Вы находитесь на странице: 1из 16

COMPUTER AWARENESS PRACTICE QUESTIONS

1. Hackers (A) all have the same motive (B) are people who maintain computers (C) may legally break into computers as long as they do not do any damage (D) break into other people's computers Answer: break into other peoples computers 2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called (A) program thievery (B) data snatching (C) software piracy (D) program looting Answer: software piracy 3. Junk e-mail is also called (A) spam (B) spoof (C) cookie crumbs (D) sniffer script Answer: spam 4. What is usually used for displaying information at public places ? (A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks Answer: Overhead Projections 5. What is MP3 ? (A) A Mouse (B) A Printer (C) A Sound Format (D) A Scanner Answer: A Sound Format 6. What is the most popular hardware for multimedia creations ? (A) PCs (B) Minicompiiters (C) Mainframe Computers (D) WANs Answer: PCs 7. For sound recording, what is necessary ?

(A) Speaker (B) Microphone (C) Talker (D) Mouse Answer: Microphone

8. The life-span of a CD-ROM is (A) approximately one year (B) approximately two years (C) approximately five years (D) approximately twenty-five years Answer: approximately five years 9. The settings are automatic and standard. (A) default (B) CPU (C) peripheral (D) user frien9ly Answer: default 10. What are the two parts of an E-mail address ? (A) User name and street address (B) Legal name and phone number (C) User name and domain name (D) Initials and password Answer: User name and domain name 11. Participants can see and hear each other in a/an (A) electronic mail system (B) message system (C) tele-conference (D) bulletin board Answer: tele-conference 12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is (A) a random-access medium (B) expensive (C) a read-only medium (D) a sequential-access medium Answer: a sequential-access medium 13. Why should you delete unknown e-mail attachments ? (A) You could go to jail

(B) The person could track you down and hurt you (C) It is bad manners (D) It might contain a virus that could hurt your computer Answer: It might contain a virus that could hurt your computer 14. How is it possible that both programs and data can be stored on the same floppy disk ? (A) A floppy disk has two sides, one for data and one for programs (B) A floppy disk has to be formatted for one or for the other (C) Programs and data are both software, and both can be stored on any memory device (D) Floppy disks can only store data, not programs Answer: Programs and data are both software, and both can be stored on any memory device 15. What is an embedded system ? (A) A program that comes wrapped in a box (B) A program that is permanently part of a computer (C) A computer that is part of a larger computer (D) A computer and software system that controls a machine or appliance Answer: A computer and software system that controls a machine or appliance 16. Which of the following will you require to hear music on your computer ? (A) Video Card (B) Tape Recorder (C) Mouse (D) Sound Card Answer: Sound Card 17. The signal that a computer is waiting for a command from the user is (A) prompt (B) event (C) time slice (D) interrupt Answer: prompt 18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page (A) Web browser (B) Web search engine (C) Web homepage (D) Web service Answer: Web browser 19. For viewing video CDs, you would use (A) CD Player (B) Windows Media Player (C) Windows Video Player (D) Windows Movie Player

Answer: Windows Media Player 20. Executing more than one program concurrently by one user on one computer is known as (A) multi-programming (B) multi-processing (C) time-sharing (D) multi-tasking Answer: multi-tasking 21. Which of the following controls the manner of interaction between the user and the operating system ? (A) language translator (B) platform (C) user interface (D) icon Answer: user interface 22. You can keep your personal flies / folders in (A) My Folder (B) My Documents (C) My Files (D) My Text Answer: My Documents 23. Three types of compact disks include CD-ROM, CD-R, and (A) CD-W (B) CD-RAM (C) CD-DVD (D) CD-RW Answer: CD-RW 24. All computers must have (A) Word processing software (B) An operating system (C) A printer attached (D) A virus checking program Answer: An operating system 25. Collecting personal information and effectively posing as another individual is known as the crime of (A) spooling (B) spoofing (C) hacking (D) identity theft Answer: identity theft

COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. If you wish to extend the length of the network without having the signal degrade, you would use a (A) resonance (B) router (C) gateway (D) repeater Answer: repeater 2. A repair for a known software bug, usually available at no charge on the Internet, is called a (A) version (B) patch (C) tutorial (D) FAQ Answer: patch 3. URL stands for (A) Universal Research List (B) Universal Resource List (C) Uniform Resource Locator (D) Uniform Research Locator Answer: Uniform Resource Locator 4. When data changes in multiple lists and all lists are not updated, this causes (A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency Answer: data inconsistency 5. What is a backup ? (A) Restoring the information backup (B) An exact copy of a system's information (C) The ability to get a system up and running in the event of a system crash or failure (D) All of these Answer: An exact copy of a systems information 6. The Internet is (A) a large network of networks (B) an internal communication system for a business (C) a communication system for the Indian government (D) a communication system for some states of India Answer: a large network of networks

7. Computers that are portable and convenient for users who travel are known as (A) supercomputers (B) planners (C) minicomputers (D) laptops Answer: laptops

8. What is the storage area for e-mail messages called ? (A) A folder (B) A mailbox (C) A directory (D) The hard disk Answer: A mailbox 9. One advantage of dial-up Internet access is (A) it utilises broadband technology (B) it is Indian (C) it uses a router for security (D) it utilises existing telephone service Answer: it utilises existing telephone service 10. What is the process of copying software programs from secondary storage media to the hard disk called ? (A) configuration (B) download (C) storage (D) installation Answer: installation 11. Which process checks to ensure that the components of the computer are operating and connected properly ? (A) Booting (B) Processing (C) Saving (D) Editing Answer: Booting 12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is (A) Modem (B) Software (C) Scanner (D) Keyboard Answer: Scanner

13. An error in a computer program (A) Crash (B) Power Failure (C) Bug (D) Virus Answer: Bug 14. Access-control based on a person's fingerprints is .an example of (A) biometric identification (B) characteristic identification (C) characteristic security (D) fingerprint security Answer: biometric identification 15. The patterns of printed lines on most products are called (A) prices (B) striping (C) scanners (D) barcodes Answer: barcodes 16. Most mail programs automatically complete the following two parts in an e-mail (A) From: and Body : (B) From: and Date : (C) From: and To : (D) From: and Subject : Answer: From: and Date : 17. The computer's capability of distinguishing spoken words is called (A) voice analysis (B) speech acknowledgement (C) voice recognition (D) speech interpretation Answer: voice recognition 18. Which of the following is an advantage of mounting an application on the Web ? (A) The possibility of 24-houraccess for users (B) Creating a system that can extend globally (C) Standardising the design of the interface (D) All of these Answer: All of these

19. The first page of a Website is called the (A) Homepage (B) Index (C) Java Script (D) Bookmark Answer: Homepage 20. ERP is an acronym for (A) Enterprise Retirement Planning (B) Enterprise Relationship Planning (C) Enterprise Resource' Planning (D) Enterprise Reorder Planning Answer: Enterprise Resource Planning 21. The software that allows users to surf the Internet is called a/an (A) Search Engine (B) Internet Service Provider (ISP) (C) Multimedia Application (D) Browser Answer: Browser 22. The issues that deal with the collection and use of data about individuals is (A) access (B) publicity (C) accuracy (D) privacy Answer: privacy 23. A term related to sending data to a satellite is (A) downlink (B) modulate (C) demodulate (D) uplink Answer: uplink 24. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called (A) hypermedia (B) hypertext (C) HTML (D) URL Answer: hypertext

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and security is concerned with protecting software from unauthorized tampering or damage. (A) data (B) cyber (C) Internet (D) metaphysical Answer: data

1. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Ans : C 2. Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. Ans : D

3. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Ans : D 4. The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number. Ans : C 5. A string of eight 0s and 1s is called a: A. megabyte. B. byte. C. kilobyte.

D. gigabyte. Ans : B 6. A ____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte D. megabyte Ans : C 7. A ____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte Ans : C 8. ____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application Ans : A 9. The components that process data are located in the: A. input devices. B. output devices. C. system unit. D. storage component. Ans : C 10. All of the following are examples of input devices EXCEPT a: A. scanner. B. mouse. C. keyboard. D. printer. Ans : D 11. Which of the following is an example of an input device? A. scanner B. speaker C. CD D. printer Ans : A

12. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Ans : B 13. The ____________, also called the brains of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU) Ans : D 14. The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device. Ans : B 15. Word processing, spreadsheet, and photo-editing are examples of: A. application software. B. system software. C. operating system software. D. platform software. Ans : A

1. Which of the following statements is FALSE concerning file names? (A) Files may share the same name or the same extension but not both (B) Every file in the same folder must have a unique name (C) File extension is another name for file type (D) The file extension comes before the dot (.) followed by the file name (E) None of these Ans : (D) 2. Verification of a login name and password is known as: (A) configuration (B) accessibility (C) authentication (D) logging in (E) None of these Ans : (C)

3. Which of the following would most likely NOT be a symptom of a virus? (A) Existing program files and icons disappear. (B) The CD-ROM stops functioning. (C) The Web browser opens to an unusual home page. (D) Odd messages or images are displayed on the screen. (E) None of these Ans : (B) 4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop. A.PSS B.POS C.inventory D.datamining Ans : A 5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Ans : C 6. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Ans : C 7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements. A. POS B. RFID C. PPS D. GPS Ans : B 8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation.

D. forecasting. Ans : A 9. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Ans : A 10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Ans : A 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Ans : D 12. ____________ is data that has been organized or presented in a meaningful fashion. A. A process B. Software C. Storage D. Information Ans : D 13. The name for the way that computers manipulate data into information is called: A. programming. B. processing. C. storing. D. organizing. Ans : B 14. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output

D. store Ans : B 15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: A. data. B. output. C. input. D. the process. Ans : B

1. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor Ans : B 2. System software is the set of programs that enables your computers hardware devices and ____________ software to work together. A. management B. processing C. utility D. application Ans : D 3. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. Ans : A 4. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices Ans : C

5. Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe. C. supercomputer. D. client. Ans : A 6. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers B. clients C. laptops D. mainframes Ans : D 7. ____________ are specially designed computers that perform complex calculations extremely rapidly. A. Servers B. Supercomputers C. Laptops D. Mainframes Ans : B 8. DSL is an example of a(n) ____________ connection. A. network B. wireless C. slow D. broadband Ans : D 9. The difference between people with access to computers and the Internet and those without this access is known as the: A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Ans : A 10. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale. A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Ans : A

11. Which of the following is the correct order of the four major functions of a computer? A. Process -> Output -> Input -> Storage B. Input -> Output-> Process -> Storage C. Process -> Storage -> Input -> Output D. Input -> Process -> Output -> Storage Ans : D

12. ____________ bits equal one byte. A. Eight B. Two C. One thousand D. One million Ans : A 13. The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000 D. 1 Ans : B 14. A byte can hold one ____________ of data. A. bit B. binary digit C. character D. kilobyte Ans : C 15. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. A. The platform B. The operating system C. Application software D. The motherboard Ans : B

Вам также может понравиться