1. Soft copy of a document has the characteristics that it can be:
1) touched
2) viewed only
3) touched and viewed
4) All of the above
5) None of the above
2. What is the meaning of 'justified text'?
1) the text headings are all in the same style
2) all four margins on the page are the same size
3) the text is the maximum size that will fit on a page
4) the text aligns with both the right and left margins
5) None of these
3. To identify the document, it is helpful to include the file name on each page as a
1) bibliography
2) header/ footer
3) find/ search
4) macro
5) None of these
4. Which of the following allows wireless mobile devices to access the Internet and its services such as the Web and e-mail etc?
1) TCP/IP
2) WAP
3) Ethernet
4) WiFi
5) None of these
5. A passive threat to computer security is
1) Malicious Intent
2) Espionage Agents
3) Accident Errors
4) Sabotage
5) None of these
6. The browser's ________ keeps a list of web pages you have visited during the current session.
1) history
2) cache
3) favorites
4) trail
5) None of these
7. Which application is not typically included in an MS Office suite?
1) word processor
2) spreadsheet
3) antivirus
4) database
5) None of these
8. Which device cannot be shared in network?
1) Floppy
2) Computer
3) Mouse
4) Printer
5) None of these
9. Bold, italics and underline are features used in many programs. To which of the following items can these features be applied?
1) files
2) pictures
3) text
4) windows
5) None of these
10. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
1) Bridge
2) Modem
3) Router
4) Gateway
5) None of these
11. What is the purpose of providing a Drafts folder in an email system?
1) to save unsent emails
2) to store spam emails
3) to save a copy of sent emails
4) to store deleted emails
5) None of these
12. Voice mail
1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet.
2) functions much like an answering machine, allowing callers to leave a voice message for the called party.
3) involves using video and computer technology to conduct a meeting between participants at geographically separate locations.
4) permits users to converse in real time with each other via the computer while connected to the Internet.
5) None of these
13. Which of the following identifies a specific web page and its computer on the Web?
1) Website
2) Website address
3) URL
4) Domain Name
5) None of these
14. A(n) __________ allows network users to share a single copy of software, which resides on the network server.
1) single-user license agreement
2) end-user license agreement
3) network site license
4) business software license
5) None of these
15. Which port doesn't exist in computer?
1) Computer port
2) USB port
3) Printer port
4) Parallel port
5) None of these
16. All of the following are basic principles of networks, except
1) each computer must have a network card
2) each computer must have software that supports the movement of information
3) there must be at least one connecting device
4) there must be communications media connecting the network hardware devices
5) None of these
17. Workgroup means
1) Individual computer
2) Individual user
3) Computers in network
4) All of the above
5) None of the above
18. The type of software that can store, update, manipulate, and retrieve data is called
1) database management
2) spreadsheet
3) desktop publishing
4) graphics
5) None of these
19. Which command allows you to reduce fragments of file and optimize the performance of disk?
1) Scandisk
2) Defrag
3) Chkdsk
4) Diskcomp
5) None of these
20. What type of telecommunications hardware allows you to access the web?
1) Browser
2) IRC
3) FTP protocol
4) Modem
5) None of these
ANSWERS:
1-2, 2-4, 3-2, 4-2, 5-1, 6-1, 7-3, 8-3, 9-3, 10-4
11-1, 12-2, 13-2, 14-3, 15-1, 16-4, 17-3, 18-1, 19-2, 20-4
1) touched
2) viewed only
3) touched and viewed
4) All of the above
5) None of the above
2. What is the meaning of 'justified text'?
1) the text headings are all in the same style
2) all four margins on the page are the same size
3) the text is the maximum size that will fit on a page
4) the text aligns with both the right and left margins
5) None of these
3. To identify the document, it is helpful to include the file name on each page as a
1) bibliography
2) header/ footer
3) find/ search
4) macro
5) None of these
4. Which of the following allows wireless mobile devices to access the Internet and its services such as the Web and e-mail etc?
1) TCP/IP
2) WAP
3) Ethernet
4) WiFi
5) None of these
5. A passive threat to computer security is
1) Malicious Intent
2) Espionage Agents
3) Accident Errors
4) Sabotage
5) None of these
6. The browser's ________ keeps a list of web pages you have visited during the current session.
1) history
2) cache
3) favorites
4) trail
5) None of these
7. Which application is not typically included in an MS Office suite?
1) word processor
2) spreadsheet
3) antivirus
4) database
5) None of these
8. Which device cannot be shared in network?
1) Floppy
2) Computer
3) Mouse
4) Printer
5) None of these
9. Bold, italics and underline are features used in many programs. To which of the following items can these features be applied?
1) files
2) pictures
3) text
4) windows
5) None of these
10. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
1) Bridge
2) Modem
3) Router
4) Gateway
5) None of these
11. What is the purpose of providing a Drafts folder in an email system?
1) to save unsent emails
2) to store spam emails
3) to save a copy of sent emails
4) to store deleted emails
5) None of these
12. Voice mail
1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet.
2) functions much like an answering machine, allowing callers to leave a voice message for the called party.
3) involves using video and computer technology to conduct a meeting between participants at geographically separate locations.
4) permits users to converse in real time with each other via the computer while connected to the Internet.
5) None of these
13. Which of the following identifies a specific web page and its computer on the Web?
1) Website
2) Website address
3) URL
4) Domain Name
5) None of these
14. A(n) __________ allows network users to share a single copy of software, which resides on the network server.
1) single-user license agreement
2) end-user license agreement
3) network site license
4) business software license
5) None of these
15. Which port doesn't exist in computer?
1) Computer port
2) USB port
3) Printer port
4) Parallel port
5) None of these
16. All of the following are basic principles of networks, except
1) each computer must have a network card
2) each computer must have software that supports the movement of information
3) there must be at least one connecting device
4) there must be communications media connecting the network hardware devices
5) None of these
17. Workgroup means
1) Individual computer
2) Individual user
3) Computers in network
4) All of the above
5) None of the above
18. The type of software that can store, update, manipulate, and retrieve data is called
1) database management
2) spreadsheet
3) desktop publishing
4) graphics
5) None of these
19. Which command allows you to reduce fragments of file and optimize the performance of disk?
1) Scandisk
2) Defrag
3) Chkdsk
4) Diskcomp
5) None of these
20. What type of telecommunications hardware allows you to access the web?
1) Browser
2) IRC
3) FTP protocol
4) Modem
5) None of these
ANSWERS:
1-2, 2-4, 3-2, 4-2, 5-1, 6-1, 7-3, 8-3, 9-3, 10-4
11-1, 12-2, 13-2, 14-3, 15-1, 16-4, 17-3, 18-1, 19-2, 20-4
No comments:
Post a Comment