Computer Knowledge For CWE-PO/MT-V- Main Examination
1. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(2) mainframe
(3) desktop
(4) tablet
(5) None of these
Ans: (2) mainframe
2. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(1) a roller ball which moves the cursor
(2) a pen-shaped device which allows data to be entered through the CRT screen
(3) a figure which resembles a familiar office device
(4) an outdated input device
(5) None of these
Ans: (1) a roller ball which moves the cursor
3. Various applications and documents are represented on the Windows desktop by—
(1) Symbols
(2) Labels
(3) Graphs
(4) Icons
(5) None of these
Ans:(4) Icons
4. What is usually used for displaying information at public places ?
(1) Monitors
(2) Overhead Projections
(3) Monitors and Overhead Projections
(4) Touch Screen Kiosks
(5) None of these
Ans: (4) Touch Screen Kiosks
5. The real business and competitive value of information technology lies in—
(1) The software applications that are used by many companies
(2) The capabilities of the software and value of the information a business acquires and uses
(3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(4) The capabilities of the hardware and the speed at which it processes information
(5) None of these
Ans:(2) The capabilities of the software and value of the information a business acquires and uses
6. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(1) Open source vendors
(2) Alliances
(3) Application service providers
(4) All of the above
(5) None of these
Ans:(3) Application service providers
7. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(1) Opening an application previously installed on the computer
(2) Borrowed copies of software
(3) Viewing a website without causing any additional transactions
(4) Running anti virus programs
(5) None of these
Ans: (2) Borrowed copies of software
8. Collecting personal information and effectively posing as another individual is known as the crime of—
(1) spooling
(2) Identity theft
(3) spoofing
(4) hacking
(5) None of these
Ans: (2) Identity theft
9. The first step in the transaction processing cycle is—
(1) database operations
(2) audit
(3) data entry
(4) user inquiry
(5) None of these
Ans: (3) data entry
10. In the information systems concept, the output function involves—
(1) Capturing and assembling elements that enter the system to be processed
(2) Transformation processes that convert input into output
(3) Transferring elements that have been produced by a transformation process to their ultimate destination
(4) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(5) None of these
Ans: (1) Capturing and assembling elements that enter the system to be processed
No comments:
Post a Comment