Unit Test With Ak
Unit Test With Ak
______7. The term used to name between the lands in storing data to CD/DVD is
called
a. Separation c. Lands ‘
B. Pits d. None of the Above
______8. Which of the following is use to name the CD/DVD disc as bootable disc?
a. Filename c. Letter
b. File name d. None of the Above
______9. Which of the following is to be considered when selecting a disk part area?
a. Status c. Size
b. Disc d. None of the Above
______10. In the procedure of CD/DVD bootable, what comes next after selecting
partition1?
a. type “active” c. type “exit”
B. type “clean” d. None of the Above
______11. Which of the following manages data flow between the computer's
operating system (OS) and attached devices, such as the hard disk, video adapter,
keyboard, mouse and printer?
a. BIOS c. OS
b. Boot d. None of the Above
______12. Among the types of booting utility available today, which of the following is
stand alone?
a. Command Prompt c. CD/DVD boot
b. Rufus d. None of the Above
______17. It enables the user to carry out some specific set of tasks or function.
a. Application Software c. Operating Software
b. System Software d. None of the Above
______19. It provides everything from new security patches, designed to keep hackers
from corrupting your files.
a. Computer Antivirus c. Driver Update
b. Device Driver d. None of the Above
______20. Which of the following is a program that lets the operating system
communicate with specific computer hardware?
a. Device Driver c. Driver update
b. Software Driver d. None of the Above
______21. Among the options given, this performs numerous additional tasks as part
of a single request and response, including verifying the identity of the requestor.
a. Desktop PC c. Server
b. Client d. None of the Above
______25. Which of the following is a program that lets the operating system
communicate with specific computer hardware?
a. Netware Server c. Cloud Server
b. Linux Server d. None of the Above
______30. This type of computer antivirus that promises one thing but delivers
another.
a. Adware c. Worm
b. Trojans d. None of the Above
1.C
2.B
3.C
4.C
5.A
6.B
7.C
8.B
9.A
10.A
11.A
12.B
13.A
14.C
15.C
16.B
17.A
18.C
19.C
20.A
21.C
22.B
23.B
24.A
25.C
26.A
27.B
28.B
29.C
30.A