0% found this document useful (0 votes)
25 views6 pages

CSC 1

The document consists of a series of multiple-choice questions covering various topics in computer science and information technology, including multimedia resources, networking, database management, and software usage. Each question presents four options, from which the correct answer must be selected. The questions assess knowledge on technical concepts, terminology, and functionalities related to computers and networks.

Uploaded by

keym1902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views6 pages

CSC 1

The document consists of a series of multiple-choice questions covering various topics in computer science and information technology, including multimedia resources, networking, database management, and software usage. Each question presents four options, from which the correct answer must be selected. The questions assess knowledge on technical concepts, terminology, and functionalities related to computers and networks.

Uploaded by

keym1902
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1.

A multimedia resource may combine several elements such as:


A. Video and text only
B. Text and graphics only
C. Text, sound, graphics, animation and video
D. Text and sound only
2. Video conference is best described as a communication link used to conduct meetings between people
A. In different location, which may be international
B. In the same location
C. In the same enterprise
D. In different locations, which must be in the same country
3. Which of the following names designates an integrated software package?
A. Internet explorer
B. Microsoft word 2003
C. Microsoft office 2003
D. Microsoft windows 2003
4. Which of the following is an input device
A. Modem
B. Scanner
C. Loud speaker
D. Printer
5. The acronym LAN stands for
A. Local area network
B. Large area network
C. Local area networker
D. Logical area network
6. Which of the following is not a network topology
A. Ring
B. Token ring
C. Star
D. Bus
7. A collection of data which is store in a logical form is known as?
A. A field
B. Information
C. A database
D. A table
8. As far as database is concern, the Acronym DBMS Stands for
A. Datum base management system
B. Datum base management sub-system
C. Determined Base management system
D. Database management system
9. A company has a single table in a computer(e.g spreadsheet) in which is stored every information about each
worker including the transactions he/she does in the company. This table is
A. A table database
B. A spreadsheet
C. A flat file database
D. A joint database
10. Which of the following statements corresponds to the second normal form for an entity-relationship model in a
relational database?
A. A relationship must have only one key and the attributes must have simple domains
B. A relationship must have a key, with simple domains for its attributes and all non-key attributes depend
entirely on the key
C. A relationship must have a key with static domains for its attributes which all depend on the key
D. A relationship must have only one key with all attributes dependent on the key
11. Which manual aims to tell you how to use a software
A. Technical manual
B. Documentation
C. User manual
D. Program
12. When is cache memory useful?
A. When the computer is connected to the internet
B. Only when the RAM is working
C. When information is transfer between hard disk and the processor
D. When a computer is booting
13. The number 23.25 translated into a normalized floating-point number, with a 10-bit mantissa and a 6-exponent.
A. 0110110000 000101
B. 0101110000 000001
C. 0101110100 000101
D. 0000010111 000100
14. The octal equivalent of the hexadecimal code F3A1 is:
A. 173101
B. 176541
C. 176451
D. 178661
15. The address bus of a certain computer has 8lines. What is the maximum number of addressable memory cells?
A. 265
B. 256
C. 252
D. 255
16. The decimal equivalent of the binary number 101001.1011 is:
A. 41.7875
B. 41.5875 41.875
C. 41.6875
D. 41.1875
17. In the memory hierarchy the fastest memory is
A. RAM
B. Cache
C. CPU register
D. Virtual memory
18. In a token ring network:
A. Each node has to ‘grap’ the token at a designated time and send or receive a message
B. Message can be passed round the ring in either direction
C. Message tokens can simultaneously be passed around the ring
D. The message is passed to the correct recipient by a central computer
19. Which of the following tag is used for inserting the largest heading in HTML
A. <h3>
B. <h1>
C. <h5>
D. <h6>
20. Which of the following tag is used to make the underlined text?
A. <i>
B. <ul>
C. <u>
D. <pre>
21. Which unit is responsible for converting the data received from the user into computer understandable format?
A. Memory unit
B. Arithmetic and Logic unit
C. Input unit
D. Output unit
22. Which of the following is not a function of the input unit
A. It reads instructions and data from the outside world
B. It convert data into computer acceptable format
C. It makes the data into user understandable format
D. It supplies the data and instructions to the computer for further processing
23. Which of the following is non-volatile storage
A. Backup
B. Secondary
C. Primary
D. Cache
24. What does MAR stand for?
A. Main address register
B. Memory access register
C. Main accessible register
D. Memory address register
25. What is the name of the software that allows a user to view web pages
A. Browser
B. Mail client
C. FTP client
D. Messenger
26. Network uses star topology if
A. Computers are arrange in a close loop
B. All computers attach to a central point
C. All computers attach to a single long cable
D. Computers attach to multiple hierarchical cables
27. Keys to represent relationship between tables is called
A. Primary key
B. Secondary key
C. Foreign key
D. Candidate key
28. Which of the following normalization places the table that all the fields are dependent on the primary key and
are independent of each other
A. 1NF
B. 2NF
C. 3NF
D. BCNF
29. The ability of application to run on different platform is called
A. Reusability
B. Portability
C. Reliability
D. Flexibility
30. The computer language use to most web pages is known as
A. WEB
B. WWW
C. HTTP
D. HTML
31. The word “attributes” in a database are properties of
A. A database
B. A field
C. A record
D. An entity
32. The ability for software to translate voice into text is known
A. Speech recording
B. Speech recognition
C. Speech translation
D. Speech digitalization
33. Which of the following scanners can be used to capture and convert hand-written text into editable text?
A. OMR
B. MICR
C. OC
D. Barcode reader
34. Which of the following has the same functions as RAM?
A. Flash memory
B. Read Only Memory
C. Cache memory
D. Virtual memory
35. Software that allows a team to have an electronic “face-to-face” meetings when members are geographically
dispersed is
A. E-mail software
B. Chat room software
C. E-messaging software
D. Videoconferencing software
36. Copyright laws
A. Prevents and punish people who duplicate open source software
B. Compensate authors for an intellectual art
C. Protect authors of their intellectual property
D. Defines principle in the field of authorship
37. The security measure that converts information to unreadable form is
A. Coding
B. Encryption
C. Bugging
D. Deciphering
38. The i7 laptops that is mostly used today by students is classified as ____ computers
A. 5th generation
B. 4th generation
C. 3rd generation
D. 2nd generation
39. An office door that is opened through eye scan is said to use
A. Automatic system
B. Biometric system
C. Artificial system
D. CY scan
40. The act of modifying data from a remote position without authorization is known as
A. Phishing
B. Hacking
C. Network logging
D. Scamming
41. Which of the following does not implies the presence of a virus in a computer?
A. Special software
B. The speed of the computer
C. The virus activities
D. File extension
42. Computer performance can be improved by:
A. Defragmentation
B. File deletion
C. Hard disk upgrade
D. ROM upgrade
43. The quality of images in the computer can be improved by
A. Using a larger monitor
B. Changing the graphic card
C. Increasing the brightness
D. Increasing the RAM chips
44. The network in which signals are made to move in one direction is the
A. Bus
B. Ring
C. Mesh
D. Round robin
45. The unit in the computer that performed binary operation is
A. Accumulation
B. Control unit
C. Arithmetic and logic unit
D. Input/output
46. Signals interference in data transmission is reduced by
A. Twisting of cable
B. Burying of cable on the ground
C. Using many ports
D. Using only coaxial cables
47. The amount of data that can flows in a network medium at a given time is defined by the
A. Switch
B. Server
C. Bandwidth
D. Cable
48. Instruction from the local storage get in the central processing unit through the
A. Operating system
B. Random access memory
C. Registers
D. Buffer
49. Which of the following text editor is suitable for programming?
A. Notepad
B. Firefox
C. MS Word
D. Pelles C
50. The organization of files in the local storage of a computer is carried out by the
A. Operating system
B. Central processing unit
C. File manager
D. Windows explorer

You might also like