14. Application software is designed to accomplish—
(D) operating system tasks
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of—
(D) a database
(Ans : (D)
16. The human-readable version of a program is called—
(D) system code
Ans : (D)
17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
Ans : (A)
18. ……… is the result produced by a computer.
(C) Output
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(D) Web browsers
(E) None of these
Ans : (D)
20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(C) UPS
Ans : (C)
21. When you save to ………, your data will remain intact even when the computer is turned off.
(C) secondary storage device
Ans : (C)
22. The motherboard is the—
(D) circuit board that contains a CPU and other chips
Ans : (D)
23. A computer-intensive problemruns on a—
(C) supercomputer
Ans : (C)
24. A(n)……converts and executesone statement at a time.
(B) interpreter
Ans : (B)
25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(D) peripheral device
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(D) One million
Ans : (D)
27. What is MP3 ?
(C) A Sound format
Ans : (C)
28. All the deleted files go to—
(A) Recycle Bin
Ans : (A)
29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(C) Software piracy
Ans : (C)
(D) operating system tasks
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of—
(D) a database
(Ans : (D)
16. The human-readable version of a program is called—
(D) system code
Ans : (D)
17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
Ans : (A)
18. ……… is the result produced by a computer.
(C) Output
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(D) Web browsers
(E) None of these
Ans : (D)
20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(C) UPS
Ans : (C)
21. When you save to ………, your data will remain intact even when the computer is turned off.
(C) secondary storage device
Ans : (C)
22. The motherboard is the—
(D) circuit board that contains a CPU and other chips
Ans : (D)
23. A computer-intensive problemruns on a—
(C) supercomputer
Ans : (C)
24. A(n)……converts and executesone statement at a time.
(B) interpreter
Ans : (B)
25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(D) peripheral device
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(D) One million
Ans : (D)
27. What is MP3 ?
(C) A Sound format
Ans : (C)
28. All the deleted files go to—
(A) Recycle Bin
Ans : (A)
29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(C) Software piracy
Ans : (C)
30. A directory within a directory is called—
(D) Sub Directory
Ans : (D)
31. Which is the best definition of a software package ?
(B) A set of computer programs used for a certain function such as word processing
Ans : (B)
32. In MICR, C stands for ……….
(D) Character
Ans : (D)
33. Fax machines and imaging systems are examples of—
(B) imaging systems
Ans : (B)
34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(B) Control
Ans : (B)
36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of—
(B) Numbers and alphabetical characters
Ans : (B)
38. A Website’s main page is called its—
(A) home page
Ans : (A)
39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
Ans : (A)
40. A collection of interrelated files in a computer is a—
(D) database
Ans : (D)
41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(B) mainframe
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by—
(D) Icons
Ans : (D)
44. What is usually used for displaying information at public places ?
(D) Touch Screen Kiosks
Ans : (D)
45. The real business and competitive value of information technology lies in—
(B) The capabilities of the software and value of the information a business acquires and uses
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(C) Application service providers
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(B) Borrowed copies of software
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of—
(B) dentity theft
Ans : (B)
49. The first step in the transaction processing cycle is—
(C) data entry
Ans : (C)
50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
Ans : (A)
(D) Sub Directory
Ans : (D)
31. Which is the best definition of a software package ?
(B) A set of computer programs used for a certain function such as word processing
Ans : (B)
32. In MICR, C stands for ……….
(D) Character
Ans : (D)
33. Fax machines and imaging systems are examples of—
(B) imaging systems
Ans : (B)
34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(B) Control
Ans : (B)
36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of—
(B) Numbers and alphabetical characters
Ans : (B)
38. A Website’s main page is called its—
(A) home page
Ans : (A)
39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
Ans : (A)
40. A collection of interrelated files in a computer is a—
(D) database
Ans : (D)
41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(B) mainframe
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by—
(D) Icons
Ans : (D)
44. What is usually used for displaying information at public places ?
(D) Touch Screen Kiosks
Ans : (D)
45. The real business and competitive value of information technology lies in—
(B) The capabilities of the software and value of the information a business acquires and uses
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(C) Application service providers
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(B) Borrowed copies of software
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of—
(B) dentity theft
Ans : (B)
49. The first step in the transaction processing cycle is—
(C) data entry
Ans : (C)
50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
Ans : (A)
No comments:
Post a Comment