(1) The term ‘Computer’ is derived from ?
- A. Latin
- B. German
- C. French
- D. Arabic
(2) 1 Gigabyte is equal to ?
- A. 1024 bits
- B. 1000 megabytes
- C. 1024 kilobytes
- D. 1024 megabytes
(3) WAN stands for ?
- A. Wap Area Network
- B. Wide Area Network
- C. Wide Array Net
- D. Wireless Area Network
(4) You can organize files by storing them in ?
- A. archives
- B. folders
- C. indexes
- D. lists
(5) Junk e-mail is also called ?
- A. spam
- B. spoof
- C. sniffer script
- D. spool
(6) What characteristic of read-only memory (ROM) makes it useful?
- A. ROM information can be easily updated.
- B. Data in ROM is non- volatile, that is, it remains there even without electrical power.
- C. ROM provides very large amounts of inexpensive data storage.
- D. ROM chips are easily swapped between different brands of computers.
(7) IBM 1401 is ?
- A. First Generation Computer
- B. Second Generation Computer
- C. Third Generation Computer
- D . Fourth Generation Computer
(8) Who invented the high level language “C”?
- A. Dennis M. Ritchie
- B. Niklaus Writh
- C. Seymour Papert
- D. Donald Kunth
(9) A fault in a computer program which prevents it from working correctly is known as ?
- A. Boot
- B. Bug
- C. Biff
- D. Strap
(10) 1 Byte = ?
- A. 8 bits
- B. 4 bits
- C. 2 bits
- D. 9 bits
(11) The term designates equipment that might be added to a computer system to enhance its functionality.
- A. digital device
- B. system add- on
- C. disk pack
- D. peripheral device
(12) What is the other name for programmed chip?
- A. A. RAM
- B. ROM
- C. LSIC
- D. PROM
(13) Store data or information temporarily and pass it on as directed by the control unit?
- A. Address
- B. Register
- C. Number
- D. Memory
(14) When creating a computer program, the designs the structure of the program?
- A. End user
- B. System Analyst
- C. Programmer
- D. All of the above
(15) The most common type of storage devices are ?
- A. magnetic storage
- B. Flash memory
- C. optical
- D. Both A & B
(16) A computer system that is old and perhaps not satisfactory is referred to as a(n) ?
- A. Ancient system
- B. Historical system
- C. Age old system
- D. Legacy system
(17) The common name for the crime of stealing passwords is ?
- A. Jacking.
- B. Identity theft.
- C. Spoofing.
- D. Hacking.
(18) is the measurement of things such as fingerprints and retinal scans used for security access?
- A. Biometrics
- B. Bio measurement
- C. Computer security
- D. Smart weapon machinery
(19) Cathode Ray Tube is a form of ?
- A. Keyboard
- B. Mouse
- C. Monitor
- D. Mother board
(20) LAN stands for ?
- A. Limited Area Network
- B. Logical Area Network
- C. Local Area Network
- D. Large Area Network
(21) To display the contents of a folder in Windows Explorer you should:
- A. click on it
- B. collapse it
- C. name it
- D. give it a password
(22) Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both data, including full-motion video, high-speed internet access, and video conferencing.
- A. video data and information
- B. voice and non-voice
- C. music and video
- D. video and audio
(23) When entering text within a document, the Enter key is normally pressed at the end of every ?
- A. Line
- B. Sentence
- C. Paragraph
- D. Word
(24) Which of the following memories must be refreshed many times per second?
- A. Static RAM
- B. Dynamic RAM
- C. EPROM
- D. ROM
(25) IC are classified on the basis of ?
- A. Manufacturing company
- B. Type of computer
- C. Number of transistors
- D. None of these