0% found this document useful (0 votes)
42 views5 pages

CS101 Practice Questions 2025

The document contains a series of questions and statements related to computer science, covering topics such as abbreviations, types of software, hardware components, malware, and cybersecurity. It includes true/false questions, fill-in-the-blank prompts, and requests for explanations of concepts like operating systems and network topologies. Overall, it serves as a comprehensive assessment of knowledge in computer fundamentals and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views5 pages

CS101 Practice Questions 2025

The document contains a series of questions and statements related to computer science, covering topics such as abbreviations, types of software, hardware components, malware, and cybersecurity. It includes true/false questions, fill-in-the-blank prompts, and requests for explanations of concepts like operating systems and network topologies. Overall, it serves as a comprehensive assessment of knowledge in computer fundamentals and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Write the full meaning of the following abbreviations:


i. ROM
ii. NIC
iii. FTP
iv. SSD
2. ________ is a type of malicious software, or malware, that spreads between
computers and causes damage to data and software
3. _________ is an example of both input and output device.
4. A speaker and a printer are examples peripheral devices . TRUE/FALSE
5. ___________ is primarily responsible for converting input (data) into meaningful
output (information).
6. A computer program that functions as an intermediary between a computer user and
the computer hardware is called_________
7. ____________is temporary storage used to hold data that is used for arithmetic and
logical operations and storing its results.
8. Plotter, Biometric sensor, light pen and a trackball are examples of input devices.
TRUE/FALSE
9. Any physical components of a computer system that we can see and touch
is_________
10. _____________are used for solving complex application such as Global Weather
Forecasting.
11. The invention of microprocessor (also called as single chip CPU) gave birth to the
much cheaper microcomputers. TRUE/FALSE
12. An operating system is an example of system software. TRUE/FALSE

13. Software programs developed for performing particular tasks to related managing
computer resources is called_______
14. Which application software can you use to create, edit, and print documents?

15. A pixel is the smallest resolvable part of a picture. TRUE/FALSE

16. The arithmetic and logic unit is the part of the CPU responsible for mathematical
function only. TRUE/FALSE
17. UNIX and MSDOS are examples of________
18. _________describes a self-replicating malware that spreads by duplicating itself in
order to infect other devices without user interaction
19. __________ is a malicious program, appearing to be legitimate, is commonly used to
target banking and payment systems to access confidential information
20. In MS Excel, the Greater Than sign (>) exemplifies a _____ operator.
21. ________is the default file type(extension) for presentation created using MS
PowerPoint 2007 or newer versions
22. In MS PowerPoint, the key used to run Slide Show from the beginning is ______

23. The intersection between a row and a column in spreadsheets is known as a____

24. What is the purpose of the Paste Special option ‘Keep Text Only’ in
MS Word?
25. In MS Word, the word document orientation is set __________ by default.
26. _______is the shortcut combination key to open a new blank page in MS Word.

27. Ctrl + E is a shortcut combination key used to ‘align center’ the selected text in MS
Word
28. In MS Word, if you want to display the meaning of a word in your text at the bottom
of the page, the________ feature will help you
29. Write the full meaning of the following abbreviations:
i. WLAN
ii. VPN
iii. DNS [3]

30. Give any two examples of search engines


31. A worm, spyware and a rootkit are all types of malware. TRUE/FALSE

32. A phishing attack refers to an attempt to steal sensitive information, or other


important data to utilize or sell the stolen information. TRUE/FALSE
33. A hard disk and flash memory are example(s) of non-volatile memory? TRUE/FALSE

34. In a Word document, what is the feature that breaks line between long words and
move to the next line when possible?
35. Collecting data and converting it into another form is called _______
36. What is the name given to the computer's short-term memory that is lost when the
computer is turned off?
37. Redo function in MS Word reverses the previously performed action.
TRUE/FALSE

38. _________ and __________ are examples of text alignment in MS Word.


39. ________ displays the name of the document that you are currently using.
40. ‘Ctrl + A’ is a shortcut for ________
41. Two types of page orientation are _____________ and ____________
42. ________________ is an example of a mobile phone operating system
43. The part of a CPU that controls and manages the operations of a computer is called
the ___________.
44. _____________ Unit receives processed data from a computer and then translates it
into another form.
45. Which output devices is suitable for displays data to a large crowd?
46. _______ and ________ are both types of computer storage.
47. The process of storing a copy of data in a separate storage medium is called _____
48. A _________ is used to temporarily store items copied or cut from a document or
computer.
49. ________ and ________ are software applications which can be used to facilitate e-
learning
50. ________ write, modify, and test code and scripts that allow computer software and
applications to function properly.
51. Personal Area Network (PAN) may include a connection between a laptop and a
smartphone using a Bluetooth. TRUE/FALSE
52. A ____________ is an example of a microcomputer.
53. Computers are classified according to their sizes and capabilities. _______ is the
most powerful followed by __________ computer.
54. In a _________________ topology devices are connected in linear fashion along a
single central cable.
55. An expression used to perform calculations in MS Excel is called __________
56. ___________ supplies networking capability to a group of computers in close
proximity to each other such as in an office building, a school or a room. It is useful
for sharing resources like files, printers, games or other applications.
57. Examples of slides layout in MS PowerPoint include _________ and ________
58. The process of terminating all of the computer programs and cutting off electricity
is called _________
59. _____________ is the process of preventing and detecting unauthorized users from
accessing any part of the computer system.
60. HTML abbreviation stands for ____________
61. _____ network is a dedicated website or software application which enables users to
communicate with each other by posting, commenting and sending message.
62. Characters that appears slightly above the normal print line are called____
63. A ______ is the name of a file created using a word processing package.
64. ________ and _______ are examples of spreadsheet packages.
65. _______ is the computerized method of writing, editing, saving and printing texts.
66. A spreadsheet has the ability to do automatic recalculations when values change.
TRUE/FALSE
67. MAN stands for __________________
68. Differentiate between data and information.
69. Explain any three differences between RAM and ROM. Use a table
70. State any three functions of an Operating System.
71. State and explain any two advantages and two disadvantages of E-banking to a newly
established business.
72. Describe the following cyber crimes
 Identity theft
 Pharming
 Cyber bullying
73. Give a real-world example of a company doing something that violates their users’
privacy. Additionally, discuss one way in which a company might protect a user's
privacy.
74. Describe a type of attack a hacker might perform to steal your data. In your answer,
you should include:
i) The name of the attack
ii) A short description of the attack
iii) Why this type of attack could be bad for a user

75.Give three online security measures individuals can take to protect their personal
information while using the internet.
75. Explain the following network topologies:
i. Start topology.
ii. Mesh topology.

You might also like