Computer 1

11
1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. Data going into the computer is called? 1) Output 2) Algorithm 3) Input 4) Calculations 5) Flowchart 3. Which of the following refers to the memory in your computer? 1) RAM 2) DSL 3) USB 4) LAN 5) CPU 4. When you are working on a document on PC, where is the document temporarily stored? 1) RAM 2) ROM 3) The CPU 4) Flash memory 5) The CD-Rom 5. Information travels between components on the mother board through 1) Flash memory 2) CMOS 3)Bays 4) Buses 5) Peripherals 6. How are data organised in a spreadsheet? 1) Lines and spaces 2) Layers and planes 3) Height and width 4) Rows and columns 5) None of these 7. Which of the following is true? 1) Byte is a single digit in a binary number 2) Bit represents a grouping of digital numbers 3) Eight-digit binary number is called a byte 4) Eight-digit binary number is called a bit 5) None of these 8. Transformation of input into output is performed by? 1) Peripherals

description

free computer qstns

Transcript of Computer 1

Sheet11. One megabyte equals approximately1) 1,000 bits2) 1,000 bytes3) 1 million bytes4) 1 million bits5) 2,000 bytes2. Data going into the computer is called?1) Output2) Algorithm3) Input4) Calculations5) Flowchart3. Which of the following refers to the memory in your computer?1) RAM2) DSL3) USB4) LAN5) CPU4. When you are working on a document on PC, where is thedocument temporarily stored?1) RAM2) ROM3) The CPU4) Flash memory5) The CD-Rom5. Information travels between components on the mother board through1) Flash memory2) CMOS3)Bays4) Buses5) Peripherals6. How are data organised in a spreadsheet?1) Lines and spaces2) Layers and planes3) Height and width4) Rows and columns5) None of these7. Which of the following is true?1) Byte is a single digit in a binary number2) Bit represents a grouping of digital numbers3) Eight-digit binary number is called a byte4) Eight-digit binary number is called a bit5) None of these8. Transformation of input into output is performed by?1) Peripherals2) Memory3) Storage4) The Input-Output unit5) The CPU9. How many options does a binary choice offer?1) None2) One3) Two4) It depends on the amount of memory in the computer5) It depends on the speed of the computer's processor10. .....is collection of web pages and ......is the very first page thatwe see on opening of a web-site1) Home-page, Web-page2) Web-site, Home-page3) Web-page, Home-page4) Web-page, Web-site5) None of these11. When the pointer is positioned on a _____ it is shaped like a hand.1) Grammar error2) Hyperlink3) Screen tip4) Spelling error5) Formatting error12. The _____ of a system includes the programs or instructions.1) Hardware2) Icon3) Information4) Software5) None of these13. 'www' stands for _____1) World Word Web2) World Wide Web3) World White Web4) World Work Web5) None of these14. What menu is selected to cut, copy, and paste?1) File2) Tools3) Special4) Edit5) None15. You can use the tab key to1) Move a cursor across the screen2) Indent a paragraph3) Move the cursor down the screen4) Only (1) and (2)5) None of these16. The most important or powerful computer in a typical network is 1) Desktop2) Network client3) Network server4) Network station5) None of these17. Which of the following is an example of connectivity?1) Internet2) Floppy disk3) Power cord4) Data5) None of these18. The ability to find an individual item in a file immediately _____ is used.1) File allocation table2) Directory3) Sequential access4) Direct access5) None of these19. The primary purpose of software is to turn data into _____1) Web sites2) Information3) Programs4) Objects5) None of these20. To what temporary area can you store text and other data, andlater paste them to another location?1) The clipboard2) ROM3) CD-ROM4) The hard disk5) None of these21. Storage that retains its data after the power is tuned off is reffered to as1) volatile storage2) non-volatile storage3) sequential storage4) direct storage5) None of these22. _____is the science that attempts to produce machines thatdisplay the same type of intelligence that humans do.1) Nano science2) Nanotechnology3) Simulation4) Artificial intelligence (AI)5) None of these23. Changing an existing document is called _____ the document.1) Creating2) Editing3) Modifying4) Adjusting5) None of these24. Computers use the _____ number system to store data andperform calculations.1) Decimal2) Hexadecimal3) Octal4) Binary5) None of these25. Which of the following is the largest unit of storage?1) GB2) KB3) MB4) TB5) None of these26. The _____ key will launch the start buttons.1) Esc2) Shift3) Windows4) Shortcut5) None of these27. _____is the process of finding errors in software code.1) Compiling2) Testing3) Running4) Debugging5) None of these28. To move to the beginning of a line of text, press the _____ key.1) Home2) A3) Page-up4) Enter5) None of these29. Virtual memory is1) Memory on the hard disk that the CPU uses as an extended RAM2) RAM3) Only necessary if you do not have any RAM in your computer4) A back up device for floppy disks5) None of these30. A _____ contains specific rules and words that express thelogical steps of an algorithm.1) Syntax2) Programming structure3) Programming language4) Logic chart5) None of these31. When sending an e-mail, the _____ line describes the contents of the message.1) to2) subject3) contents4) CC5) None of these32. The _____ tells the computer how to use its components.1) Utility2) Network3) Operating system4) Application program5) None of these33. Which grouping do you work with when formatting text in word?1) Tables, paragraphs and indexes2) Paragraphs, indexes and sections3) Characters, sections and paragraphs4) Indexes, characters and tables5) None of these34. What is backup?1) Adding more components to your network2) Protecting data by copying it from the original source to adifferent destination3) Filtering old data from the new data4) Accessing data on tape5) None of these35. Network components are connected to the same cable in the ----- topology1) Star2) Ring3) Bus4) Mesh5) Mixed36. This component is required to process data into information andconsists of integrated circuits.1) Hard disk2) RAM3) CPU4) ROM5) None of these37. One advantage of dial-up-internet access is ___1) It utilises broadband technology2) It utilizes existing telephone service3) It uses a router for security4) Modem speeds are very fast5) None of these38. What is the term for unsolicited e-mail?1) News group2) Use net3) Backbone4) Flaming5) Spam39. Two or more computers connected to each other of sharinginformation form a _____1) Network2) Router3) Server4) Tunnel5) Pipeline40. Computers that are portable and convenient for users who travelare known as _____1) Super computers2) Lap tops3) Mini computers4) File servers5) None of these41. A computer checks the _____ of user names and passwords fora match before granting access.1) Website2) Network3) Backup file4) Data base5) None of these42. Office LANs that are spread geographically apart on a largescale can be connected using a corporate _____1) CAN2) LAN3) DAN4) WAN5) TAN43. The code for a Web page is written using _____1) A fifth generation language2) Win Zip3) Peripherals4) Hypertext Markup Language5) URL44. What is the process of copying software programs fromsecondary storage media to the hard disk called?1) Configuration2) Download3) Storage4) Upload5) Installation45. Small application programs that run on a web page and mayensure a form is completed properly or provide animation are known as ______1) Flash2) Spiders3) Cookies4) Applets5) Sparks46. The first computers were programmed using _____1) Assembly language2) Machine language3) Source code4) Object code5) Spaghetti code47. Which process checks to ensure the components of thecomputer and operating are connected properly?1) Booting2) Processing3) Saving4) Editing5) None of these48. In a relational database, this is a data structure that organizesthe information about a single topic into rows and columns.1) Block2) Record3) Tuple4) Table5) Command line interface49. How can the user determine what programs are available on acomputer?1) Checking the hard disk properties2) Viewing the installed programs during the booting process3) Checking the operating system for a list of installed programs.4) Checking the existing files saved on the disk5) None of these50. When we run a program in HTML coding _____ is used asbackend and ____ works as front-end.1) Notepad - Internet-Explorer2) Notepad - Msn-messenger3) MS-Word - Internet Explorer4) Both (1) and (2)5) None of theseANSWERS:1)3 2)3 3)1 4)1 5)4 6)3 7)3 8)5 9)3 10)2 11)2 12)4 13)2 14)4 15)216)3 17)1 18)1 19)2 20)1 21)2 22)4 23)2 24)4 25)4 26)3 27)4 28)129)2 30)3 31)2 32)3 33)1 34)2 35)2 36)3 37)2 38)5 39)1 40)2 41)442)4 43)4 44)5 45)4 46)2 47)1 48)4 49)4 50)1

Sheet2

Sheet3