Information Technology IMP question and answers. The students who are enrolled for Competitive Preparations, they can go through this. This can help in your career.
1. 1111....CCCCOOOOMMMMPPPPUUUUTTTTEEEERRRR TTTTEEEERRRRMMMMIIIINNNNOOOOLLLLOOOOGGGGYYYY
ALGOL : Algorithmic Language is basically a portable for scientific computations and was first introduced with ALGOL 58.
ARTIFACTS : They are distortions in an image that are produced by the image sensors of the optical system.
AMBER : It is often referred as orange,in computer it is referred to indicate a temporary or ongoing error.
BIT : It is basic unit of computers .It has two values 1 & 0 only.
BYTE : Combination of 8 Bits.
BAND WIDTH : The total maximum capacity of network or modem connection. The modem band width is generally measured in BPS .
BROADBAND: It is also referred as wideband transimission .Broadband refers to telecommunication taht provide a variety or channels
of data over a single communication medium.
BOOTP : Bootstrap Protocol allows a disk work station to discover certain network information.
CDN : Content Distribution Network (CDN) is also known as mirroring. It consists of multiple sites around the world taht all contain
the same information .It is unnecessary because no single website can handle simultaneous requests from several hundred million
users.
Bridge : It is a computer bridge which is a device to connect two local area networks (LAN).
Buffer : It is a memory which refers to temporary shortage of memory at the time of data processing.
CLUSTER : When referring to hard disk drive a cluster is a managed section by the computer operating system that change sizes
depending upon the size of hard disk drive .
DATA BASE : It is general collection of data shared by a variety of users. In particular it has following features.
Redundancy of data is eliminated. This is an important point in Computer Terminology in exam point of view.
*. Data is independent of any programme.
*. Data is usable by many users, simultaneously.
DEBUGGING: It is a process of riding a computer programme of logical or syntactical errors.
DIGITAL ZOOM : It is a magnification of an image by internal image processing algorithm.
EBCDIC : Extended Binary Coded Decimal Interchange Code developed by IBM is a type of coding method.
ECHELON : It is a code name of a global spy system designed to capture and analyze virtually every phone call,fax, E-mail ,telex
message.
2. EDGE: Enhanced Data Rates for Global Evolution is a radio based high speed mobile data standard. It allows the data transmission
speeds upto 384 kbps to be achieved when all eight time slots are used.
FIREWALL : It is a software /hardware that limits outside network access to a computer or computer hardware that permanently
resolve the issue.
GATE WAY : It refers to a network . A gateway is an address used as entry point.
GUI : Graphical User Interface uses icons and menus to carry out commands such as opening files ,delete files , move files etc..
Internet Group Management Protocol : It is an extension of the IP Protocol and a standard for IP ( Internet Provider) multicasting.
Kernel : It refers to a computer co-operating system ,which is the first section of the operating system to load into memory.
LAWN : Local Area Wireless Network which utilizes radio transmissions to communicate with other computers or network devices.
MICROPROCCESOR: A Single chip based device which is a complete processor in itself and is capable of performing arithmatic &
logical operations.
MARKUP LANGUAGE: It consists of easily understood names ,keywords, tags that helps format overall view of a page and the data it
contains.
XML is also called meta language.
NIBBLE : Combination of four bits .
PROTOCOL : It is also known as access method,it is a standard used to define a method of exchanging data over a computer network or
through the internet.
RTOS : Real Time Operating System is an operating system that guarantees a certain capability with in a specified time constrained.
RATS /BACK DOORS : Remote Administration Tools is a method of controllilng remote machines using the IP Address.
SMART : Self Monitoring Analysis & Reporting Technology is basically a diagnostic method.
SMTP : Simple Mail Transfer Protocol is a communication protocol that sends e-mail messages from one server to another.
TFTP : Trivial File Transfer Protocol is a simple file transfer protocol and is generally used to boot disk work stations or load
configuration files to network devices such as routers.
SWAN : State Wide Area Network : It is a minimum bandwidth of twwo Mbps to provide block level connectivity within a state for e-governance.
WAP : Wireless Application Protocol is a specification for a set of communication protocol used to allow wireless devices to access the
internet and other utilities .
3. WIZARD : It is available with other software programmes or hardware devices.
WLL : Wireless Local Loop : WLL service is based on CDMA technology and applicable for limited mobility system .
It carries both data and voice with 40-60 kbps data speed & 144 kbps maximum data speed .
Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True
Output devices store instructions or data that the CPU processes.
Answer: False (memory)
The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True
Nanostructures represent the smallest human-made structures that can be built.
Answer: True
The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a
few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the
same time (but at a slower pace).
Answer: True
Being computer fluent means that you should be able to build a computer yourself.
Answer: False
Embedded computers are self-contained computer devices that have their own programming and do not receive
input.
Answer: True
A Web browser is a special device that is installed in your computer that allows it to communicate with other devices
on a network.
Answer: False (network adapter)
With a wireless network, it is easier to relocate devices.
Answer: True
The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)
Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True
Data can be a number, a word, a picture, or a sound.
Answer: True
4. Strictly defined, a computer is a data processing device.
Answer: True
The discrepancy between the â€oehavesâ€0 and â€oehave-notsâ€0 with regard to computer technology is
commonly referred to as the digital society.
Answer: False (digital divide)
One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to
avoid viruses, the programs that pose threats to computer security.
Answer: True
Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True
Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False
Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac
The ____________ is the program that manages the hardware of the computer system, including the CPU,
memory, storage devices, and input/output devices.
Answer: operating system
The type of operating system software you use depends on your computers€™s ____________.
Answer: platform
____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application
____________are the fastest and most expensive computers.
Answer: Supercomputers
A ____________ is approximately 1,000 bytes.
Answer: kilobyte
Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks
are called ____________.
Answer: instructions
A computer gathers data, processes it, outputs the data or information, and ____________ the data or
information.
Answer: stores
5. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)
The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input
The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output
____________ is the set of computer instructions or programs that enables the hardware to perform different
tasks.
Answer: Software
When you connect to the ____________, your computer is communicating with a server at your Internet service
provider (ISP).
Answer: Internet
____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes
____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics
____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)
Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as
an operating system.
Answer: Microsoft Windows
A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining
You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application
____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes
Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage
6. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft
Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers
Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just
like humans.
Answer: simulators
AAL- ATM Adaption Layer
ACL- Access Control List
ADO- ActiveX Data Objects
ADSL-Asymmetric Digital Subscriber Line
ADT- Abstract Data Type
ALGOL- Algorithmic Language
ALU- Arithmetic and Logical Unit
ANSI- American National Standard Institute
ARP- Address Resolution Protocol
ARPA- Address and Routing Parameter Area
ARPA- Advanced Research Projects Agency
ARPANET- Advanced Research Projects Agency Network
AS- Access Server
ASCII- American Standard Code for Information Interchange
ASM- Algorithmic State Machine
ASP- Active Server Pages
ASP- Application Server Provider
AT- Access Time
AT- Active Terminology
ATM- Asynchronous Transfer Mode
7. AVC- Advanced Video Coding
AVI- Audio Video Interleaved
AWT- Abstract Window Toolkit
BAL- Basic Assembly Language
BASIC- Beginners All Purpose Symbolic Instruction Code
BCD- Binary Coded Decimal
BCNF- Boyce-codd Normal Form
BER- Bit Error Rate
BIN- Binary
BINAC- Binary Automatic Computer
BIOS- Basic Input Output System
BLOB- Binary Large Object
BNC- Bayonet Neill-Concelman
BPS- Bits per Second
CAD- Computer Aided Design
CAM- Computer Aided Manufacturing
CAT- Computer Aided Translation
CASE- Computer-Aided Software Engineering
CDMA- Code Division Multiple Access
CD-ROM- CD Read Only Memory
CIFS- Common Internet File System
CISC- Complex Instruction Set Computer
CLR- Common Language Runtime
CMOS- Complementary Metal-Oxide Semiconductor
COBOL- Common Business Oriented Language
COM- Component Object Model
8. CORBA- Common Object Request Broker Architecture
CPS- Characters per Second
CPU- Central Processing Unit
CRC- Cyclic Redundancy Check
DAC- Digital to Analog Converter
DAO- Data Access Objects
DAP- Directory access protocol
DBA- Data Base Administrator
DCCP- Datagram Congestion Control Protocol
DCL- Data Control Language
DCOM- Distributed Component Object Model
DDE- Dynamic Data Exchange
DES- Data Encryption Standard
DFD- Data Flow Diagram
DFS- Distributed File System
DHCP- Dynamic Host Configuration Protocol
DHTML- Dynamic Hyper Text Markup Language
DMA- Direct Memory Access
DML- Data Manipulation Language
DNS- Domain Name System
DOM- Document Object Model
DoS- Denial of Service
DRAM- Dynamic Random Access Memory
DSDL- Document Schema Definition Languages
DSL- Digital Subscriber Line
DSL- Domain Specific Language
9. DVD- Digital Video Disc
DVD-ROM – DVD Read Only Memory
DVI- Digital Video Interface
DVR- Digital Video Recorder
EAI- Extensible Authentication Protocol
EBML- Extensible Binary Meta Language
EEPROM- Electronically Erasable Programmable Read Only Memory
EFI- Extensible Firmware Interface
ELM- Electronic Mail
EOF- End of File
EOL- End of Line
EUC- Extended UNIX Code
EXT- Extended File System
FAP- FORTRAN Assembly Program
FAT- File Allocation Table
FAQ- Frequently Asked Questions
FDD- Floppy Disk Drive
FDDI- Fiber Distributed Data Interface
FDMA- Frequency Division Multiple Access
FEC- Forward Error Correction
FHS- File system Hierarchy Standard
FIFO- First in First out
FORTRAN- Formula Translation
FPS- Floating Point System
FSM- Finite State Machine
FTTP- Fiber to the Premises
10. FTP- File Transfer Protocol
FXP- File Exchange Protocol
GB- Giga Byte
GIF- Graphic Interchange Format
GIGO- Garbage in Garbage Out
GIMP- GNU Image Manipulation Program
GML- Geography Markup Language
GUI- Graphical User Interface
GWT- Google Web Toolkit
HBA- Host Bus Adaptor
HDD- Hard Disk Drive
HD DVD- High Definition DVD
HDL- Hardware Description Language
HID- Human Interface Device
HP- Hewlett-Packard
HPFS- High Performance File System
HTM- Hierarchical Temporal Memory
HTML- Hyper Text Markup language
HTTP- Hyper Text Transfer Protocol
Hz- Hertz
IC- Integrated Circuit
ICE- In circuit Emulator
ICMP- Internet Control Message Protocol
ICP- Internet Cache Protocol
IDE- Integrated Development Environment
IDL- Interface Definition Language
11. IEEE- Institute of Electrical and Electronics Engineering
IGRP- Integrated Gateway Routing Protocol
IL- Intermediate Language
IM- Instant Messenger
IMAP- Internet Message Access Protocol
IP- Internet Protocol
IPC- Inter Process Communication
IPL- Initial Program Load
IPP- Internet Printing Protocol
IPX- Internet Packet Exchange
ISA- Instruction Set Architecture
ISDN- Integrated Services Digital Network
ISO- International Organization for Standardization
ISP- Internet Service Provider
J2EE- Java 2 Enterprise Edition
J2SE- Java 2 standard Edition
JDBC- Java Database Connectivity
JDK- Java Development Kit
JFC- Java Foundation Classes
JMS- Java Message Service
JNDI- Java Naming and Directory Interface
JNI- Java Native Interface
JPEG- Joint Photographic Experts Group
JRE- Java Runtime Environment
JS- Java Script
JSP- Java Server Pages
12. JVM- Java Virtual Machine
KB- Kilo Byte
KHz- Kilo Hertz
KBPS- Kilo Bytes Per Second
LAN- Local Area Network
LCD- Liquid Crystal Display
LCR- Least Cost Routing
LED- Light Emitting Diode
LIFO- Last in First Out
LOC- Lines of Code
MAC- Media Access Control
MAN- Metropolitan Area Network
MANET- Mobile Ad-Hoc Network
MDA- Mail Delivery Agent
MIB- Management Information Base
MICR- Magnetic Ink Character Recognition
MIDI- Musical Instrument Digital Interface
MIMD- Multiple Instruction Multiple Data
MIMO- Multiple Input Multiple Output
MIPS- Million Instructions Per Second
MOSFET- Metal-Oxide Semi-conductor Field Effect Transistor
MPEG- Motion Pictures Expert Group
MTA- Mail Transfer Agent
MX- Mail Exchange
NACK- Negative Acknowledgement
NAT- Network Address Translation
13. NFS- Network File System
NOS- Network Operating System
NUMA- Non-Uniform Memory Access
NVR- Network Video Recorder
NVRAM- Non-Volatile Random Access Memory
OASIS- Organization for the advancement of Structured Information Standards
ODBC- Open Data Base Connectivity
OLAP- Online Analytical Processing
OLE- Object Linking and Embedding
OLTP- Online Transaction Processing
OOP- Object Oriented Programming
OPML- Outline Processor Markup Language
ORB- Object Request Broker
OSI- Open Systems Interconnection
PAN- Personal Area Network
PAP- Password Authentication Protocol
PDA- Personal Digital Assistant
PDF- Portable Document Format
PERL- Practical Extraction and Reporting Language
PHP- PHP-Hypertext Preprocessor
PPI- Pixels per Inch
PVR- Personal Video Recorder
QA- Quality Assurance
QOS- Quality of Service
RAM- Random Access Memory
RDBMS- Relational Data Base Connectivity / Relational Data Base Management System
14. RDM- Relational Data Model
RDS- Remote Data Service
RIP- Routing Information Protocol
RMI- Remote Method Invocationn
ROM- Read Only Memory
RPC- Remote Procedure Call
15. 1. Which of the following is not related to a computer monitor?
(a) VDU
(b) Plasma Display
(c) Pointing devices
(d) CRT
2. ......... is an input device commonly available in laptops.
(a) Trackball
(b) Touchpad
(c) Touch screen
(d) Joystick
3. A temporary storage area attached to the CPU of the computer for input-output operations is a:
(a) Register
(b) Buffer
(c) Channel
(d) Core
4. Product of the data processing is:
(a) Data
(b) A computer
(c) Software
(d) Information
5. A collection of parallel lines that connects several devices in a computer is called:
(a) Bus
(b) Link
(c) Bidirectional wires
(d) Cables
6. Software installed to help prevent hacking is called:
(a) System software
(b) Antivirus software
(c) Firewall software
(d) Application software
7. Encryption of data means that:
(a) Data cannot be sent over the internet
(b) Data is encoded so it cannot be read without decoding software
(c) Data is kept locked in special room
(d) Data has been hacked into
8. A person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure
is:
(a) Hacker
(b) Cracker
16. (c) Programmer
(d) None of these
9. Linux is a …………..
(a) Database program
(b) Application program
(c) Operating system
(d) None of these
10........... is a legal monopoly granted for a limited time to the owner of an invention?
(a) Trade secrets
(b) Copyright
(c) Trademark
(d) Patent
11. This is based on individual who knows how to use information and communication technologies and those who
do not?
(a) Access
(b) Usage
(c) Usage Quality
(d) None of the above
12. The kind of crime involves altering raw data just before a computer processes it and then changing it back after
the processing is completed:
(a) Data diddling
(b) Data tampering
(c) Salami attacks
(d) None of the above
13. Information Technology Act in India was amended in:
(a) 2000
(b) 2004
(c) 2008
(d) 2010
14. Which of the following is not a wireless communication device?
(a) Blue tooth
(b) GPS
(c) Infra red communication
(d) None of these
15. Computer to computer exchange of business documents is done through?
(a) EDI
(b) ERP
(c) CAM
(d) CAD
16. Who started Free Software Foundation?
(a) Linus Torvald
(b) Richard Stallman
17. (c) Bill Gates
(d) GNU
17. The resolution of a monitor is governed by the:
(a) Size of the screen
(b) Cost of the monitor
(c) Contrast of the pixels on the screen
(d) Number of pixels
18. LCD stands for :
(A) Liquid Crystal Display
(B) Laser Crystal Display
(C) Light Crystal Display
(D) All of these
(E) None of these
19. A Byte constitutes of :
(A) 9 bits
(B) 8 bits
(C) 7 bits
(D) 4 bits
(E) None of these
20. Memory in a PC is addressable through :
(A) Bits
(B) Byte
(C) Nibble
(D) All of these
(E) None of these
21. One Kilo Byte represents :
(A) 1024 bytes
(B) 1000 bytes
(C) 100 bytes
(D) 1064 bytes
(E) None of these
22. RAM in its commercial forms are available as :
(A) SIMM
(B) DIMM
(C) Both (A) & (B)
(D) CPSB
(E) None of these
23. Refresh Rate of monitor is measured in :
(A) Hz
(B) Meter
(C) Volts
(D) Amp.
(E) None of these
24. Such types of printers, in which the printing head contacts with the paper in printing process, are called as :
(A) Impact Printer
(B) Non-Impact Printer
(C) Laser Printer
(D) All of these
(E) None of these
25. Which of the following meaning is used between CPU & RAM to speed up the processing power of a CPU?
(A) Virtual Memory
(B) DRAM
(C) Flash Memory
(D) Cache Memory
(E) None of these
26. Which of the following is lowest in memory hierarchy?
(A) Cache memory
(B) Secondary memory
18. (C) Registers
(D) RAM
(E) None of these
27. Which of the following is an input device?
(A) Keyboard
(B) VDU
(C) Both (A) & (B)
(D) Dvu
(E) None of these
28. Basic building block for a digital circuit is :
(A) Word
(B) Logic Gate
(C) Processor
(D) BUS
(E) None of these
29. Which of the following is a logic gate?
(A) AND
(B) OR
(C) CPU
(D) Both (A) & (B)
(E) None of these
30. ASCII stands for :
(A) American Standard Code for Institute Interchange
(B) American Standard Code for Information Interchange
(C) American Standard Code for Information Institute
(D) All of these
(E) None of These
31. Which of the following requires refreshing during retaining the data?
(A) DRAM
(B) SRAM
(C) Virtual Memory
(D) FDD
(E) None of these
32. RAM stands for :
(A) Read Access Memory
(B) Random Access Memory
(C) Random Assigned Memory
(D) All of these
(E) None of these
33. The base of binary number is :
(A) 2
(B) 16
(C) 8
(D) 10
(E) None of these
34. CRT stands for :
(A) Character Ray Tube
(B) Cathode Ray Tube
(C) Colour Ray Tube
(D) All of the above
(E) None of these
35. Which of the following is a GUI device :
(A) Keyboard
(B) Mouse
(C) OMR
(D) All of these
(E) None of these
36. Which of the following is a type of optical media?
(A) FDD
(B) HDD
(C) CD
(D) Magnetic Tape
19. (E) None of these
37. DVD stands for :
(A) Digital Video Disk
(B) Digital Versatile Disk
(C) Both (A) & (B)
(D) All of these
(E) None of these
38. Which of the following is an input device?
(A) VDU
(B) Printer
(C) Plotter
(D) MICR
(E) None of these
39. Identify the odd one :
(A) Storage tape memory
(B) Magnetic disc memory
(C) Optical disc memory
(D) Read only memory
(E) None of these
40. Nibble describes a bits combination of :
(A) 5 bits
(B) 6 bits
(C) 7 bits
(D) 4 bits
(E) None of these
41. Data in RAM are :
(A) Volatile in nature
(B) Non-volatile in nature
(C) Both (A) & (B)
(D) All of these
(E) None of these
42. BIOS stands for :
(A) Basic Input Output System
(B) Basic Instruction Output System
(C) Basic Interface Output System
(D) All of these
(E) None of these
43. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
44. When the pointer is positioned on a _____, it is shaped like a hand.
(A) Grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
20. (E) Hyperlink
45. Personal computers can be connected together to form a-
(A) server
(B) Supercomputer
(C) Network
(D) Enterprise
(E) None of these
46. A _____ is the term used when a search engine returns a Web page that matches the search criteria.
(A) Blog
(B) Hit
(C) Link
(D) View
(E) Success
47. _____are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
48. Mobile Commerce is best described as-
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/ services through wireless hand-held devices
(D) Using notebook PC’s in marketing
(E) None of the above
49. Which of the following controls the manner of interaction between the user and the operating system?
(A) Language translator
(B) Platform
(C) User interface
(D) Icon
21. (E) None of these
50. You can keep your personal files/folders in
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
(E) My Collection
51. Three types of compact disks include CD-ROM, CD-R, and
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
(E) None of these
52. All computers must have
(A) Â A word processing software
(B) An operating system
(C) An attached printer
(D) A virus checking program
(E) None of these
53. Collecting personal information and effectively posing as another individual is known as
(A) Spooling
(B) Spoofing
(C) Hacking
(D) Identity theft
(E) None of these
54. To change selected text to all capital Letters, click the change case buttons, then click
(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
22. (E) Large Size
55. A person who used his or her expertise to gain access to other people’s computers to get information illegally or to do
(A) Hacker
(B) Analyst
(C) Instant messenger
(D) Programmer
(E) Spammer
56. A device that connects to a network without the use of cables is said to be
(A) Distributed
(B) Free
(C) Centralized
(D) Open Source
(E) None of these
57. Reusable optical storage will usually have the acronym
(A) CD
(B) DVD
(C) ROM
(D) RW
(E) ROS
58. The most common type of storage devices are:
(A) Persistent
(B) Optical
(C) Magnetic
(D) Flash
(E) Steel
59. Codes consisting of lines of varying widths or lengths that are computer-readable are known as
(A) An ASCII code
(B) A magnetic tape
(C) An OCR scanner
(D) A bar code
23. (E) None of these
60. A Website’s main page is called its
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
61. Part number, part description, and number of parts ordered are examples of
(A) Control
(B) Output
(C) Processing
(D) Feedback
(E) Input
62. To access properties of an object, the mouse technique to use is
(A) Dragging
(B) Dropping
(C) Right-clicking
(D) Shift-clicking
(E) None of these
63. Computers use the number system to store data and perform calculations.
(A) Binary
(B) Octal
(C) Decimal
(D) Hexadecimal
(E) None of these
64. _________are attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing trips
(B) Computer viruses
(C) Spyware scams
(D) Viruses
24. (E) Phishing scams
65. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical – anyone can access a computer.
66. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
67. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and
then point to Auto Fit Contents.
(A) Fit to Form
(B) Format
(C) Auto size
(D) Contents
(E) Auto Fit
68. The simultaneous processing of two or more programs by multiple processors is
(A) Multiprogramming
(B) Multitasking
(C) Time-sharing
(D) Multiprocessing
(E) None of these
69. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
25. (E) Read-only
70. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CD-ROM
(E) ROM
71. The default view in Excel is view.
(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
72. What displays the contents of the active cell in Excel?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
73. In Word, you can force a page break
(A) By positioning your cursor at the appropriate place and pressing the Fl key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
74. Grouping and processing all of a firm’s transactions at one time is called
(A) A database management system
(B) Batch processing
(C) A real-time system
(D) An on-line system
26. (E) None of these
75. Help Menu is available at which button ?
(A) End
(B) Start
(C) Turnoff
(D) Restart
(E) Reboot
76. You can keep your personal files/ folders in
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
77. A central computer that holds collections of data and programs for many PCs, workstations,
and other computers is a(n)
(A) Supercomputer
(B) Minicomputer
(C) Laptop
(D) Server
(E) None of these
78. When you save to this, your data will remain intact even when the computer is turned off.
(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
79. The folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
27. (E) Inbox
80. You can a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A) Refine
(B) Expand
(C) Load
(D) Query
(E) Slowdown
81. The contents of are lost when the computer turns off.
(A) Storage
(B) Input
(C) Output
(D) Memory
(E) None of these
82. The enables you to simultaneously keep multiple Web pages open in one browser window.
(a) Tab box
(B) Pop-up helper
(C) Tab row
(D) Address bar
(E) Esc key
83. A DVD is an example of a(n)
(A) Hard disk
(B) Optical disc
(C) Output device
(D) Solid-state storage device
(E) None of these
84. What are the two parts of an e-mail address?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
28. (E) User name and recipient name
85. If you wish to extend the length of the network without having the signal degrade, you would use a
(A) Resonance
(B) Router
(C) Gateway
(D) Switch
(E) Repeater
86. A repair for a known software bug, usually available at no charge on the internet, is called
(A) version
(B) Patch
(C) Tutorial
(D) FAQ
(E) Rectifier
87. URL stands for
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Research List
(D) Uniform Research Locator
(E) Uniform Resource Locator
88. When data changes in multiple lists and all lists are not updated, this causes
(A) Data redundancy
(B) Information overload
(C) Duplicate data
(D) Data inconsistency
(E) Data repetition
89. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
29. (E) None of these
90. The Internet is
(A) A large network of networks
(B) An internal communication system for a business
(C) A communication system for the Indian government
(D) A communication system for some states of India
(E) A communication system for some cities of India
91. Computers that are portable and convenient for users who travel are known as
(A) Supercomputers
(B) Planners
(C) Minicomputers
(D) File servers
(E) Laptops
92. What is the storage area for e-mail messages called?
(A) A folder
(B) A mail box
(C) A directory
(D) The hard disk
(E) None of these
93.The operating system does all of the following EXCEPT:
1). provide a way for the user to interact with the computer.
2). manage the central processing unit (CPU).
3 ). manage memory and storage.
4 ). enable users to perform a specific task such as document editing.
94.To move forward through the tabs
1). CTRL+TAB
2 ). CTRL+SHIFT+TAB
3 ). SHIFT+TAB
4 ). None of these
95.Which of the following is a valid IP address?
1). 192.168.111.1111
2 ). 192.168.1.1
3 ). 192.168.900.1
4 ). 192.900.168.1
96.The ability to recover and read deleted or damaged files from a criminals computer is an example of
30. a law enforcement specialty called:
1). simulation
2 ). animation
3 ). robotics
4 ). computer forensics
97.Allocation of a resources in a time dependent manner to several program simultaneously called
1). multi user
2 ). multi tasking
3 ). time sharing
4 ). None of these
98.Which of the following is an example of a binary number?
1). A1BCD1
2 ). 23456
3 ). 005
4 ). 100101
99.____________ controls the way in which the computer system functions and provides a means
by which users can interact with the computer.
1). The operating system
2 ). The motherboard
3 ). The platform
4 ). Application software
100.What is the shortcut key of printing a document for computer having windows?
1). Shift + P
2 ). Alt + P
3 ). Ctrl + P
4 ). Ctrl + Shift + P
101.Which of the following are true about firewalls?
1). Follows a set of rules
2 ). Can be either a hardware or software device
3 ). Filters network traffic
4 ). All the above
102.In the binary language each letter of the alphabet, each number and each special character is made
up of a unique combination of:
1). eight bytes.
2 ). eight characters.
3 ). eight bits.
4 ). eight kilobytes.
103.Verification of a login name and password is known as:
1). configuration
2 ). accessibility
3 ). authentication
4 ). logging in
104.Which of the following is a correct format of Email address?
1). sales@website@info
2 ). sales@website.info
3 ). saleswebsite.info
4 ). sales.website.info
31. 105.The difference between people with access to computers and the Internet and those without this
access is known as the:
1). digital divide.
2 ). Internet divide.
3 ). Web divide.
4 ). cyberway divide.
106.What is e-commerce?
1). Buying and selling computer products
2 ). Buying and selling products and services not found in stores
3 ). Buying and selling international goods
4 ). Buying and selling products and services over the Internet
107.'Blue tooth' technology allows
1). Satellite communication
2 ). Wireless communication between equipments
3 ). Signal transmission on mobile phones only
4 ). Landline phone to mobile phone communication
108.Java is a
1). Operating System
2 ). Compiler
3 ). Input Device
4 ). Programming Language
109.The basic unit of a worksheet into which you enter data in Excel is called a
1). cell
2 ). table
3 ). box
4 ). column
110.The set of instructions that tells the computer what to do is
1). Softcopy
2 ). Software
3 ). Hardware
4 ). Hardcopy
111.What are the four things needed to connect to the Internet?
1). Monitor, keyboard, mouse, modem
2 ). Telephone line, PDA, modem and computer
3 ). Telephone line, modem, computer, and an ISP
4 ). Modem, computer, PDA and ISP
112.What is the commonly used unit for measuring the sped of data transmission?
1). Mega Hertz
2 ). Characters per second
3 ). Nano seconds
4 ). Bits per second
113.Word processing, spreadsheet, and photo-editing are examples of:
1). application software.
2 ). system software.
3 ). operating system software.
4 ). platform software.
114.Which of the following stores more data?
1). DVD
2 ). CD ROM
32. 3 ). Floppy Disk
4 ). CD RW
115.The base of the hexadecimal number system is
1). 2
2 ). 8
3 ). 10
4 ). 16
116.The Operating System Manages
1). Processes
2 ). Memory
3 ). Disks and I/O devices
4 ). All of the above
117.____________ is the ability of an operating system to control the activities of multiple programs at
the same time.
1). Streamlining
2 ). Multiuser
3 ). Multitasking
4 ). Simulcasting
118.What does HTTP stands for?
1). Head Tail Transfer Protocol
2 ). Hypertext Transfer Protocol
3 ). Hypertext Transfer Plot
4 ). Hypertext Transfer Plotter
119.____________ is data that has been organized or presented in a meaningful way.
1). A process
2 ). Information
3 ). Software
4 ). Storage
120.Computer software includes
1). Packaged programs
2 ). Application programs
3 ). Operating system programs
4 ). All of these
121.Data that are accumulated and processed in group called
1). Group processing
2 ). Batch Processing
3 ). Time sharing
4 ). None of these.
33. 123.Keyboard Shortcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu
(Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
124.Dialog Box - Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
34. 4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
125.Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
35. * HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource UnderSeized.
* 3G -3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile
Telecommunication System.
* SIM - Subscriber Identity Module .
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
*AAC = Advanced Audio Coding
* GIF= Graphic Interchangeable Format
* JPEG = Joint Photographic Expert Group
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
36. * CD -Compact Disk.
* DVD - Digital Versatile Disk.
*CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI -Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - Uninterruptible Power Supply.
* HSDPA - High Speed Downlink Packet Access.
* EDGE - Enhanced Data Rate for GSM [GlobalSystem for Mobile Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research
Project Agency Network.
* IBM - International Business Machines.
* HP - Hewlett Packard.
*AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network
126.Computer uses the……….number system to store data and perform calculations.
1. Binary
2. Octal bar
3. Decimal
4. Hexadecimal
127.Why is it unethical to share copyrighted files with your friends ?
1. It is not unethical, because it is legal
2. It is not unethical, because it is legal
3. Sharing copyrighted files without permission breaks copyright laws.
4. It is not unethical because the files are being given for free.
128.To instruct Word to fit the width of a column to the contents of a table automatically.
1. Fit to Form
2. Format
3. Autosize
4. AutoFit
37. 129.Which of the following can be used to select the entire document ?
1. CTRL+A
2. ALT+F5
3. SHIFT+A
4. CTRL+K
130.A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is–
1. Memory Only
2. Write Only
3. Read only
4. Run Only
131. All of the following statements concerning windows are true EXCEPT:
1). windows are an example of a command-driven environment.
2 ). windows can be resized and repositioned on the desktop.
3 ). more than one window can be open at a time.
4 ). toolbars and scrollbars are features of windows.
132.____ is a collection of raw, unprocessed facts, figures, and symbols.
A: Hardware
B: Software
C: Information
D: Data
133.The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
134.The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
38. D. 1
Answer: B
135.A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
136. ____________ controls the way in which the computer system functions and provides a means by which users
can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
137.The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
138. ____________ are specially designed computer chips that reside inside other devices, such as your car or your
electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
139.The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
140.The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
39. D. system and application.
Answer: D
141.Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
142.____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
143.DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
144.The difference between people with access to computers and the Internet and those without this access is known
as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
145.____________ is the science revolving around the use of nano structures to build devices on an extremely
small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
146.____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
40. D. One million
Answer: A
147.The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
148.Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
149. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
150.System software is the set of programs that enables your computers hardware devices and ____________
software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
151.The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
152.Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating
systems.
A. languages
B. methods
C. CPUs
D. storage devices
41. Answer: C
153.Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
154.A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
155.____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
156.The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
157.All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
158.Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
159.All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
160.The ____________, also called the â€oebrainsâ€0 of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
161.After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture
is considered:
A. data.
B. output.
C. input.
42. D. the process.
Answer: B
162.Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
163.Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
164.In the binary language each letter of the alphabet, each number and each special character is made up of a
unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
165.The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
166.A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
167.A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
43. D. megabyte
Answer: C
168.Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This
technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
169.Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
170. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
171. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
172. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
173. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
44. 174. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
175.All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
176.A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
177. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer
systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
178.A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price
(and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
179.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement
specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
45. 180.Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
181. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
182.A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
183.All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
184.Primary memory stores?
a) Data alone
b) Only programs
c) Processed data
d) All of the above
Answer : D
185.Memory unit is one part of
a) Central Processing Unit
b) Control Unit
c) External devices
d) None of the above
46. Answer : A
186.EPROM can be used for?
a) Erasing the contents of ROM
b) Rew7riting the contents of ROM
c) Erasing and rewriting the contents of ROM
d) None of the above
Answer : C
187.Memory is made up of?
a) Wires
b) Circuits
c) Several thousands of cells
d) None of the above
Answer : C
188.When you use mobile phone to purchase the product and transfer the money , the transaction is called
a) M-Commerce/mobile banking
b) E-Commerce
c) Web transaction
d) None of the above
Answer : A
189.JPG is the extension for_
a) Microsoft Outlook Files
b) Image Files
c) Bitmap Graphic Files
d)None of the above Files
Answer : b
190.What is the extension for Microsoft Word Document
a) DOC
b)DOT
c)DGN
d)DWG
Answer : A
47. 191.What is primary object of an operating system?
a) To activate the system
b) To make the most efficient use of the computer hardware and other periphery- devices
c) To save the power
d) To help the Programming languages
Answer : B
192.What is the main object of multiprogramming systems?
a) To process all the jobs with high speed
b) To use less memory space
c) Execute more jobs in the same time period
d) None of the above
Answer : B
193.What is the extension for Microsoft Excel Workspace
a) XLS
b)XLT
c)XLW
d)XLL
Answer : A
194.The basic operations performed by computer are?
a) ASCII
b) BCD
c) Hollerith
d) None of these
Answer : a
195.ROM is composed of
1. Magnetic cores
2. Micro-processors
3. Photoelectric cells
4. Floppy disks
5. None of these
Answer : 2
196.A device that can convert digital signal to analog signal is
48. 1. A packet
2. Modem
3. Switch
4. Router
5. None of these
Answer : 3
197.Internet-like networks within an enterprise known as
1. Intranet
2. Internet
3. Extranet
4. Network
5. None of these
Answer : 1
198.File Transfer Protocol (FTP) is
1. Used to send email
2. Used to browse the Web
3. is part of Netscape
4. is a protocol for the transfer of files between computers
5. None of these
Answer : 4
199.Which of the following types of channels moves data relatively slowly?
1. Narrowband channel
2. broadband channel
3. wideband channel
4. None of these
Answer : 1
200.What does DOS stand for?
1. Disk Operation Sequence
2. Disk Operating System
3. Don't Operate System
Answer : 2
201.Device which allows your computer to connect to another computer via a phone line
49. 1. Server
2. Modem
3. Jeck
Answer : 2
202.'Booting' the computer refers to:
1. Powering On the Computer
2. Powering Down the Computer
3. Closing Windows
Answer : 1
203.The list of coded instructions is called
1. Computer program
2. Algorithm
3. Flowchart
4. Utility programs
5. None of the above
Answer : 1
204.ASCII stands for
1. American standard code for information interchange
2. All purpose scientific code for information interchange
3. American security code for information interchange
4. American Scientific code for information interchange
5. None of the above
Answer : 1
205.A language which is close to that used within the computer is
1. High-level language
2. Assembly language
3. Low-level language
4. All of the above
50. Answer : 3
206.RAM is used as a short memory because it is
1. Has small capacity
2. Is very expensive
3. Volatile
4. None of the above
Answer : 3
207.In UNIX, which command is used to sort the lines of data in a file in reverse order
1. sort
2. sh
3. st
4. sort –r
Answer: 4
208.A single dimensional array is called
1. List
2. File
3. Martix
4. None of these
Answer: 1
209.C, BASIC, COBOL, and Java are examples of ……… languages.
1. Computer
2. System Programming Language
3. Low Level Programming Language
4. High Level Programming Language
Answer: 4
51.
52. 210.The earliest calculating devices are?
· Calculators
· Search engines
· Transistors
· ABACUS
211.What is the address given to a computer connected to a network called?
· Process ID
· URL
· IP Address
· None of the above
212.Algorithm and Flow chart are helpful to the programmer to?
· Identify the base of a problem
· To solve the problem
· Specify the problem completely and clearly
· No use
213.Which of the following have the faster access time?
· Compact Disks
· Semiconductor Memories
· Magnetic Tapes
· None of the above
214.What is the main object of multiprogramming systems?
· To process all the jobs with high speed
· To use less memory space
· Execute many jobs in the same time period
· None of the above
53. 215..JPG is the extension for
· Microsoft Outlook files
· Image files
· Bitmap Graphic files
· None of the above
216.Computers manipulate data in many ways, and this manipulation is called
· utilizing
· batching
· upgrading
· processing
217.A result of a computer virus can not lead to ......
· Disk Crash
· Mother Board Crash
· Corruption o f program
· Deletion of files
218.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called
a(n)
· Workstation
· CPU
· Magnetic disk
· Integrated circuit
· None of these
219.What is the main difference between a mainframe and a super computer ?
· Super computer is much larger than mainframe computers
· Super computers are much smaller than mainframe computers
· Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to
execute as many programs concurrently
54. · Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs
as fast as possible
· None of these
220.By default, your documents print in _ mode.
· Landscape
· Portrait
· Page Setup
· Print View
· None of these
221.
· Application
· Peripheral
· Programme
· Software
· None of these
222.Which of the following commands is given to reboot the computer ?
· Ctrl + Alt + Del
· Ctrl + Shift + ?
· Ctrl + Shift + Del
· Ctrl +Alt + shift
· Ctrl + Alt + Tab
223.Such a pre-made document, which has coordinating font, layout and background, is-
· Guide
· Model
· Ruler
· Template
· None of these
224.A computer cannot 'boot' if it does not have the-
55. · Compiler
· Loader
· Operating System
· Assembler
· None of these
225.COBOL is widely used in __ applications
· Commercial
· Scientific
· Space
· Mathematical
· None of these
226.A collection of interrelated files in a computer is a _
· file manager
· field
· record
· database
· None of these
227.Voice mail
· is the exchange of text messages and computer files transmitted via a communications network such as a local area network or
the Internet
· permits users to converse in real time with each other via the computer while connected to the Internet
· functions much like an answering machine, allowing callers to leave a voice message for the called party
· involves using video and computer technology to conduct a meeting between participants at geographically separate locations
· None of these
228.The number of distinct pixels in each dimension that can be displayed is called
· Quality
· Correctness
· Resolution
· Repetition
· Projection
56. 229.Which of the following device is used to send and receive information printed on a paper through telephone
line?
· Scanner
· Printer
· Fax Machine
· e - mail
· MICR
230.When computer processes the data, the intermediate data is stored in?
· RAM
· ROM
· Hard Disk
· CD
· BIOS
231.The Process of sending data to a number of stations at the same time is known as ?
· Broadcasting
· Unicasting
· Bicasting
· Synchronization
· None
232.What is the maximum storage capacity of a CD?
· 700 MB
· 1000 MB
· 1024 MB
· 2000 MB
· 100 MB
233.Which of the following keyboard shortcuts is used to view the properties of a selected object?
· Alt + Space
· Ctrl + Space
57. · Alt + Enter
· Ctrl + Enter
· None
234.Which of the following is true about URL ?
· It is a web browser
· It is a messenger
· It is a mail service
· It is a global address of documents and other resources on World Wide Web
· It is same as internet
235.LinkedIn is a?
· Search Engine
· Web Browser
· Social Networking Site
· Name of Operating System
· None of these
236.Which of the following best defines a compiler?
· Translates machine language into a high level language
· Translates one statement at a time as the program executes
· Translates two statements at a time as the program executes
· Produces object code
· is less sophisticated than an assembler
237.Which of the following device is used to transmit data over telecommunication lines?
· Drive
· Folder
· Modem
· Platforms
·
238.To restart the computer .... key/ button is used
58. · Reset
· Ctrl + Alt + del
· Backspace + Ctrl
· Ctrl + Del
· None of these
239.Simultaneous execution of two or more instructions is called:
· Multiprocessing
· Sequential Access
· Reduced Instruction Set Computing (RISC)
· Disk Mirroring
· None of these
240.Pick the odd one out:
· Interpreter
· Compiler
· Operating System
· Assembler
· None of these
241.What is the symbol for inbox in mail?
· Envelope
· BOX
· Upper Case 'I'
· Lower case 'I'
· None of these
242.An email address typically consists of user id followed by _ and the domain name.
· @
· #
· &
· ∗
· None of these
59. 243.Which of the following is a function of UPS?
· It provides battery backup for limited time
· It limits damage caused by fluctuating levels of electricity
· It delivers electronic messages via a bus
· It conducts a power-on self test or POST
· None of these
244.The vast network of computers that connects millions of people all over the world is called
· LAN
· Web
· Internet
· Hypertext
· None of these
245.A connection from one HTML document to another HTML document is called:
· Connecting Link
· Icon
· Hyper Link
· All of these
· None of these
246.'FIND' option is available under which of the following menu?
· File
· Edit
· View
· Tools
247.Which of the following folder retains copies of mails that are started but are not yet ready to send?
· Outbox
· Inbox
· Drafts
· Sent Items
60. 248.What is the full form of SQL, related to Database?
· Structured Query Language
· Structured Queue Language
· Systematic Query Language
· None
249.A network geometric arrangement in which a single connecting line is shared by a number of nodes is called–
· Car Topology
· Bus Topology
· Truck Topology
· All of the above
· None of these
250.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information
between her computer and another computer, such as one at the main office, is considered a ____.
A: home user
B: small office/home office user
C: mobile user
D: power user
251.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____.
A: input devices
B: output devices
C: storage devices
D: system units
252.____ is another name for a handheld computer.
A: All-in-one computer
B: Palmtop computer
C: Notebook computer
D: Workstation
253.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use.
A: fax machine
B: computer
C: printer
D: scanner
254.To access to the Internet and many other specialized services, you use a(n) ____.
A: Internet service provider (ISP)
B: application service provider (ASP)
C: network service provider (NSP)
D: online service provider (OSP)
255.Free software that has been donated for public use and has no copyright restrictions is called ____.
A: freeware
61. B: public-domain software
C: shareware
D: system software
256.A Web-enabled cellular telephone is sometimes called a(n) ____.
A: Internet phone
B: smart phone
C: smart pager
D: information appliance
257.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input.
A: garbage in, garbage out (GIGO)
B: what you see is what you get (WYSIWYG)
C: accuracy for accuracy (AFA)
D: none of the above
258.____ is a work arrangement in which employees work away from a company's standard workplace.
A: Remote employment
B: Telecommuting
C: Virtual office
D: Small office/home office (SOHO)
259.A(n) ____ is any hardware component that can convey information to a user.
A: input device
B: output device
C: storage device
D: system unit
260.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home.
A: desktop computer
B: handheld computer
C: Internet appliance
D: notebook computer
261.____ is the electric, electronic, and mechanical equipment that makes up a computer.
A: Hardware
B: Software
C: Information
D: Data
262.Two popular ____ are America Online and The Microsoft Network.
A: Internet service providers (ISPs)
B: application service providers (ASPs)
C: network service providers (NSPs)
D: online service providers (OSPs)
263.____ is copyrighted software that is distributed free for a trial period.
A: Freeware
B: Public-domain software
C: Shareware
D: System software
264.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk.
A: run
62. B: copy
C: duplicate
D: install
265.Because their electronic components have a ____ failure rate, modern computers are very dependable.
A: high
B: steady
C: low
D: consistent
266.Using ____, you can create online photo albums and store your digital photographs for free.
A: application service providers (ASPs)
B: photo communities
C: message boards
D: chat rooms
267.Chassis is another name for the ____.
A: memory
B: processor
C: communications device
D: system unit
268.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate.
A: server
B: handheld computer
C: Terminal
D: workstation
269.____ is a collection of raw, unprocessed facts, figures, and symbols.
A: Hardware
B: Software
C: Information
D: Data
270.A network that connects computers in a limited geographic area is called a(n) ____.
A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: small area network (SAN)
271.A floppy disk drive, a Zip ® drive, a hard disk drive, and a CD-ROM drive are all examples of ____.
A: input devices
B: output devices
C: storage devices
D: communications devices
272.If you are ____, you have knowledge and understanding of computers and their uses.
A: computer literate
B: computer savvy
C: technology literate
D: technology current
273.The fastest and most powerful computer is the ____.
63. A: personal computer
B: supercomputer
C: handheld computer
D: mainframe
274.When your computer connects to a network, you are considered ____.
A: linked
B: connected
C: online
D: networked
275.Chassis is another name for the ____.
A: memory
B: processor
C: communications device
D: system unit
276.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk.
A: run
B: copy
C: duplicate
D: install
277.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home.
A: desktop computer
B: handheld computer
C: Internet appliance
D: notebook computer
278.Free software that has been donated for public use and has no copyright restrictions is called ____.
A: freeware
B: public-domain software
C: shareware
D: system software
279.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____.
A: input devices
B: output devices
C: storage devices
D: system units
280.An Internet appliance is also called a(n) ____.
A: information appliance
B: Web device
C: online assistant
D: Internet tool
281.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and
graphics capabilities.
A: all-in-one computer
B: server
C: stand-alone computer
64. D: workstation
282.To create documents such as letters, memorandums, and brochures, use ____.
A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
283.____ is any data or instructions you enter into a computer.
A: Hardware
B: Input
C: Information
D: Output
284.Users may choose to publish Web pages to ____.
A: provide information about their families
B: provide information about their businesses
C: to provide distance-learning courses
D: All of the above
285.The world's largest network is the ____.
A: Web
B: Internet
C: wide area network (WAN)
D: online service provider (OSP)
286.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer
hardware devices.
A: utility program
B: operating system (OS)
C: user interface
D: application program
287.Using ____, you can create online photo albums and store your digital photographs for free.
A: application service providers (ASPs)
B: photo communities
C: message boards
D: chat rooms
288.Two popular ____ are America Online and The Microsoft Network.
A: Internet service providers (ISPs)
B: application service providers (ASPs)
C: network service providers (NSPs)
D: online service providers (OSPs)
289.Companies that use networks can save time and money because networks allow users to share ____.
A: hardware devices
B: software programs
C: information
D: all of the above
290.Text, graphics, sound, or video, and links to other Web documents are contained in ____.
A: Web pages
65. B: ISPs
C: OSPs
D: Web browsers
291.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and
graphics capabilities.
A: all-in-one computer
B: server
C: stand-alone computer
D: workstation
292.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate.
A: server
B: handheld computer
C: terminal
D: workstation
293.A ____ is any company with fewer than 50 employees, as well as the self-employed people who work out of their
homes.
A: small office/home office (SOHO)
B: large business
C: mobile office
D: power business
294.Using ____, you can create online photo albums and store your digital photographs for free.
A: application service providers (ASPs)
B: photo communities
C: message boards
D: chat rooms
295.You can use ____ to create Web pages.
A: presentation graphics software
B: Web page authoring software
C: e-mail software
D: desktop publishing software
296.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk.
A: run
B: copy
C: duplicate
D: install
297.The primary tool people use to communicate with others today is the ____.
A: cellular phone
B: fax machine
C: Computer
D: television
298.____ is the electric, electronic, and mechanical equipment that makes up a computer.
A: Hardware
B: Software
C: Information
D: Data
66. 299.____ is any data or instructions you enter into a computer.
A: Hardware
B: Input
C: Information
D: Output
300.A(n) ____ is any hardware component that can convey information to a user.
A: input device
B: output device
C: storage device
D: system unit
301.A floppy disk drive, a Zip ® drive, a hard disk drive, and a CD-ROM drive are all examples of ____.
A: input devices
B: output devices
C: storage devices
D: communications devices
302.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input.
A: garbage in, garbage out (GIGO)
B: what you see is what you get (WYSIWYG)
C: accuracy for accuracy (AFA)
D: none of the above
303.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its
programs.
A: utility program
B: operating system (OS)
C: user interface
D: application service provider (ASP)
304..Free software that has been donated for public use and has no copyright restrictions is called ____.
A: freeware
B: public-domain software
C: shareware
D: system software
305.A(n) ____ is a network that covers a large geographic area.
A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: global area network (GAN)
306.To access to the Internet and many other specialized services, you use a(n) ____.
A: Internet service provider (ISP)
B: application service provider (ASP)
C: network service provider (NSP)
D: online service provider (OSP)
307.The world's largest network is the ____.
A: Web
B: Internet
C: wide area network (WAN)
67. D: online service provider (OSP)
308.____ is another name for a handheld computer.
A: All-in-one computer
B: Palmtop computer
C: Notebook computer
D: Workstation
309.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk.
A: run
B: copy
C: duplicate
D: install
310.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home.
A: desktop computer
B: handheld computer
C: Internet appliance
D: notebook computer
311.Free software that has been donated for public use and has no copyright restrictions is called ____.
A: freeware
B: public-domain software
C: shareware
D: system software
312.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____.
A: input devices
B: output devices
C: storage devices
D: system units
313.An Internet appliance is also called a(n) ____.
A: information appliance
B: Web device
C: online assistant
D: Internet tool
6.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and
graphics capabilities.
A: all-in-one computer
B: server
C: stand-alone computer
D: workstation
314.To create documents such as letters, memorandums, and brochures, use ____.
A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
315.____ is any data or instructions you enter into a computer.
A: Hardware
B: Input
68. C: Information
D: Output
316.Users may choose to publish Web pages to ____.
A: provide information about their families
B: provide information about their businesses
C: to provide distance-learning courses
D: all of the above
317.The world's largest network is the ____.
A: Web
B: Internet
C: wide area network (WAN)
D: online service provider (OSP)
318.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer
hardware devices.
A: utility program
B: operating system (OS)
C: user interface
D: application program
319.____ is a collection of raw, unprocessed facts, figures, and symbols.
A: Hardware
B: Software
C: Information
D: Data
320.Using ____, you can create online photo albums and store your digital photographs for free.
A: application service providers (ASPs)
B: photo communities
C: message boards
D: chat rooms
321.Two popular ____ are America Online and The Microsoft Network.
A: Internet service providers (ISPs)
B: application service providers (ASPs)
C: network service providers (NSPs)
D: online service providers (OSPs)
322.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input.
A: garbage in, garbage out (GIGO)
B: what you see is what you get (WYSIWYG)
C: accuracy for accuracy (AFA)
D: none of the above
323.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use.
A: fax machine
B: computer
C: printer
D: scanner
324.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information
69. between her computer and another computer, such as one at the main office, is considered a ____.
A: home user
B: small office/home office user
C: mobile user
D: power user
325.Companies that use networks can save time and money because networks allow users to share ____.
A: hardware devices
B: software programs
C: information
D: all of the above
326.____ are used to establish a connection between two computers and transmit items over transmission media,
such as cables or telephone lines.
A: Input devices
B: Output devices
C: Storage devices
D: Communications devices
327.The primary tool people use to communicate with others today is the ____.
A: cellular phone
B: fax machine
C: computer
D: television
328.Because their electronic components have a ____ failure rate, modern computers are very dependable.
A: high
B: steady
C: low
D: consistent
329.To create documents such as letters, memorandums, and brochures, use ____.
A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
330.____ is copyrighted software that is distributed free for a trial period.
A: Freeware
B: Public-domain software
C: Shareware
D: System software
331.A network that connects computers in a limited geographic area is called a(n) ____.
A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: small area network (SAN)
332.Two popular ____ are America Online and The Microsoft Network.
A: Internet service providers (ISPs)
B: application service providers (ASPs)
C: network service providers (NSPs)
70. D: online service providers (OSPs)
333.A type of computer that performs all of its input, processing, output, and storage activities on its own is called
a(n) ____.
A: personal computer
B: Internet appliance
C: handheld computer
D: mainframe
334.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home.
A: desktop computer
B: handheld computer
C: Internet appliance
D: notebook computer
335.Those who use their computers for personal and business communications, budgeting and personal financial
management, and Web access are considered ____.
A: mobile users
B: large business users
C: home users
D: power users
336.____ is a work arrangement in which employees work away from a company's standard workplace.
A: Remote employment
B: Telecommuting
C: Virtual office
D: Small office/home office (SOHO)
337.Users may choose to publish Web pages to ____.
A: provide information about their families
B: provide information about their businesses
C: to provide distance-learning courses
D: all of the above
338.A Web-enabled cellular telephone is sometimes called a(n) ____.
A: Internet phone
B: smart phone
C: smart pager
D: information appliance
339.If you are ____, you have knowledge and understanding of computers and their uses.
A: computer literate
B: computer savvy
C: technology literate
D: technology current
340.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use.
A: fax machine
B: computer
C: printer
D: scanner
341.____ is data that is organized, meaningful, and useful.
71. A: Hardware
B: Software
C: Information
D: Input
342.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____.
A: input devices
B: output devices
C: storage devices
D: system units
343.The ____ is the electronic device that interprets and carries out the basic instructions that operate the
computer.
A: chassis
B: central processing unit (CPU)
C: memory
D: storage device
344.The power of a computer depends on its ____.
A: speed
B: reliability
C: accuracy
D: all of the above
345.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer
hardware devices.
A: utility program
B: operating system (OS)
C: user interface
D: application program
346.Use ____ to store data in an organized fashion, as well as retrieve, manipulate, and display that data in a variety
of formats.
A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
347.When your computer connects to a network, you are considered ____.
A: linked
B: connected
C: online
D: networked
348. The power of a computer depends on its ____.
A: speed
B: reliability
C: accuracy
D: all of the above
349. A type of computer that performs all of its input,
processing, output, and storage activities on its own is
called a(n) ____.
72. A: personal computer
B: Internet appliance
C: handheld computer
D: mainframe
350. Application or system software provided at no cost to a user
by an individual or a company is called ____.
A: shareware
B: custom software
C: freeware
D: trial software
351. The term ____ means that the accuracy of a computer's
output depends on the accuracy of the input.
A: garbage in, garbage out (GIGO)
B: what you see is what you get (WYSIWYG)
C: accuracy for accuracy (AFA)
D: none of the above
352. A(n) ____ is an expensive, powerful desktop computer
designed for work that requires intense calculations and
graphics capabilities.
A: all-in-one computer
B: server
C: stand-alone computer
D: workstation
353. If you are ____, you have knowledge and understanding of
computers and their uses.
A: computer literate
B: computer savvy
C: technology literate
D: technology current
354. Because their electronic components have a ____ failure
rate, modern computers are very dependable.
A: high
B: steady
C: low
D: consistent
355. ____ is another name for a handheld computer.
A: All-in-one computer
B: Palmtop computer
C: Notebook computer
D: Workstation
356. The primary tool people use to communicate with others
today is the ____.
A: cellular phone
B: fax machine
C: computer
D: television
357. A(n) ____ is a set of programs containing instructions that
coordinate all the activities among computer hardware
devices.
A: utility program
B: operating system (OS)
C: user interface
D: application program
358. A(n) ____ is a computer with limited functionality whose
main purpose is to connect to the Internet from home.
A: desktop computer
B: handheld computer
C: Internet appliance
D: notebook computer
359. In the workplace, computers are used to ____.
A: create memos and letters
B: calculate payroll
C: generate invoices
73. D: all of the above
360. The computer's ____ performs a specific task, usually
related to managing the computer, its devices, or its
programs.
A: utility program
B: operating system (OS)
C: user interface
D: application service provider (ASP)
361. A ____ is a computer that does not have any processing
power, and must be connected to a sever to operate.
A: server
B: handheld computer
C: terminal
D: workstation
362. A ____ is an electronic machine that can accept data,
manipulate the data according to specified rules, produce
results, and store the results for future use.
A: fax machine
B: computer
C: printer
D: scanner
363. To create documents such as letters, memorandums, and
brochures, use ____.
A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
364. The fastest and most powerful computer is the ____.
A: personal computer
B: supercomputer
C: handheld computer
D: mainframe
365. ____ is the electric, electronic, and mechanical equipment
that makes up a computer.
A: Hardware
B: Software
C: Information
D: Data
366. Use ____ to store data in an organized fashion, as well as
retrieve, manipulate, and display that data in a variety of
formats.
A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
367. Those who use their computers for personal and business
communications, budgeting and personal financial
management, and Web access are considered ____.
A: mobile users
B: large business users
C: home users
D: power users
368.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer
hardware devices.
A: utility program
B: operating system (OS)
C: user interface
D: application program
369.To create documents such as letters, memorandums, and brochures, use ____.
74. A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
370.Free software that has been donated for public use and has no copyright restrictions is called ____.
A: freeware
B: public-domain software
C: shareware
D: system software
371.When your computer connects to a network, you are considered ____.
A: linked
B: connected
C: online
D: networked
372.A network that connects computers in a limited geographic area is called a(n) ____.
A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: small area network (SAN)
373.To access to the Internet and many other specialized services, you use a(n) ____.
A: Internet service provider (ISP)
B: application service provider (ASP)
C: network service provider (NSP)
D: online service provider (OSP)
374.Text, graphics, sound, or video, and links to other Web documents are contained in ____.
A: Web pages
B: ISPs
C: OSPs
D: Web browsers
375.A type of computer that performs all of its input, processing, output, and storage activities on its own is called
a(n) ____.
A: personal computer
B: Internet appliance
C: handheld computer
D: mainframe
376.____ is another name for a handheld computer.
A: All-in-one computer
B: Palmtop computer
C: Notebook computer
D: Workstation
377.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate.
A: server
B: handheld computer
C: terminal
D: workstation
75. 378.Those who use their computers for personal and business communications, budgeting and personal financial
management, and Web access are considered ____.
A: mobile users
B: large business users
C: home users
D: power users
379.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information
between her computer and another computer, such as one at the main office, is considered a ____.
A: home user
B: small office/home office user
C: mobile user
D: power user
380.Using ____, you can create online photo albums and store your digital photographs for free.
A: application service providers (ASPs)
B: photo communities
C: message boards
D: chat rooms
381.Users may choose to publish Web pages to ____.
A: provide information about their families
B: provide information about their businesses
C: to provide distance-learning courses
D: all of the above
382.An Internet appliance is also called a(n) ____.
A: information appliance
B: Web device
C: online assistant
D: Internet tool
383.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk.
A: run
B: copy
C: duplicate
D: install
384.The primary tool people use to communicate with others today is the ____.
A: cellular phone
B: fax machine
C: computer
D: television
385.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use.
A: fax machine
B: computer
C: printer
D: scanner
386.____ is a collection of raw, unprocessed facts, figures, and symbols.
A: Hardware
76. B: Software
C: Information
D: Data
387.____ is any data or instructions you enter into a computer.
A: Hardware
B: Input
C: Information
D: Output
388.A type of computer that performs all of its input, processing, output, and storage activities on its own is called
a(n) ____.
A: personal computer
B: Internet appliance
C: handheld computer
D: mainframe
389.If you are ____, you have knowledge and understanding of computers and their uses.
A: computer literate
B: computer savvy
C: technology literate
D: technology current
390.A(n) ____ is a network that covers a large geographic area.
A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: global area network (GAN)
391.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer
hardware devices.
A: utility program
B: operating system (OS)
C: user interface
D: application program
392.____ is the process of making a Web page available on the Internet.
A: Documenting
B: Launching
C: Publishing
D: Uploading
393.Chassis is another name for the ____.
A: memory
B: processor
C: communications device
D: system unit
394.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate.
A: server
B: handheld computer
C: terminal
D: workstation
77. 395.____ is the electric, electronic, and mechanical equipment that makes up a computer.
A: Hardware
B: Software
C: Information
D: Data
396.Two popular ____ are America Online and The Microsoft Network.
A: Internet service providers (ISPs)
B: application service providers (ASPs)
C: network service providers (NSPs)
D: online service providers (OSPs)
397.Free software that has been donated for public use and has no copyright restrictions is called ____.
A: freeware
B: public-domain software
C: shareware
D: system software
398.A Web-enabled cellular telephone is sometimes called a(n) ____.
A: Internet phone
B: smart phone
C: smart pager
D: information appliance
399.The power of a computer depends on its ____.
A: speed
B: reliability
C: accuracy
D: all of the above
400.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information
between her computer and another computer, such as one at the main office, is considered a ____.
A: home user
B: small office/home office user
C: mobile user
D: power user
401.A(n) ____ is someone who communicates with a computer or uses the information it generates.
A: processor
B: user
C: programmer
D: analyst
402.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and
graphics capabilities.
A: all-in-one computer
B: server
C: stand-alone computer
D: workstation
403.The primary tool people use to communicate with others today is the ____.
A: cellular phone
B: fax machine
78. C: computer
D: television
404.A network that connects computers in a limited geographic area is called a(n) ____.
A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: small area network (SAN)
405.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its
programs.
A: utility program
B: operating system (OS)
C: user interface
D: application service provider (ASP)
406.Users may choose to publish Web pages to ____.
A: provide information about their families
B: provide information about their businesses
C: to provide distance-learning courses
D: all of the above
407.The ____ is the electronic device that interprets and carries out the basic instructions that operate the
computer.
A: chassis
B: central processing unit (CPU)
C: memory
D: storage device
408.Using ____, you can create online photo albums and store your digital photographs for free.
A: application service providers (ASPs)
B: photo communities
C: message boards
D: chat rooms
409.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____.
A: input devices
B: output devices
C: storage devices
D: system units
410.____ is another name for a handheld computer.
A: All-in-one computer
B: Palmtop computer
C: Notebook computer
D: Workstation
411.The primary tool people use to communicate with others today is the ____.
A: cellular phone
B: fax machine
C: computer
D: television
412.A network that connects computers in a limited geographic area is called a(n) ____.
79. A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: small area network (SAN)
413.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer
hardware devices.
A: utility program
B: operating system (OS)
C: user interface
D: application program
414.____ is the process of making a Web page available on the Internet.
A: Documenting
B: Launching
C: Publishing
D: Uploading
415.A(n) ____ is any hardware component that can convey information to a user.
A: input device
B: output device
C: storage device
D: system unit
416.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home.
A: desktop computer
B: handheld computer
C: Internet appliance
D: notebook computer
417.In the workplace, computers are used to ____.
A: create memos and letters
B: calculate payroll
C: generate invoices
D: all of the above
418.Companies that use networks can save time and money because networks allow users to share ____.
A: hardware devices
B: software programs
C: information
D: all of the above
419.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its
programs.
A: utility program
B: operating system (OS)
C: user interface
D: application service provider (ASP)
420.Users may choose to publish Web pages to ____.
A: provide information about their families
B: provide information about their businesses
C: to provide distance-learning courses
80. D: all of the above
421.Chassis is another name for the ____.
A: memory
B: processor
C: communications device
D: system unit
422.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate.
A: server
B: handheld computer
C: terminal
D: workstation
423.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use.
A: fax machine
B: computer
C: printer
D: scanner
424.To access to the Internet and many other specialized services, you use a(n) ____.
A: Internet service provider (ISP)
B: application service provider (ASP)
C: network service provider (NSP)
D: online service provider (OSP)
425.To create documents such as letters, memorandums, and brochures, use ____.
A: spreadsheet software
B: database software
C: presentation graphics software
D: word processing software
426.You can use ____ to create Web pages.
A: presentation graphics software
B: Web page authoring software
C: e-mail software
D: desktop publishing software
427.The ____ is the electronic device that interprets and carries out the basic instructions that operate the
computer.
A: chassis
B: central processing unit (CPU)
C: memory
D: storage device
428.Chassis is another name for the ____.
A: memory
B: processor
C: communications device
D: system unit
429.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate.
A: server
81. B: handheld computer
C: terminal
D: workstation
430.If you are ____, you have knowledge and understanding of computers and their uses.
A: computer literate
B: computer savvy
C: technology literate
D: technology current
431.A(n) ____ is a network that covers a large geographic area.
A: intranet
B: wide area network (WAN)
C: local area network (LAN)
D: global area network (GAN)
432.____ are used to establish a connection between two computers and transmit items over transmission media,
such as cables or telephone lines.
A: Input devices
B: Output devices
C: Storage devices
D: Communications devices
433.A ____ is any company with fewer than 50 employees, as well as the self-employed people who work out of their
homes.
A: small office/home office (SOHO)
B: large business
C: mobile office
D: power business
434.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce
results, and store the results for future use.
A: fax machine
B: computer
C: printer
D: scanner
435.To access to the Internet and many other specialized services, you use a(n) ____.
A: Internet service provider (ISP)
B: application service provider (ASP)
C: network service provider (NSP)
D: online service provider (OSP)
436.Because their electronic components have a ____ failure rate, modern computers are very dependable.
A: high
B: steady
C: low
D: consistent
437.Using ____, you can create online photo albums and store your digital photographs for free.
A: application service providers (ASPs)
B: photo communities
C: message boards