Introduction to Computer
Introduction to Computer
COMMUNICATION SKILLS
UNIVERSITY OF CALABAR, CALABAR
GSS131
(INTRODUCTION TO COMPUTER)
~ 23 ~
1. Fourth Generation Computers used
(A) Supercomputer
(B) Microprocessors
(C) Minicomputers
(D) Uniprocessors
2. Which of the following is not example of a search engine for
browsing?
(A) Google
(B) Yahoo
(C) ASK
(D) E-mail
3. The TCP/IP was developed by
(A) Nigerian Defense Academy
(B) US Department of Defense (DoD)
(C) Ghana Military Defense
(D) None of the above.
4. Which of the following is not a level of programming language?
(A) Low Level Language (LLL)
(B) Machine Level Language (MLL)
(C) High Level Language (HLL)
(D) System Level Language (SLL)
5. _________ is the transfer of data/information from one point to
the other using computer and other computing devices.
(A) Data bus
(B) Data communication
(C) Data analysis
(D) Data mining
~ 24 ~
7. ______________ refer to the set of rules and standard
procedures used by on the internet to communicate
(A) Internet data bundle
(B) Internet protocol
(C) Internet topology
(D) All of the above
8. One of the following is not a characteristic of computers
(A) High speed
(B) Accuracy
(C) Reliability
(D) Redundancy
9. A computer system is broadly categorized
into_________________ and _________________?
(A) Hardware and Software
(B) File and Records
(C) Diskette and flash drives
(D) None of the above
10. Application programs that are usually developed either in-house
(by an organization‟s programmers) or by consultants hired by
the organization is known as_____________?
(A) Application documentation
(B) Tailor-made (Customized) Software
(C) Application packages or CoTs
(D) All of the above
11. The communication system in which it possible to communicate in
both direction is known as _________________
(A) Simplex
(B) Half duplex
(C) Full duplex
(D) None of the above
12. The reliability of computers makes them to be deployed in
sensitive areas like
(A) Intensive-Care Units of hospitals
(B) Watching sensitive videos
(C) Connecting to your TV set
(D) None of the options
~ 25 ~
13. Another name for a HUB is
(A) Bridge
(B) Router
(C) Concentrator
(D) Modem
14. The early internet was used only by the following:
(A) Scientists, Liberians, computer experts and engineers
(B) Mathematicians, military, computer scientist, artist
(C) All of the above
(D) None of the above
15. In IT Security, what is the full meaning of C.I.A.?
(A) Cyber Investigative Attack
(B) Cyber Intelligence Attack
(C) Confidential Incident Attack
(D) Confidentiality Integrity Availability
16. Network topologies are subdivided into two categories based on
the capabilities of the network‟s hardware and the characteristics
of the various modes of data transmission. These two categories
are ___________ and ____________
(A) Wired and Wireless
(B) Physical and Logical
(C) Physical and Wired
(D) Logical and Wireless
17. Which of the following is not example of a utility program?
(A) Sorting
(B) Editing
(C) File copying
(D) Compiler
~ 27 ~
(A) Input devices
(B) Output devices
(C) Storage devices
(D) None of the above
25. A computer is said to be a programmable device because
(A) It is an electronic device
(B) It can produce output
(C) It can be assigned instructions
(D) It can receive some inputs
26. Which of the following is not an advantage of computers in
Nigeria?
(A) High speed
(B) Accuracy
(C) Dependence on electric power
(D) Storage and retrieval
27. A sensitized screen that enables a person to use a simple device
such as a pencil, or even a finger to point to Menu choices
displayed on the screen of the computer is known as _______?
(A) Light pen
(B) Touch screen
(C) Joystick
(D) Touch pad
28. Programs that are designed to solve the problems of users is
known as_____________?
(A) Logic
(B) Circuit
(C) Application software
(D) None of the above
29. _________ communication system involves one sender and
multiple recipient
(A) Point-to-point
(B) Point-to-multipoint
(C) All of the above
(D) None of the above
~ 28 ~
30. The speed at which your computer receives information is
known as_______________
(A) The standard processing rate
(B) The standard download speed
(C) The standard data speed
(D) None of the above
31. Which of the following is not a reason why firewall sometimes fail to
protect the network from external intrusion attack.
(A) Because it can only protect against known attacks
(B) Because configuring firewalls properly is very easy
(C) Because firewalls may contain software bugs or vulnerabilities
(D) Because hacks in HTTP can sip through
32. Which of the following is not a virus
(A) Worm
(B) Logic Bomb
(C) Trojan Horse
(D) Win-Zip
33. The internet host to host mail transport protocol that operates
over TCP protocol port is called?
(A) SMTP – Simple Mail Transfer Protocol
(B) FTP – File Transfer Protocol
(C) POP – Post Office Protocol
(D) Telnet Protocol
34. ________ are hardware devices used to achieve network
connectivity and communication.
(A) Network Devices
(B) Peripherals
(C) Cables
(D) Wires
35. Which of the following is not example of a translator?
(A) Debugging programs
(B) Assembler
(C) Compiler
(D) Interpreter
~ 29 ~
36. A step-by-step set of instructions directing the computer to
perform a task is known as _____________?
(A) Software
(B) Program
(C) Algorithm
(D) Flowchart
37. The computer memory system is categorized into ____________
and _____________?
(A) Primary and Secondary memory
(B) Input and Output storage
(C) Files and record storage
(D) None of the above
38. For a computer processing operation to be useful
(A) It must be produced fast
(B) Output must be in human-understandable form
(C) Output must be large
(D) Output should be electronic
39. An intruder is someone or an agent who is attempting to break
into or misused the system or computer resources. The two
existing categories of intruders are:
(A) Spammers and Hackers
(B) Insiders and Spies
(C) Insiders and Hackers
(D) Insiders and Outsider
40. Some recent use of the internet includes:
(A) Remote help, freedom of speech, registration and
reservations
(B) Search tools, correspondence, new business opportunities
(C) All of the above
(D) None of the above
41. In a _____ topology, the signals travel around the loop in one
direction and pass through each computer, which can act as a
repeater to boost the signal and send it onto the next computer.
(A) Bus
~ 30 ~
(B) Mesh
(C) Ring
(D) Star
42. ________________ Virus are often transmitted by floppy disk
left in the disk drive.
(A) Boot sector
(B) Trojan horse
(C) Script
(D) Logic bomb
43. World Wide Web (WWW) is a network of electronic documents
called __________ that are accessible through the Internet.
(A) Web links
(B) Web Pages
(C) Web sites
(D) Web browser
46. A communication system in which the caller and the called can
communicate simultaneously is known as__________________
(A) Full duplex
(B) Simplex
(C) Half duplex
(D) All of the above
~ 31 ~
47. _____________ are attached to computers primarily to provide
alphanumeric outputs to users
(A) Keyboard
(B) Printers
(C) Scanners
(D) Joystick
48. The Computer used most in offices are
(A) Mainframe computer
(B) Microcomputer
(C) Supercomputer
(D) Minicomputer
49. Which of the following is not a hardware component of a
computer system?
(A) Central Processing Unit (CPU)
(B) Main Memory
(C) Input/Output devices
(D) System files
50. Which of the following is not an example of application
software?
(A) Programs that make up payroll
(B) Programs that play games
(C) Programs that design electronic components
(D) Operating System
51. The communication system which involves two end-point is
known as ___________?
(A) Point-to-multipoint communication
(B) Point-to-point communication
(C) All of the above
(D) None of the above
52. Two most popular component of the internet are:
(A) Internet connectivity/Browsers
(B) Internet Explorer/Facebook
(C) Facebook/e-mail
(D) World Wide Web/E-mail
~ 32 ~
53. The following are important security functions except
(A) Logging/documentation
(B) Intrusion Detection System/firewalls
(C) Backup/information system design
(D) Information classification/incident handling
54. Boot sector virus infects
(A) System files
(B) Master Boot Records
(C) Application Software
(D) Document files
55. Computing devices of the fifth generation are based on
(A) Human Intelligence
(B) Artificial Intelligence
(C) Modern Intelligence
(D) Programming
56. The mouse is used in conjunction with a
____________________?
(A) Printer
(B) Floppy disk
(C) Visual Display Unit/Monitor
(D) Keyboard
57. The ENIAC stands for
(A) Electronic Numerical Integrator And Counting
(B) Electronic Numerical Integrator And Computer
(C) Electrical Numerical Integrator And Computer
(D) Electronic Numerical Interphase And Computer
58. Which of the following is not a programming language
(A) BASIC
(B) FORTRAN
(C) Python
(D) Processor
~ 33 ~
59. The two categories of Application software are _____________
and ________________
(A) Compiler and Interpreter
(B) Tailor-Made-Software and Commercial-off-Shelf (CoTS)
(C) Flowchart and algorithm
(D) Preprocessor and processor
~ 34 ~
65. The Analytical Engine had the following components
(A) Monitor, calculating unit and valves
(B) Barrel, store and monitor
(C) Store, pump and barrel
(D) Store, calculation unit, the barrel
~ 36 ~
77. Which of the following communication system uses point-to-
multipoint communication?
(A) Telephone communication
(B) Computer communication
(C) Microphone in voice conferencing
(D) All of the above
78. Which of the following is not a disadvantage of computers?
(A) Redundancy
(B) Cost
(C) Computer literacy
(D) Ease of document editing
79. Which of the following input device is mostly used in graphic
base operating environment?
(A) Mouse
(B) Keyboard
(C) All of the above
(D) None of the above
80. A memory device that has the ability of losing its contents when
the system is turned off is said to be a _______________?
(A) Permanent memory
(B) Volatile memory
(C) Secondary memory
(D) None of the above
~ 37 ~
(B) Software
(C) Hardware
(D) All of the above
83. Which of the following is not example of a network topology?
(A) Bus
(B) Star
(C) Ring
(D) Protocol
84. A network device that reads the destination address on the sent
packets and forwards the packets to the appropriate destination is
called a ___________
(A) Router
(B) Modem
(C) Hub
(D) Network Interface Card
85. Which of the following device(s) can help you access to the
internet?
(A) TV Sets
(B) Mobile
(C) Laptops
(D) All of the above
86. A _____ is a network device used to connect one computer with
a telephone line so that one can access information from other
computers.
(A) LAN Card
(B) Bridge
(C) Modem
(D) Repeater
87. Which of the following is the entry level connection to the
internet using Dail-Up?
(A) Telephone line and a modem
(B) Circuitries and a processor
(C) All of the above
(D) None of the above
~ 38 ~
88. The speed at which you put your data to the internet is known
as_____
(A) Download speed
(B) Upload speed
(C) All of the above
(D) None of the above
89. _______________ is achieved by sending data on a radio
frequency
(A) Wired internet
(B) Wireless internet
(C) All of the above
(D) None of the above
90. Virus is a
(A) Utility Program
(B) Destructive program
(C) System Program
(D) None of the above
91. The antenna picks up radio waves from wireless internet access points
and send to your server terminal through a ____________
(A) Internet Service Provider
(B) Wireless Network Card
(C) All of the above
(D) None of the above
92. A malicious program that attaches itself to other programs in the
computer with the intention of deleting or destroying data in a
host computer is called _____________________________
(A) Virus
(B) Worm
(C) Spam
(D) Phishing
93. A network of networks is known as _____________
(A) Network
(B) Internet
(C) All of the above
(D) None of the above
~ 39 ~
94. A self-contained program that has the capability to transport
itself from one computer (resources) to another in a network is
called _________________________
(A) Bot net
(B) Virus
(C) Worm
(D) Antivirus
95. Which is the most expensive computer in the world
(A) Mainframe computer
(B) Microcomputer
(C) Supercomputer
(D) Minicomputer
96. Which of the following is an Antivirus program?
(A) Windows
(B) Norton Antivirus (NAV)
(C) Photoshop
(D) All of the above
97. A ________ is a network device that acts as an interface between
the computer and the network cable
(A) Hub
(B) Modem
(C) Bridge
(D) Network Interface Card
98. An operating system that is designed such that one user can
effectively do one thing at a time is known as _____________?
(A) Real-time Operating System
(B) Single user, single tasking Operating System
(C) Single user multitasking Operating System
(D) Multi-users Operating System
99. Which of the following computer device has a dual function?
(A) Keyboard
(B) Printer
(C) Visual Display Unit (VDU)
(D) Flash drives
~ 40 ~
100. _____________ is a type of communication system in which
there is a central location from which information is sent to many
recipients
(A) Broadcast communication
(B) Client-Server computer communications
(C) All of the above
(D) None of the above
101. The Third Generation of Computers was in the year
(A) 1965–1970
(B) 1957–1964
(C) 1971–1981
(D) 1946–1956
102. Printers are categorized into different classes according to ____?
(A) Their sizes
(B) Mode of operation
(C) Speed
(D) The method used in printing output
103. An operating system that allows a user to simultaneously run
multiple application (programs) on the computer is known as
_______________?
(A) Single user, multitasking Operating System
(B) Real-time Operating System
(C) Single user, single tasking Operating System
(D) Multi-users Operating System
104. A computer system can be described in terms of
(A) Monoware and Multiware
(B) Hardware and software
(C) Peopleware and Engineeringware
(D) None of the options
105. The Central Processing Unit (CPU) is made up of
_______________ and _________________
(A) Input and Output devices
(B) Control Unit and Arithmetic/Logic Unit
(C) None of the Above
(D) All of the Above
~ 41 ~
106. The various program that perform the tasks for which the
computer was purchased is known as _______________?
(A) System software
(B) Application software
(C) Operating system
(D) All of the above
107. Which of the following input device is used by WAEC, JAMB
and UNICAL post UTME?
(A) Optical Mark Reader (OMR)
(B) Barcode Scanners
(C) Optical Character Reader (OCR)
(D) All of the above
108. What is the full meaning of TCP/IP?
(A) Timeline Control Protocol/Internet Protocol
(B) Transmission Control Protocol/Internet Protocol
(C) All of the above
(D) None of the above
109. The Operating System that are used to control machinery,
scientific instruments and industrial systems are known as
__________________?
(A) Single user, single tasking Operating system
(B) Real-time Operating System
(C) Single user, multitasking Operating System
(D) Multi-users, Operating System
110. Which of the following is examples of a point-to-point
communication system?
(A) Telephone voice communication
(B) Computer communication
(C) All of the above
(D) none of the above
111. A computer and groups of computers that exist in a domain
which share certain thing in common from others in the network
is known as______________
~ 42 ~
(A) A network database
(B) Network resources
(C) Workstation
(D) Server
112. What is the full meaning of DARPA?
(A) Defense Advance Research Project Agency
(B) Defence Advance Research Project Agency
(C) Defense Advance Research Projects Agency
(D) Defense Access Research Projects Agency
113. An attack which prevent computer resources from being
available to the intended users is called _______________
(A) Flooding Web Server attack
(B) Prevention of Service attack
(C) Denial of Service Attack
(D) Flooding of Service attack
~ 43 ~
117. A common name for main memory is _________________?
(A) Read Only Memory (ROM)
(B) Random Access Memory (RAM)
(C) All of the above
(D) None of the above
118. Which of the following is not a function or advantage of
Operating System?
(A) Facilitating efficiency and reliability
(B) Controlling the hardware
(C) Serves as interface between the user and computer hardware
(D) Translation of source program code.
119. A device that enables the computer to output high-quality line
graphics is known as ___________?
(A) Microforms
(B) Graph plotters
(C) Printer
(D) Keyboard
120. You can connect to the internet through the following except
_______________
(A) Cable
(B) Satellite
(C) Terrestrial fixed and mobile wireless
(D) Digitizers
121. A storage area which holds programs and data temporarily
during processing is known as __________?
(A) Secondary memory
(B) Main memory
(C) All of the above
(D) None of the above
122. Which of the following is not an input device of a computer
system?
(A) Keyboard
(B) Mouse
(C) Joystick
(D) Printer
~ 44 ~
123. The Slide Rule was invented by
(A) Charles Babbage
(B) William Oughtred
(C) Gottfried W. Leibnitze
(D) Joseph-Marie Jacquard
124. A hybrid computer has a device that converts analog signals into
digital codes, called
(A) Digitizer
(B) Converter
(C) Modem
(D) Translator
~ 45 ~
128. Which of the following is a demerit of application packages?
(A) Application packages are tailored towards general needs and
may not be able to meet the specific needs of a user/client
(B) The user of application packages results in relatively quick
implementation of a computer based project.
(C) The user enjoys a high level of confidence, since the program
is well-tried and tested
(D) All of the above
129. System devices used for entering data and instructions code
(programs) into the computer is known as ________________- ?
(A) Output
(B) Input
(C) Logic gates
(D) Files
130. Computers can help in crime detection and control if
(A) Computers are made faster
(B) Everyone has a computer
(C) Records of citizens are stored in database
(D) None of the options
~ 46 ~
133. Which of the following is not a recommended step taken to
protect data and information stored on a computer system.
(A) Isolation of Information from some users
(B) Keeping a backup copy of every file in their system to make
their job easy
(C) Users should only change and modify information they are
authorized to modify
(D) Users should only be able to read or view data needed for
their job.
134. Establishing as internet connection over a wireless network
through an antenna is known as ____________________
(A) Internet protocols
(B) Radio (wireless) connection
(C) Satellite connection
(D) Telephone connection
135. The condition where information and other resources stored in a
system are only made available to authorized users, entities or
processes is known as_______________________
(A) Confidentiality
(B) Reliability
(C) Availability
(D) Accessibility
136. The ______ topology is used to enable network devices to
transmit and receive data across the transmission media without
interfering with each other.
(A) Physical
(B) Logical
(C) Wired
(D) Wireless
137. A ______________ connection is an arrangement in which
outgoing and incoming data are sent from, and arrive at a
computer.
(A) Satellite internet
(B) Mobile phone internet
(C) Laptops internet
(D) TV sets internet
~ 47 ~
138. Which of the following is/are the goal of computer network
system
(A) Sharing data (or information)
(B) Sharing hardware/software resources
(C) Centralizing administration and support
(D) All of the above
~ 48 ~
(B) Charles Babbage
(C) John von Neumann
(D) Bill Gates
144. Whenever programs and data are entered into the computer from
an input device, they are held in __________________ until
processing is completed.
(A) Hard disk
(B) Main memory
(C) Secondary memory
(D) All of the above
145. Which of the following input device is used in modern bank
cheques?
(A) Joystick
(B) Punched card
(C) Magnetic Ink Character Recognizer (MICR)
(D) Optical Mark Reader (OMR)
146. A master control program that takes over the operations of the
computer to the extent of being able to allow a number of
programs to run on the compute without human involvement is
known as ____________________?
(A) Logic Control
(B) Operating System
(C) Compiler
(D) Assembler
147. Which of the following is/are types of computer network
(A) Local Area Network
(B) Wide Area Network
(C) Metropolitan Area Network
(D) All of the above
148. What is the means for Virus transmission?
(A) Monitor
(B) Flash Drive
(C) Cable
(D) Mouse
~ 49 ~
149. __________ refers to a layout of a computer network?
(A) Network protocol
(B) Network topology
(C) Network administrator
(D) All of the above
150. In which year was E-mail adopted for ARPANET by RAY
TOMLINSON?
(A) 1964
(B) 1974
(C) 1962
(D) 1972
151. On the net we can find computers while on the web we can find?
(A) Videos
(B) Sound
(C) Information
(D) All of the above
152. The layout of the actual path that data follows within the physic
topology is known as____?
a. Physical topology
b. Logical topology
c. All of the above
d. None of the above
153. http and https, how do they differ?
a. https is secured
b. https is standard
c. All of the above
d. None of the above
154. ___________ led to the invention of computer networks?
a. Examination processing
b. Result processing
c. Decentralization (distributed data processing)
d. None of the above
~ 50 ~
155. Which of the following is a disadvantage of a star topology?
a. If the central computer fails, the entire computers in the
network goes down
b. If the central computer fails, the entire computers in the
network are not affected
c. All of the above
d. None of the above
156. What is the full meaning of www?
a. World Wide Webs
b. World Wide Web
c. All of the above
d. None of the above
157. Human beings and computers share information in almost similar
ways.
a. True
b. False
158. Which of these is true of point-to-multipoint communication?
a. Multiple recipients and non recipient
b. One recipient and one sender
c. One sender and multiple recipients
d. All of the above
159. Another name for a single cable that system devices and
computers are connected to is known as ______?
a. Trunk
b. Path
c. Communication
d. All of the above
160. Which of these is an instance of a half-duplex communication?
a. A mobile phone
b. A walkie-talkie
c. A laptop
d. A palmtop
~ 51 ~
161. Modern computer keyboards have between _____ and _____
keys?
a. 10 and 50
b. 100 and 150
c. 102 and 105
d. 200 and 250
162. One of these is not a goal of computer networking.
a. Sharing information (or data)
b. Sharing hardware and software
c. All of the above
d. None of the above
~ 52 ~
c. Thermal printer
d. All of the above
~ 53 ~
172. If a web address is given as:
https//www.unical.edu.ng/Faculty/Department/ which of the
following is the protocol and host name?
a. www.unical.edu.ng and https
b. https and www.unical.edu.ng
c. https and Faculty
d. All of the above
173. 1 Terabyte is equivalent to______________?
a. 1024 megabytes
b. 1024 gigabytes
c. 1024 petabytes
d. All of the above
174. According to Vint Cerf, a packet is similar to a postcard with a
_______________________?
a. Simple address
b. IP – Address
c. Internet Address
d. All of the above
175. Programs that provide useful and several services to users by
providing facilities for performing common routine tasks are
known as ______________?
a. Translators
b. Utility programs
c. Operating systems
d. None of the above
176. Which of these is not a component needed to establish a
computer network?
a. Server
b. Workstation
c. Link equipment (like switches, routers, bridges, cables)
d. None of the above
~ 54 ~
177. The statement LDA 25 is a Mnemonic code for _____________?
a. Add contents of Accumulator with contents of address location
25
b. Local contents of Accumulator with contents of address
location 25
c. Store contents of Accumulator with contents of address location
25
d. All of the above
178. A low level language must be translated into _________ codes
before execution?
a. Machine
b. High level
c. All of the above
d. None of the above
179. What is the general (correct) format of an email?
a. [email protected]
b. localpart@domain
c. All of the above
d. None of the above
180. What is the meaning of URL?
a. Uniform Resource Locator
b. Universal Resource Locator
c. All of the above
d. None of the above
181. Network topologies are further subdivided into two categories
known as _____ and ___?
a. Hardware and software
b. Physical and logical
c. Primary and secondary
d. Algorithm and flowchart
~ 55 ~
182. The web exists because of _________________?
a. Programs
b. Computers
c. All of the above
d. None of the above
183. The actual organization of the computers and computing devices
on the network and the subsequent guided transmission media
connections is known as_____?
a. Logical topology
b. Physical topology
c. All of the above
d. None of the above
184. _________ is used to enable network devices to transmit and
receive data across the transmission media without interfering
with each other?
a. Logical topology
b. Physical topology
c. All of the above
d. None of the above
185. _______ are transmitted from the sending computers through the
hub or switch to all computers on the network?
a. Data
b. Signals
c. Bandwidth
d. All of the above
186. Which of the following network topology offers the advantages
of centralized resources and management?
a. Bus
b. Star
c. Ring
d. Mesh
~ 56 ~
187. Which of these technologies require the use of cables?
a. Wireless network
b. TV Station to house TV network
c. Radio Station to personal radio network
d. Wired network
188. Which of the following network topology is the simplest and
cheaper to implement?
a. Bus
b. Star
c. Ring
d. Mesh
189. Which of the following network topology connects computers
on a single circle of cables?
a. Ring
b. Star
c. Bus
d. Mesh
190. A network topology that has no terminating ends is known as _____?
a. Bus
b. Ring
c. Star
d. Mesh
191. MAN is an acronym for?
a. Metropolitan Area Network
b. Main-campus Area Network
c. Mechanical Area Network
d. Metropolitan Action Network
~ 57 ~
192. In which of the following network topology does a computer act
as a repeater to boost the signal and send it into the next
computer?
a. Ring
b. Star
c. Mesh
d. Bus
193. In which of the following network topology can a failure of one
computer can have an impact on the entire network?
a. Ring
b. Mesh
c. Bus
d. Star
194. _______________ delivers packets anywhere in the world?
a. www
b. sim
c. internet
d. dot net
195. ___________ is an abstract or imaginary space of information?
a. Web
b. www
c. All of the above
d. None of the above
~ 58 ~
197. _________ is the simplest and most common network topology?
a. Bus
b. Star
c. Mesh
d. Ring
198. In a client-server architecture, which of these is true?
a. The client derives it resources from the server
b. The server derives its resources from the client
c. The client and server are equal
d. The client is the host
199. In which of the following network topology does its
configuration provides redundant paths throughout the network?
a. Mesh
b. Star
c. Bus
d. Ring
200. What is the full meaning of bps?
a. Byte per second
b. Bits per second
c. Kilobyte per second
d. Megabyte per second
~ 59 ~
ANSWERS GSS131 (INTRODUCTION TO COMPUTER)
~ 60 ~