0% found this document useful (0 votes)
67 views5 pages

Unit Test With Ak

The document appears to be a quiz or test covering various topics related to computing. It consists of 30 multiple choice questions addressing subjects like operating systems, software, computer hardware, and security. The questions are presented along with possible answer choices but no explanations or answers are shown.

Uploaded by

papyoverzosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views5 pages

Unit Test With Ak

The document appears to be a quiz or test covering various topics related to computing. It consists of 30 multiple choice questions addressing subjects like operating systems, software, computer hardware, and security. The questions are presented along with possible answer choices but no explanations or answers are shown.

Uploaded by

papyoverzosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Name ________________________ Grade and Section______________

Adviser________________________ Score ________________________

_____1. Refers to the violation of creating multiple software for others?


a. Optical Media Board
b. Ethics
c. Copyright Infringement Software
d. None of the Above
______2. Under the functions of Operating System, which of the following it also
performs the task of allocation and de-allocation of the devices?
a. Security c. Networking
b. I/O System Management d. None of the Above

______3. In the General Procedure of Installing Microsoft Windows 7, Installing


Windows, Copying Files, Expanding Files, , Installing Update, Completing Install
which is missing?
a. Installing network c. Installing Features
b. Installing I/O System d. None of the Above

______4. Which of the following is the nucleus of computer?


a. Processor c. Kernel
b. Operating System d. None of the Above
______5. In the installation of Microsoft Windows 7 Operating System, which bit is not
mentioned?
a. 86bit c. 32bit
b. 64bit d. None of the Above
______6. This allows the process where the Windows NT operating system uses for
storing, organizing, and finding files on a hard disk efficiently.
a. NTFS c. CD/DVD
b. USBFD d. None of the Above

______7. The term used to name between the lands in storing data to CD/DVD is
called
a. Separation c. Lands ‘
B. Pits d. None of the Above

______8. Which of the following is use to name the CD/DVD disc as bootable disc?
a. Filename c. Letter
b. File name d. None of the Above
______9. Which of the following is to be considered when selecting a disk part area?
a. Status c. Size
b. Disc d. None of the Above

______10. In the procedure of CD/DVD bootable, what comes next after selecting
partition1?
a. type “active” c. type “exit”
B. type “clean” d. None of the Above
______11. Which of the following manages data flow between the computer's
operating system (OS) and attached devices, such as the hard disk, video adapter,
keyboard, mouse and printer?
a. BIOS c. OS
b. Boot d. None of the Above

______12. Among the types of booting utility available today, which of the following is
stand alone?
a. Command Prompt c. CD/DVD boot
b. Rufus d. None of the Above

______13. The name of BIOS' non-volatile memory is


a. CMOS c. POST
b. BIOS d. None of the Above

______14. Which of the following is the purpose of bootstrap loader?


A. Dispart C. Locate
B. Trap d. None of the Above

______15. It makes a Rufus unique compared to other booting utility.


A. set up any software C. flash firmware to BIOS
B. Lesser Time d. None of the Above
______16. Among the options given, it manages the computer hardware resources in
addition to applications and data.
a. GUI c. USBFD
b. OS d. None of the Above

______17. It enables the user to carry out some specific set of tasks or function.
a. Application Software c. Operating Software
b. System Software d. None of the Above

______18. Which of the following is a crime involving in computer operation?


a. Cyber Crime c. Cybercrime
B. Cyber-Crime d. None of the Above

______19. It provides everything from new security patches, designed to keep hackers
from corrupting your files.
a. Computer Antivirus c. Driver Update
b. Device Driver d. None of the Above

______20. Which of the following is a program that lets the operating system
communicate with specific computer hardware?
a. Device Driver c. Driver update
b. Software Driver d. None of the Above
______21. Among the options given, this performs numerous additional tasks as part
of a single request and response, including verifying the identity of the requestor.
a. Desktop PC c. Server
b. Client d. None of the Above

______22. Which of the following materials is used in virtual machine to create a


memory disk space?
a. Desktop PC c. Server PC
b. USBFD d. None of the Above

______23. It allows for the management and distribution of printing functionality.


a. Mail Server c. Database Server
b. Printer Server d. None of the Above

______24. They are the virtual servers hosted on a third-party infrastructure on an


open network.
a. Computer Antivirus c. Driver Update
b. Device Driver d. None of the Above

______25. Which of the following is a program that lets the operating system
communicate with specific computer hardware?
a. Netware Server c. Cloud Server
b. Linux Server d. None of the Above

______26. An example of System Software is


a. Java c. Visual Basic (VB)
b. Assembly Language d. None of the Above

______27. Which of the following is an example of Application Software?


a. Translator Language c. Word Processor
b. Programming Language d. None of the Above
______28. The type of computer antivirus that steals sensitive information.
a. Trojans c. Worm
b. Spyware d. None of the Above

______29. Which type of computer antivirus that spreads unwanted email?


a. Spam c. Internet Mechanism
b. Adware d. None of the Above

______30. This type of computer antivirus that promises one thing but delivers
another.
a. Adware c. Worm
b. Trojans d. None of the Above
1.C
2.B
3.C
4.C
5.A
6.B
7.C
8.B
9.A
10.A
11.A
12.B
13.A
14.C
15.C
16.B
17.A
18.C
19.C
20.A
21.C
22.B
23.B
24.A
25.C
26.A
27.B
28.B
29.C
30.A

You might also like