Computer Awareness MCQ's Practice Set - 8
1. Which part is the “brain” of the computer?
1) CPU
2) Monitor
3) RAM
4) ROM
2. Something which has easily-understood instructions is said
to be
1) Information
2) Word-processing
3) User friendly
4) Icon
3. Information on a computer is stored as
1) Analog data
2) Digital data
3) Modern data
4) Watts data
4. For creating a document, you use _____ command at file
menu.
1) New
2) Open
3) Document
4) Type
5. ______ is data that has been organized or presented in a
meaningful fashion.
1) A process
2) Storage
3) Software
4) Information
6. A ______ contains buttons and menus that provide quick
access to commonly used commands.
1) Menu bar
2) Toolbar
3) Window
4) Find
7. Letters, numbers and symbols found on a keyboard are ______
1) Icon
2) Screen
3) Keys
4) Menu
8. Which is not an item of hardware?
1) An MP3 file
2) A keyboard
3) A disk drive
4) A monitor
9. A (n) ______ is created by an application.
1) Executable file
2) Software program
3) Document
4) O/S
10. Storage media such as a CD read and write information
using ________
1) Laser beam of red
light
2) Magnetic dots
3) Magnetic strips
4) All of the above
11. Vendor-created program modification are called _______
1) Patches
2) Antivirus
3) Holes
4) Fixes
12. When we open an Internet site we see www. What is the full
form of www?
1) World wide wakeups
2) World wide web
3) Word wading works
4) World wide Spiderman web
13. What do you use to create a chart?
1) Pei Wizard
2) Excel Wizard
3) Data Wizard
4) Chart Wizard
14. The effect the ROLLBACK command in a transactions is the
following:
1) Undo all changes to
the database resulting form the execution of the transaction
2) Undo the effects of the last UPDATE command
3) Restore the content of the database to its state at the
end of the previous day
4) Make sure that all changes to the database are in effect
15. Each of the following is a true statement except;
1) Online systems continually update the master file
2) In online processing, the user enters transactions into a
device that is directly connected to the computer system.
3) Batch processing is
still used today in older systems or in some systems with massive columns of
transactions.
4) Information in batch systems will always be up-to-date
16. When you save to ______ your data will remain intact even
with the computer is turned off.
1) RAM
2) Motherboard
3) Secondary storage
device
4) Primary storage device
17. The motherboard is the
1) Circuit board that houses peripheral devices
2) Same as the CPU chip
3) The first chip that is accessed when the computer is
turned 0n
4) Circuit board that
contains a CPU and other chips
18. Each box in a spreadsheet is called a
1) Cell
2) Empty space
3) Record
4) Field
19. What is the term for unsolicited e-mail
1) Newsgroup
2) Usenet
3) Flaming
4) spam
20. The ability to easily add additional users means that a
network is
1) Icon
2) Hyperlink
3) Menu
4) Source derived
21. To take information form one source and bring it to your
computer is referred to as _____
1) Upload
2) Download
3) Transfer
4) De-link
22. Under link text, such as text and folder names is referred
to as a ______
1) Icon
2) Hyperlink
3) Menu
4) Source drive
23. Junk e-mail is also called _______
1) Spam
2) Spoof
3) Sniffer script
4) Spool
24. What is the most common way to get a virus in your
computer’s hard disk?
1) By installing games form their CD ROMs
2) By uploading pictures form mobile phones to the computer
3) By opening emails
4) By sending e-mails
25. What is the default extension for all word documents?
1) WRD
2) TXT
3) DOC
4) FIL
26. The keys labeled 0-9 on the keyboards are called ________
1) Function keys
2) Numeric keys
3) Typewriter keys
4) Special keys
27. In a spreadsheet, a cell is defined as the ______
1) Intersection of a table and a duplet
2) Intersection of a file and a database
3) Intersection of a
row and column
4) Intersection of a field and a record
28. The basic goal of computer process is to convert data into
______
1) Information
2) Tables
3) Files
4) Graphs
29. Dumb terminals have terminal and ______
1) Mouse
2) Speaker
3) Keyboard
4) Mouse or speaker
30. _______ is when the more power-hungry components, such as
the monitor and the hard drive are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
31. To shrink a window to an icon _____
1) Open a group window
2) Minimize a window
3) Maximize a window
4) Restore a window
32. Personal computers can be connected together to form a
______
1) Server
2) Supercomputer
3) Enterprise
4) Network
33. What characteristic of read-only memory (ROM) makes it
useful?
1) ROM information can be easily updated
2) Data in ROM is
nonvolatile, that is, remains there even without electrical power
3) ROM provides very large amounts of expensive data storage
4) ROM chips are easily swapped between different brands of
computers.
34. By CD you can
1) Read
2) Write
3) Read and write
4) Either Read or Write
35. The Word function that corrects text as you type is
referred to as
1) Auto Summarize
2) Auto Insert
3) Auto Correct
4) Track Changes
36. To combine two or more cells into a single cell is called
1) Merging
2) Joining
3) Sharing
4) Splitting
37. _______ is when the computer is turned on and the O/S is
loading
1) Booting
2) Flashing
3) Tracking
4) Taping
38. A device that connects to a network without the use of
cables is said to be ______
1) Distributed
2) Wireless
3) Centralized
4) Open source
39. The particular field of a record that uniquely identifies
each record is called the ______
1) Key field
2) Primary field
3) Master field
4) Order field
40. A CPU contains _______
1) A card reader and a printing device
2) An analytical engine and a control unit
3) A control unit and
an arithmetic logic unit
4) An arithmetic logic unit and a card reader
41. A computer cannot “boot” if it does not have the _______
1) Complier
2) Loader
3) O/S
4) Assembler
42. The ___ key and the _______ key can be used in combination
with other keys to perform shortcuts and special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
43. When you quickly press and realize the left mouse button
twice you are ______
1) Primary-clicking
2) Pointing
3) Double-clicking
4) Secondary-clicking
44. What is the process of copying software program form
secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
45. _______ provides the means to move the pointer on the
screen and give information to the computer by clicking it buttons.
1) Scanner
2) Mouse
3) Keyboard
4) Program
46. Even if a disk fails, the computer applications running
and using it can continue processing. This application is said to have been
designed with this feature called.
1) 100 percent up-time
2) Fault tolerance
3) High reliability
4) All of these
47. Two or more computers connected to each other sharing
information form a ______
1) Network
2) Router
3) Server
4) Tunnel
48. A computer-intensive problem runs on a _______
1) Server
2) Mainframe
3) Supercomputer
4) Super PC
49. Programs that automatically submit your search request to
several search engines simultaneously are called.
1) Met search engines
2) Web crawlers
3) Spiders
4) Hits
50. Which of the following describes programs that can run
independently, travel from system to system, and disrupt computer
communications?
1) Trojans
2) Viruses
3) Idlers
4) Droppers