1. Which of the following is an example of non volatile memory?
1) VLSI
2) LSI
3) ROM
4) RAM
5) Hard disk
2. IEEE 802.16 popularly called ___
1) Ethernet
2) Wi-Fi
3) WIMAX
4) Wireless Network
5) None of these
3. To protect system, there are how many security levels?
1) One
2) Two
3) Three
4) Four
5) Five
4. Java was originally invented by
1) Oracle
2) Microsoft
3) Novell
4) Sun
5) IBM
5. Asmall network making up the internet and also having a small number of computers with in it is called ___
1) Host
2) Address
3) Sub domain
4) Domain
5) URL
6. The operating system of a computer serves as a software interface between the user and ___
1) Software
2) Hardware
3) Processor
4) Compiler
5) RAM
7. Both the ALU and control section of CPU employ special purpose storage locations called:
1) Decoders
2) Buffers
3) Multiplexer
4) Registers
5) Flip flops
8. The address of the next instruction to be executed by the current process is provided by the ___
1) CPU registers
2) program counter
3) process stack
4) pipe
5) coding counter
9. Which command combines the contents of one file with another?
1) Restore
2) Rename
3) Append
4) Add
5) Store
10. The ___ is the administrative section of the computer system.
1) Memory Unit
2) Input Unit
3) Central Processing Unit
4) Control Unit
5) Logic Unit
11. Coded entries which are used to gain access to a computer system are called
1) Codeword's
2) Entry codes
3) Entry words
4) Security commands
5) Data codes
12. What is the primary requisite of a good computer programmer?
1) Mathematical mind
2) Artistic mind
3) Logical mind
4) Scientific knowledge
5) Memory Knowledge
13. The errors that can be pointed out by the compiler:
1) Syntax errors
2) Internal errors
3) Semantic errors
4) Coding errors
5) Logical errors
14. Which of the following is an advantage to using fibre optics data transmission?
1) Resistance to data theft
2) Fast data transmission rate
3) Few transmission errors
4) Low noise level
5) All the above
15. Which one of the following when added can reduce the processing time of a computer?
1) A buffer
2) A co-processor
3) 1024 megabyte
4) A converter
5) 1064 megabyte
16. A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?
1) Hoax
2) Worm
3) Trojan
4) Joke program
5) Juke program
17. 'DB' computer abbreviation usually means?
1) Driver Boot
2) Double Byte
3) Data Block
4) Database
5) None of these
18. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.
1) WAN (Wide Area Network)
2) World Wide Web
3) URL (Universal Resource Locator)
4) LAN (Local Area Network)
5) All the above
19. Hardware devices that are not part of the main computer system and are often added later to the system.
1) Execute
2) Highlight
3) Peripheral
4) Clip art
5) Insert
20. '.BAK' extension refers usually to what kind of file?
1) Audio file
2) MS Encarta document
3) Backup file
4) Animation/ movie file
5) Restore file
21. The main computer that stores the files that can be sent to computers that are networked together is ___
1) Clip art
2) File server
3) Peripheral
4) Mother board
5) IC
22. Which of the following word processors came first?
1) MS Word
2) Lotus Notes
3) WordPerfect
4) WordStar
5) WordPad
23. Which of the following operating systems is produced by IBM?
1) UNIX
2) Windows
3) DOS
4) OS-2
5) OS-3
24. Computers calculate numbers in what mode?
1) Decimal
2) Octal
3) Binary
4) Primary
5) Secondary
25. Which of the following software is used to view web pages?
1) Web Browser
2) Internet Browser
3) Page Browser
4) Crème Browser
5) All the above
26. ____ is the process in which a user sends computer information from his computer to another computer through modem.
1) Downloading
2) Uploading
3) Processing
4) Programming
5) Seeding
27. Which of the following is used to save the frequently visited web sites?
1) Frequent List
2) Favourites List
3) Explorer List
4) File list
5) Data list
28. Which of the following performs arithmetic and logical operations?
1) CU
2) PU
3) ALU
4) Memory
5) CPU
29. A ____ is a group of independent computers attached to one another through communication media.
1) Internet
2) E-mail
3) Network
4) Software
5) Hard ware
30. Which of the following is a presentation program?
1) MS-Word
2) MS-Excel
3) MS-Power Point
4) MS- Access
5) MS-Outlook
31. Collection of 1024 Bytes:
1) 1MB
2) 1KB
3) 1TB
4) 1GB
5) 100 MB
32. How would you be able to protect yourself from phishing?
1) Call your local fish store.
2) Get an Anti-Virus Program
3) Change Passwords Every 4-6 months
4) 2 & 3
5) All the above
33. Why is identity theft something hackers usually go for?
1) Personal Information
2) Being able to have another name
3) Send them emails
4) Take their victim's address for future use
5) All the above
34. This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
1) Spam
2) Malware
3) Phishing
4) Spyware
5) Under ware
35. Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
1) Close window
2) Never use your computer
3) Anti-Virus Program
4) Turn Off Computer
5) Restart Computer
36. Older networks often use another type of cable, called ________
1) Unshielded twisted-pair cable
2) Coaxial cable
3) Optical Fibre
4) Twisted-pair cable
5) Data cable
37. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) RAM
38. Total keys keyboard is most popular
1) 123
2) 111
3) 101
4) 134
5) 143
39. What is the name of the software that allows us to browse through web pages?
1) Mail Client
2) FTP Client
3) Messenger
4) Browser
5) Server
40. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.
1) RAM
2) ROM
3) PROM
4) Primary storage
5) Secondary storage
ANSWERS:
1) 3; 2) 3; 3) 4; 4) 4 ; 5) 1; 6) 2 ; 7) 4; 8) 2; 9) 3; 10) 3;
11) 4; 12) 3; 13) 5 14) 2; 15) 2; 16) 3; 17) 4; 18) 1; 19) 3; 20) 3;
21) 2; 22) 4; 23) 4; 24) 3; 25) 1; 26) 2; 27) 2; 28) 3; 29) 3; 30) 3;
31) 2; 32) 4; 33) 1; 34) 4; 35) 3; 36) 2; 37) 4; 38) 3; 39) 4; 40) 1;
1) VLSI
2) LSI
3) ROM
4) RAM
5) Hard disk
2. IEEE 802.16 popularly called ___
1) Ethernet
2) Wi-Fi
3) WIMAX
4) Wireless Network
5) None of these
3. To protect system, there are how many security levels?
1) One
2) Two
3) Three
4) Four
5) Five
4. Java was originally invented by
1) Oracle
2) Microsoft
3) Novell
4) Sun
5) IBM
5. Asmall network making up the internet and also having a small number of computers with in it is called ___
1) Host
2) Address
3) Sub domain
4) Domain
5) URL
6. The operating system of a computer serves as a software interface between the user and ___
1) Software
2) Hardware
3) Processor
4) Compiler
5) RAM
7. Both the ALU and control section of CPU employ special purpose storage locations called:
1) Decoders
2) Buffers
3) Multiplexer
4) Registers
5) Flip flops
8. The address of the next instruction to be executed by the current process is provided by the ___
1) CPU registers
2) program counter
3) process stack
4) pipe
5) coding counter
9. Which command combines the contents of one file with another?
1) Restore
2) Rename
3) Append
4) Add
5) Store
10. The ___ is the administrative section of the computer system.
1) Memory Unit
2) Input Unit
3) Central Processing Unit
4) Control Unit
5) Logic Unit
11. Coded entries which are used to gain access to a computer system are called
1) Codeword's
2) Entry codes
3) Entry words
4) Security commands
5) Data codes
12. What is the primary requisite of a good computer programmer?
1) Mathematical mind
2) Artistic mind
3) Logical mind
4) Scientific knowledge
5) Memory Knowledge
13. The errors that can be pointed out by the compiler:
1) Syntax errors
2) Internal errors
3) Semantic errors
4) Coding errors
5) Logical errors
14. Which of the following is an advantage to using fibre optics data transmission?
1) Resistance to data theft
2) Fast data transmission rate
3) Few transmission errors
4) Low noise level
5) All the above
15. Which one of the following when added can reduce the processing time of a computer?
1) A buffer
2) A co-processor
3) 1024 megabyte
4) A converter
5) 1064 megabyte
16. A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?
1) Hoax
2) Worm
3) Trojan
4) Joke program
5) Juke program
17. 'DB' computer abbreviation usually means?
1) Driver Boot
2) Double Byte
3) Data Block
4) Database
5) None of these
18. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.
1) WAN (Wide Area Network)
2) World Wide Web
3) URL (Universal Resource Locator)
4) LAN (Local Area Network)
5) All the above
19. Hardware devices that are not part of the main computer system and are often added later to the system.
1) Execute
2) Highlight
3) Peripheral
4) Clip art
5) Insert
20. '.BAK' extension refers usually to what kind of file?
1) Audio file
2) MS Encarta document
3) Backup file
4) Animation/ movie file
5) Restore file
21. The main computer that stores the files that can be sent to computers that are networked together is ___
1) Clip art
2) File server
3) Peripheral
4) Mother board
5) IC
22. Which of the following word processors came first?
1) MS Word
2) Lotus Notes
3) WordPerfect
4) WordStar
5) WordPad
23. Which of the following operating systems is produced by IBM?
1) UNIX
2) Windows
3) DOS
4) OS-2
5) OS-3
24. Computers calculate numbers in what mode?
1) Decimal
2) Octal
3) Binary
4) Primary
5) Secondary
25. Which of the following software is used to view web pages?
1) Web Browser
2) Internet Browser
3) Page Browser
4) Crème Browser
5) All the above
26. ____ is the process in which a user sends computer information from his computer to another computer through modem.
1) Downloading
2) Uploading
3) Processing
4) Programming
5) Seeding
27. Which of the following is used to save the frequently visited web sites?
1) Frequent List
2) Favourites List
3) Explorer List
4) File list
5) Data list
28. Which of the following performs arithmetic and logical operations?
1) CU
2) PU
3) ALU
4) Memory
5) CPU
29. A ____ is a group of independent computers attached to one another through communication media.
1) Internet
2) E-mail
3) Network
4) Software
5) Hard ware
30. Which of the following is a presentation program?
1) MS-Word
2) MS-Excel
3) MS-Power Point
4) MS- Access
5) MS-Outlook
31. Collection of 1024 Bytes:
1) 1MB
2) 1KB
3) 1TB
4) 1GB
5) 100 MB
32. How would you be able to protect yourself from phishing?
1) Call your local fish store.
2) Get an Anti-Virus Program
3) Change Passwords Every 4-6 months
4) 2 & 3
5) All the above
33. Why is identity theft something hackers usually go for?
1) Personal Information
2) Being able to have another name
3) Send them emails
4) Take their victim's address for future use
5) All the above
34. This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
1) Spam
2) Malware
3) Phishing
4) Spyware
5) Under ware
35. Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
1) Close window
2) Never use your computer
3) Anti-Virus Program
4) Turn Off Computer
5) Restart Computer
36. Older networks often use another type of cable, called ________
1) Unshielded twisted-pair cable
2) Coaxial cable
3) Optical Fibre
4) Twisted-pair cable
5) Data cable
37. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) RAM
38. Total keys keyboard is most popular
1) 123
2) 111
3) 101
4) 134
5) 143
39. What is the name of the software that allows us to browse through web pages?
1) Mail Client
2) FTP Client
3) Messenger
4) Browser
5) Server
40. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.
1) RAM
2) ROM
3) PROM
4) Primary storage
5) Secondary storage
ANSWERS:
1) 3; 2) 3; 3) 4; 4) 4 ; 5) 1; 6) 2 ; 7) 4; 8) 2; 9) 3; 10) 3;
11) 4; 12) 3; 13) 5 14) 2; 15) 2; 16) 3; 17) 4; 18) 1; 19) 3; 20) 3;
21) 2; 22) 4; 23) 4; 24) 3; 25) 1; 26) 2; 27) 2; 28) 3; 29) 3; 30) 3;
31) 2; 32) 4; 33) 1; 34) 4; 35) 3; 36) 2; 37) 4; 38) 3; 39) 4; 40) 1;