A ........ is approximately one billion bytes
1.Megabyte
2.Gigabyte
3.Terabyte
4.None of these
A computer cannot boot if it does not have the _____
1.Compiler
2.Loader
3.Operating system
4.Assembler
A computer consists of
1.motherboard
2.hard disk drive
3.central processing unit
4.All of the above
A _______ is a software program used to view Web pages.
1.site
2.host
3.link
4.browser
An email account includes a storage area often called ________
1.mailbox
2.hyperlink
3.IP address
4.None of these
An Excel Workbook is a collection of
1.Charts
2.Worksheets
3.Both A & B
4.None of the above
By default your documents print in ________ mode
1.Landscape
2.Portrait
3.Page Setup
4.Print View
C BASIC COBOL and Java are examples of ............language
1.low-level
2.programming
3.computer
4.high-level
Ctrl Shift and Alt are called .......... keys.
1.modifier
2.function
3.alphanumeric
4.adjustment
Hardware devices that are not part of the main computer system and are often added later to the system are ________
1.clip art
2.highlight
3.execute
4.peripherals
he computer s processor consists of the following parts
1.CPU and Main Memory
2.Hard Disk and Floppy Drive
3.Control Unit and ALU
4.Operating System and Application
In MICR C stands for...........
1.Code
2.Colour
3.Computer
4.Character
In the binary Language each letter of the alphabet each number and each special character is made up of a unique combination of _________
1.eight bytes
2. eight kilobytes
3.eight characters
4.eight bits
Markup tags tell the web browser
1.How to display the file
2.How to organise the page
3.How to display message box on page
4.None of the above
Merge cells option can be applied from?
1.Format Cells dialog box Alignment Tab
2.Formatting toolbar
3.Both of above
4.None of above
Microcomputer hardware consists of three basic categories of physical equipment ____
1.Keyboard monitor hard drive
2.system unit input/output memory
3.system unit input/output secondary storage
4.system unit primary storage secondary storage
Microsoft Office is an example of a
1.Closed source software
2. Open source software
3.Horizontal market software
4. vertical market software
MS-Word is an example of _____
1.An operating system
2.A processing device
3.Application software
4.An input device
Several computers linked to a server to share programs and storage space________
1.Network
2.Grouping
3.Library
4.Integrated system
Storage capacity of magnetic disk depends on
1.disk pack in disk surface
2.tracks per inch of surface
3.bits per inch of tracks
4.All of the above
Storage which stores or retains data after power off is called____
1.Volatile storage
2.Non-volatile storage
3.Sequential storage
4.Direct storage
The basic operations performed by a computer are
1.Logical operation
2.Storage and relative
3.Arithmetic operation
4.All the above
The box that contains the central electronic components of the computer is the ..............
1.Motherboard
2.System Unit
3.Peripheral
4.RAM
The first computer was programmed using .......
1. Assembly language
2.Machine language
3.Spaghetti code
4.Source code
The First Mechanical Computer Designed by Charles Babbage was called?
1.Super Computer
2.Abacus
3.Calculator
4.Analytical Engine
The instructions for starting the computer are housed in _____
1.RAM
2.CD-ROM
3.ROM Chip
4.None of these
The operating system called UNIX is typically used for_______
1.Desktop computers
2.Laptop computers
3.Super computers
4.All of these
The smallest unit in a digital system is a.........
1.Bit
2.Byte
3.Character
4.Kilobyte
The term _____ designates equipment that might be added to a computer system to enhance its functionality
1.digital device
2.system add-on
3.disk pack
4.peripheral device
The _____ controls communications for the entire computer system
1.arithmetic-logic unit
2.semiconductor
3.motherboard
4.coprocessor
To make the number pad act as a directional arrow we press
1.Num lock
2.Caps lock
3.Arrow lock
4.Shift
unk e-mail is also called ______
1.Spam
2.Spoof
3.Sniffer script
4.Spool
USB is which type of storage device?
1.Tertiary
2.Secondary
3.Primary
4.Auxillary
Vendor-created program modifications are called ________
1.patches
2.antiviruses
3.holes
4.fixes
What are the four things needed to connect to the internet?
1.telephone line modem computer and an ISP
2.modem computer PDA and ISP
3.telephone line modem computer and PDA
4.computer ISP modem and communication software
What characteristic of read-only memory (ROM ) makes it useful?
1.ROM informationcan be easily updated
2.Data in ROM is non volatile that is it remains there even without electrical power
3.ROM provides very large amounts of inexpensive data storage
4.ROM chips are easily swapped between different brands of computers
What happens when you boot up a PC?
1.Portions of the operating system are copied from disk into memory
2.Portions of the operating system are copied from memory onto disk
3.Portions of the operating system are compiled
4.Portions of the operating system are emulated
What is a default file extension for all word documents?
1.TXT
2.WRD
3.FIL
4.DOC
Where is RAM located?
1.Mother Board
2.Expansion Board
3.External Drive
4.None
Which file starts MS Word?
1.word.exe
2.msword.exe
3.word2003.exe
4.winword.exe
Which key is used in combination with another key to perform a specific task?
1.Function
2.Spacebar
3.Arrow
4.Control
Which motherboard form factor uses one 20 pin connector?
1.Baby AT
2.AT
3.ATX
4. All the above
Which of the following is a storage device?
1.Floppy discs
2.hard disk drive
3.Optical disc
4.All of the above
Which of the following is an example of an optical disk?
1.Digital versatile disks
2.Magnetic disks
3.Memory disks
4.Data bus disks
Which of the following refers to a small single-site network ?
1.LAN
2.DSL
3.RAM
4.USB
Which of the following software applications would be the most appropriate for performing numerical and statistical calculations?
1.Database
2.Document Processor
3.Graphic Package
4.Spread Sheet
Windows 95 Windows 98 and Windows NT are known as what?
1.Processor
2.domain names
3. modems
4.operating systems
You can use the tab key to ________
1.move a cursor across the screen
2.indent a paragraph
3.move the cursor down the screen
4.both (a) and (b)
__are attempts by individuals to obtain confidential information from you by falsifying their identity
1.Phishing trips
2.Computer viruses
3.Phishing scams
4.Spyware scams
___ is the process of dividing the disk into tracks and sectors
1.Tracking
2.Formatting
3.Crashing
4.Allotting