0% found this document useful (0 votes)
13 views6 pages

Comps 1 p1

Comps

Uploaded by

Elishama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views6 pages

Comps 1 p1

Comps

Uploaded by

Elishama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

of 1. Which of the following is an input device?

A) Monitor
B) Printer
C) Mouse
D) Speakers

2. Which part is a component of a CPU?


A) Processor
B) Operating system
C) Control Unit
D) Hard disk
3. In which field is computer science applied for crop monitoring?
A) Banking
B) Education
C) Agriculture
D) Social networks

4. What is the binary equivalent of


the decimal number 10?
A) 1010
B) 1000
C) 1100
D) 1110

5. Which of the following is NOT a type of network?


A) LAN
B) WAN
C) MAN
D) SAN
6. What does the acronym WWW stand for?
A) World Wide Web
B) Web World Wide
C) World Web Wide
D) Wide World Web

7. Which network topology connects all devices to a central hub?


A) Bus
B) Ring
C) Star
D) Mesh

8. What is the term for unauthorized copying and distribution of software?


A) Hacking
B) Phishing
C) Piracy
D) Spamming

9. Which of the following is NOT a stage in the Systems Development Life Cycle?
A) Problem identification
B) Feasibility study
C) System analysis
D) System optimization

10. What is the purpose of a copyright?


A) To prevent plagiarism
B) To protect intellectual property
C)To ensure system security
D) To~lock unsafe websites

11. Which of the following is an example of a storage device?


A) Keyboard
B) Monitor
C) Hard disk drive
D) Microphone
12. What is the main function of an output device?
A) To process data
B) To store data
C) To input data
D) To display or present information
13. Which of the following is NOT an Internet service?
A) Email
B) E-commerce
C) E-learning
D) E-printing
14. Which one is not a function of a processor?
A)to excute instructions
B) to control sequence of instructions
C) to do logical operations
D) to manage storage

15. Which of the following is an example of operating system program?


A) Microsoft Excel
B) Adobe Photoshop
C) Windows
D) Google Chrome

16. What does URL stand for?


A) Universal Resource Locator
B) Uniform Resource Locator
C) United Resource Locator
D) Unified Resource Locator
17. Which of the following is NOT a characteristic of safe websites?
A) Secure connection (https)
B) Privacy policy
C) Pop-up advertisements
D)Contact information
18. What is the smallest unit of data in computing?
A) Byte
B) Bit
C) Nibble
D) K ilobyt e
19. Which network topology connects each device to every other
device in a circle?
A) Bus
B) Star
C) Ring
D) Mesh
20. What is the purpose of an antivirus program?
A) To speed up the computer
B) To protect against malicious software
C) To improve Internet
D) To connect computer to internet

21. Which of the following is an example of plagiarism?


A) Quoting a source and citing it properly
B) Copying text from a website without attribution
C) Paraphrasing ideas and citing the original source
D) Writing original content based on research
22. What does CPU stand for?
A) Central Processing Unit
B) Computer Processing Unit
C) Central Program Unit
D) Control Processing Unit
23. Which of the following is NOT a data collection technique in system
analysis?
A) Questionnaire
B) Interview
C) Observation
D) Programming
24. What is the purpose of a firewall in computer security?
A) To prevent physical theft of the computer
B) To filter network traffic
C) To increase processing speed
D) To compress data for storage

25. Which of the following is an example of web browser?


A) Google Chrome
B) Oracle Database
C) Norton Antivirus
D) Windows Media Player
26. What is the function of RAM in a computer?
A) Long-term data storage
B) Processing calculations
C) Temporary data storage while the computer is running
D) Displaying graphics on the screen
27. Which of the following is NOT a type of a level of system testing?
A) user acceptance testing
B) blackbox testing
C) integration testing
D) unit testing
28. What does the term "cyber wellness" refer to?
A) Physical health of computer users
B) Maintenance of computer hardware
C) Safe and responsible use of digital technologies
D) Speed of internet connections

29. Which of the following is an example of an input device used in agriculture?


A) Soil moisture sensor
B) Irrigation system
C) Drone camera
D) GPS tracker
30. What is the purpose of a UPS (Uninterruptible Power Supply) in computing?
A) To increase internet speed
B) To provide backup power during outages
C) To filter incoming electricity
D) To cool down the computer system
31. Which of the following is NOT a valid attribute of an entrepreneur?
A) corrupt
B) honest
C) integrity
D) innovative
32. What does the term "e-commerce" refer to?
A) Electronic mail communication
B) Online buying and selling of goods and services
C) Educational content delivered electronically
D) Entertainment provided through electronic means

33. Which of the following is an example of a social network?


A) Amazon
B) Facebook
C) Microsoft Word
D) Google Search
34. What is the main purpose of an operating system?
A) To create documents and spreadsheets
B) To manage hardware and software resources
C) To protect against viruses
D) To browse the Internet
35, Which of the following is NOT a common network topology?
A) Star
B) Ring
C) Triangle
D) Bus

36. What does stand for in computing?


A) General User Interface
B) Graphical User Interface
C) Generated User Interface
D) Global User Interface

37. Which of the following is an example of a processing device?


A) Printer
B) Scanner
C) Graphics Processing Unit (GPU)
D) External hard drive

38. What is the primary function of a web browser?


A) To create web pages
B) To send emails
C) To view web pages
D) To edit images
39. Which of the following is NOT acharacteristic of ethical behavior in computing?
A) Respecting others' privacy
B) Sharing copyrighted material without permission
C) Citing sources in research software

39. Which of the following is NOT a characteristic of ethical behavior in


computing?
A) Respecting others' privacy
B) Sharing copyrighted material without permission
C) Citing sources in research
D) Using licensed software legally
40. What is the purpose of a cooling fan in a computer?
A) To make the computer run faster
B) To prevent overheating of components
C) To reduce electricity consumption
D) To improve Wi-Fi signal strength

You might also like