MCQ on Computer Knowledge
1. —— is when the more power hungry components, such as the monitor and the hard drive, are put in idle.
(A) Hibernation. (B) Power down. (C) Standby mode. (D) The shutdown procedure
2. Hard disk drives are considered —— storage.
(A) flash (B) nonvolatile (C) temporary (D) nonpermanent
3. The —— key and the —— key can be used in combination with other keys to perform shortcuts and special tasks.
(A) Control, Alt (B) Function, toggle (C) Delete, Insert (D) Caps Lock, Num Lock
4. The most common input devices are the —— and the ——
(A) microphone, printer (B) scanner, monitor (C) digital camera, speakers (D) keyboard, mouse
5. To save an existing file with a new name or to a new location, you should use the — command.
(A) Save (B) Save and Replace (C) Save As (D) New File
6. Which type of software manages the computer's processes functioning as an interface, connecting user, the application software, and the hardware ?
(A) System software (B) Utility program (C) Translator program (D) Operating system
7. The portion of the CPU that coordinates the activities of all the other computer components is the
(A) motherboard (B) coordination board (C) control unit (D) arithmetic logic unit
8. Something which has easily understood instructions is said to be
(A) user friendly (B) information (C) word processing (D) icon
9. In a database, —— fields store numbers used to perform calculations.
(A) next (B) key (C) alphanumeric (D) numeric
10. A(n) —— is a combination of hardware and software that facilitates the sharing of information between computing devices.
(A) network (B) peripheral (C) expansion board (D) digital device
11. Which of the following statements is true ?
(A) Virtual memory is the space on the hard drive where the operating system begins to store data when it becomes memory-bound
(B) Accessing data from RAM is slower than accessing data from virtual memory
(C) When it is using virtual memory, the operating system builds a file called the RAM file
(D) If a computer is memory-bound, adding more RAM will not solve the problem
12. The term bit is short for
(A) megabyte (B) binary language (C) binary digit (D) binary number
13. All of the following terms are associated with spreadsheet software except
(A) worksheet (B) cell (C) formula (D) virus detection
14. —— are devices used to transmit data over telecommunications lines.
(A) Drives (B) Drive bays (C) Modems (D) Platforms
15. A —— is approximately one billion bytes.
(A) kilobyte (B) bit (C) gigabyte (D) megabyte
16. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)
(A) version (B) patch (C) tutorial (D) FAQ
17. Computers gather data, which means that they allow users to —— data.
(A) present (B) input (C) output (D) store
18. Which of the following terms is just the connection of networks that can be joined together ?
(A) virtual private network (B) internet (C) intranet (D) extranet
19. —— is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off.
(A) The Network Interface Card (NIC) (B) The CPU (C) RAM (D) ROM
20. Servers are computers that provide resources to other computers connected to a
(A) network (B) mainframe (C) supercomputer (D) client
21. What menu is selected to print ?
(A) Edit (B) Special (C) File (D) Tools
22. The name a user assigns to a document is called a(n)
(A) filename (B) program (C) record (D) data
23. A —— is an electronic device that processes data, converting it into information.
(A) processor (B) computer (C) case (D) stylus
24. —— are words that a programming language has set aside for its own use.
(A) Control words (B) Reserved words (C) Reserved keys (D) Control structures
25. What are the two types of output devices ?
(A) Monitor and printer
(B) Storage disks (floppy, CD)
(C) Keyboard and mouse
(D) Windows 2000, Windows NT
26. To access properties of an object, the mouse technique to use is ——
(A) dragging (B) dropping (C) right-clicking (D) shift-clicking
27. A(n) —— is a program that makes the computer easier to use.
(A) operating system (B) application (C) utility (D) network
28. Connections to the Internet using a phone line and a modem are called —— connections.
(A) digital (B) dial-up (C) broadband (D) dish
29. To access a mainframe or supercomputer, users often use a ——
(A) terminal (B) node (C) desktop (D) handheld
30. A flaw in a program that causes it to produce incorrect or inappropriate results is called a ——
(A) bug (B) byte (C) attribute (D) unit problem
31. A Website address is a unique name that identifies a specific —— on the Web.
(A) Web browser (B) PDA (C) Website (D) link
32. Every component of your computer is either ——
(A) hardware or software
(B) software or CPU/RAM
(C) application software or system software
(D) input devices or output devices
33. To make the number pad act as directional arrows, you press the —— key.
(A) num lock (B) caps lock (C) arrow lock (D) shift
34. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form.
(A) Editing text (B) Inserting tables and indexes (C) Formatting text (D) Proofing documents
35. The —— performs simple mathematics for the CPU.
(A) ALU (B) DIMM (C) BUS (D) Register
36. Reusable optical storage will typically have the acronym ——
(A) CD. (B) RW (C) DVD (D) ROM
37. —— is processed by the computer into information.
(A) numbers (B) processor (C) input (D) data
38. Personal computers can be connected together to form a ——
(A) server (B) supercomputer (C) enterprise (D) network
39. A word in a web page that, when clicked, opens another document is called ——
(A) anchor (B) hyperlink (C) reference (D) URL
40. The —— of software contains lists of commands and options.
(A) title bar (B) menu bar (C) formula bar (D) tool bar
41. How many values can be represented by a single byte ?
(A) 4 (B) 16 (C) 64 (D) 256
42. Transformation of input into output is performed by
(A) Peripherals (B) Memory (C) Storage (D) The CPU
43. Which of the following can handle most system functions that aren't handled directly by the operating system ?
(A) Vertical-market applications (B) Utilities (C) Algorithms (D) Integrated software
44. Device drivers are
(A) tiny power cords for external storage devices
(B) experts who know how to maximise the performance of devices
(C) small, special-purpose programs
(D) the innermost part of the operating system
45. Which of the following refers to a small, single-site network ?
(A) LAN (B) DSL (C) RAM (D) USB
46. A set of instructions telling the computer what to do is called
(A) mentor (B) instructor (C) compiler (D) program
47. Data going into the computer is called ——.
(A) output (B) algorithm (C) input (D) calculations
48. If you receive an e-mail from someone you don't know, what should you do ?
(A) Forward it to the police immediately
(B) Delete it without opening it
(C) Open it and respond to them saying you don't know them
(D) Reply and ask them for their personal information
49. How many options does a binary choice offer ?
(A) It depends on the amount of memory in the computer (B) One (C) Two (D) None
50. A collection of programs that controls how your computer system runs and processes information is called —— .
(A) operating system (B) compiler (C) office (D) interpreter
****
COMPUTER KNOWLEDGE (page 61 CSR Sep 2019)
1. —— is when the more power hungry components, such as the monitor and the hard drive, are put in idle.
(A) Hibernation. (B) Power down. (C) Standby mode. (D) The shutdown procedure
2. Hard disk drives are considered —— storage.
(A) flash (B) nonvolatile (C) temporary (D) nonpermanent
3. The —— key and the —— key can be used in combination with other keys to perform shortcuts and special tasks.
(A) Control, Alt (B) Function, toggle (C) Delete, Insert (D) Caps Lock, Num Lock
4. The most common input devices are the —— and the ——
(A) microphone, printer (B) scanner, monitor (C) digital camera, speakers (D) keyboard, mouse
5. To save an existing file with a new name or to a new location, you should use the — command.
(A) Save (B) Save and Replace (C) Save As (D) New File
6. Which type of software manages the computer's processes functioning as an interface, connecting user, the application software, and the hardware ?
(A) System software (B) Utility program (C) Translator program (D) Operating system
7. The portion of the CPU that coordinates the activities of all the other computer components is the
(A) motherboard (B) coordination board (C) control unit (D) arithmetic logic unit
8. Something which has easily understood instructions is said to be
(A) user friendly (B) information (C) word processing (D) icon
9. In a database, —— fields store numbers used to perform calculations.
(A) next (B) key (C) alphanumeric (D) numeric
10. A(n) —— is a combination of hardware and software that facilitates the sharing of information between computing devices.
(A) network (B) peripheral (C) expansion board (D) digital device
11. Which of the following statements is true ?
(A) Virtual memory is the space on the hard drive where the operating system begins to store data when it becomes memory-bound
(B) Accessing data from RAM is slower than accessing data from virtual memory
(C) When it is using virtual memory, the operating system builds a file called the RAM file
(D) If a computer is memory-bound, adding more RAM will not solve the problem
12. The term bit is short for
(A) megabyte (B) binary language (C) binary digit (D) binary number
13. All of the following terms are associated with spreadsheet software except
(A) worksheet (B) cell (C) formula (D) virus detection
14. —— are devices used to transmit data over telecommunications lines.
(A) Drives (B) Drive bays (C) Modems (D) Platforms
15. A —— is approximately one billion bytes.
(A) kilobyte (B) bit (C) gigabyte (D) megabyte
16. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)
(A) version (B) patch (C) tutorial (D) FAQ
17. Computers gather data, which means that they allow users to —— data.
(A) present (B) input (C) output (D) store
18. Which of the following terms is just the connection of networks that can be joined together ?
(A) virtual private network (B) internet (C) intranet (D) extranet
19. —— is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off.
(A) The Network Interface Card (NIC) (B) The CPU (C) RAM (D) ROM
20. Servers are computers that provide resources to other computers connected to a
(A) network (B) mainframe (C) supercomputer (D) client
21. What menu is selected to print ?
(A) Edit (B) Special (C) File (D) Tools
22. The name a user assigns to a document is called a(n)
(A) filename (B) program (C) record (D) data
23. A —— is an electronic device that processes data, converting it into information.
(A) processor (B) computer (C) case (D) stylus
24. —— are words that a programming language has set aside for its own use.
(A) Control words (B) Reserved words (C) Reserved keys (D) Control structures
25. What are the two types of output devices ?
(A) Monitor and printer
(B) Storage disks (floppy, CD)
(C) Keyboard and mouse
(D) Windows 2000, Windows NT
26. To access properties of an object, the mouse technique to use is ——
(A) dragging (B) dropping (C) right-clicking (D) shift-clicking
27. A(n) —— is a program that makes the computer easier to use.
(A) operating system (B) application (C) utility (D) network
28. Connections to the Internet using a phone line and a modem are called —— connections.
(A) digital (B) dial-up (C) broadband (D) dish
29. To access a mainframe or supercomputer, users often use a ——
(A) terminal (B) node (C) desktop (D) handheld
30. A flaw in a program that causes it to produce incorrect or inappropriate results is called a ——
(A) bug (B) byte (C) attribute (D) unit problem
31. A Website address is a unique name that identifies a specific —— on the Web.
(A) Web browser (B) PDA (C) Website (D) link
32. Every component of your computer is either ——
(A) hardware or software
(B) software or CPU/RAM
(C) application software or system software
(D) input devices or output devices
33. To make the number pad act as directional arrows, you press the —— key.
(A) num lock (B) caps lock (C) arrow lock (D) shift
34. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form.
(A) Editing text (B) Inserting tables and indexes (C) Formatting text (D) Proofing documents
35. The —— performs simple mathematics for the CPU.
(A) ALU (B) DIMM (C) BUS (D) Register
36. Reusable optical storage will typically have the acronym ——
(A) CD. (B) RW (C) DVD (D) ROM
37. —— is processed by the computer into information.
(A) numbers (B) processor (C) input (D) data
38. Personal computers can be connected together to form a ——
(A) server (B) supercomputer (C) enterprise (D) network
39. A word in a web page that, when clicked, opens another document is called ——
(A) anchor (B) hyperlink (C) reference (D) URL
40. The —— of software contains lists of commands and options.
(A) title bar (B) menu bar (C) formula bar (D) tool bar
41. How many values can be represented by a single byte ?
(A) 4 (B) 16 (C) 64 (D) 256
42. Transformation of input into output is performed by
(A) Peripherals (B) Memory (C) Storage (D) The CPU
43. Which of the following can handle most system functions that aren't handled directly by the operating system ?
(A) Vertical-market applications (B) Utilities (C) Algorithms (D) Integrated software
44. Device drivers are
(A) tiny power cords for external storage devices
(B) experts who know how to maximise the performance of devices
(C) small, special-purpose programs
(D) the innermost part of the operating system
45. Which of the following refers to a small, single-site network ?
(A) LAN (B) DSL (C) RAM (D) USB
46. A set of instructions telling the computer what to do is called
(A) mentor (B) instructor (C) compiler (D) program
47. Data going into the computer is called ——.
(A) output (B) algorithm (C) input (D) calculations
48. If you receive an e-mail from someone you don't know, what should you do ?
(A) Forward it to the police immediately
(B) Delete it without opening it
(C) Open it and respond to them saying you don't know them
(D) Reply and ask them for their personal information
49. How many options does a binary choice offer ?
(A) It depends on the amount of memory in the computer (B) One (C) Two (D) None
50. A collection of programs that controls how your computer system runs and processes information is called —— .
(A) operating system (B) compiler (C) office (D) interpreter
****