This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Thursday, July 24, 2014

Glossary of Parts of the Computer Hardware

Glossary of Parts of the Computer Hardware
monitor
It looks like a TV and lets you see your work and your files.

system box or CPU
Central Processing Unit – the brains and memory of the computer of the computer.

keyboard
The keys you use to type. Includes letters, numbers, punctuation, command, and function keys.

mouse
The hand held device you use to select and open items and programs.

floppy diskettes
Also called a floppy, or a diskette. Stores files or programs and is inserted into the A drive (also called the floppy drive).

CD-ROM
Stores programs (also called applications) and is inserted into the D drive.

hard drive
Inside the system box, stores programs and files.

Glossary of Mouse
point to
Move the mouse (on the mouse pad) so the pointer touches the item you choose.

click
Point to an item and quickly press and release the left mouse button. (This button is also known as MB1, that is mouse button 1.

right click
Point to item and press and release the right mouse button. Shows options available without going through menus.

double click
Point to an item and press the left mouse button twice quickly. This is a shortcut that selects and opens an application or file.

drag
Point to an item and press and hold the left mouse button while moving the mouse. Moves objects, resizes windows, or draws.

slide
Move the mouse on the mouse pad so a menu is highlighted.

cursor
This black, blinking, vertical line shows where text will appear if you type.

Glossary of Windows
desktop
Your electronic work area or what you see on your computer screen.

icons
Symbols used to represent applications or items.

maximize/minimize button
Changes the window to fill the whole screen or part of the screen.

menu bar
The types of menus, usually found in a bar at the top of the window.

mouse pointer
An arrow used with a mouse to choose commands, select text and graphics, and resize windows.

menus
A list of what you can do in the application.

multitasking
Using more than one program at a time.

scroll bars
On the side and bottom of a window, you use these to move through a document larger than the monitor screen.

title bar
Shows the name of the window.

window
Rectangular area on the screen that is an open program or file.

window border
The outside edge of the window. You use the border to resize the windows to make room for other windows.

Exercises
  • Resize windows
  • Move windows
  • Playing Solitaire is good practice using the mouse. This will give students experience clicking and dragging and dropping.

Opening and Closing documents and files

Opening Windows 98
  1. Push the Power button on the system box. On some PCs the button has a light in it.
  2. Push the Power button on the monitor.
  3. After about a minute, the desktop will appear. In the bottom bar will be the Start button.
Opening Programs from the Desktop
Desktop icons
The Windows 98 desktop comes with icons. To open one of these programs, double click on the icon.
To find other programs that do not have icons on the desktop, click the Start button in the lower left of the screen.
Opening Programs from the Start Menu
  1. If a program does not have an icon on the desktop, use the Start button to find it or the Program Group it is in. A program has a specific icon.  In the Programs figure, Accessories is a Program Group, and Microsoft Word is a program.
  2. Click the Start button.
  3. Click Programs. Programs gives a list of Program Groups and programs.
  4. Double click on the program you want to open. Or Click on the Program Group. Then double click on the program you want to open. http://www.net1plus.com/users/devenslc/startprog.gif

How to use Enter and Delete and Backspace key (Instructor will say these instructions out loud and demonstrate all the steps)


Using the Enter key        The Enter key pushes text down to the next line or moves the cursor down to the next line so that typing can begin.

Application Files
Program files environment where you can create and edit the kind of document that application makes.
Click
To select an object by pressing the mouse button when the cursor is pointing to the required menu option, icon or hypertext link.
Close
To close a window that has been opened for viewing and / or editing.
Computer
A general-purpose machine that processes data according to a set of instructions that are stored internally either temporarily or permanently.
Central Processor Unit (CPU)
This term has two meanings (just to confound beginners, you understand)
1) Central Processor Unit--the main chip on the computer that makes everything go.
2) The box that holds the guts of the computer.
A faster CPU is always better than a slower one. You can never have too fast of a CPU.
Crash
Your computer or application no longer works correctly and so you "loose" all the work you've done since the last time you saved.
Creating A File
Storing data as a file with an assigned file name that is unique within the directory it resides in.
Delete
To remove an item of data from a file or to remove a file from the disk.
Desktop
An on-screen representation of a desktop such as used in the Macintosh and Windows operating systems.
Dialog Boxes
Takes over your screen and allows you to "dialog" with the computer.
Directory (AKA Folder, sub-directory)
Allows you to organize files and other folders.
Disk Space
This is the place where your files live. The greater the disk space the more files you can keep. (See also Megabytes)
More disk space is always better than less. You can never have much disk space.
Documents
Files you create and edit.
Document Files
Files we care about (memos, letters, pictures, etc.)
Double Click
To press the mouse button twice in rapid succession without moving the mouse between clicks.
Drag
To move an object on screen in which its complete movement is visible from starting location to destination.
Edit
To make a change to existing data.
File Cabinet
Metaphorically, the hard drive (and other kinds of storage media like floppy disks) which store files and folders.
Folder (AKA Directory, Sub-Directory)
Allows you to organize files and other folders.
Folder Icons
Collections of documents and other folders.
Icons
In a graphical user interface (GUI), a small, pictorial, on screen representation of an object, such as a document, program, folder or disk drive.
Icon View
Allows you to see icons of folders and files primarily as icons with little information.
Keyboard
This if the primary text input device. It also contains certain standard function keys, such as the Escape key, tab, and arrow keys, shift and control keys, and sometimes other manufacturer-customized keys.
Kilo (K)
This is a unit of measure = 1,000.  So 1,000 bytes is a KiloByte.
List View
Shows the icons but also orders the icons (often by name, but can sort the list in other ways) and shows more information about them.
Macintosh
The brand name of a family of personal computers (hardware) and an operating system (software) from Apple, introduced in 1984.
Megabytes (Mb)
Mega = million so Mb is 1,000,000 bytes.  It's enough information for the computer to store one character (e.g. "h"), so 1mb text file = 1,000,000 keystrokes in that file. Just to confound the masses, although RAM and Disk Space do something completely different we measure both in megabytes. This leads to confusion.
MegaHertz (Mhz)
This stands for MegaHertz. A hertz is an electronics term. 1 hz = one cycle (or wavelength) per second. 1 megahertz = 1,000,000 cycles per second.
In computer jargon, Mhz measures how *fast* your CPU chip runs. Although it's more important to know the chip than the speed, if you're comparing the same kind of CPU chip then a higher / faster CPU speed (measured in MHz) is better than a slower speed.
Menu
Displays a list of commands, some with images next to them.
Modifier Keys
Keys that change the meaning of what you type.
Mouse
Pointing device that allows you to tell the computer what to do.
Operating System (OS)
System software that allows your computer to work.
Pointer (AKA Cursor)
The name of the arrow (or other shape) that tracks across the screen as you move the mouse (or other pointing device) around.
Random Access Memory (RAM)
This stands for Random Access Memory. You can think of this as the "space" where you computer does its processing. The more space you have the more processes you can run at the same time. More RAM is always better than less. You can never have much RAM.
Recycle Bin
Place where you put files and folders that you may later want to delete or get rid of. Compare Trash.
Resize Box
Allows you to change the size and shape of a window.
Right click
To press the right button on the mouse. (This is Windows specific. On a Mac running System 8 or higher, you hold down the Control key and then click to get the same effect.)
Save
Tell the computer to create a file on disk that has the information you've put into the document (usually typing).
Save As
Give the file a name and/or store the file in a certain place.
Scroll bar
Allows you to move around through your document.
Shut down
To quit all applications and turn off the computer.
Software
Instructions that tell the computer what to do.
System files
Allows our computer to work.
Trash
Place where you put files and folders that you want to delete or get rid of.
Volume Icons
Devices that hold files and folders.


SBI CLERK MCQ FOR 2014

   SBI CLERK 2014
  1. ·         Any computer parts that you can actually touch are considered to be (Hardware ).
  2. ·         The box that contains the central electronic components of the computer is the  (SYSTEM UNIT).
  3. ·        Devices, such as monitors and printers, that are connected to the computer are called (peripheral devices)
  4. ·         A(n) ____________device enables you to enter data and instructions into the computer (INPUT DEVICE)
  5. ·        ____________, when attached to a computer, can translate a user’s handwriting into digital input. (DIGITIZER OR GRAPHICS TABLET).
  6. ·        most common input devices are the ____________ and the ____________. ( KEYBOARD AND MOUSE)
  7. ·        most common keyboard uses the ____________ layout ( QUERTY).
  8. ·         The ____________ key and the ____________ key can be used in combination with other keys to perform shortcuts and special tasks.( CONTROL AND ALT)
  9. ·        The Delete key, Num Lock key, and Caps Lock key are considered ____________ keys because their function changes each time you press them. (TOGGLE KEYS)
  10. ·        I-beam or an arrow is known as the mouse (POINTER).
  11. ·        A ____________ is the traditional way to enter data into a PDA and can be used on Tablet PCs for handwriting recognition (STYLUS)
  12. ·         A ____________ is an output device that creates tangible hard copies. PRINTER
  13. ·        The diagonal distance, measured in millimeters, between pixels of the same color is called (DOT PITCH)
  14. ·        ____________ printers have tiny hammer-like keys that strike the paper through an inked ribbon (IMPACT  PRINTER).
  15. ·         Inkjet printers and laser printers are examples of ____________ printers.(NON IMPACT PRINTER)
  16. ·         ____________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.
  17. ·         A printer’s speed is measured in: (PPM ).
  18. ·        Restarting the system when it is already powered on is called (WARM BOOTING).
  19. ·        is when the computer saves an image of the desktop and powers down (HIBERNATE).
  20. ·         ____________ data and programs are stored in the hard drive.(PRERMANENT)
  21. ·        Hard disk drives are considered ____________ storage (NOT VOLATILE MEMORY)
  22. ·         ____________ are devices used to transmit data over telecommunications lines. (MODEM)
  23. ·         The ____________ port sends data one bit at a time and is often used to connect a modem to the computer. (SEREAL )
  24. ·        The ____________ port transmits data in groups of bits, is faster than a serial port, and is generally used to connect a printer (PARALLEL).
  25. ·        The ____________, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips( SMPS)
  26. ·         The ____________ enables your computer to connect to other computers. (NIC).
  27. ·         ____________ is referred to as primary storage (RAM)
  28. ·         RAM is considered volatile storage, which means it is: (TEMPORARY OR VOLATILE MEMORY).
  29. ·         ____________ is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off.( ROM).
  30. ·         ____________ speed is measured in nanoseconds. (RAM).
  31. ·         A(n) ____________ is a combination of hardware and software that facilitates the sharing of information between computing devices. (NETWORK )
  32. ·         Storage devices, such as floppy disk drives and Zip disk drives that are no longer standard on many new computers, are known as ____________ technologies.( LEGACY)
  33. ·         ____________ is a series of small cards (called memory cards or memory modules) that plug into slots on the motherboard. (RAM)
  34. ·         ____________ devices, such as monitors, modems, and printers, are devices that are externally connected to the computer. PERIPHERAL
  35. ·        A(n)____________ mouse uses an internal sensor or laser instead of a rollerball, and therefore does not need a mousepad.  (OPTICAL).
  36. ·        ____________ keyboards have a much shorter range than radio frequency (RF) keyboards (BLUETOOTH)
  37. ·         ____________ technology allows a person sitting at a computer equipped with a personal video camera and a microphone to transmit video and audio across the Internet. (VEDIO CONFRENCING)
  38. ·        In ____________ systems, you operate your computer through a microphone, telling it to perform specific commands or translate spoken words into data input. ( SPEECH – RECOGNITION )
  39. ·         Two power-management settings on a computer are ____________ and ____________. (hibernation and Stand By mode)
  40. ·        ____________drives, sometimes referred to as jump drives or thumb drives, are a newer alternative to storing portable data. (FLASH )
  41. ·        ____________ is the largest printed circuit board to which all other boards are connected. (MOTHERBOARD).
  42. ·        ____________ is the storage space nearby the CPU where data and commands are stored and can be located, opened, and delivered to the CPU for processing in a few billionths of a second (RAM).
  43. ·        Devices such as digital video cameras, MP3 players, and digital media players benefit from using a(n) ____________ port, one of the newer and faster interfaces available, which can transfer data from 400 Mbps to 800 Mbps (FIRE –WIRE).
  44. ·         Thermal printers are ideal for mobile computing because they are compact, lightweight, and require no ink cartridges.
  45. ·        USB ports can connect a wide variety of peripherals to the computer, including keyboards, printers, mice, and digital cameras
  46. ·         Match the following ports with the devices most likely to be connected to them:
  47. ·         I.     VGA port                     A. flash drive
  48. ·         II.    parallel port                B. monitor
  49. ·         III.   serial port                    C. printer
  50. ·         IV.  Ethernet port            D. modem
  51. ·         V.    USB port                      E. DSL or cable modem (Answer: B, C, D, E, A)
  52. ·         Match the following terms with their meanings:
  53. ·         I.     stylus                                            A. an input device used to enter data on a PDA
  54. ·         II.    hertz (Hz)                                    B. the clearness or sharpness of an image
  55. ·         III.   resolution                                   C. temporary
  56. ·         IV.  volatile                                         D. a unit of frequency indicating cycles per second
  57. ·         V.    system unit                                E. contains the central electronic components of the computer
  58. ·         Answer: A, D, B, C, E
  59. ·         Match the following terms with their meanings:
  60. ·         I.     peripheral devices   A. an example of permanent storage
  61. ·         II.    modem port              B. external devices that exchange data with the computer through ports
  62. ·         III.   dot-matrix                  C. an example of an impact printer
  63. ·         IV.  ergonomics                D. an example of a connectivity port
  64. ·         V.    hard disk drive          E. the science involved with minimizing the risk of injury or discomfort
  65. ·         B, D, C, E, A
  66. ·        The memory which is utmost accessible to the processor is (CACHE MEMORY).
  67. ·        High density double sided floppy disks could store _____ of data (1.44 MB)
  68. ·         . which of the following memories must be refreshed many times per second? (DRAM)
  69. ·        Which of the following memories not needs refresh? (SRAM)
  70. ·        A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is (BUFFER )
  71. ·         Instructions and memory address are represented by (BINARY CODES)
  72. ·         . The memory which is programmed at the time (PROM).
  73. ·         In magnetic disks data is organized on the
  74. ·         platter in a concentric sets or rings called (TRACK)
  75. ·         concentric circles on a hard drive (TRACK).
  76. ·         the time it takes a storage device to locate and retrieve stored data  (ACCESS-TIME)
  77. ·         . pie-shaped wedges on a hard drive (SECTOR).
  78. ·         IBM stands for International Business Machines.
  79. ·         Which of the following memories must be refreshed many times per second. (DRAM).
  80. ·         A collection of 8 bits is called.( 1 byte or 1 Character ).
  81. ·         The BOOT sector files of the system are stored in (ROM ).
  82. ·         Which of the following is exclusively a sequential access storage device.( Magnetic  Tape).
  83. ·         The concept of virtual memory:
  84. ·         Cache memory -- faster to access than DRAM
  85. ·         In processing cheques which of the following I/O techniques have banks traditionally used (MICR).
  86. ·         Type of RAM that is NOT temporary is NV RAM.
  87. ·         ROM is type of ------------ FIRMWARE.
  88. ·         The container that houses most of the electronic components that make up a (SYSTEM UNIT).
  89. ·         Numbering system in which all numbers consist of only two digits-0 and1 (BINARY NUMBER SYSTERM)
  90. ·         The communications web for the entire computer system. ------------ SYSTEM BOARD
  91. ·         Consists of a tiny circuit board etched on a stamp-sized square of silicon (CHIP).
  92. ·         Tells the rest of the computer system how to carry out a program’s instuctions. ---------- CONTROL UNIT.
  93. ·         Performs arithmetic operations and logical operations. (ALU)
  94. ·         The most common type of microprocessor. ---------- (CISC CHIP).
  95. ·         A plastic card, the size of a regular credit card, with an embedded chip.  (SMART CARD READER).
  96. ·         Volatile storage that holds the program and the data the CPU is currently  processing. ---( RAM).
  97. ·         Temporary high-speed holding area between the memory and the CPU (CHACHE MERMOY).
  98. ·         Produces precisely timed electrical beats used as a timing mechanism (SYSTEM CLOCK)
  99. ·         Machines manufactured so that users cannot easily add new devices. (closed architecture)
  100. ·         Also called plug-in boards, controller cards, adapter cards, and interface cards. ---( EXPANSION BOARD ).
  101. ·         Card that allows distant computers to communicate, via converted elec-  tronic signals, over telephone lines. ------- MODEM
  102. ·         Credit card-sized expansion boards used by portable computers. --------- (PC CARD).
  103. ·         Connects the parts of the CPU to each other. ------- DATA BUS
  104. ·         Connecting socket on the outside of the system unit. ------- PORT.
  105. ·         Connects external devices that need to send or receive a lot of data over a short distance. ---- (PARALLEL PORT.)
  106. ·         Connects input and output devices to the system unit via the ports. (CABLE).
  107. ·         You organize files by storing them in (FOLDER).
  108. ·         Where are data and programme stored when the processor uses them? (MAIN MERMORY).
  109. ·         What characteristic of read-only memory (ROM) makes it useful? (Data in ROM is non-volatile, that is, it remains there even without electrical power )


Wednesday, October 23, 2013

I am Presenting Collection of Questions and Answers of PO Exam held on 19 October 2013 i.e 19-10-2013

Questions Related to Computer Awareness 1)
 how mny bytes in 1 KB- 1024 bytes
 2)which is input device… sm options are there
 3) shining disk contains large volume of data- CD
 4) full form of PC
 5) whc is permanent memor- ROM
 6) oracle is ……. type of s/w- dbms
 7) datas are organised in whc way in excel- rows nd column
 8) data is input and processed in to- output
 9) part of comptr system- CPU 
10) whc one is hardware…. sm options are there. 
11) device used for network connection.
 12) nos. are usually aligned in table of Ms word 
13) 1 qstn related to scanner
 14) whc storage has large memory.
 15) starting and loading of OS- booting
 16) whc one is nt binary number.. sm options were there- 202
 17) another qustn on binary number 
18) one qstn on excel spreadsheet related.
 19) printed form of excel sheet copy- hardcopy - 



IBPS PO-3 (19/10/2013) Morning Session General Awareness Questions:
 1. Chairman of US Federal Reserve- Janet Yellen
 2. SLR full form — Statutory Liquidity Ratio
 3. National Award in “Best Entertaining Movie” Category – Vicky Donor
 4. What is the Maximum Home loan limit to a person in metropolitan city? 
5. Interest Rate for Export
 6. Current bank rate — 9.00 % 
7. About SARFAESI act — Secularization and Reconstruction of Financial Assets and Enforcement of Security Interest Act,2002 related with NPA
 8. Micro industry(service) set up cost limit
 9. Where is national institute of sports — Patiala
 10. Inventor of mouse who died recently — Douglas Engelbert 
11.Which among below a microprocessor manufacturing company (Option- Intel, Microsoft etc) – Intel 
12. Name of tablet made by Microsoft — Surface 
13. T20 Term associated with cricket 
14.Who keeps all credit information of persons — CIBIL 
15. Two question from union budget
 16. Basic Saving Bank Deposit Scheme (BSBDA) For elderly People and Student Living Outside their Native Home- Maximum Limit in the Account Per Month- Answer IS 25000 RS and 10000 can be transacted at once. 17. About “Aam Admi Bima Yojana” 
18. MICR full form — Magnetic ink character recognition 
19. Author of book “The lowland” — Jhumpa Lahri
 20. Australian PM — Tony Abbot
 21. Main Focus Of RaghuRam Rajan Comitte- Comes Under Planning Commission and Financial sector Reforms 22. Target fiscal deficit of govt in FY 2013-14 – 4.8%
 23. Who among following are major applicant in new banking license. (Option: Tata Sons, Mahindra etc)
 24. Which of the following not considered as proof of identity while opening account in bank (options-passport,electricity bill,adhar card,pan card,driving license)
 25. Who is not an MP (Option -Amitabh Bachchan , Dharmendra,etc)
 26. Pan Card essential for how much money transaction (above 50,000)
 27. ‘Branch On Wheels’ scheme by which bank — ICICI 
28. EU 28th Member — Croatia 
29. Britain PM — David Cameron
 30. CCTV Full Form – Closed-circuit TV Camera 
31. NPA Category 
32. Tagore Award for cultural harmony — Zubin Mehta
 33. About MNREGA — 100 Days/150 days
 34. INS Sindhurakshak Made by — Russia
 35. Hummingbird Alogorithm deveoloped by — Google
 36. Corporate Debt Limit- 25bn $ 
37. Limit of Micro Enterprise as per MSME act 2006- 25 lakh 
38. Largest Producer of Gold — China 39. RBI Rajbhasha awards – PNB
 40. Roshni Scheme – ‘Roshni’ for Naxaliteaffected areas, placement linked skill development .

Sunday, October 6, 2013

practice questions

                                

Computer
Computer Knowledge Questions
1. RAM stands for :
(A) Read Access Memory
(B) Random Access Memory
(C) Random Assigned Memory
(D) All of these
(E) None of these

2. Data in RAM are :
(A) Volatile in nature
(B) Non-volatile in nature
(C) Both (A) & (B)
(D) All of these
(E) None of these

3. BIOS stands for :
(A) Basic Input Output System
(B) Basic Instruction Output System
(C) Basic Interface Output System
(D) All of these
(E) None of these

4. RAM in its commercial forms are available as :
(A) SIMM
(B) DIMM
(C) Both (A) & (B)
(D) CPSB
(E) None of these

5. Which of the following requires refreshing during retaining the data?
(A) DRAM
(B) SRAM
(C) Virtual Memory
(D) FDD
(E) None of these

6. Refresh Rate of monitor is measured in :
(A) Hz
(B) Meter
(C) Volts
(D) Amp.
(E) None of these

7. Which of the following meaning is used between CPU & RAM to speed up the processing power of a CPU?
(A) Virtual Memory
(B) DRAM
(C) Flash Memory
(D) Cache Memory
(E) None of these

8. Which of the following is lowest in memory hierarchy?
(A) Cache memory
(B) Secondary memory
(C) Registers
(D) RAM
(E) None of these

9. Which of the following is an input device?
(A) Keyboard
(B) VDU
(C) Both (A) & (B)
(D) Dvu
(E) None of these

10. CRT stands for :
(A) Character Ray Tube
(B) Cathode Ray Tube
(C) Colour Ray Tube
(D) All of the above
(E) None of these

11. Which of the following is a GUI device :
(A) Keyboard
(B) Mouse
(C) OMR
(D) All of these
(E) None of these

12. LCD stands for :
(A) Liquid Crystal Display
(B) Laser Crystal Display
(C) Light Crystal Display
(D) All of these
(E) None of these

13. Such types of printers, in which the printing head contacts with the paper in printing process, are called as :
(A) Impact Printer
(B) Non-Impact Printer
(C) Laser Printer
(D) All of these
(E) None of these

14. Which of the following is a type of optical media?
(A) FDD
(B) HDD
(C) CD
(D) Magnetic Tape
(E) None of these

15. DVD stands for :
(A) Digital Video Disk
(B) Digital Versatile Disk
(C) Both (A) & (B)
(D) All of these
(E) None of these

16. Which of the following is an input device?
(A) VDU
(B) Printer
(C) Plotter
(D) MICR
(E) None of these

17. Identify the odd one :
(A) Storage tape memory
(B) Magnetic disc memory
(C) Optical disc memory
(D) Read only memory
(E) None of these

18. Nibble describes a bits combination of :
(A) 5 bits
(B) 6 bits
(C) 7 bits
(D) 4 bits
(E) None of these

19. A Byte constitutes of :
(A) 9 bits
(B) 8 bits
(C) 7 bits
(D) 4 bits
(E) None of these

20. Memory in a PC is addressable through :
(A) Bits
(B) Byte
(C) Nibble
(D) All of these
(E) None of these

21. One Kilo Byte represents :
(A) 1024 bytes
(B) 1000 bytes
(C) 100 bytes
(D) 1064 bytes
(E) None of these

22. Basic building block for a digital circuit is :
(A) Word
(B) Logic Gate
(C) Processor
(D) BUS
(E) None of these

23. Which of the following is a logic gate?
(A) AND
(B) OR
(C) CPU
(D) Both (A) & (B)
(E) None of these

24. The base of binary number is :
(A) 2
(B) 16
(C) 8
(D) 10
(E) None of these

25. ASCII stands for :
(A) American Standard Code for Institute Interchange
(B) American Standard Code for Information Interchange
(C) American Standard Code for Information Institute
(D) All of these
(E) None of these

Answers :
1. (B) 2. (A) 3. (A) 4. (C) 5. (A) 6. (A) 7. (D) 8. (B) 9. (A) 10. (B)
11. (B) 12. (A) 13. (A) 14. (C) 15. (B) 16. (D) 17. (D) 18. (D) 19. (B) 20. (B)
21. (A) 22. (B) 23. (D) 24. (A) 25. (B)

 

1. You can keep your personal files/folders in—
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Answer: My Documents

2. The primary purpose of software is to turn data into—
(A) Web sites
(B) Information
(C) Programs
(D) Objects
(E) None of these
Answer: Information
 
3. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Answer: Sub Directory

4. A compiler translates a program written in a high-level language into—
(A) Machine language
(B) An algorithm
(C) A debugged program
(D) Java
(E) None of these
Answer: Machine language

5. When you turn on the computer, the boot routine will perform this test—
(A) RAM test
(B) Disk drive test
(C) Memory test
(D) Power-on self-test
(E) None of these
Answer: Disk drive test

 

6. A ……is a unique name that you give to a file of information. 
(A) device letter
(B) folder
(C) filename
(D) filename extension
(E) None of these
Answer: filename extension

7. Hardware includes—
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and output data
(D) all devices involved in processing information including the central processing unit, memory and storage
(E) None of these
Answer: (D)

8. A ……… contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Answer: programming language

9. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Answer: Recycle Bin

10. The simultaneous processing of two or more programs by multiple processors is—
(A) Multiprogramming
(B) Multitasking
(C) Time-sharing
(D) Multiprocessing
(E) None of these
Answer: Multiprocessing

11. The secret code that restricts entry to some programs—
(A) Password
(B) Passport
(C) Entry-code
(D) Access-code
(E) None of these
Answer: Password

12. Computers use the ……… number system to store data and perform calculations.
(A) binary 
(B) octal
(C) decimal 
(D) hexadecimal
(E) None of these
Answer: binary

13. The main function of the ALU is to—
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Answer: Perform arithmetic and logical operations

14. ……is the process of carrying out commands.
(A) Fetching 
(B) Storing
(C) Executing 
(D) Decoding
(E) None of these
Answer: Executing

15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer
(B) The printed parts of the computer
(C) The printed output
(D) The physical output devices
(E) None of these
Answer: The printed output

16. A(n) ……… is a program that makes the computer easier to use. 
(A) utility
(B) application
(C) operating system
(D) network
(E) None of these
Answer: utility

17. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)—
(A) Workstation
(B) CPU
(C) Magnetic disk
(D) Integrated circuit
(E) None of these
Answer: Integrated circuit

18. Computer systems are comprised of—
(A) Hardware, programs, processors, procedures and people
(B) Hardware, programs, information, people and procedures
(C) Hardware, programs, information, people and networks
(D) Hardware, software, procedures, networks and people
(E) None of these
Answer: Hardware, software, procedures, networks and people

19. An error in a computer program—
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
(E) None of these
Answer: Bug

20. What is output ?
(A) What the processor takes from the user
(B) What the user gives to the processor
(C) What the processor gets from the user
(D) What the processor gives to the user
(E) None of these
Answer: What the processor gives to the user

 


1. Which of the following's absence the computer system can still be functional
A. Operating system
B. Hard Drive
C. RAM
D. Sound Card

2.The name for the way that computers manipulate data into information is called:
A. programming 

B. processing 
C. storing 
D. organizing

3.When you are working on a document on a PC where is the document temporarily stored ?
A. Hard Disk
B. ROM
C. RAM 
D. CD-ROM 

4. A set of instructions telling the computer what to do is called:
A.  Program
B. Compiler
C. Debugger 
D. Mentor

5. The term "hypertext" means:
A. Text with heavy formatting
B. Blinking text
C. Hyper media 
D. None of the above 

6. What is the extension of executable program under windows ?
A. .doc
B. .txt
C. .bin
D. .exe 

7. Which of the following is optical storage media ?
A. CD-ROM 
B. EEPROM
C. Optical ROM
D. None of the above

8. What is the other name for a LAN Card?
A. NIC
B. Network Connector 
C. MODEM 
D. Internet Card

9. Computer security can be enforced by using which of the following ?
A. Firewall
B. Password 
C. Encryption
D. All of the above

10. Which of the following is a database management tool developed by Microsoft?
A. dBase
B. Access 
C. Personal Oracle 
D. Sybase

11. URL stands for:
A. Uniform Research List
B. Uniform Research Locator
C. Uniform Resource Locator 
D. Universal Resource List

12. Speed of computer is calculated in the units of :
A. RPM
B. Hertz
C. kmh 
D. mth

13. Primary memory stores :
A. Data alone
B. Programs alone
C. Results alone
D. All of these

14. Junk e-mail is also called
A. Spoof
B. Spam
C. Spill
D. Sniffer script

15. DPI stands for :
A. Due Protocol Inspection
B. Do Per Instruction
C. Dots Per Inch
D. None of the above





DBMS ---
Questions 1:
Which of the following is not true of the traditional approach to information processing
a. there is common sharing of data among the various applications
b. it is file oriented
c. programs are dependent on the file
d. it is inflexible
e. all of the above are true

Question 2:
Which of the following hardware component is the most important to the operation of database management system?
a. high resolution video display
b. printer
c. high speed, large capacity disk
d. plotter
e. mouse

Question 3:
Generalized database management system do not retrieve data to meet routine request
a. true
b. false

Question 4:
Batch processing is appropriate if
a. large computer system is available
b. only a small computer system is avilbale
c. only a few transactions are involved
d. all of the above
e. none of the above

Question 5:
Large collection of files are called
a. fields
b. records
c. database
d. sectors

Question 6:
Which of the following is not a relational database?
a. dBase IV
b. 4th Dimension
c. FoxPro
d. Reflex

Question 7:
In order to use a record management system 
a. you need to understand the low level details of how information is stored
b. you need to understand the model the record management system uses
c. bother a and b
d. none of the above

Question 8:
Sort/Report generators
a. are faster than index/report generators
b. require more disk space than indexed/report generators
c. do not need to sort before generating report
d. both a and b

Question 9:
If a piece of data is stored in two places in the database, then 
a. storage space is wasted
b. changing the data in one spot will cause data inconsistency
c. in can be more easily accessed
d. both and b

Question 10:
An audit trail
a. is used to make backup copies
b. is the recorded history of operations performed on a file
c. can be used to restore lost information
d. none of the above

Answers:

1.a     2.c     3. b     4.e      5.c     6.d      7.b      8.b      9.d      10.b 

Questions 1:

The relational database environment has all of the following components except
a. users
b. separate files
c. database
d. query languages
e. database

Question 2:

Database management systems are intended to 
a. eliminate data redundancy
b. establish relationship among records in different files
c. manage file access
d. maintain data integrity
e. all of the above 

Question 3:

One approach to standardization storing of data?
a. MIS
b. structured programming
c. CODASYL specification
d. none of the above

Question 4:

The language used application programs to request data from the DBMS is 
referred to as the
a. DML
b. DDL
c. query language
d. any of the above
e. none of the above

Question 5:

The highest  level in the hierarchy of data organization is called
a. data bank
b. data base
c. data file
d. data record

Question 6:

Choose the RDBMS which supports full fledged client server application development
a. dBase V
b. Oracle 7.1
c. FoxPro 2.1
d. Ingress

Question 7:

Report generators are used to 
a. store data input by a user
b. retrieve information from files
c. answer queries
d. both b and c

Question 8:

A form defined 
a. where data is placed on the screen
b. the width of each field
c. both a and b
d. none of the above

Question 9:

A top-to-bottom relationship among the items in a database is established by a 
a. hierarchical schema
b. network schema
c. relational schema
d. all of the above

Question 10:

The management information system (MIS) structure with one main computer 
system is called a
a. hierarchical MIS structure
b. distributed MIS structure
c. centralized MIS structure
d. decentralized MIS structure

Answers:

1.b     2.e     3.c      4.a      5.b     6. b     7.d     8.a      9.a      10.c 

Questions 1:

The ascending order of a data hirerchy is:
a. bit-byte-record-field-file-database
b. byte-bit-field-record-file-database
c. bit-byte-field-record-file-database
d. bit-byte-file-record-field-database

Question 2:

Which of the following is true of a network structure?
a. t is a physical representation of the data
b. It allows a many-to-many relationship
c. It is conceptually simple
d. It will be dominant data base of the future

Question 3:

Which of the following is a problem of file management system?
a. difficult to update
b. lack of data independence
c. data redundancy
d. program dependence
e. all of above

Question 4:

One data dictionery software package is called
a. DB/DC dictionary
b. TOTAL
c. ACCESS
d. Datapac
e. Data Manager

Question 5:

The function of a database is ...
a. to check all input data
b. to check all spelling
c. to collect and organize input data
d. to output data

Question 6:

What is the language used by most of the DBMSs for helping their users to access data?
a. High level language
b. SQL
c. Query Language
d. 4GL

Question 7:

The model for a record management system might be
a. handwritten list
b. a Rolodex card file
c. a business form
d. all of above

Question 8:

Primitive operations common to all record management system include
a. print
b. sort
c. look-up
d. all of above

Question 9:

In a large DBMS
a. each user can "see" only a small part of the entire database
b. each subschema contains every field in the logical schema
c. each user can access every subschema

Question 10:

Information can be transferred between the DBMS and a
a. spreadsheet program
b. word processor program
c. graphics program
d. all of the above

Answers:

1. c    2. b    3. e     4. a     5. c    6. c     7. d    8. c     9. a     10.





1.      These systems typically contain the system's electronic components and selected secondary storage devices, but no input devices.

 
A.     Desktop systems
B.     Personal digital assistants
C.     Palm computers
D.     Laptop computers

2.      A byte is formed by a group of

 
A.     four bits.
B.     eight bits.
C.     12 bits.
D.     16 bits.

3.      Which of the following is not a binary code?

 
A.     EBCDIC
B.     ASCII
C.     CISC
D.     Unicode

4.      This coding system is designed to support international languages like Chinese and Japanese.

 
A.     ASCII
B.     Unicode
C.     EBCDIC
D.     ANSIC

5.      On the motherboard, the connection points for chips are referred to as

 
A.     slots.
B.     sockets.
C.     ports.
D.     lines.

6.      Tiny circuit-boards etched onto squares of sand-like material called silicon are called

 
A.     buses.
B.     slots.
C.     sockets.
D.     chips.

7.      Integrated circuits must be mounted on _____ which are then plugged into the motherboard.

 
A.     slots
B.     pins
C.     ports
D.     carrier packages

8.      Which of the following is a function of the control unit?

 
A.     It provides pathways that support communication among the various electronic components.
B.     It directs the control signals between the CPU and input and output devices.
C.     It performs fundamental math operations like addition, subtraction, etc.
D.     It uses the logic to compare two pieces of data.

9.      Pathways that support communication among the various electronic components on the system board are called

 
A.     bus lines.
B.     network lines.
C.     logic paths.
D.     gateways.

10.    In a microcomputer system, the CPU is contained on a single chip called the

 
A.     semiconductor.
B.     ALU.
C.     microprocessor.
D.     Control Unit.

11.    This term is used to describe the number of bits that a CPU can access at one time.

 
A.     Bitrate
B.     Word
C.     Pulse width
D.     Character

12.    A 32-bit word computer can access

 
A.     2 bytes at a time.
B.     16 bytes at a time.
C.     4 bytes at a time.
D.     8 bytes at a time.

13.    Which of the following allow a computer to run two programs simultaneously?

 
A.     Coprocessors
B.     Multiplexing
C.     Dual core chip
D.     Binary system

14.    These chips use special software to take a large program, break it down into parts, and assign the parts to separate processors.

 
A.     Arithmetic-logic units
B.     Multiplexers
C.     Parallel processors
D.     Graphics coprocessors

15.    Visa, MasterCard, and American Express have all introduced this new type of card, which has an embedded chip.

 
A.     Data card
B.     Micro card
C.     Smart card
D.     Embedded card

16.    An automatic identification system used to track objects, people or animals is called a(n)

 
A.     image processor.
B.     smart card.
C.     RFID tag.
D.     NIC.

17.    Frequently-accessed information is held in

 
A.     hard drive.
B.     cache memory.
C.     flash memory.
D.     read only memory.

18.    With this type of memory, large programs are divided into parts and the parts stored on a secondary device, usually a hard disk.

 
A.     Flash
B.     Cache
C.     Virtual
D.     Extended

19.    Which of the following provides flexibility and expandability for a computer system?

 
A.     ROM
B.     RAM
C.     CMOS
D.     Cache

20.    All of the following are commonly used units of measurement to describe memory capacity, except:

 
A.     Megabyte (MB).
B.     Gigabyte (GB).
C.     Terabyte (TB).
D.     Nanobyte (NB).

21.    When you reboot your system, the computer takes instructions to start from the

 
A.     DRAM.
B.     SDRAM.
C.     DDR.
D.     ROM.

22.    Precisely timed electrical beats or impulses that indicate the speed of processing or power of a computer system are called

 
A.     the clock speed.
B.     the beat.
C.     the pulse.
D.     the system speed.

23.    Which of the following is helpful in enhancing graphics performance, 3-D animations and transferring video data?

 
A.     AGP
B.     ISA
C.     Graphic coprocessors
D.     FireWire buses

24.    These types of ports typically provide connections to specialized devices such as camcorders.

 
A.     FireWire
B.     Serial
C.     Parallel
D.     AGP

25.    Which of the following ports is used for connecting musical instruments to a sound card?

 
A.     AGP
B.     USB
C.     MIDI
D.     SCSI

26.    "Bit" is short for "binary information technology".

True    False

27.    ASCII is the acronym for Automatic Standard Code for Information Interchange.

True    False

28.    Data created by a computer system using the ASCII coding scheme can be directly accessed by another computer system using different coding schemes.

True    False

29.    The ALU tells the rest of the computer system how to carry out a program's instructions.

True    False

30.    The control unit directs the movement of electronic signals between the memory and the ALU.

True    False

31.    64-bit processors are commonly being used in powerful microcomputers.

True    False

32.    The more the number of bits, the slower the computer becomes.

True    False

33.    RAM is considered as volatile storage.

True    False

34.    Virtual memory is held in a RAM chip.

True    False

35.    Information stored on CMOS chips cannot be altered by a user.

True    False

36.    The speed of a computer's system clock cannot be varied.

True    False

37.    PC cards were developed in order to meet the size constraints of notebook and handheld computers.

True    False

38.    The number of bits that can travel simultaneously down a bus is known as the word size.

True    False

39.    Accelerated graphics port (AGP) is over twice as fast as the ISA.

True    False

40.    Serial ports send data one bit at a time and are very good for sending information over long distances.

True    False

41.    Parallel ports are mostly used to connect printers to the system unit.

True    False

42.    Serial ports are gradually replacing USB ports.

True    False

43.    The FireWire port used to connect a camcorder to a laptop would be as fast as a USB 2.0 port.

True    False

44.    FireWire is mainly used to connect digital camcorders and video editing software.

True    False

45.    A notebook computer would commonly use an IrDA port to transfer data to a desktop computer.

True    False

46.    Two of the most popular binary coding schemes are ASCII and _____.

________________________________________

47.    IBM developed the _____ binary coding scheme and it is used primarily for large computers.

________________________________________

48.    The _____ acts as the communication center for a computer system.

________________________________________

49.    _____ are often expressed in word sizes.

________________________________________

50.    _____ operations consist of making comparisons.

________________________________________

51.    A _____ bit word computer can access eight bytes of information at a time.

________________________________________

52.    _____ are special-purpose processing units that assist the CPU in performing certain types of operations.

________________________________________

53.    _____ memory is non-volatile RAM and is considered quite expensive.

________________________________________

54.    _____ memory uses the hard drive to substitute for RAM.

________________________________________

55.    _____ provides start-up instructions for the computer when it is powered on.

________________________________________

56.    The systems clock speed is measured in _____.

________________________________________

57.    A computer can process instructions if the _____ is fast.

________________________________________

58.    Network interface cards (NICs) are connected through _____ on the motherboard.

________________________________________

59.    _____ is a set of hardware and software standards used for creating operating systems, processing units, and expansion boards, as well as other devices that are able to configure themselves.

________________________________________

60.    A(n) _____ card connects the system board to the computer's monitor.

________________________________________

61.    To connect a computer to one or more other computers a(n) _____ card is needed.





 

62.    To meet the size constraints, laptops use _____ cards.

________________________________________

63.    _____ buses are used for special applications and provide support for digital camcorders and video editing software.

________________________________________

64.    _____ are mostly used to connect printers to the system unit.

________________________________________

65.    A(n) _____ gives us a wireless mechanism to transfer data between devices.

________________________________________

66.    Describe the four types of system units.





 

67.    Describe the three binary coding systems.





 

68.    How is the dual-core chip useful for microcomputers?





 

69.    What is parallel processing?





 

70.    How is a smart card useful?





 

71.    What is Flash RAM? How is it different from other types of RAM?





 

72.    What is the difference between a modem and an NIC?





 

73.    Name four different types of expansion buses.





 

74.    What is the difference between a serial port and a parallel port?





 

75.    How would you transfer data from your desktop computer to a printer using an IrDA port?





 




Chapter 6 The System Unit Key

 
1.        (p. 156)A

2.        (p. 158)B

3.        (p. 158)C

4.        (p. 158)B

5.        (p. 160)B

6.        (p. 160)D

7.        (p. 160)D

8.        (p. 161)B

9.        (p. 161)A

10.      (p. 161)C

11.      (p. 162)B

12.      (p. 162)C

13.      (p. 162)C

14.      (p. 162)C

15.      (p. 162)C

16.      (p. 163)C

17.      (p. 163)B

18.      (p. 164)C

19.      (p. 164)C

20.      (p. 164)D

21.      (p. 164)D

22.      (p. 165)A

23.      (p. 170)A

24.      (p. 171)A

25.      (p. 171)C

26.      (p. 158)FALSE

27.      (p. 158)FALSE

28.      (p. 158)FALSE

29.      (p. 161)FALSE

30.      (p. 161)TRUE

31.      (p. 162)TRUE

32.      (p. 162)FALSE

33.      (p. 163)TRUE

34.      (p. 164)FALSE

35.      (p. 164)FALSE

36.      (p. 165)TRUE

37.      (p. 167)TRUE

38.      (p. 167)FALSE

39.      (p. 170)FALSE

40.      (p. 170)TRUE

41.      (p. 170)TRUE

42.      (p. 170)FALSE

43.      (p. 171)TRUE

44.      (p. 171)TRUE

45.      (p. 171)TRUE

46.      (p. 158)EBCDIC

47.      (p. 158)EBCDIC

48.      (p. 159)motherboard

49.      (p. 162)Chip capacities

50.      (p. 162)Logical

51.      (p. 162)sixty-four

52.      (p. 162)Coprocessors

53.      (p. 163-164)Flash

54.      (p. 164)Virtual

55.      (p. 164)CMOS

56.      (p. 165)gigahertz

57.      (p. 165)clock speed

58.      (p. 166)expansion slots

59.      (p. 166)Plug and Play

60.      (p. 166)graphics

61.      (p. 166)Network Interface card (NIC)

62.      (p. 167)PC

63.      (p. 170)FireWire

64.      (p. 170)Parallel ports

65.      (p. 171)IrDA port

66.      (p. 156-158)The four types of system units are: tablet PC system unit, desktop system unit, notebook system unit, and PDA system unit. The desktop system unit can be placed horizontally (desktop) or vertically (tower). All input devices are located outside the system unit. The notebook system unit is portable and contains some integrated input devices, like a pointer and keyboard. Tablet PC system units are similar to notebooks, but are designed to use a stylus as the primary input device. The PDA system unit is very small (palm sized) and contains the entire computer system.

67.      (p. 158)The three binary coding systems are ASCII, EBCDIC, and Unicode. ASCII is the most widely used system. EBCDIC was developed by IBM for use in large computers. Both of these systems use 8 bits per byte. Unicode was developed with funding from several large software companies. It uses 16 bits per byte to facilitate the storage of complex international alphabets.

68.      (p. 162)A microcomputer has a single CPU which does not allow the computer to process heavy tasks. But with the help of a dual-core chip, even a microcomputer can run all the complex programs that only large computers could do. This is done through parallel processing.

69.      (p. 162)Parallel processing is the simultaneous use of more than one CPU to run a program that allows faster execution and improved performance.

70.      (p. 162-163)A smart card is essentially a plastic card the size of a regular credit card that has an embedded chip. It can store 80 times the information stored on the magnetic strip of a regular credit card. It is used for identification, providing access to a network, securing cellular phones, securing set-top boxes on televisions, storing medical files, personal records etc.

71.      (p. 163-164)Flash RAM or flash memory chips can retain data even if power is disrupted. This type of RAM is the most expensive and used primarily for special applications such as for digital cell telephones, digital video cameras, and portable computers. It is different from other types of RAM because it is considered as non-volatile RAM.

72.      (p. 166)While both allow you to connect to other computers, they work in different ways. A modem translates an audio signal to connect you via the telephone system. An NIC is used when this translation is not needed, such as a network.

73.      (p. 170)Industry standard architecture (ISA), Peripheral component interconnect (PCI), Accelerated graphics port (AGP), Universal serial bus (USB), and FireWire buses (HPSB).

74.      (p. 170)A serial port can only send one data bit at a time and is very good for sending data over a long distance. Parallel ports can send 8 bits at a time and are primarily used to connect printers.
 75.      (p. 171)An IrDA transmits infrared signals. Using this, we can transfer data from one device to another without any cables. For example, if both your desktop computer and printer have IrDA ports, you can simply put your computer near the printer and take printouts without needing to connect the two with a cable. The only thing is the two machines need is to be near each other.



Practice set
 Networking and Security

Multiple Choice:


1.             Which of the following is NOT an advantage of using networks compared to a stand-alone computer?
A.    ease of maintenance and administration
B.     enhanced resource sharing
C.     increased productivity
D.    increased communication capabilities
Answer: A    Reference: Networking Advantages                            Difficulty: Easy
2.             ____________ networks may experience significant slowdowns if more than ten (10) users are on the network.
A.    Wide area
B.     Peer-to-peer
C.     Server-based
D.    Metropolitan area
Answer: B    Reference: Client/Server Networks                             Difficulty: Moderate
3.             All of the following statements are DISADVANTAGES of peer-to-peer networks EXCEPT:
A.    P2P networks do not require servers.
B.     security cannot be implemented centrally on P2P networks.
C.     each computer must be updated individually in P2P networks.
D.    P2P networks are decentralized and not easily scalable.
Answer: A    Reference: Client/Server Networks                                         Difficulty: Easy



4.             Individual users must take responsibility for data backups and security on a peer-to-peer network because this kind of network is considered:
A.    scalable.
B.     centralized.
C.     decentralized.
D.    dedicated.
Answer: C    Reference: Client/Server Networks                                         Difficulty: Moderate
5.             The ability to easily add additional users means that a network is:
A.    scalable.
B.     dedicated.
C.     decentralized.
D.    secure.
Answer: A    Reference: Client/Server Networks                                         Difficulty: Moderate
6.             In a client/server network, all clients are connected to a server that performs tasks for them, such as backup and security; therefore, it is known as a ____________ network.
A.    local area
B.     dedicated
C.     decentralized
D.    centralized
Answer: D    Reference: Client/Server Networks                                         Difficulty: Easy
7.             A(n) ____________ is a small group of computers and peripherals linked together in a small geographic area.
A.    LAN
B.     PAN
C.     CAN
D.    MAN
Answer: A    Reference: Classifications of Client/Server Networks: LANs…                         Difficulty: Easy

8.             The Internet is most accurately categorized as a:
A.    LAN.
B.     PAN.
C.     WAN.
D.    MAN.
Answer: C    Reference: Classifications of Client/Server Networks: LANS…                 Difficulty: Easy
9.             PANs are used to connect ____________ devices (such as Bluetooth-enabled devices) in close proximity to each other.
A.    peripheral
B.     wireless
C.     dedicated
D.    client
Answer: B    Reference: Classifications of Client/Server Networks: LANs…                   Difficulty: Easy
10.         A(n) ____________ is a private corporate network, used exclusively by company employees.
A.    Internet
B.     local area network
C.     peer-to-peer
D.    intranet
Answer: D    Reference: Constructing Client/Server Networks                Difficulty: Moderate
11.         ____________ is specialized software that runs on a server computer to control network functionality.
A.    NOS software
B.     NCP software
C.     TCP software
D.    MAC software
Answer: A    Reference: Constructing Client/Server Networks                Difficulty: Easy


12.         The layout and structure of the network is known as the network’s:
A.    NOS.
B.     topology.
C.     components.
D.    protocol.
Answer: B    Reference: Constructing Client/Server Networks                Difficulty: Easy
13.         Cable and wireless communication technologies are types of:
A.    network adapters.
B.     topologies.
C.     transmission media.
D.    network operating systems.
Answer: C    Reference: Constructing Client/Server Networks                Difficulty: Moderate
14.         Network navigation devices include all of the following EXCEPT:
A.    servers.
B.     routers.
C.     switches.
D.    hubs.
Answer: A    Reference: Constructing Client/Server Networks                Difficulty: Easy
15.         ____________ servers store and manage files for network users.
A.    File
B.     Web
C.     Authentication
D.    Main
Answer: A    Reference: Constructing Client/Server Networks                Difficulty: Moderate


16.         A(n) ____________ server keeps track of users logging onto the network and the services available to the users.
A.    file
B.     authentication
C.     Web
D.    e-mail
Answer: B    Reference: Servers                                                           Difficulty: Easy
17.         ____________ servers are used to fulfill one specific function, such as handling e-mail.
A.    Dedicated
B.     Network
C.     Protocol
D.    Peer-to-peer
Answer: A    Reference: Servers                                                           Difficulty: Moderate
18.         ____________ servers are used to manage all client-requested printing jobs for all printers.
A.    Database
B.     Network
C.     Print
D.    E-mail
Answer: C    Reference: Print Servers                                                 Difficulty: Easy
19.         A(n) ____________ server, on a network, delivers the software to the clients because the software does not reside on the client computers.
A.    Web
B.     application
C.     communications
D.    database
Answer: B    Reference: Application Servers                                     Difficulty: Easy

20.         The ____________ server, on a network, is the single point of contact with the outside world and is often the only device connected to the Internet.
A.    intranet
B.     database
C.     application
D.    communications
Answer: D                Reference: Communications Servers                          Difficulty: Challenging
21.         In a(n) ____________ topology, all computers are connected in sequence, using a single cable.
A.    bus
B.     star
C.     hybrid
D.    ring
Answer: A    Reference: Bus Topology                                                Difficulty: Moderate
22.         In a bus topology, a ____________, located at each end of the network, absorbs the signal to prevent it from being reflected back onto the cable.
A.    node
B.     terminator
C.     packet
D.    network device
Answer: B    Reference: Bus Topology                                                Difficulty: Easy
23.         In a bus topology, the nodes do nothing to move the data along the network, making it a(n) ____________ topology.
A.    client/server
B.     active
C.     passive
D.    terminated
Answer: C    Reference: Bus Topology                                                Difficulty: Moderate

24.         Active topologies differ from passive topologies in that nodes on the active topology network:
A.    help pass the data along the network.
B.     listen for signals on the line before transmitting.
C.     ultimately send their messages to a terminator.
D.    actively search for packets intended for themselves.
Answer: A    Reference: Ring Topology                                              Difficulty: Challenging
25.         When two computers send data at the same time on a bus network it is called a(n):
A.    access method.
B.     data collision.
C.     active topology.
D.    data termination.
Answer: B    Reference: Bus Topology                                                Difficulty: Moderate
26.         In a ring topology, the computer in possession of the ____________can transmit data.
A.    packet
B.     data
C.     access method
D.    token
Answer: D    Reference: Ring Topology                                              Difficulty: Moderate
27.         Because each node on the network is responsible for retransmitting the token and the data to the next node, the ____________ topology is considered an active topology.
A.    ring
B.     bus
C.     star
D.    hybrid
Answer: A    Reference: Ring Topology                                              Difficulty: Moderate


28.         Which of the following statements about ring topology networks is TRUE?
A.    A ring topology network is plagued with data collisions.
B.     A ring topology network uses the CSMA/CD access method to transmit data.
C.     A ring topology network allows only one node to transmit data at a time.
D.    A ring topology network is considered passive.
Answer: C    Reference: Ring Topology                                              Difficulty: Moderate
29.         In the star topology, the central point of failure is the:
A.    client.
B.     switch.
C.     terminator.
D.    access point.
Answer: B    Reference: Star Topology                                               Difficulty: Challenging
30.         Which of the following statements, concerning star topology networks, is FALSE?
A.    Star topology networks use the CSMA/CD access method.
B.     If one computer fails, it does not affect the rest of the network.
C.     There are no data collisions on a star topology network.
D.    If the switch fails, the network no longer functions.
Answer: C    Reference: Star Topology                                               Difficulty: Challenging
31.         When a collision occurs on an Ethernet network, the node that detects the collision sends a(n):
A.    token.
B.     packet.
C.     jam signal.
D.    warning.
Answer: C    Reference: Star Topology                                               Difficulty: Moderate


32.         On an Ethernet network, after a collision occurs between two computers and a jam signal is sent, what happens next?
A.    The signals are encrypted to avoid a second collision.
B.     A token is resent by the two computers that caused the collision.
C.     The two computers wait random amounts of time, and then resend their signals.
D.    The switch notifies the network of the collision.
Answer: C    Reference: Star Topology                                               Difficulty: Challenging
33.         Which of the following statements is FALSE concerning bandwidth?
A.    Bandwidth defines the speed at which the data flows on the network.
B.     Cable is rated by the maximum amount of bandwidth it supports.
C.     Bandwidth is the amount of data transmitted across the transmission medium in a certain amount of time.
D.    Bandwidth is measured in bits per second (bps).
Answer: A    Reference: Transmission Media                                    Difficulty: Easy
34.         ____________ defines whether the transmission media uses electrical impulses or pulses of light to transmit data.
A.    Bandwidth
B.     Susceptibility to interference
C.     Signal transmission method
D.    Access method
Answer: C    Reference: Wired Transmission Media                                               Difficulty: Challenging
35.         EMI and RFI are types of:
A.    signal interference.
B.     bandwidth measurements.
C.     twisted pair cable.
D.    wireless transmission media.
Answer: A    Reference: Wired Transmission Media                                               Difficulty: Moderate

36.         All of the following statements concerning twisted pair cable are true EXCEPT:
A.    Twisted pair uses pulses of light to send data.
B.     The number of twists in twisted pair is significant because it makes the wires less susceptible to interference.
C.     UTP is not recommended in areas with significant sources of interference.
D.    The two most common types of UTP in use today are Cat 5e and Cat 6.
Answer: A    Reference: Twisted Pair Cable                                                   Difficulty: Moderate
37.         UTP and STP are examples of:
A.    CATV cable.
B.     thicknet coaxial cable.
C.     fiber-optic cable.
D.    twisted pair cable.
Answer: D    Reference: Twisted Pair Cable                                                   Difficulty: Easy
38.         The core of a coaxial cable is usually made from:
A.    magnesium oxide.
B.     copper.
C.     silicon.
D.    glass fibers.
Answer: B    Reference: Coaxial Cable                                                            Difficulty: Easy
39.         All of the following statements regarding fiber-optic cable are true EXCEPT:
A.    the core of fiber-optic cable is composed of copper.
B.     fiber-optic cable uses pulses of light to transmit data.
C.     data passes through fiber-optic cable in one direction only.
D.    the outer jacket of fiber-optic cables is often made of Kevlar.
Answer: A    Reference: Fiber-Optic Cable                                                    Difficulty: Moderate


40.         The wired medium least susceptible to signal interference is:
A.    STP cable.
B.     coaxial cable.
C.     fiber-optic cable.
D.    UTP cable.
Answer: C    Reference: Fiber-Optic Cable                                                    Difficulty: Moderate
41.         ____________ wireless devices have largely been replaced with faster technology.
A.    802.11b
B.     802.11g
C.     802.11n
D.    802.11a
Answer: A    Reference: Wireless Media Options                                        Difficulty: Moderate
42.         All of the following protocols are proprietary EXCEPT:
A.    TCP/IP.
B.     IPX.
C.     NetBEUI.
D.    AFP.
Answer: A    Reference: Network Operating Systems                                Difficulty: Easy
43.         The major network operating systems for installation on the server, in a client/server environment, include all of the following EXCEPT:
A.    Windows Server 2003.
B.     UNIX.
C.     Windows XP.
D.    Novell NetWare.
Answer: C    Reference: Network Operating Systems                                Difficulty: Easy


44.         The OSI model is divided into ____________ processes called layers.
A.    five
B.     six
C.     seven
D.    eight
Answer: C    Reference: Dig Deeper: The OSI Model                                             Difficulty: Easy
45.         In the OSI model, the ____________ layer handles data encryption and compression.
A.    application
B.     presentation
C.     data link
D.    session
Answer: B    Reference: Dig Deeper: The OSI Model                                  Difficulty: Challenging
46.         In the OSI model, the ____________ layer is responsible for assembling the data packets into frames.
A.    session
B.     transport
C.     data link
D.    network
Answer: C    Reference: Dig Deeper: The OSI Model                                  Difficulty: Challenging
47.         The device that acts as an interface to connect with and communicate on a network is known as the:
A.    network adapter.
B.     hub.
C.     repeater.
D.    switch.
Answer: A    Reference: Network Adapters                                                 Difficulty: Easy


48.         Which of the following statements concerning MAC addresses is TRUE?
A.    A MAC address is used to externally identify a computer on a network.
B.     The MAC address and the IP address can be used interchangeably.
C.     A MAC address must match the IP address.
D.    The first three numbers in the address identify the manufacturer.
Answer: D    Reference: MAC Addresses                                                       Difficulty: Challenging
49.         If a network requires a cable to connect two devices farther apart than the normal maximum run length of the media, the way to prevent signal degradation is to install a(n):
A.    adapter.
B.     repeater.
C.     bridge.
D.    switch.
Answer: B    Reference: Repeaters and Hubs                                                          Difficulty: Moderate
50.         Another name for a “smart” hub is a:
A.    bridge.
B.     repeater.
C.     firewall.
D.    switch.
Answer: D    Reference: Switches and Bridges                                            Difficulty: Moderate

Fill in the Blank:


51.         ____________ are designed to send information between two networks.
Answer: Routers                Reference: Routers                                               Difficulty: Easy
52.         The special communications software, installed on a computer to enable the network adapter to communicate with the operating system is called the ____________.
Answer: device driver                  Reference: Network Adapters                                      Difficulty: Moderate
53.         Entering a user ID and password is known as ____________.
Answer: authentication   Reference: Authentication                                 Difficulty: Easy
54.         The acronym NOS stands for ____________.
Answer: Network Operating System   Reference: Network Operating Systems                    Difficulty: Easy
55.         NetBEUI, AFP, and IPX are known as ____________ protocols, which means that they do not work with another vendor’s NOS.
Answer: proprietary         Reference: Network Operating Systems        Difficulty: Challenging
56.         The ____________ identifies a computer internally on the network.
Answer: MAC address                  Reference: MAC Addresses                                            Difficulty: Moderate
57.         In the OSI model, the ____________ layer converts the data into signals for transmission over the network.
Answer: physical               Reference: Dig Deeper: The OSI Model                                  Difficulty: Challenging
58.         Combining multiple topologies into one network is known as a(n) ____________ network.
Answer: hybrid                              Reference: Comparing Topologies                               Difficulty: Easy
59.         CSMA/CD is the access method used on ____________ networks.
Answer: Ethernet              Reference: Star Topology                                               Difficulty: Challenging
60.         The ____________ passing method is used on a ring topology to avoid collisions.
Answer: token                                Reference: Ring Topology                                              Difficulty: Moderate
61.         ____________ is the amount of data that can be transmitted over transmission media in a certain amount of time.
Answer: Bandwidth                      Reference: Wired Transmission Media                                   Difficulty: Challenging
62.         A(n) ____________ is a set of rules for exchanging communication.
Answer: protocol              Reference: Star Topology                                               Difficulty: Easy
63.         ____________ cable is composed of a glass or plastic fiber (or bundle of fibers) as its core.
Answer: Fiber-optic Reference: Fiber-Optic Cable                                                 Difficulty: Easy
64.         ____________ networks do not need specialized network operating system software.
Answer: Peer-to-peer                  Reference: Network Operating Systems                                Difficulty: Moderate        

65.         The 802.11 wireless standard is also known as ____________.
Answer: Wi-Fi                     Reference: Wireless Media Options                            Difficulty: Easy
66.         In wireless networks, wireless NICs connect to ____________, which provide wireless devices with a sending and receiving connection to the network.
Answer: wireless access points              Reference: Network Adapters                          Difficulty: Moderate
67.         ____________ are containers that hold multiple data packets.
Answer: Frames                             Reference: MAC Addresses                                Difficulty: Challenging
68.         The acronym MAC, as in MAC address, stands for ____________.
Answer: Media Access Control              Reference: MAC Addresses                                Difficulty: Moderate
69.         A(n) ____________ sends data only to the intended recipient as opposed to a hub, which sends the data to all devices connected to it.
Answer: switch                              Reference: Switches and Bridges                                 Difficulty: Moderate
70.         ____________ are devices used to send data between different segments (collision domains) on a network.
Answer: Bridges                 Reference: Switches and Bridges                                 Difficulty: Easy
71.         ____________ amplify a signal and retransmit it to extend cable runs beyond the maximum run length.
Answer: Repeaters                        Reference: Repeaters and Hubs                                               Difficulty: Moderate
72.         ____________ is the open protocol used by the Internet.
Answer: TCP/IP                  Reference: Network Operating Systems                                Difficulty: Challenging
73.         EMI and RFI are types of ____________.
Answer: interference                   Reference: Wired Transmission Media                                   Difficulty: Easy
74.         The term packet screening refers to the examination of incoming data packets by the ____________to ensure that they originate or are authorized by valid users on the internal network.
Answer: firewall                Reference: Firewalls                                                         Difficulty: Moderate
75.         ____________ use IP addresses to send information between two networks.
Answer: Routers                Reference: Routers                                                           Difficulty: Moderate



True and False:
76.         In a ring topology, if one computer fails it can bring the entire network to a halt.
Answer: True                                  Reference: Ring Topology                                              Difficulty: Easy
77.         An application server acts as a go-between for computers on an internal network and the external network (Internet).
Answer: False (proxy)                  Reference: Firewalls                                                         Difficulty: Moderate
78.         The hub is responsible for breaking down data into packets and preparing the packets for transmission across the network.
Answer: False (network adapter or NIC)        Reference: Network Adapters                                                                             Difficulty: Easy
79.         In the OSI model, the session layer sets up and manages the virtual (not physical) connection between the sending and receiving devices.
Answer: True                                  Reference: Dig Deeper: The OSI Model                                  Difficulty: Challenging
80.         Twisted pair cable has the lowest susceptibility to interference.
Answer: False (highest)   Reference: Figure 12.14: Comparison of Characteristics…                                       Difficulty: Moderate
81.         Throughput is another name for bandwidth.
Answer: True                                  Reference: Wired Transmission Media                                   Difficulty: Easy
82.         Crosstalk interference is the tendency of signals on one twisted pair wire to interfere with signals on a wire next to it.
Answer: True                                  Reference: Twisted Pair Cable                                       Difficulty: Easy
83.         The ring topology is the most widely deployed client/server topology in businesses today.
Answer: False (star)                      Reference: Star Topology                                               Difficulty: Moderate
84.         Token passing and CSMA/CD are methods of avoiding data collisions.
Answer: True                                  Reference: Network Topologies                                   Difficulty: Easy
85.         A bus topology provides a fairer allocation of resources than a ring topology by giving all the nodes on the network an equal opportunity to send data.
Answer: False                                 Reference: Ring Topology                                              Difficulty: Challenging
86.         MAC addresses enable computers on one network to communicate with computers on another network.
Answer: False (IP addresses)                  Reference: MAC Addresses                                Difficulty: Moderate

87.         Bridges are relatively simple devices whose sole purpose is to amplify a signal and retransmit it.
Answer: False         (Repeaters)  Reference: Repeaters and Hubs                                               Difficulty: Challenging
88.         In a star network, the failure of one computer affects the other computers on the network.
Answer: False         Reference: Figure 12.10: Advantages and Disadvantages of Bus,…                        Difficulty: Easy
89.         Hubs receive a signal from a device, reconstruct it, and transmit it to all the ports on the hub.
Answer: True                                  Reference: Repeaters and Hubs                                               Difficulty: Challenging
90.         Authentication can be achieved through passwords, biometric access devices, and possessed objects.
Answer: True                                  Reference: Authentication                                             Difficulty: Easy

Matching:


91.         Match the following acronyms to their descriptions:
            I.    MAC                     A. type of interference
            II.  CSMA/CD           B. device address
            III. OSI                       C. Ethernet access method
            IV. EMI                       D. type of cable
            V.  UTP                      E. protocol standard
Answer: B, C, E, A, D         Reference: Multiple locations in chapter       Difficulty: Moderate

92.         Match the following terms to their meanings:
            I.    frame                   A. packet granting transmission rights
            II.  bastion                B. assemblage of packets
            III. token                   C. a Novell protocol
            IV. IPX                        D. host configured as proxy server
            V.  jam                       E. signal indicating data collisions
Answer: B, D, A, C, E                     Reference: Multiple locations in chapter                   Difficulty: Moderate

93.         Match the following devices to their functions:
            I.    repeater              A. sends data to a specific device, not to all devices
            II.  hub                       B. transmits data between two different networks
            III. switch                  C. device used for signal amplification and retransmission
            IV. bridge                  D. multiport device used for signal amplification and broadcast
            V.  router                  E. connects collision domains of a network
Answer: C, D, A, E, B                     Reference: Multiple locations in chapter                   Difficulty: Challenging

94.         Match the following terms to their meanings:
            I.    topology             A. communication rules
            II.  proxy                   B. large size coaxial cable
            III. intranet               C. server controlling Internet access of network
            IV. protocol              D. private Web-based network
            V.  ThickNet             E. layout of a network
Answer: E, C, D, A, B                     Reference: Multiple locations in chapter                   Difficulty: Moderate

95.         Match the following acronyms to their descriptions:
            I.    TCP/IP                 A. proprietary communications protocol
            II.  IPX                        B. software controlling communications in a network
            III. NOS                      C. network spanning a metropolitan area
            IV. MAN                    D. type of network adapter
            V.  NIC                       E. open communications protocol
Answer: E, A, B, C, D                     Reference: Multiple locations in chapter       Difficulty: Moderate



96.         Match the following OSI layers to their functions:
            I.    Session                A. reformats, compresses, and encrypts data
            II.  Presentation      B. sets up a virtual connection between sending and receiving devices and                                                                                                                             manages communication
            III. Data Link            C. determines where to send the data packets on the network
            IV. Transport           D. assembles the data packets into frames and delivers them to the physical layer
            V.  Network             E. handles packet acknowledgment
Answer: B, A, D, E, C                     Reference: Dig Deeper: The OSI Model                                  Difficulty: Challenging

97.         Match the following terms to their meanings:
            I.    bandwidth         A. entering a user ID and password
            II.  bend radius        B. examining incoming data packets to ensure they originated from an authorized                                                                                                                           user
            III. ThinNet               C. degree of flexibility in a cable
            IV. authentication  D. a type of coaxial cable used for cable TV
            V.  packet screening                                                                                  E. amount of data that can be transmitted in a certain amount of time
Answer: E, C, D, A, B                     Reference: Multiple locations in chapter                   Difficulty: Moderate

98.         Match the following terms to their meanings:
            I.    firewall                A. a security measure, composed of hardware or software, to protect a network                                                                                                                                from attacks over the Internet
            II.  terminator         B. a device that absorbs the signal to prevent its reflection back onto the network
            III. passive topology                                                                                  C. a special data packet on a ring topology
            IV. access method  D. nodes on a network do nothing to move data along the network
            V.  token                   E. controls how computers can use the transmission media
Answer: A, B, D, E, C                     Reference: Multiple locations in chapter                   Difficulty: Moderate


99.         Match the following terms to their meanings:
            I.    active topology             A. combining multiple topologies into one network
            II.  hybrid                              B. the routes data takes to flow between devices
            III. transmission media                                                                             C. each node on the network is responsible for retransmitting the signal
            IV. device driver                 D. a chunk of data containing the address of the receiving computer
            V.  packet                             E. enables a device to communicate with the operating system
Answer: C, A, B, E, D                     Reference: Multiple locations in chapter                   Difficulty: Moderate

100.     Match the following terms to their meanings:
            I.    crosstalk             A. tendency of signals on one wire to interfere with signals on a wire next to it
            II.  CAT 6                   B. can handle bandwidth of 1 Gbps
            III. open protocol   C. computers connected in sequence on a single cable
            IV. centralized         D. not associated with one particular vendor
            V.  bus                       E. characteristic of client/server networks
Answer: A, B, D, E, C                     Reference: Multiple locations in chapter                   Difficulty: Moderate








1. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
e. none of these
answer - D

2. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
e. None of these
answer - D

3. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
e. None of these
answer - C

4. . ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
E. None of these
Answer - B
5. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit
E. None of these
Answer - A

6. . …..aim at the boot sector of  a hard drive by infecting a very crucial component of the boot process ?
A.File infection virus
B.Boot virus
C.Network virus
D.E-mail virus
      e)None of these
Answer - B
7. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as :
A) phishing
B) flaming
C)blogging
D)pop- ups
E)None of these
Answer - A
8. Which file starts MS Word?
A) Winword.exe
B) Word.exe
C) Msword.exe
D) Word2003.exe
E) None of these
Answer- A
9. What is the default left margin in Word 2003 document?
A) 1"
B) 1.25"
C) 1.5"
D) 2"
E) None of these
Answer- B
10. Managers are using sophisticated tool to combat cyber slacking, especially involving the internet such tools include ?
A)Web filters
B)Surveillance Software
C)Proxcy Server
D)Packet sniffer
E)All
Answer- E
11. Software, such as virus, worms and Trojan hores that has a malicious intent, is known as
A)Spyware
B)Adware
C)Malware
D)Spam
E)None of these
Answer -C
12. Portrait and Landscape are
A) Page Orientation
B) Paper Size
C) Page Layout
D) All of above
E) None of these
Answer- A
13. Red triangle at the top right corner of a cell indicates
a. There is an error in the cell
b. There is a comment associated with the cell
c. The font color of the text in cell is red
d. The cell can't accept formula
e. None of these.
Answer- B

14. Convert Binary number(101001101 to its equivalent hexadecimal number ?
15 E
15 D
14 D
13 E
None of these
Answer - C

15. Wi-Max stand for ……
World wide interoperability for microwave access
World wide interoperation for microwave access
World wide interoperation for microwave oven
Both 1 and 3
None of these
Answer -A
16. RISC , CISC AND EPIC are types of
controller
processor
system unit
micro programming
none of these
Answer -B
17.Some system programs that manage the  computer’s operation are stored in ROM as
Form ware
Firmware
Firewall
Both 1 and 2
None of these
Answer-B
18.example of the utility software are…….
Disk defragmenter
A)Virus scanner
B)A kruti publisher
C)Word star
D)Both 1 and 2
E)None of these
Answer- D
19.for page break which option of main menu is selected.
A)insert
B)window
C)tools
D)view
E)none of these
Answer -A
20.Which of the following is not an alignment option ?
Left Alignment
Right alignment
Center alignment
Justified
None of these
Answer -E
21.M.s access is a software, which is based on the concept of…..
Word processor
Spreadsheet
Database
Presentation
None of these
Answer -C
22.Single in-line memory module (SIMM) and dual in-line memory module (DIMM) chips are found in desktop. Who does consist these chips?
Rom
Ram
Prom
Both 1 and 2
None of these
Answer -B

23.A computer’s CPU consists of million of tiny switches. They are called…….
bits
transistors
registers
bytes
none of these
Answer- B
24.Which of the following bus technology enable the user to connect many devices through single port.
USB
IEEE 1394
SCSI
All
None of these
Answer- C
25. The capability of a program to run under different operating systems and or hardware platforms…..
Multiprogramming
Multitasking
Platform independence
Parallel processing
None of these
Answer-C
26.What is instant message.(IM) ?
Relay software
Chat software
System software
E-mail software
None of these
Answer B
27.Microsoft ‘s SQL server is the fasted growing ……
Enterprise
Server
Network server
DBMS
None of these
Answer -D
29. . ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
E. None of these
Answer-D
30. ………………. Is a collection of data that is organized so that its contents can easily be accessed manage and updated.
Data warehouse
Data mining
Database
Data dictionary
None of these.
Answer- C

31. What is tuple ?
Another name for table in RDBMS
Another name for the key linking different table in database
Initial source value of a field.
A row of record in database table.
None of these.
Answer -D

32. Arranging of data in a logical sequence is knows as …
Classifying
Searching
Sorting
Reproducing
None of these
Answer- C

33. Which of the following is not a DBMS software
Foxpro
Oracle
Sybase
Database 2000
None of these
Answer-D
34. While working with Ms-Dos which command transfers a specific file from one disk to another?
a.    Copy
b.    Diskcopy
c.    Time
d.    Rename
e.   None of these
Answer-A
35. Which of the following extensions suggest that the file is a backup copy
a.    Bak
b.    Bas
c.    Com
d.    Txt
e. none of these
Answer -A
36. Terminal is a
(a) device used to give supply to a computer
(b) Point at which data may leave or enter the computer
(c) ending point in a program
(d) point where wires are interconnected
(e) an input/output device
Answer-B
37. For reproducing sound, a CD (Compact Disc) audio player uses a
(a) quartz crystal
(b) titanium needle
(c) laser beam
(d) barium titanium ceramic
(e) none of these
Answer C
38. The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byte is made up of
(a) eight decimal digits
(b) eight binary digits
(c) two binary digits
(d) two decimal digits
(e) none of these
Answer- B
39. The computer device primarily used to provide hard copy is the
(a) CRT
(b) Line Printer
(c) Computer Console (
d) Card Reader
e. None of these
Answer - B
40. First generation computer systems used
(a) Transistors
(b) Vacuum tubes
(c) Magnetic cores
(d) Silicon chips
e) None of these
Answer - B
41. The most widely used commercial programming computer language is
(a) BASIC
b) COBOL
c) FORTRAN
d) PASCAL
e) None of these
Answer-B

42. A computer programmer
(a) enters data into computer
(b) writes programs
(c) changes flow chart into instructions
(d) provides solutions to complex problems
(e) does total planning and thinking for a computer
Answer-E
43. Which of the following floppy sizes exists?
(a) 5.25 inches
b) 4.75 inches
c) 6 inches
d) 8 inches
e. None of these
Answer-A
44. . A temporary storage area, attached to the CPU, for I/O operations, is a
(a) Channel
b) Buffer
c) Register
d) Core
e) None of these
Answer-B
45. Which of the following is true?
(a) Plotters are not available for microcomputer systems
(b) Micro-computer are not programmed like conventional computers
(c) Mini-computers are task-oriented
(d) The contents of ROM are easily changed
(e) None of these

46. What access method is used for obtaining a record from a casset the tape ?
Sequential
Direct Sequential
Random
Both 2 and 3
None of these
Answer - A
47. Which of the following circuit is used as a ‘Memory device’ in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
(e) none of these
Answer - B
48 . ………….. is a device that connect two LAN or two segment of the same LAN.
a) Bridges
b) Switches
c) Routers
d) Hubs
e) None of these
Answer- A
49. The most common media for data communication are ……
a) Twisted-pair cable
b) fiber-optic cable and wireless link
c) co-axial cable
d) All
e) None of these
Answer -D
50. Data normalization in DBMS in used for ……..
Maintaining data
Controlling the data sedentary
Integrating the database
Managing the database
None of these Answer 



2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronicthermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
Ans : (B)
9. The following are all computing devices , except………
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
Ans : (C)
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
Ans : (D)
11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
Ans : (A)
16. URL stands for ……..
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
Ans : (C)
17. A database management system (DBMS) is a …………
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these
Ans : (D)
18. Which of the following is NOT a goal of transaction processing system ?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
Ans : ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
Ans : (D)
21. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
Ans : (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user’s computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
Ans : ()
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
Ans : (D)
24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
Ans : (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
Ans : (D)
26. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
Ans : (A)
27. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
Ans : (A)
28. The code that relational database management systems use to perform their database task is referred to as …..
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
Ans : (B)
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
Ans : (C)
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
Ans : (B)
31. A _________ contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
Ans : (A)
33. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
Ans : (B)
34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
Ans : (A)
35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
Ans : (C)
36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command – based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
Ans : (B)
37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
Ans : (C)
39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)
40. Making a field ______ meAns : that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
Ans : (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
Ans : ()
42. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans : (C)
43. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these
Ans : (A)
44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
Ans : (D)
45. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
Ans : (C)
46. The internet is ……
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
Ans : (C)
48. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B
49. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A
50. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B

Q51. …….. is a program which reproduces itself ?
Virus
Software
Program
Both 1 and 2
None of these
Answer -- A
Q2. …..aim at the boot sector of  a hard drive by infecting a very crucial component of the boot process ?
File infection virus
Boot virus
Network virus
E-mail virus
None of these.
Answer - B
Q3. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as :
phishing
flaming
blogging
pop- ups
None of these
Answer- A
Q4. Managers are using sophisticated tool to combat cyber slacking, especially involving the internet such tools include ?
Web filters
Surveillance Software
Proxcy Server
Packet sniffer
All
Answer -- E
Q5. Software, such as virus, worms and Trojan hores that has a malicious intent, is known as
Spyware
Adware
Malware
Spam
None of these
Answer - C
Q6. Virus suspected mails come under ………
Sink
Spam
Both 1 and 2
Delete
None of these
Answer - B
Q7. Malicious software is known as
Badware
Malware
Malicious ware
Iiigalware
None of these
Answer - B
Q8. Hardware or software designed to guard against authorized access to computer network is known as …
Hacker proof program
Firewall
Hacker resistant server
Encryption safe wall
None of these
Answer- B


1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B


16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C


20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A


24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in the Blank:

51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac

52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system

53. The type of operating system software you use depends on your computer’s ____________.
Answer: platform

54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application

55. ____________are the fastest and most expensive computers.
Answer: Supercomputers

56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions

58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.
Answer: stores

59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1

60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)

61. The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input

62. The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output

63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software

64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet

65. ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes

66. ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)

68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows

69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining

70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage

71. You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application

72. ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes

73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft

74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers

75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.
Answer: simulators

True and False

76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True

77. Data can be a number, a word, a picture, or a sound.
Answer: True

78. Strictly defined, a computer is a data processing device.
Answer: True

79. The discrepancy between the “haves” and “have-nots” with regard to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security.
Answer: True

81. Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True

82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False

83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True

84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True

86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True

87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True

88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False

89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True

90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices.
Answer: True

92. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)



                Practice Set ---     using system software:
the operating system, utility programs, and file management


101.     All of the following are tasks performed by the operating system EXCEPT:
A.    managing hardware on the computer.
B.     controlling the way application programs work with the CPU.
C.     performing housekeeping tasks like file compression and disk defragmentation.
D.    providing an interface for users to interact with the computer.
Answer: C    Reference: System Software Basics                             Difficulty: Moderate
102.     All of the following are operating system categories EXCEPT:
A.    real-time.
B.     single-user, single-task.
C.     single-user, multitask.
D.    virtual.
Answer: D    Reference: Operating System Categories                  Difficulty: Easy
103.     The ____________ is like a traffic cop that coordinates the flow of data and information through the computer system and provides a way for the user to interact with the computer.
A.    CPU
B.     operating system
C.     utility program
D.    RAM
Answer: B    Reference: What the Operating System Does          Difficulty: Easy


104.     Digital storage oscilloscopes, Mars Exploration Rovers and the Mars Reconnaissance Orbiter require a ____________ operating system.
A.    real-time
B.     single-user, single-task
C.     single-user, multitask
D.    multiuser
Answer: A    Reference: Real-Time Operating Systems                  Difficulty: Moderate
105.     A real-time operating system, as defined in the text, is most likely to be used for:
A.    desktop and laptop PCs.
B.     cell phones and PDAs.
C.     supercomputers.
D.    fuel-injection systems in car engines.
Answer: D    Reference: Real-Time Operating Systems                  Difficulty: Moderate
106.     Which one of the following statements is TRUE?
A.    Single-user operating systems are commonly used in robotics.
B.     Windows and Macintosh operating systems are the most commonly used single-user multitask operating systems.
C.     Supercomputers use single-user multitask operating systems.
D.    Single-user multitask operating systems are also known as network operating systems.
Answer: B    Reference: Operating System Categories                  Difficulty: Challenging
107.     The MS-DOS operating system is a:
A.    graphical user interface, single-task operating system.
B.     “user-friendly” multitask operating system.
C.     command-driven interface, single-task operating system.
D.    graphical user interface that executes in real-time.
Answer: C    Reference: Single-User Operating Systems               Difficulty: Moderate


108.     All of the following are examples of multiuser operating systems EXCEPT:
A.    Novell Netware.
B.     Symbian.
C.     Windows Server 2003.
D.    UNIX.
Answer: B    Reference: Multiuser Operating Systems                  Difficulty: Moderate
109.     Linux is a(n) ____________ operating system.
A.    Windows
B.     Microsoft
C.     open-source
D.    Mac
Answer: C    Reference: Linux                                                               Difficulty: Moderate
110.     The ____________ operating system does NOT have a graphical user interface.
A.    Windows XP
B.     MS-DOS
C.     Windows CE
D.    Mac OS
Answer: B    Reference: Single-User Operating Systems               Difficulty: Moderate
111.     The operating system does all of the following EXCEPT:
A.    provide a way for the user to interact with the computer.
B.     manage the central processing unit (CPU).
C.     manage memory and storage.
D.    enable users to perform a specific task such as document editing.
Answer: D    Reference: What the Operating System Does          Difficulty: Moderate

112.     During the boot process, the ____________ looks for the system files.
A.    CD
B.     BIOS
C.     CPU
D.    DVD
Answer: B    Reference: The Boot Process: Starting Your Computer     Difficulty: Easy
113.     ____________ are lists of commands that appear on the screen.
A.    GUIs
B.     Icons
C.     Menus
D.    Windows
Answer: C    Reference: The User Interface                                      Difficulty: Easy
114.     ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
A.    Multitasking
B.     Streamlining
C.     Multiuser
D.    Simulcasting
Answer: A    Reference: Processor Management                            Difficulty: Easy
115.     The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
A.    action.
B.     event.
C.     interrupt.
D.    activity.
Answer: C    Reference: Processor Management                            Difficulty: Challenging

116.     The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
A.    CPU
B.     slice of time
C.     stack
D.    event
Answer: B    Reference: Processor Management                            Difficulty: Challenging
117.     The blocks of code, included in the operating system, that software applications interact with are known as:
A.    application programming interfaces (APIs).
B.     complimentary metal-oxide conductors (CMOS).
C.     device drivers.
D.    bootstrap loaders.
Answer: A    Reference: Software Application Coordination       Difficulty: Moderate
118.     MS-DOS is a ____________ operating system.
A.    point-and-click
B.     user-friendly
C.     command-driven
D.    Mac
Answer: C    Reference: Single-User Operating System                 Difficulty: Moderate
119.     An interrupt handler is a(n):
A.    location in memory that keeps track of recently generated interrupts.
B.     peripheral device.
C.     utility program.
D.    special numeric code that indicates the priority of a request.
Answer: D    Reference: Processor Management                            Difficulty: Challenging


120.     A spooler is a(n):
A.    location in memory that maintains the contents of a document until it prints out.
B.     print job.
C.     program that coordinates the print jobs that are waiting to print.
D.    message sent from the printer to the operating system when a print job is completed.
Answer: C    Reference: Processor Management                            Difficulty: Challenging
121.     Virtual memory is typically located:
A.    on a floppy disk.
B.     in the CPU.
C.     in a flash card.
D.    on the hard drive.
Answer: D    Reference: Memory and Storage Management      Difficulty: Easy
122.     The purpose of a swap (or page) file is to:
A.    maintain pages of documents that are being spooled to the printer.
B.     hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
C.     prevent thrashing in a multitasking environment.
D.    allow multiple print jobs to print their pages out simultaneously.
Answer: B    Reference: Memory and Storage Management      Difficulty: Moderate
123.     The definition of thrashing is:
A.    swapping data between virtual memory and RAM too frequently.
B.     insufficient hard disk space.
C.     too many processors being managed by the operating system.
D.    inaccurate information stored in the registry.
Answer: A    Reference: Memory and Storage Management      Difficulty: Moderate


124.     All of the following are TRUE of Safe Mode EXCEPT:
A.    Safe Mode is a special diagnostic mode.
B.     Safe Mode loads all nonessential icons.
C.     Safe Mode allows users to troubleshoot errors.
D.    Safe Mode loads only the most essential devices.
Answer: B    Reference: Handling Errors in the Boot Process      Difficulty: Moderate
125.     Verification of a login name and password is known as:
A.    configuration.
B.     accessibility.
C.     authentication.
D.    logging in.
Answer: C    Reference: Configurations and Customizations       Difficulty: Moderate
126.     The combination of the operating system and the processor is referred to as the computer’s:
A.    CPU.
B.     platform.
C.     BIOS.
D.    CMOS.
Answer: B    Reference: Desktop Operating Systems                     Difficulty: Easy
127.     The following message generally means:
A.    Text Box:  Non-system disk or disk error
Replace and strike any key when ready .
B.      
A.    a nonsystem floppy has been left in the floppy disk drive.
B.     the CD drive is not functioning.
C.     the BIOS is corrupted.
D.    there is a problem loading a device.
Answer: A    Reference: Handling Errors in the Boot Process      Difficulty: Moderate
128.     Which of the following is the correct sequence of actions that takes place during the boot-up process?
A.    Load operating system à Activate BIOS à Perform POST à Check configuration settings
B.     Activate BIOS à Perform POST à Load operating system à Check configuration settings
C.     Perform POST à Load operating system à Activate BIOS à Check configuration settings
D.    Activate BIOS à Check configuration settings à Perform POST à Load operating system
Answer: B    Reference: The Boot Process: Starting Your Computers    Difficulty: Challenging
129.     All of the following are steps involved in the boot process EXCEPT:
A.    load the operating system into RAM.
B.     the power-on self-test.
C.     activate the basic input/output system (BIOS).
D.    load application programs.
Answer: D    Reference: The Boot Process: Starting Your Computers    Difficulty: Easy
130.     The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
A.    BIOS
B.     API
C.     device driver
D.    supervisor program
Answer: A    Reference: Step 1: Activating BIOS                              Difficulty: Moderate
131.     The basic input/output system (BIOS) is stored in:
A.    RAM.
B.     ROM.
C.     the CPU.
D.    the hard drive.
Answer: B    Reference: Step 1: Activating BIOS                              Difficulty: Easy


132.     Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
A.    configuration
B.     CMOS
C.     POST
D.    ROM
Answer: C    Reference: Step 2: Performing the Power-On Self-Test    Difficulty: Easy
133.     The memory resident portion of the operating system is called the:
A.    registry.
B.     API.
C.     CMOS.
D.    kernel.
Answer: D    Reference: Step 3: Loading the Operating System  Difficulty: Easy
134.     Which of the following does NOT occur during the power-on self-test (POST)?
A.    The ScanDisk utility begins to run.
B.     The video card and video memory are tested.
C.     The BIOS identification process occurs.
D.    Memory chips are checked to ensure they are working properly.
Answer: A    Reference: Step 2: Performing the Power-On Self-Test    Difficulty: Moderate
135.     All of the following are TRUE regarding virtual memory EXCEPT:
A.    any amount of RAM can be allocated to virtual memory.
B.     the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
C.     this temporary storage is called the swap file (or page file).
D.    virtual memory is physical space on the hard drive.
Answer: A    Reference: Memory and Storage Management      Difficulty: Moderate

136.     The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
A.    files.
B.     folders.
C.     drives.
D.    systems.
Answer: D    Reference: Organizing Your Computer: File Management           Difficulty: Easy
137.     All of the following statements concerning windows are true EXCEPT:
A.    windows are an example of a command-driven environment.
B.     windows can be resized and repositioned on the desktop.
C.     more than one window can be open at a time.
D.    toolbars and scrollbars are features of windows.
Answer: A    Reference: The Desktop and Window Features       Difficulty: Easy
138.     All of the following statements concerning files are true EXCEPT:
A.    A file is a collection of related pieces of information stored together for easy reference.
B.     Files can be generated from an application.
C.     Files are stored in RAM.
D.    Files should be organized in folders.
Answer: C    Reference: Organizing Your Files                                 Difficulty: Moderate
139.     Using Windows Explorer, a plus (+) sign in front of a folder indicates:
A.    an open folder.
B.     the folder contains subfolders.
C.     a text file.
D.    a graphics file.
Answer: B    Reference: Organizing Your Files                                 Difficulty: Moderate


140.     In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
A.    List
B.     Thumbnails
C.     Details
D.    Icon
Answer: C    Reference: Viewing and Sorting Files and Folders   Difficulty: Moderate
141.     In Windows XP, an especially good way to display folders containing picture files is the __________ view.
A.    List
B.     Thumbnails
C.     Details
D.    Icon
Answer: B    Reference: Viewing and Sorting Files and Folders   Difficulty: Easy
142.     Which of the following statements is FALSE concerning file names?
A.    Files may share the same name or the same extension but not both.
B.     The file extension comes before the dot (.) followed by the file name.
C.     Every file in the same folder must have a unique name.
D.    File extension is another name for file type.
Answer: B    Reference: Naming Files                                                 Difficulty: Easy
143.     Which of the following characters CANNOT be used in a file name when using the Windows XP operating system?
A.    Hyphen (-)
B.     Underscore (_)
C.     Colon (:)
D.    “At” symbol (@)
Answer: C    Reference: Naming Files                                                 Difficulty: Moderate

144.     If you select a file on your PC hard drive and press the Delete key, it will be:
A.    permanently removed from the system.
B.     removed from the system, but it can be recovered using special utility programs.
C.     placed on a backup floppy disk or CD.
D.    sent to the Recycle Bin folder.
Answer: D    Reference: Working with Files                                      Difficulty: Easy
145.     What happens when a file is emptied from the Recycle Bin?
A.    It is moved to RAM.
B.     Its reference is removed, but the file remains until overwritten.
C.     It is compressed.
D.    It is copied to a storage device.
Answer: B    Reference: Bits and Bytes: Need to Recover a Deleted…   Difficulty: Moderate
146.     Add/Remove Programs and Display are found in:
A.    System Restore.
B.     Task Manager.
C.     Control Panel.
D.    Task Scheduler.
Answer: C    Reference: Utility Programs                                           Difficulty: Challenging
147.     All of the following are included in the file path EXCEPT:
A.    the drive.
B.     all folders and subfolders.
C.     the file name.
D.    the file view.
Answer: D    Reference: Naming Files                                                 Difficulty: Easy


148.     The ____________ collects scattered pieces of files on the hard disk and rearranges them sequentially on the hard drive.
A.    ScanDisk utility
B.     disk defragmenter
C.     disk cleanup program
D.    file compression utility
Answer: B    Reference: Dig Deeper: Hard Disk Defragmenter Utilities Work Difficulty: Moderate
149.     FAT and NTFS are:
A.    file management utility programs.
B.     part of the boot process.
C.     programs for managing and scheduling tasks on the system.
D.    file systems.
Answer: D    Reference: Dig Deeper: How Disk Defragmenter Utilities Work Difficulty: Challenging
150.     To restore your Windows XP computer to the state it was in on a previous date, you can use the ____________ utility.
A.    System Restore
B.     Task Manager
C.     Defragment
D.    Backup
Answer: A    Reference: System Restore and Backup Utilities      Difficulty: Easy

Fill in the Blank:
151.     The ____________ is the feature of the program that allows the user to communicate with the computer system.
Answer: user interface    Reference: System Software Basics                 Difficulty: Moderate
152.     ____________ is an open-source operating system based on UNIX and designed for use on personal computers.
Answer: Linux                     Reference: Linux                                                   Difficulty: Moderate
153.     GNOME is a graphical user interface, used by the ____________ operating system.
Answer: Linux                     Reference: The User Interface                          Difficulty: Moderate
154.     Windows 2003/XP, Mac OS X, and Linux are examples of the ____________ category of operating system.
Answer: single-user, multitask                                                                          Reference: Operating Systems Categories            Difficulty: Moderate
155.     After the system files are loaded into RAM, the ____________, the essential component of the operating system is loaded and remains in RAM the entire time the computer is powered on.
Answer: kernel (or supervisor program)                                                                    Reference: Step 3: Loading the Operating System                                                                                                                                                               Difficulty: Challenging
156.     The ____________ contains all the different configurations (settings) used by the operating system and by other applications.
Answer: registry                Reference: Step4: Checking Further Configurations and Customizations                           Difficulty: Moderate
157.     The verification of your login name and password at the end of the boot process is called ____________.
Answer: authentication   Reference: Step4: Checking Further Configurations and Customizations                                                                                                                                                            Difficulty: Easy
158.     ____________ refers to the actual lines of instructional code that make the program work.
Answer: Source code       Reference: Trends in IT: Emerging Technologies…  Difficulty: Challenging
159.     When the operating system processes a task assigned a higher priority before processing a task with a lower priority this is called ____________.
Answer: preemptive multitasking                                                                    Reference: Processor Management                       Difficulty: Challenging
160.     If a printer is in use, the operating system puts a print request in a temporary storage area of RAM called the ____________.
Answer: buffer                   Reference: Processor Management                Difficulty: Moderate
161.     A(n) ____________ is when a user restarts the system after it is already on.
Answer: warm boot                     Reference: Bits and Bytes: What’s the Difference   Difficulty: Easy
162.     The process of optimizing RAM storage by borrowing hard drive space is called ____________.
Answer: virtual memory Reference: Memory Storage and Management      Difficulty: Challenging
163.     Devices attached to a computer come with a special program called a(n) ____________.
Answer: device driver      Reference: Hardware and Peripheral Device Management                                    Difficulty: Moderate
164.     After installing a device driver, if the system becomes unstable or crashes, Windows XP has a(n) ____________ feature that reinstalls the old driver.
Answer: Roll Back Driver Reference: Hardware and Peripheral Device Management                                    Difficulty: Challenging
165.     The ____________ is the part of the file identification that follows the dot (.).
Answer: extension (or file type)                                                                        Reference: Naming Files                                                Difficulty: Easy
166.     C:\My Documents\Spring 2006\TechNotes is a(n)  ____________.
Answer: file path               Reference: Working with Files                          Difficulty: Easy
167.     The ____________ is a special kind of memory that uses almost no power and contains information about the system’s memory, types of disks, and other essential input/output hardware components.
Answer: CMOS       Reference: Step 2: Performing the Power-On Self-Test    Difficulty: Challenging
168.      ____________ appear at the side or bottom of the screen to control what part of the window is displayed.
Answer: Scrollbars            Reference: The Desktop and Windows Features     Difficulty: Easy
169.     The most recent version of the Mac operating system (Mac OS X 10.4 Tiger) is based on ____________.
Answer: UNIX                     Reference: Mac OS                                               Difficulty: Challenging
170.     The ____________ utility can be used to easily remove temporary Internet files from the hard disk.
Answer: Disk Cleanup      Reference: System Maintenance Utilities       Difficulty: Moderate
171.     Error-checking, once known as ScanDisk, finds ____________, or physical errors on the disk, and helps prevent the operating system from using these areas in the future.
Answer: bad sectors         Reference: System Maintenance Utilities       Difficulty: Moderate
172.     ____________ is a tool included in Windows XP that gathers information about the computer when there is a program error and automatically creates a text log file.
Answer: Dr. Watson for Windows                                                                   Reference: System Maintenance Utilities        Difficulty: Challenging
173.     ____________ is a file system, supported by Windows XP, that supports larger hard drives and larger file sizes that the FAT.
Answer: NTFS         Reference: Dig Deeper: How Disk Defragmenter Utilities Work                                     Difficulty: Easy
174.     The concentric circles on hard disks are called ____________.
Answer: tracks       Reference: Dig Deeper: How Disk Defragmenter Utilities Work                                     Difficulty: Easy

175.     Every time you start your computer, or when a new application or driver is installed, Windows XP automatically creates a snapshot of your entire system’s settings called a(n) ____________.
Answer: restore point      Reference: System Restore and Backup Utilities      Difficulty: Moderate

True and False:
176.     The queue is where prints jobs are placed while waiting to be processed.
Answer: True                      Reference: Processor Management                Difficulty: Easy
177.     A network requires a multiuser operating system.
Answer: True                      Reference: Multiuser Operating Systems      Difficulty: Easy
178.     A graphical user interface (GUI) uses windows, menus, and commands.
Answer: False (icons)       Reference: The User Interface                          Difficulty: Moderate
179.     Most application software is platform-dependent.
Answer: True                      Reference: Desktop Operating Systems         Difficulty: Moderate
180.     In 1984, Windows became the first operating system to incorporate a Graphical User Interface (GUI).
Answer: False (Mac OS)  Reference: Mac OS                                               Difficulty: Easy
181.     The stack is a special numerical code that prioritizes requests to the CPU.
Answer: False (interrupt handler)                                                                    Reference: Processor Management                       Difficulty: Challenging
182.     The condition of excessive paging, which eventually slows down the computer system, is known as swapping.
Answer: False (thrashing)                                                                                   Reference: Processor Management                       Difficulty: Moderate
183.     The swap file is also known as the page file.
Answer: True                      Reference: Memory and Storage Management      Difficulty: Easy
184.     The devices whose drivers are included in Windows are called Plug and Play (PnP).
Answer: True    Reference: Hardware and Peripheral Device Management   Difficulty: Easy
185.     The main files of the operating system are known as the system files.
Answer: True                      Reference: Step 3: Loading the Operating System  Difficulty: Easy

186.     Files stored on the same device or folder can share both the same name and the same extension.
Answer: False                     Reference: Naming Files                                     Difficulty: Easy
187.     APIs are small applications, incorporated into the operating system, that perform special functions, such as manage system resources or improve efficiency.
Answer: False (Utility programs)                                                                      Reference: Utility Programs                                                Difficulty: Moderate
188.     Disk Defragmenter is a Windows utility that cleans unnecessary files from your hard drive.
Answer: False (Disk Cleanup)                                                                                         Reference: System Maintenance Utilities        Difficulty: Moderate
189.     In Windows XP, the additional information displayed when you place your cursor over a file icon is known as a dialog box.
Answer: False (ScreenTip)                                                                                  Reference: Viewing and Sorting Files and Folders  Difficulty: Moderate

Matching:


190.     Match the following operating systems with their characteristic features:
            I.    Lynx                     A. open source
            II.  Palm OS              B. used in personal digital assistants
            III. Mac OS               C. network operating system
            IV. Linux                    D. primarily for Apple computers
            V.  Novell Netware E. real-time operating system
Answer: E, B, D, A, C         Reference: Operating System Categories      Difficulty: Challenging

191.     Match the following file extensions with their application types:
            I.    .xls                        A. Access database
            II.  .doc                      B. compressed file
            III. .htm                     C. Word document
            IV. .zip                       D. Excel file
            V.  .mdb                    E. Web page
Answer: D, C, E, B, A         Reference: Figure 5.20 Filename Extensions            Difficulty: Easy
192.     Match the following acronyms with their descriptions:
            I.    NTFS                    A. command-driven PC operating system
            II.  API                        B. user interface involving windows and icons
            III. DOS                      C. system for managing and organizing files on disk
            IV. GIF                        D. file format for representing graphical information
            V.  GUI                       E. blocks of program code for performing common functions
Answer: C, E, A, D, B                     Reference: Multiple locations in chapter                   Difficulty: Moderate

193.     Match the following terms with their definitions:
            I.    platform             A. picture that represents an object such as a software application
            II.  menu                   B. a list of commands that appear on a screen
            III. icon                      C. a special location in RAM
            IV. window               D. combination of a computer’s operating system and processor
            V.  stack                    E. rectangular box displayed on a screen that contains programs
Answer: D, B, A, E, C                     Reference: Multiple locations in chapter                   Difficulty: Moderate

194.     Match the following acronyms with their definitions:
            I.    OS                         A. a type of file system
            II.  ROM                    B. system software
            III. CMOS                  C. a type of display
            IV. LCD                       D. complementary metal-oxide semiconductor
            V.  FAT                       E. a type of memory
Answer: B, E, D, C, A                     Reference: Multiple locations in chapter                   Difficulty: Easy



195.     Match the following terms with their definitions:
            I.    tracks                   A. another term meaning to “open” a file
            II.  sectors                 B. smallest segment within a sector
            III. cluster                 C. pie-shaped wedges on a hard drive
            IV. write                    D. another term meaning to “save” a file
            V.  read                     E. concentric circles on a hard drive
Answer: E, C, B, D, A                     Reference: Dig Deeper: How Disk Defragmenter    Difficulty: Moderate

196.     Match the following utility programs with their functions:
            I.    File compression                                                                                  A. removes redundancies in a file to reduce the size
            II.  Task Manager               B. removes unnecessary files from the hard drive
            III. System Restore             C. enables users to check on a program or exit a nonresponding program
            IV. Error-checking              D. allows users to restore system settings back to a specific date
            V.  Disk Cleanup                  E. once known as ScanDisk, it checks for lost files and fragments
Answer: A, C, D, E, B                     Reference: Utility Programs                               Difficulty: Moderate

197.     Match the following terms with their definitions:
            I.    Recycle Bin         A. also known as the “file extension”
            II.  .rtf                        B. a file format that can be read by any word processing program
            III. “/”, “:”, “\”        C. a folder on the desktop where files deleted from the hard drive reside
            IV. file type               D. helps users manage files and folders
            V.  Windows Explorer                                                                               E. path separators 
Answer: C, B, E, A, D                     Reference: Dig Deeper: How Disk Defragmenter… Difficulty: Moderate



198.     Match the following views with their definitions:
            I.    Tiles                      A. displays files and folders as very small icons with file names
            II.  Details                 B. displays files and folders as small icons with no other information beside the                                                                             file name
            III. Icon                      C. displays files and folders in list form, which can be sorted by column                                                      headings
            IV. Thumbnails        D. displays the contents of folders as small images
            V.  List                        E. displays files and folders as icons in list form and includes filename,
                                                application, and size
Answer: E, C, B, D, A                     Reference: Viewing and Sorting Files and Folders   Difficulty: Challenging

199.     Match the following terms with their definitions:
            I.    root directory   A. a collection of related pieces of information stored together as a single unit
            II.  folder                   B. a collection of files
            III. file                        C. a storage device represented by a letter
            IV. file management                                                                                  D. the top of the filing structure of the computer system
            V.  drive                    E. provides organizational structure to the computer’s contents
Answer: D, B, A, E, C                     Reference: Organizing Your Files                                 Difficulty: Moderate

200.     Match the following terms with their definitions:
            I.    file name             A. identifies which application should be used to read the file
            II.  dot (.)                  B. separates the filename from the file extension
            III. file extension     C. folders within the primary folder
            IV. file path               D. the name assigned to a file when it is saved
            V.  subfolders          E. identifies the exact location of a file
Answer: D, B, A, E, C                     Reference: Naming Files                                    Difficulty: Moderate







Find the answer of these question below of the questions……



Q1 Data going in to the computer is called –
(1) output                             (2) algorithm          
(3) input                                (4) calculations      
(5) flow chart
Transformation of input into output is performed by-
(1) peripherals                    (2) memory
(3) storage                           (4) Input Output Unit
(5) CPU
A collection of program that controls now your computer system runs and processes information called-
(1) Operating System         (2) Computer
(3) Office                              (4) Compiler                 
(5) Interpreter
A set of instructions telling the computer what to do is called –
(1) Mentor                           (2) Instructor          
(3) Compiler                        (4) Program
(5) Debugger
Which of the following can handle most system functions that aren’t handled directly by operating system?
(1) Vertical Market application 
(2) Utilities
(3) Algorithms                                
(4) Integrated software   
(5) Compilers          
Which of the following refers to the memory in your computer?
(1) RAM                                (2) DSL                     
(3) USB                                  (4) LAN                     
(5) CPU
One megabyte  equals approximately-
(1) 1,000 bits                       (2) 1,000 bytes      
(3) 1 million bytes              (4) 1 million bits
(5) 2,000 bytes
How are data organized in spreadsheets?
(1) Line and Spaces                        (2) Layers and Planes
(3) Height and Width        (4) Rows and Columns
(5) None of these
When cutting and pasting, the item cut is temporarily stored in-
(1) ROM                                (2) Hard drive        
(3) Diskette                          (4) Dash Board       
(5) Clipboard
An operating system version designed for home use in Microsoft Windows XP-
(1) Home edition                (2) Media Edition
(3) Tablet PC Edition          (4) Standard PC Edition
(5) None of these
When you press and release the secondary mouse button you are-     
(1) Right Clicking                (2) Left Clicking 
(3) Double Clicking                        (4) either (1) or (2)           
(5) Neither (1) nor (2)
A _ is a flash memory storage device that plugs in to a USB port.
(1) USB Snap drive             (2) USB Flash drive
(3) USB Memory market drive  
(4) All of these                     (5) None of these
A Graphical User Interface displays-
(1) Graphics                         (2) Text                     
(3) both (1) and (2)                       (4) Neither (1) nor (2)
(5) None of these
Underlined text, such as text and folder names is referred to as a __.
(1) Hyperlink                       (2) Menu     
(3) Source drive                  (4) Resource locator
(5) None of these
An operating system version designed for use with Tablet PC is Microsoft Windows XP ___.
(1) Home Edition                (2) Media Center Edition
(3) Tablet PC Edition          (4) Standard PC Edition
(5) None of these
The ___ contains commands associated with my computer window.
(1) Standard Menu                        (2) Start Menu
(3) System Menu                (4) file Menu
(5) None of these
The ___ is the drive containing the files to be copied.
(1) Source drive                  (2) destination drive
(3) USB drive                       (4) Port drive
(5) None of these
A ___ is pointing device.
(1) Monitor                          (2) Mouse    
(3) Keyboard                       (4) Printer   
(5) None of these
One Million byte of information is abbreviated as –
(1) Bit                         (2) KB            
(3) MB                                   (4) GB                       
(5) None of these
Microsoft’s latest operation system is-
(1) Vista                                (2) Vista Advanced           
(3) Windows XP                  (4) Windows 7       
(5) None of these
What is the other name of the LAN Card?
(1) Modem                           (2) NIC                      
(3) Internet Card                (4) Network Connector
(5) None of these
When using characters is windows, what does windows use?
(1) ASCII                                (2) UNICODE          
(3) MORSE                           (4) IDBC       
(5) WESTRN
How fast is fast Ethernet?
(1) 10 Mbps                         (2) 100 Mbps         
(3) 256 kbps                        (4) 1 Gbps   
(5) 10 Gbps
Which is not true?
(1) Google is a search engine.
(2) Ubuntu is system software
(3) Windows XP launched 2001
(4) BUZZ is an e-commerce
(5) None of these
In Excel, the default worksheet opens with-
(1) one worksheet             (2) two worksheets
(3) three worksheets        (4) four worksheets
(5) None of these
In H2O the figure 2 is appeared lowered, which effect has been applied?
(1) Grammar options        (2) Spelling options
(3) Opposite words                      
(4) Synonyms and Antonyms    
(5) None of these
What is the shortcut of Research command in MS Word?
(1) Alt + Click                       (2) F3            
(3) Ctrl + F                            (4) F7            
(5) None of these
A process known as ___ is used by large retailers to study trends.
(1) data mining                   (2) data selection  
(3) POS                                  (4) data conversion          
(5) None of these
A(n) ____ system is a small, wireless handled computer that scans in ‘item’s tag and pull up the current price and any special offers as you shop.
(1) PSS                                   (2) POS                     
(3) Inventory                       (4) Data mining      
(5) Data capsulation
Which of the following is NOT one of the Major data processing functions of a computer?
(1) Gathering data
(2) Processing data into information
(3) Analyzing the data or information
(4) String the data or information        
(5) None of these
Surgeons can perform delicate operations by manipulating device through computers instead of manually. This technology is known as-
(1) Robotics                         (2) Computer Forensics   
(3) Simulation                     (4) Forecasting       
(5) None of these
___ is the study of molecules and structures whose size ranges from 1 to 100 nanometres.
(1) Nano Sciences              (2) Microelectrodes
(3) Computer Forensics    (4) Artificial Intelligence
(5) None of these
___ is data that has been organized or presented in meaningful fashion.
(1) Process                           (2) Software           
(3) Storage                           (4) Information      
(5) None of these
Computer gather data, which means that they allow users to ___ data.
(1) Present                           (2) Input      
(3) Output                            (4) Store      
(5) None of these
Computer process data into information by working exclusively with:
(1) Multimedia                    (2) words     
(3) characters                      (4) Numbers           
(5) None of these
In the binary language each letter of the alphabet, each number and each special character is made up of unique combination of –
(1) eight byte                       (2) eight kilobyte
(3) eight characters                       (4) eight bits           
(5) None of three
A string of eight OS and IS is called a –
(1) Megabyte                      (2) byte                    
(3) Kilobyte                          (4) gigabyte
(5) None of these
A ___ is a approximately a million bytes –
(1) Gigabyte             (2) Kilobyte 
(3) Megabyte                      (4) Terabyte
(5) None of these
The components that process data are located in the-
(1) input devices                 (2) Output devices
(3) System unit                   (4) Storage component
(5) None of these
Which of the following are examples of input devices except a:
(1) Scanner                          (2) Speaker 
(3) CD                                    (4) Printer   
(5) None of these
The ___ button on the quick access toolbar allows you to cancel your recent commands or actions.
(1) Search                             (2) Cut                      
(3) Documents                    (4) Undo      
(5) None of these
___ Software allows users to perform calculations on rows and column of data.
(1) Word Processing                     (2) Presentation
(3) Database management system      
(4) Electronic Spreadsheet                     
(5) None of these
___ cells involves creating a single cells by combining two or more selected cells.
(1) formatting                     (2) Merging 
(3) Embedding                    (4) Splitting 
(5) None of these
When you quickly press and release the left mouse button twice, you are ___.
(1) Primary –clicking         (2) Pointing
(3) Double-clicking                        (4) Secondary-clicking
(5) None of these
To delete an incorrect character in a document ___ to erase to the right of insertion point.
(1) press the left mouse key
(2) double-click the right mouse key
(3) press the backspace key
(4) press the delete key
(5) None of these
___ are lists of commands that appear on the screen.
(1) GUIs                                 (2) Icons       
(3) Menu                              (4) Windows           
(5) None of these
The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an-
(1) Action                             (2) Event      
(3) Interrupt                        (4) Activity  
(5) None of these
The CPU and memory are located on the-
(1) expansion board                      (2) Motherboard
(3) Storage device              (4) Output device
(5) None of these
___ is a set of computer programs used on a computer to help perform tasks.
(1) An instruction               (2) Software           
(3) Memory                         (4) A processor      
(5) None of these
___ bits equal one byte.
(1) Eight                                (2) Two                    
(3) One thousand               (4) One million       
(5) None of these












Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
1.
3
11.
1
21.
2
31.
1
41.
4
2.
5
12.
2
22.
4
32.
1
42.
3
3.
2
13.
3
23.
2
33.
4
43.
2
4.
4
14.
1
24.
4
34.
2
44.
3
5.
1
15.
3
25.
3
35.
4
45.
4
6.
1
16.
3
26.
3
36.
4
46.
3
7.
3
17.
1
27.
1
37.
2
47.
3
8.
4
18.
2
28.
4
38.
3
48.
2
9.
5
19.
3
29.
1
39.
3
49.