Computer Quiz Ba 5-10
Computer Quiz Ba 5-10
Computer Quiz
1. IP address contains ........... bits.
(1) 8 bits
(2)16 bits
(3) 32 bits
(4) 40 bits
(5) None of these
7. ____________ are viruses that are triggered by the passage of time or on a certain date.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these
9. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a system’s information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these
10. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database,
(5) None of these
12. The vast network of computers that connects millions of people all over the world is called—
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
14. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base
17. System software is the set of programs that enables your computer’s hardware devices
and______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
18. ________ are specially designed computer chips which reside inside other devices, such as
your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
20. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
ANSWERS
1. (3)
2. (2)
3. (2)
4. (4)
5. (3)
6. (1)
7. (3)
8. (1)
9. (4)
10. (3)
11. (2)
12. (4)
13. (3)
14. (3)
15. (1)
16. (3)
17. (4)
18. (2)
19. (3)
20. (4)
5. The term _______ designates equipment that might be added to a computer system to enhance
its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
7. What is MP3?
1) A mouse
2) A printer
3) A sound format
4) A scanner
5) None of these
9. _______ is the act of copying or downloading a program from a network and making multiple
copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
14. When writing a document, you can use the _______ feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word.
1) dictionary
2) word finder
3) encyclopedia
4) thesaurus
5) None of these
15. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
16. A disk’s content that is recorded at the time of manufacture and that cannot be changed or
erased by the user is
1) read-only
2) memory-only
3) run-only
4) write-only
5) None of these
19. When installing _______, the user must copy and usually decompress program files from a
CD-ROM or other medium to the hard disk.
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
ANSWERS
ANSWERS
1. c
2. d
3. 3
4. 2
5. 4
6. 4
7. 3
8. 1
9. 3
10. 4
11. b
12. 4
13. 3
14. 4
15. 2
16. 1
17. b
18. 1
19. 4
20. 4
5. ________ is when the more power-hungry components, such as the monitor and
the hard drive, are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
5) None of these
7. The ________ key and the ________ key can be used in combination with other keys
to perform shortcuts and special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
5) None of these
8. The most common input devices are the ________ and the ________.
1) microphone, printer
2) scanner, monitor
3) digital camera, speakers
4) keyboard, mouse
5) None of these
9. To save an existing file with a new name or to a new location, you should use
the ________ command.
1) Save
2) Save and Replace
3) Save As
4) New File
5) None of these
10. A(n) ________ is a combination of hardware and software that facilitates the
sharing of information between computing devices.
1) network
2) peripheral
3) expansion board
4) digital device
5) None of these
12. Computers gather data, which means that they allow users to ________ data.
1) present
2) input
3) output
4) store
5) None of these
13. Which of the following terms is just the connection of networks that can be
joined together ?
1) virtual private network
2) internet
3) intranet
4) extranet
5) None of these
14. ________ is a form of permanent memory that holds all the instructions the
computer needs to start up and does not get erased when the power is turned off.
1) The Network Interface Card (NIC)
2) The CPU
3) RAM
4) ROM
5) None of these
15. Servers are computers that provide resources to other computers connected
to a ________
1) network
2) mainframe
3) supercomputer
4) client
5) None of these
1. 3
2. 2
3. 3
4. 1
5. 3
6. 2
7. 1
8. 4
9. 3
10. 1
11. 3
12. 2
13. 2
14. 4
15. 1
3. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K
5. The terminal device that functions as a cash register, computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal
e) None of the above
11. Bluetooth is a type of radio wave information transmission system that is good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles
13. Acredit card-sized expansion board that is inserted into portable computers that connects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem
15. A modem that doesn't need to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL
16. Aspecial high-speed line used by large corporations to support digital communications is known as:
a) satellite/air connection service lines
b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
e) None of the above
17. An affordable technology that uses existing telephone lines to provide high-speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU
18. The capacity of a communication channel is measured in ___
a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data
20. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0
1) b;
2) d;
3) b;
4) b;
5) d;
6) c;
7) c;
8) c;
9) c;
10) b
11) a;
12) a;
13) c;
14) b;
15) c;
16) d;
17) d;
18) a;
19) a;
20) d;
2. EEPROM permits?
(1) Read Permission only
(2) read and byte erase permission
(3) Read, byte erase and byte write operations
(4) Read, byte erase, byte write and chip erase operations
(5) None of these
3. The process of identifying specific rows and columns so that so that certain columns and rows are
always visible on the screen is called:
(1) Freezing
(2) locking
(3) Selecting
(4) fixing
(5) none
4. Where can you find the horizontal split bar on MS Word screen?
(1) On the left of horizontal scroll bar
(2) On the right of horizontal scroll bar
(3) On the top of vertical scroll bar
(4) On the bottom of vertical scroll bar
(5) None of these
5. A microprocessor is generally?
(1) Single chip SSI
(2) Single chip MSI
(3) Single Chip LSI
(4) Both 1and 2
(5) None of these
6. What is a portion of a document in which you set certain page formatting options?
(1) Page
(2) Document
(3) Section
(4) Page Setup
(5) None
9. _____ is when the more power – hungry components such as the monitor and the hard drive are put to
idle.
(1) Hibernation
(2) Power down
(3) Standby mode
(4) The Shut down procedure
(5) None of these
10. A human being who writes programs, operate and maintain computer is known as-
(1) live ware
(2) freeware
(3) spyware
(4) shareware
(5) None of these
18. _____ is a procedure that requires users to enter an identification code and a matching password
(1) paging
(2) logging on
(3) time sharing
(4) Multitasking
(5) None of these
20. Computer programs ‘ are written in a high-level programming language; however, the human-
readable version of a program is called..............
(1) cache
(2) instruction set
(3) source code
(4) word size
(5) None of these
25. A series of instructions that tells a computer what to do and how to do it is called a-
(1) Program
(2) command
(3) user response
(4) processor
(5) None of these