRACTICE BOOK» NOT FOR SALE


B. To determine, analyze, and oversee a
C. Electronic Transaction Act
set of data public policies
D. None of the above
C. To determine, analyze, and implement
a set of data privacy policies
49. Software that enables a user to ob-
tain covert information about another’s D. To define, implement, oversee a set of
computer activities by transmitting data data privacy policies
covertly from their hard drive.
52. Censorship can take many forms, except
A. Ransomware .
B. Malware A. Rejecting the use of certain key words
C. Spyware in search engine searches

D. Hacking B. Prohibiting the use of social media


C. Limiting access to certain Web sites
50. SMO stands for?
D. Allowing access to only some content
A. Social Media Operation or modified content at certain Web sites
B. Social Medical Optimization 53. Categories of data brokers, except
C. Social Media Optimization A. For marketing and advertising
D. Security Media Optimization B. Risk mitigation and fraud detection

51. Organizations should appoint an executive C. People search sites


CPO to . D. For sales and production

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS

You might also like