Computer Set - 6
Computer Set - 6
1) Status bar
2) Taskbar
3) History list
4) Too bar
2. ___ is a set of computer programs that run or controls computer hardware and acts an
ans interface with application programs and users.
1) Object code
2) A complier
3) An O/S
4) The CPU
5. ____ are words that a programming language has set aside for its won use.
1) Control words
2) Reserved words
3) Reserved keys
4) Control structures
6. What are the two types of output devices?
1) Monitor and printer
2) Storage-disks (floppy,CD)
3) Keyboard and a mouse
4) Windows 2000, windows NT
8. The portion that shows all the choices you can make while working in a window is called
the
___
1) Options
2) Table
3) Menu bar
4) Item bar
9. What is output?
1) Processor takes form user
2) User gives to processor
3) Processor gets form user
4) Processor gives to user
10. What type of program controls the various computer parts and allows the user to interact
with the computer?
1) Utility software
2) O/s
3) Word processing software
4) Database program
11. Each cell in a Micro soft Office Excel document is referred to by its cell address, which is
the
1) Cell’s column label
2) Cell’s column label and worksheet tab name
3) Cell’s row label
4) Cell’s row and column labels.
12. The collection of links throughout the internet creates an inter connected network called
the
__
1) www
2) web
3) wide area web
4) all of the above
14. What is the place in the computer system where data and programs and temporarily
stored?
1) Paste
2) Open
3) Memory
4) Pocket
15. A key that will erase information form the computer’s memory and characters on the
screen.
1) Edit
2) Delete key
3) Dummy out
4) Trust key
16. The central processing unit contains which of the following as a computer?
1) Memory Regulation Unit
2) Flow Control Unit
3) Arithmetic Logic Unit
4) Instruction Manipulation Unit
19. A Web __ consists of one or more Web pages located on a Web server.
1) Hub
2) Site
3) Story
4) Template
20. A Sender must not be able to deny that he sent a specific message when he in fact did.
This
is an aspect of security called ____
1) Privacy
2) Authentication
3) Integrity
4) Non-repudiation
22. You are planning on using a single network that supports 208 users. Which IP address
class
would you choose to be the most efficient?
1) Class A
2) Class B
3) Class C
4) Class D
28. Cache and main memory will lose their contents when the power is off. The are __
1) Dynamic
2) Static
3) Volatile
4) Non-voltaic
29. The rectangular area of the screen the t displays a program, data, and/or information is a
___
1) Title bar
2) Button
3) Dialog box
4) Window
34. __ means that the dealt contained in a database is accurate and reliable.
1) Data redundancy
2) Data integrity
3) Data reliability
4) Data consistency
42. Which one of the following objects is passed to a JavaBeans one of its properties is set via
a
JSP action?
1) Servlet Request
2) http Servlet Request
3) servlet Response
4) http Serve let Response
47. Developing sets of instructions for the computer to follow and to do the task the same
way
as many times as needed is called.__
1) Listing
2) Sequencing
3) Programming
4) Directing
48. Programs designed specifically to address general purpose application and special
purpose
applications are called __
1) O/S
2) System software
3) Application software
4) Management information systems