0% found this document useful (0 votes)
12 views

Computer Set - 6

The document consists of a series of multiple-choice questions covering various topics related to computer science and information technology. Topics include web history, operating systems, passwords, output devices, programming languages, databases, and computer memory. Each question presents four options, requiring the reader to select the correct answer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Computer Set - 6

The document consists of a series of multiple-choice questions covering various topics related to computer science and information technology. Topics include web history, operating systems, passwords, output devices, programming languages, databases, and computer memory. Each question presents four options, requiring the reader to select the correct answer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

1. The __ shows all the Web sites and pages that you have visited over a period of time.

1) Status bar
2) Taskbar
3) History list
4) Too bar

2. ___ is a set of computer programs that run or controls computer hardware and acts an
ans interface with application programs and users.
1) Object code
2) A complier
3) An O/S
4) The CPU

3. Passwords enable users to __


1) Get into the system quickly
2) Make efficient user of time
3) Retain confidentiality of files
4) Simplify life structures

4. The make a user assigns to a document is called a(n) ___


1) Filename
2) Program
3) Record
4) Data

5. ____ are words that a programming language has set aside for its won use.
1) Control words
2) Reserved words
3) Reserved keys
4) Control structures
6. What are the two types of output devices?
1) Monitor and printer
2) Storage-disks (floppy,CD)
3) Keyboard and a mouse
4) Windows 2000, windows NT

7. Computations and logical operations are performed by the


1) RAM
2) ALU
3) Register
4) Control Unit

8. The portion that shows all the choices you can make while working in a window is called
the
___
1) Options
2) Table
3) Menu bar
4) Item bar

9. What is output?
1) Processor takes form user
2) User gives to processor
3) Processor gets form user
4) Processor gives to user

10. What type of program controls the various computer parts and allows the user to interact
with the computer?
1) Utility software
2) O/s
3) Word processing software
4) Database program

11. Each cell in a Micro soft Office Excel document is referred to by its cell address, which is
the
1) Cell’s column label
2) Cell’s column label and worksheet tab name
3) Cell’s row label
4) Cell’s row and column labels.

12. The collection of links throughout the internet creates an inter connected network called
the
__
1) www
2) web
3) wide area web
4) all of the above

13. CD-ROM stands for ____


1) Central processing unit
2) CD-remote open mouse
3) CD- resize or minimize
4) CD- read only memory

14. What is the place in the computer system where data and programs and temporarily
stored?
1) Paste
2) Open
3) Memory
4) Pocket

15. A key that will erase information form the computer’s memory and characters on the
screen.
1) Edit
2) Delete key
3) Dummy out
4) Trust key

16. The central processing unit contains which of the following as a computer?
1) Memory Regulation Unit
2) Flow Control Unit
3) Arithmetic Logic Unit
4) Instruction Manipulation Unit

17. The process of writing out computer instructions is known as


1) Assembling
2) Compiling
3) Executing
4) Coding

18. An ad hoc query is a __


1) Pre-panned question
2) Pre-scheduled question
3) Spur-of-the moment question
4) Question that will not return any results

19. A Web __ consists of one or more Web pages located on a Web server.
1) Hub
2) Site
3) Story
4) Template

20. A Sender must not be able to deny that he sent a specific message when he in fact did.
This
is an aspect of security called ____
1) Privacy
2) Authentication
3) Integrity
4) Non-repudiation

21. __ is an access method in which collisions are entirely avoided.


1) CSMA
2) CSMA/CD
3) CSMA/CA
4) All of the above

22. You are planning on using a single network that supports 208 users. Which IP address
class
would you choose to be the most efficient?
1) Class A
2) Class B
3) Class C
4) Class D

23. The main directory of a disk is called the _ directory.


1) Root
2) Sub
3) Folder
4) Network
24. You can user the tab key to ____
1) Move a cursor across the screen
2) Indent the paragraph
3) Move the cursor done the screen
4) Only 1) and 2)

25. A string of eight 0s and 1s is called __ the document.


1) Megabyte
2) Editing
3) Modifying
4) Adjusting

26. Changing an existing document is called _ the document.


1) Creating
2) Editing
3) Modifying
4) Adjusting

27. Microsoft Office is


1) Shareware
2) Public-domain software
3) Open-source software
4) An application suite

28. Cache and main memory will lose their contents when the power is off. The are __
1) Dynamic
2) Static
3) Volatile
4) Non-voltaic
29. The rectangular area of the screen the t displays a program, data, and/or information is a
___
1) Title bar
2) Button
3) Dialog box
4) Window

31. _ lets you leave a screen or program


1) Boot
2) Programs
3) Exit
4) Text

32. The physical arrangement of elements on a page is referred to as a document’s __


1) Features
2) Format
3) Pagination
4) Grid

33. Which of the following describes a relational database?


1) It provides a relationship between integers
2) It consists of separate tables of related data
3) It retrieves data related to its queries
4) It provides a relationship between floats

34. __ means that the dealt contained in a database is accurate and reliable.
1) Data redundancy
2) Data integrity
3) Data reliability
4) Data consistency

35. ___ is the result produced by a computer.


1) Data
2) Memory
3) Output
4) Input

36. __ is an invalid type of database key.


1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key

37. Which of the following is a key function of firewall?


1) Monitoring
2) Deleting
3) Copying
4) Moving

38. A(n) __ converts and executes one statement at a time.


1) Complier
2) Interpreter
3) Converter
4) Instructions

39. Documents converted to __ can be published to the web.


1) A doc file
2) http
3) machine language
4) HTML

40. You cannot link Excel worksheet data to a word document __


1) With the right drag method
2) With the hyperlink
3) With the copy and paste special commands
4) With the copy paste buttons on the standard commands

41. When speaking of computer input and output, input refers to


1) Any data processing that occurs from new data input into computer
2) Retrieval of data or information that has been entered into the computer
3) Data or information that has been entered into the computer
4) The transmission of data that has been entered into the computer

42. Which one of the following objects is passed to a JavaBeans one of its properties is set via
a
JSP action?
1) Servlet Request
2) http Servlet Request
3) servlet Response
4) http Serve let Response

43. The standard protocol of the Internet is ___


1) TCP/IP
2) Java
3) HTML
4) Flash

44. Memory unit is one part of __


1) Control unit
2) Central Processing Unit
3) Input devices
4) Output devices

45.____ is when the computer is turned on and the O/S is loading.


1) Booting
2) Flashing
3) Tracking
4) Taping

47. Developing sets of instructions for the computer to follow and to do the task the same
way
as many times as needed is called.__
1) Listing
2) Sequencing
3) Programming
4) Directing

48. Programs designed specifically to address general purpose application and special
purpose
applications are called __
1) O/S
2) System software
3) Application software
4) Management information systems

49. A __ is an electronic device that process data, converting it into information.


1) Processor
2) Computer
3) Case
4) Stylus

50. _____ is the process of finding errors in software code.


1) Compiling
2) Testing
3) Running
4) Debugging

You might also like