0% found this document useful (0 votes)
3 views38 pages

Introduction to Computer

The document contains a series of multiple-choice questions related to computer science and information technology, covering topics such as computer generations, programming languages, network protocols, and security. It includes questions about hardware components, software types, internet usage, and communication systems. The content appears to be part of an introductory course on computers at the University of Calabar.

Uploaded by

nwatarock
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views38 pages

Introduction to Computer

The document contains a series of multiple-choice questions related to computer science and information technology, covering topics such as computer generations, programming languages, network protocols, and security. It includes questions about hardware components, software types, internet usage, and communication systems. The content appears to be part of an introductory course on computers at the University of Calabar.

Uploaded by

nwatarock
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

CENTRE FOR GENERAL STUDIES AND

COMMUNICATION SKILLS
UNIVERSITY OF CALABAR, CALABAR

GSS131
(INTRODUCTION TO COMPUTER)

~ 23 ~
1. Fourth Generation Computers used
(A) Supercomputer
(B) Microprocessors
(C) Minicomputers
(D) Uniprocessors
2. Which of the following is not example of a search engine for
browsing?
(A) Google
(B) Yahoo
(C) ASK
(D) E-mail
3. The TCP/IP was developed by
(A) Nigerian Defense Academy
(B) US Department of Defense (DoD)
(C) Ghana Military Defense
(D) None of the above.
4. Which of the following is not a level of programming language?
(A) Low Level Language (LLL)
(B) Machine Level Language (MLL)
(C) High Level Language (HLL)
(D) System Level Language (SLL)
5. _________ is the transfer of data/information from one point to
the other using computer and other computing devices.
(A) Data bus
(B) Data communication
(C) Data analysis
(D) Data mining

6. What is the full meaning of ROM-BIOS?


(A) Read Only Memory-Basic Interface/ Output System
(B) Read Only Memory-Basic Input/Output System
(C) All of the above
(D) None of the above

~ 24 ~
7. ______________ refer to the set of rules and standard
procedures used by on the internet to communicate
(A) Internet data bundle
(B) Internet protocol
(C) Internet topology
(D) All of the above
8. One of the following is not a characteristic of computers
(A) High speed
(B) Accuracy
(C) Reliability
(D) Redundancy
9. A computer system is broadly categorized
into_________________ and _________________?
(A) Hardware and Software
(B) File and Records
(C) Diskette and flash drives
(D) None of the above
10. Application programs that are usually developed either in-house
(by an organization‟s programmers) or by consultants hired by
the organization is known as_____________?
(A) Application documentation
(B) Tailor-made (Customized) Software
(C) Application packages or CoTs
(D) All of the above
11. The communication system in which it possible to communicate in
both direction is known as _________________
(A) Simplex
(B) Half duplex
(C) Full duplex
(D) None of the above
12. The reliability of computers makes them to be deployed in
sensitive areas like
(A) Intensive-Care Units of hospitals
(B) Watching sensitive videos
(C) Connecting to your TV set
(D) None of the options
~ 25 ~
13. Another name for a HUB is
(A) Bridge
(B) Router
(C) Concentrator
(D) Modem
14. The early internet was used only by the following:
(A) Scientists, Liberians, computer experts and engineers
(B) Mathematicians, military, computer scientist, artist
(C) All of the above
(D) None of the above
15. In IT Security, what is the full meaning of C.I.A.?
(A) Cyber Investigative Attack
(B) Cyber Intelligence Attack
(C) Confidential Incident Attack
(D) Confidentiality Integrity Availability
16. Network topologies are subdivided into two categories based on
the capabilities of the network‟s hardware and the characteristics
of the various modes of data transmission. These two categories
are ___________ and ____________
(A) Wired and Wireless
(B) Physical and Logical
(C) Physical and Wired
(D) Logical and Wireless
17. Which of the following is not example of a utility program?
(A) Sorting
(B) Editing
(C) File copying
(D) Compiler

18. A computer system can display its output in ___________ and


_____________ forms.
(A) Input and Output
(B) Softcopy and Hardcopy
(C) File and record
(D) None of the above
~ 26 ~
19. In the Banking sector computers can be used in
(A) Cheque processing
(B) Official video games
(C) All of the options
(D) None of the options
20. What is the full meaning of HTTP?
(A) Hypertext transmission Protocol
(B) Hypertext Transfer Protocol
(C) Hypertext Translation Protocol
(D) Hypertext Timeline Protocol
21. Why is the combination of firewalls and Intrusion Detection
System (IDS) recommended to enhance security in a network?
(A) Because of spammers and hackers attack
(B) Because of virus attack
(C) Because of insiders and outsiders attack
(D) Because of external attacker
22. A _____ is a network device that regenerates signals so that they
can be transmitted on additional cable segments to extend the
cable length or to accommodate more computers on the network
segment.
(A) Hub
(B) Modem
(C) Bridge
(D) Repeater
23. A ______________ is a program that converts program
statements written in one programming language, to statements
in another language.
(A) Utility program
(B) Translator
(C) Processor
(D) All of the above
24. Computer devices that transform information from machine
readable form to human readable form is known
as____________________?

~ 27 ~
(A) Input devices
(B) Output devices
(C) Storage devices
(D) None of the above
25. A computer is said to be a programmable device because
(A) It is an electronic device
(B) It can produce output
(C) It can be assigned instructions
(D) It can receive some inputs
26. Which of the following is not an advantage of computers in
Nigeria?
(A) High speed
(B) Accuracy
(C) Dependence on electric power
(D) Storage and retrieval
27. A sensitized screen that enables a person to use a simple device
such as a pencil, or even a finger to point to Menu choices
displayed on the screen of the computer is known as _______?
(A) Light pen
(B) Touch screen
(C) Joystick
(D) Touch pad
28. Programs that are designed to solve the problems of users is
known as_____________?
(A) Logic
(B) Circuit
(C) Application software
(D) None of the above
29. _________ communication system involves one sender and
multiple recipient
(A) Point-to-point
(B) Point-to-multipoint
(C) All of the above
(D) None of the above
~ 28 ~
30. The speed at which your computer receives information is
known as_______________
(A) The standard processing rate
(B) The standard download speed
(C) The standard data speed
(D) None of the above
31. Which of the following is not a reason why firewall sometimes fail to
protect the network from external intrusion attack.
(A) Because it can only protect against known attacks
(B) Because configuring firewalls properly is very easy
(C) Because firewalls may contain software bugs or vulnerabilities
(D) Because hacks in HTTP can sip through
32. Which of the following is not a virus
(A) Worm
(B) Logic Bomb
(C) Trojan Horse
(D) Win-Zip
33. The internet host to host mail transport protocol that operates
over TCP protocol port is called?
(A) SMTP – Simple Mail Transfer Protocol
(B) FTP – File Transfer Protocol
(C) POP – Post Office Protocol
(D) Telnet Protocol
34. ________ are hardware devices used to achieve network
connectivity and communication.
(A) Network Devices
(B) Peripherals
(C) Cables
(D) Wires
35. Which of the following is not example of a translator?
(A) Debugging programs
(B) Assembler
(C) Compiler
(D) Interpreter

~ 29 ~
36. A step-by-step set of instructions directing the computer to
perform a task is known as _____________?
(A) Software
(B) Program
(C) Algorithm
(D) Flowchart
37. The computer memory system is categorized into ____________
and _____________?
(A) Primary and Secondary memory
(B) Input and Output storage
(C) Files and record storage
(D) None of the above
38. For a computer processing operation to be useful
(A) It must be produced fast
(B) Output must be in human-understandable form
(C) Output must be large
(D) Output should be electronic
39. An intruder is someone or an agent who is attempting to break
into or misused the system or computer resources. The two
existing categories of intruders are:
(A) Spammers and Hackers
(B) Insiders and Spies
(C) Insiders and Hackers
(D) Insiders and Outsider
40. Some recent use of the internet includes:
(A) Remote help, freedom of speech, registration and
reservations
(B) Search tools, correspondence, new business opportunities
(C) All of the above
(D) None of the above
41. In a _____ topology, the signals travel around the loop in one
direction and pass through each computer, which can act as a
repeater to boost the signal and send it onto the next computer.
(A) Bus
~ 30 ~
(B) Mesh
(C) Ring
(D) Star
42. ________________ Virus are often transmitted by floppy disk
left in the disk drive.
(A) Boot sector
(B) Trojan horse
(C) Script
(D) Logic bomb
43. World Wide Web (WWW) is a network of electronic documents
called __________ that are accessible through the Internet.
(A) Web links
(B) Web Pages
(C) Web sites
(D) Web browser

44. ___________ is the connection of two or more computers for the


purpose of sharing both hardware and software scarce resources
(A) Network
(B) Program
(C) Data
(D) Algorithm
45. An operating system that allows many users to take advantage of
various resources of the computer simultaneously is known as
_____________________?
(A) Single user, multitasking Operating System
(B) Real-time Operating System
(C) Single user, single tasking Operating System
(D) Multi-users Operating System

46. A communication system in which the caller and the called can
communicate simultaneously is known as__________________
(A) Full duplex
(B) Simplex
(C) Half duplex
(D) All of the above
~ 31 ~
47. _____________ are attached to computers primarily to provide
alphanumeric outputs to users
(A) Keyboard
(B) Printers
(C) Scanners
(D) Joystick
48. The Computer used most in offices are
(A) Mainframe computer
(B) Microcomputer
(C) Supercomputer
(D) Minicomputer
49. Which of the following is not a hardware component of a
computer system?
(A) Central Processing Unit (CPU)
(B) Main Memory
(C) Input/Output devices
(D) System files
50. Which of the following is not an example of application
software?
(A) Programs that make up payroll
(B) Programs that play games
(C) Programs that design electronic components
(D) Operating System
51. The communication system which involves two end-point is
known as ___________?
(A) Point-to-multipoint communication
(B) Point-to-point communication
(C) All of the above
(D) None of the above
52. Two most popular component of the internet are:
(A) Internet connectivity/Browsers
(B) Internet Explorer/Facebook
(C) Facebook/e-mail
(D) World Wide Web/E-mail
~ 32 ~
53. The following are important security functions except
(A) Logging/documentation
(B) Intrusion Detection System/firewalls
(C) Backup/information system design
(D) Information classification/incident handling
54. Boot sector virus infects
(A) System files
(B) Master Boot Records
(C) Application Software
(D) Document files
55. Computing devices of the fifth generation are based on
(A) Human Intelligence
(B) Artificial Intelligence
(C) Modern Intelligence
(D) Programming
56. The mouse is used in conjunction with a
____________________?
(A) Printer
(B) Floppy disk
(C) Visual Display Unit/Monitor
(D) Keyboard
57. The ENIAC stands for
(A) Electronic Numerical Integrator And Counting
(B) Electronic Numerical Integrator And Computer
(C) Electrical Numerical Integrator And Computer
(D) Electronic Numerical Interphase And Computer
58. Which of the following is not a programming language
(A) BASIC
(B) FORTRAN
(C) Python
(D) Processor

~ 33 ~
59. The two categories of Application software are _____________
and ________________
(A) Compiler and Interpreter
(B) Tailor-Made-Software and Commercial-off-Shelf (CoTS)
(C) Flowchart and algorithm
(D) Preprocessor and processor

60. Which of the following is the main power of a computer


network?
(A) Speed
(B) Ability to share information efficiently
(C) Security
(D) None of the above
61. The most suitable example of the internet is:
(A) Local Area Network (LAN)
(B) Wide Area Network (WAN)
(C) Personal Area Network (PAN)
(D) Metropolitan Area Network (MAN)
62. Why should computers connected to the internet without
protection posed a big threat to the owners?
(A) Because of hackers
(B) Because it does not have Antivirus software installed
(C) Because it might be infected with malicious programs
(D) Because the internet is not protected
63. ___________ of MIT was the first to propose a global network
of computers in 1962.
(A) Leonard Kleinrock
(B) Lawrence Robert
(C) J. C. R. Licklider
(D) Edward brown
64. The versatility characteristic of computers is that
(A) A computer plays a single role
(B) A computer can be used for multiple purposes
(C) A computer can be used for programming
(D) None of the options

~ 34 ~
65. The Analytical Engine had the following components
(A) Monitor, calculating unit and valves
(B) Barrel, store and monitor
(C) Store, pump and barrel
(D) Store, calculation unit, the barrel

66. A close internet within an organization is called ____________


(A) Internet
(B) Intranet
(C) All of the above
(D) None of the above

67. ______________ is a type of pointing device used for data input


(A) Keyboard
(B) Mouse
(C) All of the above
(D) None of the above

68. The cursor is to the keyboard as ______________ is to the


mouse of a computer system.
(A) Point Arrow
(B) Cursor
(C) Monitor
(D) Printer

69. What is the full meaning of ISDN?


(A) Internet Services Data Network
(B) Internet Services Digital Network
(C) All of the above
(D) None of the above
70. Which of the following is not an Antivirus?
(A) AVG
(B) Norton Antivirus
(C) Kaspersky
(D) I love you
71. In a ___________ communication system, communication is
only possible in one direction
~ 35 ~
(A) Simplex
(B) Half duplex
(C) Full duplex
(D) All of the above
72. Which of the following is not a network scarce resources?
(A) Printer
(B) Internet connection
(C) Network scanner
(D) Protocol
73. Computers of the first generation used
(A) Integrated circuits
(B) Wires
(C) Transistors
(D) Vacuum tubes
74. Which of the following input device is mostly used in a
command based operating environment?
(A) Keyboard
(B) Mouse
(C) All of the above
(D) None of the above
75. Limitations of analog computers include
(A) Long setup and inaccurate results
(B) Size and long Setup
(C) Speed and long Setup
(D) Cost

76. Program that help people to use the computer is known as


_____________________?
(A) System Software
(B) Compiler
(C) Microsoft word
(D) All of the above

~ 36 ~
77. Which of the following communication system uses point-to-
multipoint communication?
(A) Telephone communication
(B) Computer communication
(C) Microphone in voice conferencing
(D) All of the above
78. Which of the following is not a disadvantage of computers?
(A) Redundancy
(B) Cost
(C) Computer literacy
(D) Ease of document editing
79. Which of the following input device is mostly used in graphic
base operating environment?
(A) Mouse
(B) Keyboard
(C) All of the above
(D) None of the above
80. A memory device that has the ability of losing its contents when
the system is turned off is said to be a _______________?
(A) Permanent memory
(B) Volatile memory
(C) Secondary memory
(D) None of the above

81. Which of the following is an example of a simple, single


function computing device that does not use an operating
system?
(A) Desktops
(B) Laptops
(C) Palmtops
(D) Microwave ovens with digital keypads
82. Which of the following system resources can be shared in a
network
(A) Data

~ 37 ~
(B) Software
(C) Hardware
(D) All of the above
83. Which of the following is not example of a network topology?
(A) Bus
(B) Star
(C) Ring
(D) Protocol
84. A network device that reads the destination address on the sent
packets and forwards the packets to the appropriate destination is
called a ___________
(A) Router
(B) Modem
(C) Hub
(D) Network Interface Card
85. Which of the following device(s) can help you access to the
internet?
(A) TV Sets
(B) Mobile
(C) Laptops
(D) All of the above
86. A _____ is a network device used to connect one computer with
a telephone line so that one can access information from other
computers.
(A) LAN Card
(B) Bridge
(C) Modem
(D) Repeater
87. Which of the following is the entry level connection to the
internet using Dail-Up?
(A) Telephone line and a modem
(B) Circuitries and a processor
(C) All of the above
(D) None of the above

~ 38 ~
88. The speed at which you put your data to the internet is known
as_____
(A) Download speed
(B) Upload speed
(C) All of the above
(D) None of the above
89. _______________ is achieved by sending data on a radio
frequency
(A) Wired internet
(B) Wireless internet
(C) All of the above
(D) None of the above
90. Virus is a
(A) Utility Program
(B) Destructive program
(C) System Program
(D) None of the above
91. The antenna picks up radio waves from wireless internet access points
and send to your server terminal through a ____________
(A) Internet Service Provider
(B) Wireless Network Card
(C) All of the above
(D) None of the above
92. A malicious program that attaches itself to other programs in the
computer with the intention of deleting or destroying data in a
host computer is called _____________________________
(A) Virus
(B) Worm
(C) Spam
(D) Phishing
93. A network of networks is known as _____________
(A) Network
(B) Internet
(C) All of the above
(D) None of the above

~ 39 ~
94. A self-contained program that has the capability to transport
itself from one computer (resources) to another in a network is
called _________________________
(A) Bot net
(B) Virus
(C) Worm
(D) Antivirus
95. Which is the most expensive computer in the world
(A) Mainframe computer
(B) Microcomputer
(C) Supercomputer
(D) Minicomputer
96. Which of the following is an Antivirus program?
(A) Windows
(B) Norton Antivirus (NAV)
(C) Photoshop
(D) All of the above
97. A ________ is a network device that acts as an interface between
the computer and the network cable
(A) Hub
(B) Modem
(C) Bridge
(D) Network Interface Card
98. An operating system that is designed such that one user can
effectively do one thing at a time is known as _____________?
(A) Real-time Operating System
(B) Single user, single tasking Operating System
(C) Single user multitasking Operating System
(D) Multi-users Operating System
99. Which of the following computer device has a dual function?
(A) Keyboard
(B) Printer
(C) Visual Display Unit (VDU)
(D) Flash drives
~ 40 ~
100. _____________ is a type of communication system in which
there is a central location from which information is sent to many
recipients
(A) Broadcast communication
(B) Client-Server computer communications
(C) All of the above
(D) None of the above
101. The Third Generation of Computers was in the year
(A) 1965–1970
(B) 1957–1964
(C) 1971–1981
(D) 1946–1956
102. Printers are categorized into different classes according to ____?
(A) Their sizes
(B) Mode of operation
(C) Speed
(D) The method used in printing output
103. An operating system that allows a user to simultaneously run
multiple application (programs) on the computer is known as
_______________?
(A) Single user, multitasking Operating System
(B) Real-time Operating System
(C) Single user, single tasking Operating System
(D) Multi-users Operating System
104. A computer system can be described in terms of
(A) Monoware and Multiware
(B) Hardware and software
(C) Peopleware and Engineeringware
(D) None of the options
105. The Central Processing Unit (CPU) is made up of
_______________ and _________________
(A) Input and Output devices
(B) Control Unit and Arithmetic/Logic Unit
(C) None of the Above
(D) All of the Above
~ 41 ~
106. The various program that perform the tasks for which the
computer was purchased is known as _______________?
(A) System software
(B) Application software
(C) Operating system
(D) All of the above
107. Which of the following input device is used by WAEC, JAMB
and UNICAL post UTME?
(A) Optical Mark Reader (OMR)
(B) Barcode Scanners
(C) Optical Character Reader (OCR)
(D) All of the above
108. What is the full meaning of TCP/IP?
(A) Timeline Control Protocol/Internet Protocol
(B) Transmission Control Protocol/Internet Protocol
(C) All of the above
(D) None of the above
109. The Operating System that are used to control machinery,
scientific instruments and industrial systems are known as
__________________?
(A) Single user, single tasking Operating system
(B) Real-time Operating System
(C) Single user, multitasking Operating System
(D) Multi-users, Operating System
110. Which of the following is examples of a point-to-point
communication system?
(A) Telephone voice communication
(B) Computer communication
(C) All of the above
(D) none of the above
111. A computer and groups of computers that exist in a domain
which share certain thing in common from others in the network
is known as______________

~ 42 ~
(A) A network database
(B) Network resources
(C) Workstation
(D) Server
112. What is the full meaning of DARPA?
(A) Defense Advance Research Project Agency
(B) Defence Advance Research Project Agency
(C) Defense Advance Research Projects Agency
(D) Defense Access Research Projects Agency
113. An attack which prevent computer resources from being
available to the intended users is called _______________
(A) Flooding Web Server attack
(B) Prevention of Service attack
(C) Denial of Service Attack
(D) Flooding of Service attack

114. Internet connection is always initiated by dialing an _________


(A) Internet cable
(B) Internet Service provider (ISP)
(C) Internet Channels
(D) All of the above

115. ____________ is defined as an estimated probability that a


THREAT WILL BE ACTIVATED
(A) Threat
(B) Risk
(C) Vulnerability
(D) Attack.
116. The WWW consist of?
(A) Files
(B) Links
(C) Resources
(D) All of the above

~ 43 ~
117. A common name for main memory is _________________?
(A) Read Only Memory (ROM)
(B) Random Access Memory (RAM)
(C) All of the above
(D) None of the above
118. Which of the following is not a function or advantage of
Operating System?
(A) Facilitating efficiency and reliability
(B) Controlling the hardware
(C) Serves as interface between the user and computer hardware
(D) Translation of source program code.
119. A device that enables the computer to output high-quality line
graphics is known as ___________?
(A) Microforms
(B) Graph plotters
(C) Printer
(D) Keyboard
120. You can connect to the internet through the following except
_______________
(A) Cable
(B) Satellite
(C) Terrestrial fixed and mobile wireless
(D) Digitizers
121. A storage area which holds programs and data temporarily
during processing is known as __________?
(A) Secondary memory
(B) Main memory
(C) All of the above
(D) None of the above
122. Which of the following is not an input device of a computer
system?
(A) Keyboard
(B) Mouse
(C) Joystick
(D) Printer
~ 44 ~
123. The Slide Rule was invented by
(A) Charles Babbage
(B) William Oughtred
(C) Gottfried W. Leibnitze
(D) Joseph-Marie Jacquard
124. A hybrid computer has a device that converts analog signals into
digital codes, called
(A) Digitizer
(B) Converter
(C) Modem
(D) Translator

125. ______________ converts data/information from forms that are


convenient for humans to the Binary codes that a computer
requires, and Vice Versa.
(A) Program
(B) Input and Output devices
(C) Primary and secondary memory
(D) All of the above
126. Which is the following is not the merit of application packages?
(A) They save programming effort and expenses on the part of
the user
(B) Software development cost are effectively shared among the
purchasers, thus making them cheap
(C) The user enjoy a high level of confidence, because the
program is well tried and tested
(D) The purchaser does not have direct control of the package.

127. Which of the following internet system is prone to rain fade


(Degradation)
(A) TV set internet
(B) Laptops internet
(C) Mobile phone internet
(D) Satellite internet

~ 45 ~
128. Which of the following is a demerit of application packages?
(A) Application packages are tailored towards general needs and
may not be able to meet the specific needs of a user/client
(B) The user of application packages results in relatively quick
implementation of a computer based project.
(C) The user enjoys a high level of confidence, since the program
is well-tried and tested
(D) All of the above

129. System devices used for entering data and instructions code
(programs) into the computer is known as ________________- ?
(A) Output
(B) Input
(C) Logic gates
(D) Files
130. Computers can help in crime detection and control if
(A) Computers are made faster
(B) Everyone has a computer
(C) Records of citizens are stored in database
(D) None of the options

131. Which of the following internet system is an option for people in


rural areas?
(A) TV set internets
(B) Laptops internet
(C) Mobile phone internet
(D) Satellite internet

132. Which of the following shows the use of computers in Education


(A) Computer-aided instruction
(B) e-Learning
(C) Educational management
(D) All of the options

~ 46 ~
133. Which of the following is not a recommended step taken to
protect data and information stored on a computer system.
(A) Isolation of Information from some users
(B) Keeping a backup copy of every file in their system to make
their job easy
(C) Users should only change and modify information they are
authorized to modify
(D) Users should only be able to read or view data needed for
their job.
134. Establishing as internet connection over a wireless network
through an antenna is known as ____________________
(A) Internet protocols
(B) Radio (wireless) connection
(C) Satellite connection
(D) Telephone connection
135. The condition where information and other resources stored in a
system are only made available to authorized users, entities or
processes is known as_______________________
(A) Confidentiality
(B) Reliability
(C) Availability
(D) Accessibility
136. The ______ topology is used to enable network devices to
transmit and receive data across the transmission media without
interfering with each other.
(A) Physical
(B) Logical
(C) Wired
(D) Wireless
137. A ______________ connection is an arrangement in which
outgoing and incoming data are sent from, and arrive at a
computer.
(A) Satellite internet
(B) Mobile phone internet
(C) Laptops internet
(D) TV sets internet
~ 47 ~
138. Which of the following is/are the goal of computer network
system
(A) Sharing data (or information)
(B) Sharing hardware/software resources
(C) Centralizing administration and support
(D) All of the above

139. Which of the following is not a family of Operating System?


(A) Microsoft Windows family
(B) Macintosh
(C) Unix
(D) Microprocessor
140. In general, the use of Operating Systems depends on
_____________ and ____________?
(A) Size and function of a computer system
(B) Hardware and Software of the computer
(C) Type of computer and type of applications that will be run on
the computer
(D) All of the above
141. In which area of transportation are computers used?
(A) Airways reservation
(B) Railway reservation
(C) Traffic control
(D) All of the options
142. Programs that are developed to solve a variety of similar
problems without any specific user/client in mind is known as
_______________________?
(A) Tailor-made (customized) software
(B) Application packages or CoTs Software
(C) All of the above
(D) None of the above

143. The Stored Program Concept was proposed by


(A) William Oughtred

~ 48 ~
(B) Charles Babbage
(C) John von Neumann
(D) Bill Gates

144. Whenever programs and data are entered into the computer from
an input device, they are held in __________________ until
processing is completed.
(A) Hard disk
(B) Main memory
(C) Secondary memory
(D) All of the above
145. Which of the following input device is used in modern bank
cheques?
(A) Joystick
(B) Punched card
(C) Magnetic Ink Character Recognizer (MICR)
(D) Optical Mark Reader (OMR)
146. A master control program that takes over the operations of the
computer to the extent of being able to allow a number of
programs to run on the compute without human involvement is
known as ____________________?
(A) Logic Control
(B) Operating System
(C) Compiler
(D) Assembler
147. Which of the following is/are types of computer network
(A) Local Area Network
(B) Wide Area Network
(C) Metropolitan Area Network
(D) All of the above
148. What is the means for Virus transmission?
(A) Monitor
(B) Flash Drive
(C) Cable
(D) Mouse
~ 49 ~
149. __________ refers to a layout of a computer network?
(A) Network protocol
(B) Network topology
(C) Network administrator
(D) All of the above
150. In which year was E-mail adopted for ARPANET by RAY
TOMLINSON?
(A) 1964
(B) 1974
(C) 1962
(D) 1972
151. On the net we can find computers while on the web we can find?
(A) Videos
(B) Sound
(C) Information
(D) All of the above
152. The layout of the actual path that data follows within the physic
topology is known as____?
a. Physical topology
b. Logical topology
c. All of the above
d. None of the above
153. http and https, how do they differ?
a. https is secured
b. https is standard
c. All of the above
d. None of the above
154. ___________ led to the invention of computer networks?
a. Examination processing
b. Result processing
c. Decentralization (distributed data processing)
d. None of the above
~ 50 ~
155. Which of the following is a disadvantage of a star topology?
a. If the central computer fails, the entire computers in the
network goes down
b. If the central computer fails, the entire computers in the
network are not affected
c. All of the above
d. None of the above
156. What is the full meaning of www?
a. World Wide Webs
b. World Wide Web
c. All of the above
d. None of the above
157. Human beings and computers share information in almost similar
ways.
a. True
b. False
158. Which of these is true of point-to-multipoint communication?
a. Multiple recipients and non recipient
b. One recipient and one sender
c. One sender and multiple recipients
d. All of the above
159. Another name for a single cable that system devices and
computers are connected to is known as ______?
a. Trunk
b. Path
c. Communication
d. All of the above
160. Which of these is an instance of a half-duplex communication?
a. A mobile phone
b. A walkie-talkie
c. A laptop
d. A palmtop
~ 51 ~
161. Modern computer keyboards have between _____ and _____
keys?
a. 10 and 50
b. 100 and 150
c. 102 and 105
d. 200 and 250
162. One of these is not a goal of computer networking.
a. Sharing information (or data)
b. Sharing hardware and software
c. All of the above
d. None of the above

163. Which of the following is not a type of mouse?


a. Cord
b. Cordless
c. Light pen
d. None of the above
164. Given an email address: [email protected] what is the technical name
given to X, Y respectively?
a. Name of mail box and host name of the email server
b. Hostname of the email server and name of the mail box
c. All of the above
d. None of the above
165. Which of the following printer works like an office copier?
a. Dot matrix
b. Laser
c. Drum
d. All of the above
166. Another name for photographic film media is ___________?
a. Graph plotters
b. Microforms

~ 52 ~
c. Thermal printer
d. All of the above

167. The creation of tracks and sectors on disk surfaces in order to


store data is known as___________?
a. Formatting
b. Copying
c. Editing
d. All of the above
168. .Identify warning signs associated with virus.
a. Random increases in file size
b. Unknown file appearing
c. Missing files
d. All of the above

169. Which of the following is not a translator for high level


languages?
a. Assemble
b. Compiler
c. Interpreter
d. All of the above
170. Prevention, detection and eradication are techniques used to
protect against.
a. Data theft
b. bot – net
c. virus
d. All of the above
171. Which of the following is not a storage parameters?
a. Bit
b. Nibble
c. Byte
d. Databus

~ 53 ~
172. If a web address is given as:
https//www.unical.edu.ng/Faculty/Department/ which of the
following is the protocol and host name?
a. www.unical.edu.ng and https
b. https and www.unical.edu.ng
c. https and Faculty
d. All of the above
173. 1 Terabyte is equivalent to______________?
a. 1024 megabytes
b. 1024 gigabytes
c. 1024 petabytes
d. All of the above
174. According to Vint Cerf, a packet is similar to a postcard with a
_______________________?
a. Simple address
b. IP – Address
c. Internet Address
d. All of the above
175. Programs that provide useful and several services to users by
providing facilities for performing common routine tasks are
known as ______________?
a. Translators
b. Utility programs
c. Operating systems
d. None of the above
176. Which of these is not a component needed to establish a
computer network?
a. Server
b. Workstation
c. Link equipment (like switches, routers, bridges, cables)
d. None of the above

~ 54 ~
177. The statement LDA 25 is a Mnemonic code for _____________?
a. Add contents of Accumulator with contents of address location
25
b. Local contents of Accumulator with contents of address
location 25
c. Store contents of Accumulator with contents of address location
25
d. All of the above
178. A low level language must be translated into _________ codes
before execution?
a. Machine
b. High level
c. All of the above
d. None of the above
179. What is the general (correct) format of an email?
a. [email protected]
b. localpart@domain
c. All of the above
d. None of the above
180. What is the meaning of URL?
a. Uniform Resource Locator
b. Universal Resource Locator
c. All of the above
d. None of the above
181. Network topologies are further subdivided into two categories
known as _____ and ___?
a. Hardware and software
b. Physical and logical
c. Primary and secondary
d. Algorithm and flowchart

~ 55 ~
182. The web exists because of _________________?
a. Programs
b. Computers
c. All of the above
d. None of the above
183. The actual organization of the computers and computing devices
on the network and the subsequent guided transmission media
connections is known as_____?
a. Logical topology
b. Physical topology
c. All of the above
d. None of the above
184. _________ is used to enable network devices to transmit and
receive data across the transmission media without interfering
with each other?
a. Logical topology
b. Physical topology
c. All of the above
d. None of the above
185. _______ are transmitted from the sending computers through the
hub or switch to all computers on the network?
a. Data
b. Signals
c. Bandwidth
d. All of the above
186. Which of the following network topology offers the advantages
of centralized resources and management?
a. Bus
b. Star
c. Ring
d. Mesh

~ 56 ~
187. Which of these technologies require the use of cables?
a. Wireless network
b. TV Station to house TV network
c. Radio Station to personal radio network
d. Wired network
188. Which of the following network topology is the simplest and
cheaper to implement?
a. Bus
b. Star
c. Ring
d. Mesh
189. Which of the following network topology connects computers
on a single circle of cables?
a. Ring
b. Star
c. Bus
d. Mesh
190. A network topology that has no terminating ends is known as _____?
a. Bus
b. Ring
c. Star
d. Mesh
191. MAN is an acronym for?
a. Metropolitan Area Network
b. Main-campus Area Network
c. Mechanical Area Network
d. Metropolitan Action Network

~ 57 ~
192. In which of the following network topology does a computer act
as a repeater to boost the signal and send it into the next
computer?
a. Ring
b. Star
c. Mesh
d. Bus
193. In which of the following network topology can a failure of one
computer can have an impact on the entire network?
a. Ring
b. Mesh
c. Bus
d. Star
194. _______________ delivers packets anywhere in the world?
a. www
b. sim
c. internet
d. dot net
195. ___________ is an abstract or imaginary space of information?
a. Web
b. www
c. All of the above
d. None of the above

196. Which of the following network topology offers superior


redundancy (repeated cabling among computers) and reliability?
a. Mesh
b. Ring
c. Star
d. Bus

~ 58 ~
197. _________ is the simplest and most common network topology?
a. Bus
b. Star
c. Mesh
d. Ring
198. In a client-server architecture, which of these is true?
a. The client derives it resources from the server
b. The server derives its resources from the client
c. The client and server are equal
d. The client is the host
199. In which of the following network topology does its
configuration provides redundant paths throughout the network?
a. Mesh
b. Star
c. Bus
d. Ring
200. What is the full meaning of bps?
a. Byte per second
b. Bits per second
c. Kilobyte per second
d. Megabyte per second

~ 59 ~
ANSWERS GSS131 (INTRODUCTION TO COMPUTER)

1. B 30. B 59. B 88. B 117. B 146. B 176. D


2. D 31. B 60. B 89. B 118. B 147. D 177. B
3. B 32. D 61. B 90. B 119. B 148. B 178. A
4. D 33. A 62. C 91. B 120. D 149. B 179. C
5. B 34. A 63. C 92. A 121. B 150. D 180. C
6. B 35. A 64. B 93. B 122. D 151. D 181. B
152. B 182. A
7. B 36. B 65. D 94. C 123. B
153. A 183. B
8. D 37. A 66. B 95. C 124. A
154. C 184. A
9. A 38. B 67. B 96. B 125. B 185. B
10. B 39. D 68. A 97. D 126. D 155. A
156. B 186. B
11. B 40. C 69. B 98. B 127. D 187. D
157. A
12. A 41. C 70. D 99. D 128. A 188. A
158. C
13. C 42. A 71. A 100. C 129. B 189. A
159. A
14. A 43. B 72. D 101. A 130. C 160. B 190. B
15. D 44. A 73. D 102. D 131. D 161. C 191. A
16. B 45. D 74. A 103. A 132. D 162. D 192. A
17. D 46. A 75. A 104. B 133. B 163. C 193. A
18. B 47. B 76. A 105. B 134. B 164. D 194. C
165. B 195. C
19. A 48. B 77. C 106. B 135. A
166. B 196. A
20. B 49. D 78. D 107. A 136. B
167. A 197. A
21. C 50. D 79. A 108. B 137. A 198. A
22. D 51. B 80. B 109. B 138. D 168. D
169. A 199. A
23. B 52. D 81. D 110. C 139. D 200. B
170. C
24. B 53. C 82. D 111. C 140. C
171. D
25. C 54. B 83. D 112. C 141. D
172. B
26. C 55. B 84. A 113. C 142. B 173. B
27. B 56. C 85. D 114. B 143. C 174. B
28. C 57. B 86. C 115. B 144. B 175. B
29. B 58. D 87. A 116. D 145. C

~ 60 ~

You might also like