Computer Test
1. To change selected text to all capital letters, click the change case button, then click
1) Uppercase
2) Upper all
3) Capslock
4) Lock Upper
5) Large Size
2. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
1) hacker
2) analyst
3) instant messenger
4) programmer
5) spammer
3. A device that connects to a network without the use of cables is said to be
1) distributed
2) free
3) centralized
4) open source
5) None of these
4. Reusable optical storage will typically have the acronym
1) CD
2) DVD
3) ROM
4) RW
5) ROS
5. The most common type of storage devices are
1) persistent
2) optical
3) magnetic
4) flash
5) steel
6. Codes consisting of lines of varying widths or lengths that are computer readable are known as
1) an ASCII code
2) a magnetic tape
3) a bar code
4) an OCR scanner
5) None of these
7. A Web site’s main page is called its
1) Homepage
2) Browser page
3) Search Page
4) Bookmark
5) None of these
8. Part number, part description, and number of parts ordered are examples of
1) control
2) output
3) processing
4) feedback
5) input
9. To access properties of an object, the mouse technique to use is
1) dragging
2) dropping
3) right-clicking
4) shift-clicking
5) None of these
10. Computers use the ________ number system to store data and perform calculations.
1) binary
2) octal
3) decimal
4) hexadecimal
5) None of these
11. ________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
1) Phishing trips
2) Computer viruses
3) Spyware scams
4) Viruses
5) Phishing scams
12. Why is it unethical to share copyrighted files with your friends?
1) It is not unethical, because it is legal.
2) It is unethical because the files are being given for free.
3) Sharing copyrighted files without permission breaks copyright laws.
4) It is not unethical because the files are being given for free.
5) It is not unethical - anyone can access a computer
13. Which of the following can be used to select the entire document?
1) CTRL + A
2) ALT + F5
3) SHIFT + A
4) CTRL + K
5) CTRL + H
14. To instruct Word to fit the width of a column to the contents of a table automatically, click the________ button and then point to AutoFit Contents.
1) Fit to Form
2) Format
3) Auto-size
4) Contents
5) Auto Fit
15. The simultaneous processing of two or more programs by multiple processors is
1) multiprogramming
2) multitasking
3) time-sharing
4) multiprocessing
5) None of these
Answers..
1. 1 2. 1 3. 5 4. 4 5. 3 6. 3 7. 1 8. 5 9. 3 10. 1 11. 1 12. 3 13. 1 14. 5 15. 4
1. To change selected text to all capital letters, click the change case button, then click
1) Uppercase
2) Upper all
3) Capslock
4) Lock Upper
5) Large Size
2. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
1) hacker
2) analyst
3) instant messenger
4) programmer
5) spammer
3. A device that connects to a network without the use of cables is said to be
1) distributed
2) free
3) centralized
4) open source
5) None of these
4. Reusable optical storage will typically have the acronym
1) CD
2) DVD
3) ROM
4) RW
5) ROS
5. The most common type of storage devices are
1) persistent
2) optical
3) magnetic
4) flash
5) steel
6. Codes consisting of lines of varying widths or lengths that are computer readable are known as
1) an ASCII code
2) a magnetic tape
3) a bar code
4) an OCR scanner
5) None of these
7. A Web site’s main page is called its
1) Homepage
2) Browser page
3) Search Page
4) Bookmark
5) None of these
8. Part number, part description, and number of parts ordered are examples of
1) control
2) output
3) processing
4) feedback
5) input
9. To access properties of an object, the mouse technique to use is
1) dragging
2) dropping
3) right-clicking
4) shift-clicking
5) None of these
10. Computers use the ________ number system to store data and perform calculations.
1) binary
2) octal
3) decimal
4) hexadecimal
5) None of these
11. ________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
1) Phishing trips
2) Computer viruses
3) Spyware scams
4) Viruses
5) Phishing scams
12. Why is it unethical to share copyrighted files with your friends?
1) It is not unethical, because it is legal.
2) It is unethical because the files are being given for free.
3) Sharing copyrighted files without permission breaks copyright laws.
4) It is not unethical because the files are being given for free.
5) It is not unethical - anyone can access a computer
13. Which of the following can be used to select the entire document?
1) CTRL + A
2) ALT + F5
3) SHIFT + A
4) CTRL + K
5) CTRL + H
14. To instruct Word to fit the width of a column to the contents of a table automatically, click the________ button and then point to AutoFit Contents.
1) Fit to Form
2) Format
3) Auto-size
4) Contents
5) Auto Fit
15. The simultaneous processing of two or more programs by multiple processors is
1) multiprogramming
2) multitasking
3) time-sharing
4) multiprocessing
5) None of these
Answers..
1. 1 2. 1 3. 5 4. 4 5. 3 6. 3 7. 1 8. 5 9. 3 10. 1 11. 1 12. 3 13. 1 14. 5 15. 4
Nice blog Surendra, I'm busy writing a Computer Practice textbook chapter on blogging here in South Africa. Students have to use Blogger. Would you mind if I referenced your blog? It's not published yet, we still have to submit to the education department. Thanks May
ReplyDelete