Q1. An Ad hoc query is a:
a) pre - planned question
b) pre - scheduled question
c) spur - of - the - moment question
d) question taht will not return any results
e) None of The Above
Q2. A computer _____ is a set of program instructions that can attach itself to a file, reproduces itself and spread to other files:
c) trojan horse
d) phishing scam
e) None of The Above
Q3. A file extension is separated from the main file name with ______but no spaces:
a) question mark
b) exclamation mark
c) underscore
e) None of The Above
Q4. Computers manipulate data in many ways, and this manipulation is called:
a) utilizing
b) batching
c) upgrading
d) processing
e) None of The Above
Q5. Application software is designed to accomplish:
a) real world tasks
b) computer - centric tasks
c) gaming tasks
d) operating system tasks
e) None of The Above
Q6. The human - readable version of a program is called:
a) standard code
b) program code
c) integer code
d) system code
e) None of The Above
Q7. _____is the result produced by a computer:
b) Memory
c) Output
e) None of The Above
Q8. A _____computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage and processing components into a single portable unit:
a) notebook
b) journal
d) briefcase
e) None of The Above
Q9. A computer intensive problem runs on a:
b) mainframe
c) supercomputer
d) super PC
e) None of The Above
Q10. All the deleted files go to:
a) Recycle Bin
b) Task Bar
c) Tool Bar
d) My Computer
e) None of The Above
Q11. Which is the best definition of a software package:
a) an add on for your computer such as additional memory
b) a set of computer programs used for a certain function such as word processing
c) a protection you can buy for a computer
d) the box, manual and license agreement that accompany commercial software
e) None of The Above
Q12. Fax machines and imaging systems are examples of:
a) bar codes readers
b) imaging systems
c) scanning devices
d) pen - based systems
e) None of The Above
Q13. A collection of interrelated files in a computer is a:
a) file manager
b) field
d) database
e) None of The Above
Q14. A _____is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users:
b) mainframe
c) desktop
e) None of The Above
Q15. Which one of the following would be considered as a way that a computer virus can enter a computer system?
a) opening an application previously installed on the computer
b) Borrowed copies of software
c) viewing a website without causing any additional transactions
d) Running antivirus programs
This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.
No comments:
Post a Comment