1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
11. OCR stands for _____
(1) Optical Character Recognition
(2) Optical CPU Recognition
(3) Optimal Character Rendering
(4) Other Character Restoration
(5) None of these
12. If a new device is attached to a computer, such as a printer or scanner, its ______ must be installed before the device can be used.
1) buffer
2) driver
3) pager
4) server
5) None of these
13. The software that allows users to surf the Internet is called a/an
(1) Search engine
(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) None of these
14. A tuple is a
1) column of a table
2) two-dimensional table
3) row of a table
4) key of a table
5) None of these
15. The method of file organization in which data records in a file are arranged in a specified order according to a key field is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method
5) None of these
16. In Excel,_____ contains one or more worksheets.
1) Template
2) Workbook
3) Active cell
4) Label
5) None of these
17. Which of the following is a popular programming language for developing multimedia web pages, websites, and web-based applications?
1) COBOL
2) Java
3) BASIC
4) Assembler
5) None of these
18. Compiling creates a(n) _____ .
1) program specification
2) algorithm
3) executable program
4) subroutine
5) None of these
19. A CD-RW disk
(1) has a faster access than an internal disk
(2) is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) can be erased and rewritten
(5) None of these
20. The first page of a Web site is called the
1) Home page
2) Index
3) Java Script
4) Book mark
5) None of these
Answers:
1
|
1
|
11
|
1
|
2
|
2
|
12
|
2
|
3
|
4
|
13
|
4
|
4
|
2
|
14
|
3
|
5
|
4
|
15
|
4
|
6
|
4
|
16
|
2
|
7
|
1
|
17
|
2
|
8
|
4
|
18
|
3
|
9
|
2
|
19
|
4
|
10
|
2
|
20
|
1
|
No comments:
Post a Comment