1. . …..aim at the boot sector of a hard drive by infecting a very crucial component of the boot process?
(1) File infection virus (2) Boot virus
(3) Network virus (4) E-mail virus
(5) None of these
2. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as :
(1) phishing (2) flaming
(3) blogging (4) pop- ups
(5) None of these
3. Malicious software is known as :
(1) Badware (2) Malware
(3) Malicious ware (4) Illigalware
(5) None of these
4. Hardware or software designed to guard against authorized access to computer network is known as …
(1) Hacker proof program (2) Firewall
(3) Hacker resistant server (4) Encryption safe wall
(5) None of these
5. The fastest and quietest type of printer is a(n):
(1) dot-matrix printer. (2) inkjet printer.
(1) dot-matrix printer. (2) inkjet printer.
(3) laser printer. (4) plotter.
(5) None of these
6. The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n):
(1) plotter. (2) inkjet printer.
(1) plotter. (2) inkjet printer.
(3) laser printer. (4) dot-matrix printer.
(5) none of these
7. MICR stands for?
(1) Magnetic Ink Character Recognition
(1) Magnetic Ink Character Recognition
(2) Magnetic Ink Code Reader
(3) Magnetic Ink Cases Reader
(3) Magnetic Ink Cases Reader
(4) None of the above
(5) All of the above
8. The main difference between application and system software is that:
(1) Application software is composed of program instructions but system software is not.
(2) Application software is stored in memory whereas system software is only in the CPU.
(3) System software is unnecessary whereas application software must be present on the computer.
(4) System software manages hardware whereas application software performs user tasks.
(1) Application software is composed of program instructions but system software is not.
(2) Application software is stored in memory whereas system software is only in the CPU.
(3) System software is unnecessary whereas application software must be present on the computer.
(4) System software manages hardware whereas application software performs user tasks.
(5) None of these
9. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(1) Trojan horse (2) Boot sector
(3) Script (4) Logic bomb
(5) None of these
(1) Trojan horse (2) Boot sector
(3) Script (4) Logic bomb
(5) None of these
10. Servers are computers that provide resources to other computers connected to a ___________
(1) mainframe (2) network
(3) supercomputer (4) client
(5) None of these
(1) mainframe (2) network
(3) supercomputer (4) client
(5) None of these
11. A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
12. A Proxy server is used for which of the following?
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these
13. When data changes in multiple lists and all lists are not updated, this causes:
(1) data redundancy (2) information overload
(3) duplicate data (4) data inconsistency
(5) None of these
(1) data redundancy (2) information overload
(3) duplicate data (4) data inconsistency
(5) None of these
14. _____________ are words that a programming language has set aside for its own use.
(1) Control worlds (2) Reserved words
(3) Control structures (4) Reserved keys
(5) None of these
(1) Control worlds (2) Reserved words
(3) Control structures (4) Reserved keys
(5) None of these
15. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(1) router (2) modem
(1) router (2) modem
(3) node (4) cable
(5) None of these
16. Which term identifies a specific computer on the web and the main page of the entire site
(1) URL (2) Web site address
(1) URL (2) Web site address
(3) Hyperlink (4) Domain name
(5) None of these
17. The code that relational database management systems use to perform their database task is referred to as …..
(1) QBE (2) SQL
(1) QBE (2) SQL
(3) OLAP (4) Sequel Server
(5) None of these
18. The purpose of the primary key in a database is to:
(1) unlock the database
(1) unlock the database
(2) provide a map of the data
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
19. A _________ contains specific rules and words that express the logical steps of an algorithm.
(1) programming language (2) syntax
(3) programming structure (4) logic chart
(5) None of these
(1) programming language (2) syntax
(3) programming structure (4) logic chart
(5) None of these
20. The most frequently used instructions of a computer program are likely to be fetched from:
(1) the hard disk (2) cache memory
(3) RAM (4) registers
(5) None of these
(1) the hard disk (2) cache memory
(3) RAM (4) registers
(5) None of these
Answers
1
|
2
|
11
|
3
|
2
|
1
|
12
|
2
|
3
|
2
|
13
|
4
|
4
|
2
|
14
|
2
|
5
|
3
|
15
|
1
|
6
|
1
|
16
|
1
|
7
|
1
|
17
|
2
|
8
|
4
|
18
|
3
|
9
|
2
|
19
|
2
|
10
|
2
|
20
|
2
|
No comments:
Post a Comment