__________________Is
a program which reproduces itself
_____________
Viruses that aim at the boot sector of a hard drive are infecting a
verycrucial component of the boot process
____________Is
the virus that they will attach themselves to EXE files, compressedfiles like
ZIP files and driver files
-__________
Is the virus, which is uniquely created to quickly spread throughoutthe local
area network
Which of
the following are the main purposes of an operating system
Define
acronym ‘spooling’
Several
programs are in a memory concurrently; the system switchesamong the programs
for efficient processing and minimal idle time iscalled _____________
____________
Is the using scheduling and multiprogramming to provide aneconomical
interactive system of two or more users
_______________
Is a system with two or more central processing units
__________
Is the system where fast response is desirable, but not required
______________
Is the system where processing must be completed with in certaintime
constraints appropriate for the system
___________
Is the smallest block that can be read or written on a disk
______________
Is the collection of sectors all as same circumference on a
singlesurface
_______________________
Is the time interval when a process uses Central Processing Unitonly
______________
Is the time interval when a process uses I/O devices only
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Question 31
|
A disk’s content that is recorded at the time of manufacture
and that cannot be changed or erased by the user is—
A
|
(A) read-only
|
|
B
|
(B) memory-only
|
|
C
|
(C) run-only
|
|
D
|
(D) write-only
|
|
E
|
(E) None of these
|
|
Questio32
|
||
In an information system, alphanumeric data normally takes
the form of—
A
|
(A) Sentences and paragraphs
|
B
|
(B) Numbers and alphabetical characters
|
C
|
(C) Graphic shapes and figures
|
D
|
(D) Human voice and other sounds
|
E
|
(E) None of these
|
Question 33
|
A Website’s main page is called its—
A
|
(A) home page
|
|
B
|
(B) browser page
|
|
C
|
(C) search place
|
|
D
|
(D) bookmark
|
|
E
|
(E) None of these
|
|
Questio34
|
||
When installing ………, the user must copy and usually
decompress program files from a CDROM or other medium to the hard disk.
A
|
(A) programming software
|
B
|
(B) system hardware
|
C
|
(C) applications hardware
|
D
|
(D) applications software
|
E
|
(E) None of these
|
Question 35
|
A collection of interrelated files in a computer is a—
A
|
(A) file manager
|
|
B
|
(B) field
|
|
C
|
(C) record
|
|
D
|
(D) database
|
|
E
|
(E) None of these
|
|
Questio36
|
||
A _____________ computer is a large and expensive computer
capable of simultaneously processing data for hundreds or thousands of users.
A
|
(A) server
|
B
|
(B) mainframe
|
C
|
(C) desktop
|
D
|
(D) tablet
|
E
|
(E) None of these
|
Questio37
|
Various applications and documents are represented on the
Windows desktop by—
A
|
(A) Symbols
|
|
B
|
(B) Labels
|
|
C
|
(C) Graphs
|
|
D
|
(D) Icons
|
|
E
|
(E) None of these
|
|
Questio38
|
||
What is usually used for displaying information at public
places ?
A
|
(A) Monitors
|
B
|
(B) Overhead Projections
|
C
|
(C) Monitors and Overhead Projections
|
D
|
(D) Touch Screen Kiosks
|
E
|
(E) None of these
|
Questio 39
|
Collecting personal information and effectively posing as
another individual is known as the crime of—
A
|
(A) spooling
|
|
B
|
(B) dentity theft
|
|
C
|
(C) spoofing
|
|
D
|
(D) hacking
|
|
E
|
(E) None of these
|
|
Questio40
|
||
The first step in the transaction processing cycle is—
A
|
(A) database operations
|
B
|
(B) audit
|
C
|
(C) data entry
|
D
|
(D) user inquiry
|
E
|
(E) None of these
|
Question 41
|
In the information systems concept, the output function
involves—
A
|
(A) Capturing and assembling elements that enter the
system to be processed
|
B
|
(B) Transformation processes that convert input into
output
|
C
|
(C) Transferring elements that have been produced by a
transformation process to their ultimate destination
|
D
|
(D) Monitoring and evaluating feedback to determine
whether a system is moving toward the achievement of its goal
|
E
|
(E) None of these
|
Question 42
|
The primary function of the ________ is to set up the
hardware and load andstart an operating system.
A
|
(a) System Programs
|
|
B
|
(b) BIOS
|
|
C
|
(c) CPU
|
|
D
|
(d) Memory
|
|
Questio 43
|
||
The clock rate of a Processor Measured in ___________
A
|
(a) Milliseconds
|
B
|
(b) Megahertz or Gigahertz
|
C
|
(c) Megabytes or Gigabytes
|
D
|
(d) None of the above
|
Question44
|
Spooling helps because
A
|
(a) It is more secure method of accessing data
|
|
B
|
(b) Print jobs go more smoothly with less stop and go
|
|
C
|
(c) The computer is released to do other things while
still printing
|
|
D
|
(d) None of the above
|
|
Question 45
|
||
When creating a computer program, the_______ designs
the structure of theprogram
A
|
(a) End user
|
B
|
(b) System Analyst
|
C
|
(c) Programmer
|
D
|
(d) All of the above
|
Question46
|
Checking the computer program for errors is called
A
|
(a) Correcting
|
|
B
|
(b) Verification
|
|
C
|
(c) Debugging
|
|
D
|
(d) Inspecting
|
|
Questi47
|
||
__________ Is an artificial language designed to
communicate instructions to acomputer
A
|
(a) Programming language
|
B
|
(b) Machine language
|
C
|
(c) Software language
|
D
|
(d) None of the above
|
Question48
|
Machine language sometimes also referred as the ______
A
|
(a) Binary language
|
|
B
|
(b) High level language
|
|
C
|
(c) Middle level language
|
|
D
|
(d) None of the above
|
|
Question49
|
||
_________ Is a language, instead of using numbers,
programmers began usingEnglish like abbreviations (Mnemonics) to represent the
elementaryoperations.
A
|
(a) Machine language
|
B
|
(b) Mnemonics language
|
C
|
(c) Assembly level language
|
D
|
(d) None of the above
|
Questio50
|
BASIC stands for ________
A
|
(a) Beginners All Purpose Symbolic Instruction Code
|
|
B
|
(b) Beginners All Symbolic Instruction Code
|
|
C
|
(c) Beginners All Purpose Systematic Instruction Code
|
|
D
|
(d) Beginners All Programs Symbolic Instruction Code
|
|
Question51
|
||
COBOL is an acronym for ___________
A
|
(a) Common Business Oriented Language
|
B
|
(b) Computer Business Oriented Language
|
C
|
(c) Common Business Operated Language
|
D
|
(d) Common Business Organized Language
|
Question 52
|
The program that comprises the _________ are called system
software
A
|
(a) Operating System
|
|
B
|
(b) Application Software
|
|
C
|
(c) Development Software
|
|
D
|
(d) None of the above
|
|
Question 53
|
||
A bit can hold the value -----
A
|
(a) 1 byte
|
|
B
|
(b) 8 bits
|
|
C
|
(c) 0 or 1
|
|
D
|
(d) None of the above
|
|
Question 54
|
||
When was the first CPU introduced (first Microprocessor the
Intel4004)
A
|
(a) 1961
|
B
|
(b) 1971
|
C
|
(c) 1981
|
D
|
(d) 1991
|
Question 55
|
Which is of the following is NOT part of a computer chip’s
job?
A
|
(a) Performing mathematical operations
|
B
|
(b) Moving data from one memory location to another
|
C
|
(c) Starting up the computer
|
D
|
(d) Storing the data
|
Question 56
|
_____________ First takes in the entire program,
checks errors, complies andexecutes it
A
|
(a) Assembler
|
|
B
|
(b) Interpreter
|
|
C
|
(c) Loader
|
|
D
|
(d) Complier
|
|
Quest57
|
||
___________ Takes one line, checks it for errors and
then executes it
A
|
(a) Assembler
|
B
|
(b) Interpreter
|
C
|
(c) Loader
|
D
|
(d) Complier
|
Question 58
|
What kind of memory is both static and non-volatile?
A
|
(a) RAM
|
|
B
|
(b) ROM
|
|
C
|
(c) BIOS
|
|
D
|
(d) CACHE
|
|
Que59
|
||
Where does most data go first with in a computer memory
hierarchy?
A
|
(a) RAM
|
B
|
(b) ROM
|
C
|
(c) BIOS
|
D
|
(d) CACHE
|
Question 60
|
The path that data travels between two computers is NOT
called a
A
|
(a) Communication channel
|
|
B
|
(b) Communication link
|
|
C
|
(c) Communication bridge
|
|
D
|
(d) None of the above
|
|
Question 61
|
||
A modem us used to____________
A
|
(a) Change incoming analog signals to digital signals and
outgoingdigital signals to analog signals
|
B
|
(b) Connect two computers using telephone lines
|
C
|
(c) Both (a) and (b)
|
D
|
(d) None of the above
|
Question 62
|
To move a copy of file from one computer to another over
acommunication channel is called.
A
|
(a) File transfer
|
|
B
|
(b) File encryption
|
|
C
|
(c) File modification
|
|
D
|
(d) None of the above
|
|
Question 63
|
||
LAN stands for
A
|
(a) Local Area Network
|
B
|
(b) Local And Network
|
C
|
(c) Language Area Network
|
D
|
(d) Limited Area Network
|
Question 64
|
Match the following
A
|
(a) LAN (1) No entry restriction and No geographical
limitation
|
|
B
|
(b) WAN (2) Entry is restricted and limited to
geographical area
|
|
C
|
(c) MAN (3) Entry is restricted and No geographical
limitation
|
|
Question 65
|
||
An airline reservation network would most likely to be
in a --- topology(a) Star(b) Bus(c) Ring(d) Mesh
A
|
(a) Star
|
B
|
(b) Bus
|
C
|
(c) Ring
|
D
|
(d) Mesh
|
Question 66
|
WAN stands for
A
|
(a) Wide Area Network
|
|
B
|
(b) Work Area Network
|
|
C
|
(c) Wide And Network
|
|
D
|
(d) Wash Area Network
|
|
Question67
|
||
_____________ Is simply consists of one or more
attributes that determine otherattributes
A
|
a) Lock
|
|
B
|
b) Database
|
|
C
|
c) Key
|
|
D
|
d) None of the above
|
|
Question 68
|
||
Be unique is the characteristic of the ____________ key
A
|
a) Primary
|
B
|
b) Secondary
|
C
|
c) Foreign
|
D
|
d) Candidate
|
Question 69
|
A unique key can uniquely identify each______________ in a
table
A
|
a) Field
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
B
|
b) Row
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
C
|
c) File
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
D
|
d)Database
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
__________Is a database that treats all of its data as a
collection of relations
EEPROM stands for
_________ Generation computers are very big in size with
less memory
EBCDIC stands for
Computer can do everything except
---- Is a data model in which the data is organized into a
tree likeStructure
SQL stands for
_______ Is the most widely used medium for
telecommunications
___________ Is widely used medium of communication for
cable television systems
______________ Cable consists of one or more filaments of
glass fiber wrapped inprotective layers that carries data by means of pulses
of light
__________ Is a computer network used for communications
among computersand different information technological devices close to one
person
|
|