comp awar

Upload: chandrasekar-ravi

Post on 07-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 comp awar

    1/49

    1. The earlier computers, which were massive in size, were based on vacuum tubes.2. Early computing machines, like the ENIAC, were actually meant to assist thearmed forces.3. The printers in pre-1950s were punch cards.4. An improvement on the ENIAC, which pioneered 'stored program', was made

    possible with the help of the mathematician John von Neumann.5. Before the 1950s, computers were mostly owned by universities and researchlabs.6. The B-programming language was developed by Ken Thompson.7. Famous people, associated with the ENIAC, EDVAC, UNIVAC computers areEckert & Mauchly.8. The 1st commercially produced and sold computer (1951) was UNIVAC.9. IBM was provided software for PCs by Microsoft.10. Time-sharing, teletyping, were associated with mainframe computers.11. The transformation from heavy computers to PCs was made possible usingmicroprocessors.

    12. The first microprocessor was developed in 1971 by Intel.13. The term 'micro' (extremely small) denotes 10-6m.14. The Harvard student, who chose to write computer programs and droppedstudies was Bill Gates.15. A pentium 4 (P-4) employs roughly 40 million transistors.16. Mark-1, Apple-1, and collossus were initial desktop computers.17. Binary digits are briefed as bit.18. A collection of bits is called byte.19. C++, is a computer language.20. The process of eliminating programming faults is called debugging.21. Starting up on operating system is called booting.

    22. A program used to browse the web is called browser.23. An error in software designing which can even cause a computer to crash iscalled bug.24. Click and double-click are achieved using the mouse.25. Java, C, ForTran, Pascal and BASIC are computer programming languages.26. The device which sends computer data using a phone line is called MODEM.27. 'Worm' and 'virus' are actually programs.28. A 'file' is a unit ofinformation.29. A megabyte has 106(million) bytes.30. A small, single-site network is called LAN.31. A processor that collects several data and sends them over a single line iscalled bridge.32. 'Nano' stands forone billionth part.33. The number of bit patterns using an n-bit code is 2n.34. The part of a computer that works with the data/programs is called CPU.35. To convert a binary number to a decimal, we have to express it in power of2.36. www stands forworld wide web.37. Mathematics employed in computers is called Boolean algebra.38. A collection of 8 bits is called byte.

  • 8/6/2019 comp awar

    2/49

    39. The first home computer (1977), which was sold in millions of units wasApple II.40. 'PARAM' is a supercomputer.41. A website containing periodic posts is called blog.42. While cutting and pasting, the cutitem is temporarily stored in the clipboard.

    43. http stands forhyper text transfer protocol.44. The unwanted or non-requested emails are called "spam".45. A computer framed to give various network services is called server.

    1. All of the following are examples of real security and privacy risks EXCEPT:

    A. hackers.

    B. spam.

    C. viruses.D. identity theft.

    Answer: B

    2. A process known as ____________ is used by large retailers to study trends.A. data miningB. data selectionC. POS

    D. data conversionAnswer: A

    3. ____________terminals (formerly known as cash registers) are often connected tocomplex inventory and sales computer systems.A. DataB. Point-of-sale (POS)C. SalesD. QueryAnswer: B

    4. A(n) ____________ system is a small, wireless handheld computer that scans anitems tag and pulls up the current price (and any special offers) as you shop.A. PSSB. POSC. inventory

  • 8/6/2019 comp awar

    3/49

    D. data miningAnswer: A

    5. The ability to recover and read deleted or damaged files from a criminals

    computer is an example of a law enforcement specialty called:A. robotics.B. simulation.C. computer forensics.D. animation.Answer: C

    6. Which of the following is NOT one of the four major data processing functions of acomputer?A. gathering data

    B. processing data into informationC. analyzing the data or informationD. storing the data or informationAnswer: C

    7. ____________ tags, when placed on an animal, can be used to record and track in adatabase all of the animals movements.A. POSB. RFIDC. PPS

    D. GPSAnswer: B

    8. Surgeons can perform delicate operations by manipulating devices through computersinstead of manually. This technology is known as:A. robotics.B. computer forensics.C. simulation.D. forecasting.Answer: A

    9. Technology no longer protected by copyright, available to everyone, is considered tobe:A. proprietary.B. open.C. experimental.

  • 8/6/2019 comp awar

    4/49

    D. in the public domain.Answer: A

    10. ____________ is the study of molecules and structures whose size ranges from 1 to

    100 nanometers.A. NanoscienceB. MicroelectrodesC. Computer forensicsD. Artificial intelligenceAnswer: A11. ____________ is the science that attempts to produce machines that display the sametype of intelligence that humans do.A. NanoscienceB. NanotechnologyC. Simulation

    D. Artificial intelligence (AI)Answer: D

    12. ____________ is data that has been organized or presented in a meaningful fashion.A. A processB. SoftwareC. StorageD. InformationAnswer: D

    13. The name for the way that computers manipulate data into information is called:A. programming.B. processing.C. storing.D. organizing.Answer: B

    14. Computers gather data, which means that they allow users to ____________ data.A. presentB. inputC. outputD. storeAnswer: B

    15. After a picture has been taken with a digital camera and processed appropriately, theactual print of the picture is considered:A. data.

  • 8/6/2019 comp awar

    5/49

    B. output.C. input.D. the process.Answer: B

    16. Computers use the ____________ language to process data.A. processingB. kilobyteC. binaryD. representationalAnswer: C

    17. Computers process data into information by working exclusively with:A. multimedia.

    B. words.C. characters.D. numbers.Answer: D

    18. In the binary language each letter of the alphabet, each number and each specialcharacter is made up of a unique combination of:A. eight bytes.B. eight kilobytes.C. eight characters.

    D. eight bits.Answer: D

    19. The term bit is short for:A. megabyte.B. binary language.C. binary digit.D. binary number.Answer: C

    20. A string of eight 0s and 1s is called a:A. megabyte.B. byte.C. kilobyte.D. gigabyte.Answer: B

  • 8/6/2019 comp awar

    6/49

    21. A ____________ is approximately one billion bytes.A. kilobyteB. bitC. gigabyte

    D. megabyteAnswer: C

    22. A ____________ is approximately a million bytes.A. gigabyteB. kilobyteC. megabyteD. terabyteAnswer: C

    23. ____________ is any part of the computer that you can physically touch.A. HardwareB. A deviceC. A peripheralD. An applicationAnswer: A

    24. The components that process data are located in the:A. input devices.

    B. output devices.C. system unit.D. storage component.Answer: C

    25. All of the following are examples of input devices EXCEPT a:A. scanner.B. mouse.C. keyboard.D. printer.Answer: D

    26. Which of the following is an example of an input device?A. scannerB. speakerC. CD

  • 8/6/2019 comp awar

    7/49

    D. printerAnswer: A

    27. All of the following are examples of storage devices EXCEPT:

    A. hard disk drives.B. printers.C. floppy disk drives.D. CD drives.Answer: B

    28. The ____________, also called the brains of the computer, is responsible for processing data.A. motherboardB. memory

    C. RAMD. central processing unit (CPU)Answer: D

    29. The CPU and memory are located on the:A. expansion board.B. motherboard.C. storage device.D. output device.Answer: B

    30. Word processing, spreadsheet, and photo-editing are examples of:A. application software.B. system software.C. operating system software.D. platform software.Answer: A

    31. ____________ is a set of computer programs used on a computer to help performtasks.A. An instructionB. SoftwareC. MemoryD. A processorAnswer: B

  • 8/6/2019 comp awar

    8/49

    32. System software is the set of programs that enables your computers hardwaredevices and ____________ software to work together.A. managementB. processing

    C. utilityD. applicationAnswer: D

    33. The PC (personal computer) and the Apple Macintosh are examples of two different:A. platforms.B. applications.C. programs.D. storage devices.Answer: A

    34. Apple Macintoshes (Macs) and PCs use different ____________ to process data anddifferent operating systems.A. languagesB. methodsC. CPUsD. storage devicesAnswer: C

    35. Servers are computers that provide resources to other computers connected to a:A. network.B. mainframe.C. supercomputer.D. client.Answer: A

    36. Smaller and less expensive PC-based servers are replacing ____________ in manybusinesses.A. supercomputersB. clientsC. laptopsD. mainframesAnswer: D

    37. ____________ are specially designed computers that perform complex calculationsextremely rapidly.

  • 8/6/2019 comp awar

    9/49

    A. ServersB. SupercomputersC. LaptopsD. MainframesAnswer: B

    38. DSL is an example of a(n) ____________ connection.A. networkB. wirelessC. slowD. broadbandAnswer: D

    39. The difference between people with access to computers and the Internet and those

    without this access is known as the:A. digital divide.B. Internet divide.C. Web divide.D. broadband divide.Answer: A

    40. ____________ is the science revolving around the use of nanostructures to builddevices on an extremely small scale.A. Nanotechnology

    B. Micro-technologyC. Computer forensicsD. Artificial intelligenceAnswer: A

    41. Which of the following is the correct order of the four major functions of a computer?A. Process Output Input StorageB. Input Output Process StorageC. Process Storage Input OutputD. Input Process Output StorageAnswer: D

    42. ____________ bits equal one byte.A. EightB. TwoC. One thousand

  • 8/6/2019 comp awar

    10/49

    D. One millionAnswer: A

    43. The binary language consists of ____________ digit(s).

    A. 8B. 2C. 1,000D. 1Answer: B

    44. A byte can hold one ____________ of data.A. bitB. binary digitC. character

    D. kilobyteAnswer: C

    45. ____________ controls the way in which the computer system functions and providesa means by which users can interact with the computer.A. The platformB. The operating systemC. Application softwareD. The motherboardAnswer: B

    46. The operating system is the most common type of ____________ software.A. communicationB. applicationC. systemD. word-processing softwareAnswer: C

    47. ____________ are specially designed computer chips that reside inside other devices,such as your car or your electronic thermostat.A. ServersB. Embedded computersC. Robotic computersD. MainframesAnswer: B

  • 8/6/2019 comp awar

    11/49

    48. The steps and tasks needed to process data, such as responses to questions or clickingan icon, are called:A. instructions.B. the operating system.

    C. application software.D. the system unit.Answer: A

    49. The two broad categories of software are:A. word processing and spreadsheet.B. transaction and application.C. Windows and Mac OS.D. system and application.Answer: D

    50. The metal or plastic case that holds all the physical parts of the computer is the:A. system unit.B. CPU.C. mainframe.D. platform.Answer: A

    Fill in the Blank:

    51. Between PCs and Macs, the ____________ is the platform of choice for graphicdesign and animation.

    Answer: Mac

    52. The ____________ is the program that manages the hardware of the computersystem, including the CPU, memory, storage devices, and input/output devices.

    Answer: operating system

    53. The type of operating system software you use depends on your computers

    ____________.

    Answer: platform

    54. ____________software helps you carry out tasks, such as typing a document or

    creating a spreadsheet.

    Answer: Application

  • 8/6/2019 comp awar

    12/49

    55. ____________are the fastest and most expensive computers.Answer: Supercomputers

    56. A ____________ is approximately 1,000 bytes.Answer: kilobyte

    57. Input devices are used to provide the steps and tasks the computer needs to

    process data, and these steps and tasks are called ____________.Answer: instructions

    58. A computer gathers data, processes it, outputs the data or information, and

    ____________ the data or information.

    Answer: stores

    59. The binary language consists of two digits: ____________ and ____________.

    Answer: 0 and 1

    60. A string of ____________ 0s and 1s is called a byte.

    Answer: eight (8)

    61. The devices you use to enter data into a computer system are known as____________ devices.

    Answer: input

    62. The devices on a computer system that let you see the processed information areknown as ____________ devices.

    Answer: output

    63. ____________ is the set of computer instructions or programs that enables the

    hardware to perform different tasks.Answer: Software

    64. When you connect to the ____________, your computer is communicating with a

    server at your Internet service provider (ISP).

    Answer: Internet

  • 8/6/2019 comp awar

    13/49

    65. ____________ are computers that excel at executing many different computerprograms at the same time.

    Answer: Mainframes

    66. ____________is the application of computer systems and techniques to gatherlegal evidence.

    Answer: Computer forensics

    67. ____________ is the science that attempts to create machines that will emulatethe human thought process.

    Answer: Artificial intelligence (AI)

    68. Macintosh computers use the Macintosh operating system (Mac OS), whereasPCs generally run ____________ as an operating system.

    Answer: Microsoft Windows

    69. A process known as ____________ tracks trends and allows retailers to respond

    to consumer buying patterns.

    Answer: data mining

    70. Hard disk drives and CD drives are examples of ____________ devices.

    Answer: storage

    71. You would use ____________ software to create spreadsheets, type documents,and edit photos.

    Answer: application

    72. ____________ are computers that support hundreds or thousands of userssimultaneously.

    Answer: Mainframes

    73. ____________ is the term given to the act of stealing someones identity andruining their credit rating.

    Answer: Identity theft

  • 8/6/2019 comp awar

    14/49

  • 8/6/2019 comp awar

    15/49

    83. Clicking on an icon with the mouse is a form of giving an instruction to thecomputer.

    Answer: True

    84. Output devices store instructions or data that the CPU processes.Answer: False (memory)

    85. The CPU and memory are located on a special circuit board in the system unit

    called the motherboard.Answer: True

    86. Nanostructures represent the smallest human-made structures that can be built.

    Answer: True

    87. The main difference between a supercomputer and a mainframe is that

    supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designed to handle many programs running at the same

    time (but at a slower pace).

    Answer: True

    88. Being computer fluent means that you should be able to build a computer

    yourself.

    Answer: False

    89. Embedded computers are self-contained computer devices that have their own

    programming and do not receive input.Answer: True

    90. A Web browser is a special device that is installed in your computer that allows

    it to communicate with other devices on a network.Answer: False (network adapter)

    91. With a wireless network, it is easier to relocate devices.

    Answer: True

    92. The most common type of memory that the computer uses to process data is

  • 8/6/2019 comp awar

    16/49

    ROM.Answer: False (RAM)

    Matching:

    93. Match the following terms with their approximate size:I. kilobyte A. one million bytesII. byte B. eight bitsIII. gigabyte C. one thousand bytesIV. megabyte D. one billion bytesV. terabyte E. one trillion bytesAnswer: C, B, D, A, E

    94. Match the following terms with their meanings:

    I. printer A. storage deviceII. scanner B. output deviceIII. RAM C. input deviceIV. CPU D. a type of memoryV. CD drive E. processorAnswer: B, C, D, E, A

    95. Match the following terms with their meanings:I. mainframe A. the most expensive computers that perform complex calculationsextremely rapidlyII. supercomputer B. a computer that provides resources to other computers connected to

    a networkIII. embedded computer C. a large, expensive computer that supports hundreds orthousands of users simultaneouslyIV. PDA D. a self-contained computer device that usually performs preprogrammedfunctions such as temperature controlV. server E. a small mobile computing deviceAnswer: C, A, D, E, B

    96. Match the following terms with their meanings:

    I. software A. transforming data into informationII. hardware B. data that has been organized or presented in a meaningful fashion

    III. operating system C. any part of the computer that you can physically touchIV. processing D. a set of computer programs that enables hardware to perform differenttasksV. information E. the most common type of system software, it controls the way in whichthe computer system functionsAnswer: D, C, E, A, B

    97. Match the following terms with their meanings:

  • 8/6/2019 comp awar

    17/49

    I. system software A. the set of programs that enables computer hardware devices andapplication software to work togetherII. application software B. the kind of operating system software you will use depends onthisIII. platform C. operating system software generally used on PCs

    IV. Microsoft Windows D. a set of programs used to accomplish a specific taskV. Mac OS E. operating system software used on the Apple MacintoshAnswer: A, D, B, C, E

    98. Match the following terms with their meanings:

    I. data A. the main circuit board in the system unitII. memory B. the representation of a fact or idea (unprocessed information)III. output C. processed data or informationIV. storage D. holds instructions or data that the CPU processesV. motherboard E. data or information that can be accessed againAnswer: B, D, C, E, A

    99. Match the following terms with their meanings:I. bit A. the science revolving around the use of nanostructures to build devices on anextremely small scaleII. binary language B. the case that contains the system componentsIII. instructions C. consists of 0s and 1sIV. system unit D. short for binary digitV. nanotechnology E. steps and tasks necessary to process data into usable informationAnswer: D, C, E, B, A

    100. Match the following fields to the related computer technology:I. medicine A. Internet research and virtual toursII. business B. data miningIII. law enforcement C. robotics and simulationIV. education D. computer forensicsV. archeology E. digital recreations of ruinsAnswer: C, B, D, A, E

    1. In a survey of more than 500 companies and government agencies, ____________percent detected computer security breaches.A. 20B. 75C. 85D. 99Answer: C

  • 8/6/2019 comp awar

    18/49

    2. The survey showed that these businesses lost more than ____________ due to securitybreaches.A. $100,000 eachB. $377 millionC. five employees each

    D. $1 millionAnswer: B

    3. The typical computer criminal is a(n):A. young hacker.B. trusted employee with no criminal record.C. trusted employee with a long, but unknown criminal record.D. overseas young cracker.Answer: B

    4. The majority of computer crimes are committed by:

    A. hackers.B. insiders.C. overseas criminals.D. young teenage computer geniuses.Answer: B

    5. The common name for the crime of stealing passwords is:A. spooling.B. identity theft.C. spoofing.D. hacking.

    Answer: C Reference: Theft by Computer6. Collecting personal information and effectively posing as another individual is knownas the crime of:A. spooling.B. identity theft.C. spoofing.D. hacking.Answer: B

    7. Malicious software is known as:A. badware.B. malware.C. maliciousware.D. illegalware.Answer: B

    8. A program that performs a useful task while simultaneously allowing destructive actsis a:

  • 8/6/2019 comp awar

    19/49

    A. worm.B. Trojan horse.C. virus.D. macro virus.Answer: B Moderate

    9. An intentionally disruptive program that spreads from program to program or fromdisk to disk is known as a:A. Trojan horse.B. virus.C. time bomb.D. time-related bomb sequence.Answer: B

    10. In 1999, the Melissa virus was a widely publicized:A. e-mail virus.

    B. macro virus.C. Trojan horse.D. Time bomb.Answer: A

    11. What type of virus uses computer hosts to reproduce itself?A. Time bombB. WormC. Melissa virusD. Macro virusAnswer: B

    12. The thing that eventually terminates a worm virus is a lack of:A. memory or disk space.B. time.C. CD drive space.D. CD-RW.Answer: A

    13. When a logic bomb is activated by a time-related event, it is known as a:A. time-related bomb sequence.B. virus.C. time bomb.D. Trojan horse.Answer: C

    14. A logic bomb that was created to erupt on Michelangelos birthday is an example ofa:A. time-related bomb sequence.B. virus.

  • 8/6/2019 comp awar

    20/49

    C. time bomb.D. Trojan horse.Answer: C

    15. What is the name of an application program that gathers user information and sends it

    to someone through the Internet?A. A virusB. SpybotC. Logic bombD. Security patchAnswer: B

    16. Standardization of Microsoft programs and the Windows operating system has madethe spread of viruses:A. more complicated.B. more difficult.

    C. easier.D. slower.Answer: C

    17. HTML viruses infect:A. your computer.B. a Web page in the HTML code.C. both a Web page and the computer that is viewing it.D. NoAnswer: B

    18. Software programs that close potential security breaches in an operating system areknown as:A. security breach fixes.B. refresh patches.C. security repairs.D. security patches.Answer: D

    19. When customers of a Web site are unable to access it due to a bombardment of faketraffic, it is known as:A. a virus.B. a Trojan horse.C. cracking.D. a denial of service attack.Answer: D

    20. ___________ is the measurement of things such as fingerprints and retinal scans usedfor security access.A. Biometrics

  • 8/6/2019 comp awar

    21/49

    B. BiomeasurementC. Computer securityD. Smart weapon machineryAnswer: A

    21. What is the most common tool used to restrict access to a computer system?A. User loginsB. PasswordsC. Computer keysD. Access-control softwareAnswer: B

    22. The most common passwords in the U.S. or Britain include all EXCEPT:A. love.B. Fred.C. God.

    D. 123.Answer: D

    23. Hardware or software designed to guard against unauthorized access to a computernetwork is known as a(n):A. hacker-proof program.B. firewall.C. hacker-resistant server.D. encryption safe wall.Answer: B

    24. The scrambling of code is known as:A. encryption.B. a firewall.C. scrambling.D. password-proofing.Answer: A

    25. If you want to secure a message, use a(n):A. cryptology source.B. encryption key.C. encryption software package.D. cryptosystem.Answer: D Reference: How It Works: 10.2 Cryptography

    26. To prevent the loss of data during power failures, use a(n):A. encryption program.B. surge protector.C. firewall.

  • 8/6/2019 comp awar

    22/49

    D. UPS.Answer: D

    27. A(n) ____________ can shield electronic equipment from power spikes.A. encryption program

    B. surge protectorC. firewallD. UPSAnswer: B

    28. All of these are suggestions for safe computing EXCEPT:A. dont borrow disks from other people.B. open all e-mail messages but open them slowly.C. download shareware and freeware with caution.D. disinfect your system.Answer: B

    29. Freeware ___________ encrypts data.A. encryptionB. firewall softwareC. PGPD. private and public keysAnswer: C

    30. ____________ is defined as any crime completed through the use of computertechnology.A. Computer forensics

    B. Computer crimeC. HackingD. CrackingAnswer: B

    31. Most computer systems rely solely on ___________ for authentication.A. loginsB. passwordsC. encryptionD. lock and keyAnswer: B

    32. Creating strong computer security to prevent computer crime usually simultaneouslyhelps protect :A. privacy rights.B. personal ethics.C. the number of cookies downloaded to your personal computer.D. personal space.Answer: A

  • 8/6/2019 comp awar

    23/49

    33. Over ___________ was spent by businesses and government to repair problems inregard to Y2K.A. 20 million dollarsB. 100 million dollarsC. 1 billion dollars

    D. 100 billion dollarsAnswer: D

    34. What is a complex system that takes on nearly complete responsibility for a taskeliminating the need for people, verification, or decision making?A. Autonomous systemB. Missile defense auto-systemC. Smart weaponD. Independent systemAnswer: D

    35. Security procedures can:A. will eliminate all computer security risk.B. reduce but not eliminate risks.C. are prohibitively expensive.D. are inaccessible for the average home user.Answer: B

    Fill in the Blank:

    36. The field of computer ____________ uses special software to scan hard drives ofpotential criminal suspects.

    Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging37. Computer ____________ often goes unreported because businesses fear negativepublicity.Answer: crime

    38. ____________ connections are the most frequent point of attack for Internetcommerce.Answer: Internet

    39. ____________ is the most common form of computer crime.Answer: Theft

    40. A survey by eMarketer.com found that ____________ are the most often cited onlinefraud cases.Answer: online auctions Reference: Identity Theft

    41. Theft of computers is most common for PDAs and ____________ computers.Answer: notebook

  • 8/6/2019 comp awar

    24/49

    42. When you use a disk in several different computers within the same day, you aretaking the chance of contracting a(n) ____________.Answer: virus Reference: Viruses Difficulty: Easy

    43. A(n) ____________ attaches itself to documents that contain embedded programs

    that automate tasks.Answer: macro virus

    44. Both viruses and ____________ use computer hosts to replicate.Answer: worms

    45. ____________ programs search for and eliminate viruses.Answer: Antivirus

    46. A security patch is a software program that closes possible security breaches in theoperating system. The cost to the consumer is ____________.

    Answer: nothing or free

    47. ____________ was once the word used for malicious computer wizardry.Answer: Hackers or hacking

    48. ____________ refers to electronic trespassing or criminal hacking.Answer: Cracking

    49. DoS stands for ___________.Answer: denial of service

    50. DDoS stands for ___________.Answer: distributed denial of service

    51. ____________ hijack Web pages and redirect users to other sites.Answer: Webjackers

    52. ___________ software monitors and records computer transactions.Answer: Audit-control

    53. Each individual who uses a public key cryptosystem has ___________ keys.Answer: two Reference: How It Works: 10.2 Cryptography

    54. PGP stands for ___________.Answer: Pretty Good Privacy

    55. Most operating systems, including Windows XP, assign each user a unique___________.Answer: user identifier or user ID

  • 8/6/2019 comp awar

    25/49

    56. It should now be common knowledge that users should not open ___________ frome-mail recipients that the user does not know.Answer: attachments

    Matching:

    57. Match the acts and centers with their purposes:I. Computer Fraud and Abuse Act A. created by Attorney General Janet Reno in 1998II. USA Patriot Act B. defines what kinds of communications are legal onlineIII. Digital Millennium Copyright Act C. created in 2001 as a response to the terroristattacks of September 11, 2001IV. Telecommunications Act of 1996 D. provides instant information on crimes andcriminalsV. Communications Decency Act E. declared unconstitutional by the Supreme CourtVI. National Infrastructure Protection Center F. created as a result of the first headline-making worm

    VII. National Crime Information Center G. used to arrest a student for writing to crack anAdobe productAnswers: F, C, G, B, E, A, D

    58. Match the following rules of thumb about safe computing with the properdescriptions:I. share with care A. be aware of e-mail from what appear to be legitimate companiesII. handle e-mail carefully B. dont choose a dictionary wordIII. disinfect regularly C. keep your disks in your own computerIV. take your password seriously D. copy, copy, copyV. if its important, back it up E. encrypt

    VI. sensitive info over the Internet? F. use antivirus softwareAnswers: C, A, F, B, D, E

    1. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line1) Compiler 2) Interpreter 3) Linker 4) Loader 5) None

    2. _ _ _ _ _ _ _ _ is an OOP principle

    1) Structured programming 2) Procedural programming 3) Inheritance4) Linking 5) None

    3. COBOL is widely used in _ _ _ _ _ _ _ applications

    1) Commercial 2) Scientific 3) Space 4) Mathematical5) None

    4. RAM stands for1) Random origin money 2) Random only memory 3) Read only memory4) Random access memory 5) None

  • 8/6/2019 comp awar

    26/49

    5. 1 Byte = ?1) 8 bits 2) 4 bits 3) 2 bits 4) 9 bits 5) None

    6. SMPS stands for1) Switched mode power supply 2) Start mode power supply

    3) Store mode power supply 4) Single mode power supply5) None

    7. The device used to carry digital data on analog lines is called as

    1) Modem 2) Multiplexer 3) Modulator 4) Demodulator 5) None

    8. VDU is also called

    1) Screen 2) Monitor 3) Both 1 & 2 4) printer 5) None

    9. BIOS stands for1) Basic Input Output system 2) Binary Input output system

    3) Basic Input Off system 4) all the above5) None

    10. Father of C programming language1) Dennis Ritchie 2) Prof Jhon Kemeny 3) Thomas Kurtz 4) Bill Gates5) None

    11. The 16 bit Microprocessor means that it has1) 16 address lines 2) 16 Buses 3) 16 Data lines 4) 16 routes 5) None

    12. Data going into the computer is called

    1) Output 2) algorithm 3) Input 4) Calculations 5) flow chart

    13. Which of the following refers to a small, single-site network?1) LAN 2) DSL 3) RAM 4) USB 5) CPU

    14. Microsoft Office is1) Shareware 2)Public domain software 3) Open-sourse software4) A vertical market application 5) An application suite

    15. How many options does a BINARY choice offer1) None 2) One 3) Two

    4) it depends on the amount of memory on the computer5) It depends on the speed of the computers processor

    16. A collection of program that controls how your computer system runs andprocesses information is called

    1) Operating System 2) Computer 3) Office 4) Compiler 5) Interpreter

  • 8/6/2019 comp awar

    27/49

    17. Computer connected to a LAN (Local Area Network) can1) run faster 2) go on line3) share information and /or share peripheral equipment4) E-mail 5) None

    18. Information travels between components on the mother board through1) Flash memory 2) CMOS 3) Bays 4) Buses 5) Peripherals

    19. How are data organized in a spreadsheet?

    1) Lines & spaces 2) Layers & Planes 3) Height & Width4) Rows & Columns 5) None

    20. The blinking symbol on the computer screen is called the1) mouse 2) logo 3) hand 4) palm 5) cursor

    Ans:-

    01.2 06.1 11.3 16.1

    02.3 07.1 12.3 17.3

    03.1 08.3 13.1 18.304.4 09.1 14.5 19.4

    05.1 10.1 15.3 20.5

    1. All of the following are examples of real security and privacy risksEXCEPT:A. hackers.

    B. spam.C. viruses.D. identity theft.Answer: B2. A process known as ____________ is used by large retailers to studytrends.A. data miningB. data selectionC. POSD. data conversionAnswer: A

    3. ____________terminals (formerly known as cash registers) are oftenconnected to complex inventory and sales computer systems.A. DataB. Point-of-sale (POS)C. SalesD. QueryAnswer: B4. A(n) ____________ system is a small, wireless handheld computer that

  • 8/6/2019 comp awar

    28/49

    scans an items tag and pulls up the current price (and any special offers)as you shop.A. PSSB. POSC. inventory

    D. data miningAnswer: A5. The ability to recover and read deleted or damaged files from acriminals computer is an example of a law enforcement specialty called:A. robotics.B. simulation.C. computer forensics.D. animation.Answer: C6. Which of the following is NOT one of the four major data processingfunctions of a computer?

    A. gathering dataB. processing data into informationC. analyzing the data or informationD. storing the data or informationAnswer: C7. ____________ tags, when placed on an animal, can be used to recordand track in a database all of the animals movements.A. POSB. RFIDC. PPSD. GPS

    Answer: B8. Surgeons can perform delicate operations by manipulating devicesthrough computers instead of manually. This technology is known as:A. robotics.B. computer forensics.C. simulation.D. forecasting.Answer: A9. Technology no longer protected by copyright, available to everyone, isconsidered to be:A. proprietary.B. open.C. experimental.D. in the public domain.Answer: A10. ____________ is the study of molecules and structures whose sizeranges from 1 to 100 nanometers.A. NanoscienceB. Microelectrodes

  • 8/6/2019 comp awar

    29/49

    C. Computer forensicsD. Artificial intelligenceAnswer: A11. ____________ is the science that attempts to produce machines thatdisplay the same type of intelligence that humans do.

    A. NanoscienceB. NanotechnologyC. SimulationD. Artificial intelligence (AI)Answer: D

    12. ____________ is data that has been organized or presented in ameaningful fashion.A. A processB. SoftwareC. Storage

    D. InformationAnswer: D13. The name for the way that computers manipulate data into informationis called:A. programming.B. processing.C. storing.D. organizing.Answer: B14. Computers gather data, which means that they allow users to

    ____________ data.

    A. presentB. inputC. outputD. storeAnswer: B15. After a picture has been taken with a digital camera and processedappropriately, the actual print of the picture is considered:A. data.B. output.C. input.D. the process.Answer: B

    16. Computers use the ____________ language to process data.A. processingB. kilobyteC. binaryD. representational

  • 8/6/2019 comp awar

    30/49

    Answer: C17. Computers process data into information by working exclusively with:A. multimedia.B. words.C. characters.

    D. numbers.Answer: D18. In the binary language each letter of the alphabet, each number andeach special character is made up of a unique combination of:A. eight bytes.B. eight kilobytes.C. eight characters.D. eight bits.Answer: D19. The term bit is short for:A. megabyte.

    B. binary language.C. binary digit.D. binary number.Answer: C

    20. A string of eight 0s and 1s is called a:A. megabyte.B. byte.C. kilobyte.D. gigabyte.

    Answer: B

    21. A ____________ is approximately one billion bytes.A. kilobyteB. bitC. gigabyteD. megabyteAnswer: C22. A ____________ is approximately a million bytes.A. gigabyteB. kilobyteC. megabyteD. terabyteAnswer: C23. ____________ is any part of the computer that you can physicallytouch.A. HardwareB. A deviceC. A peripheralD. An application

  • 8/6/2019 comp awar

    31/49

  • 8/6/2019 comp awar

    32/49

    31. ____________ is a set of computer programs used on a computer tohelp perform tasks.A. An instructionB. SoftwareC. Memory

    D. A processorAnswer: B32. System software is the set of programs that enables your computershardware devices and ____________ software to work together.A. managementB. processingC. utilityD. applicationAnswer: D33. The PC (personal computer) and the Apple Macintosh are examples oftwo different:

    A. platforms.B. applications.C. programs.D. storage devices.Answer: A34. Apple Macintoshes (Macs) and PCs use different ____________ toprocess data and different operating systems.A. languagesB. methodsC. CPUsD. storage devices

    Answer: C35. Servers are computers that provide resources to other computersconnected to a:A. network.B. mainframe.C. supercomputer.D. client.Answer: A36. Smaller and less expensive PC-based servers are replacing

    ____________ in many businesses.A. supercomputersB. clientsC. laptopsD. mainframesAnswer: D37. ____________ are specially designed computers that performcomplex calculations extremely rapidly.A. ServersB. Supercomputers

  • 8/6/2019 comp awar

    33/49

    C. LaptopsD. MainframesAnswer: B38. DSL is an example of a(n) ____________ connection.A. network

    B. wirelessC. slowD. broadbandAnswer: D39. The difference between people with access to computers and theInternet and those without this access is known as the:A. digital divide.B. Internet divide.C. Web divide.D. broadband divide.Answer: A

    40. ____________ is the science revolving around the use ofnanostructures to build devices on an extremely small scale.A. NanotechnologyB. Micro-technologyC. Computer forensicsD. Artificial intelligenceAnswer: A41. Which of the following is the correct order of the four major functions ofa computer?A. Process Output Input Storage

    B. Input Output Process StorageC. Process Storage Input OutputD. Input Process Output StorageAnswer: D42. ____________ bits equal one byte.A. EightB. TwoC. One thousandD. One millionAnswer: A43. The binary language consists of ____________ digit(s).A. 8B. 2C. 1,000D. 1Answer: B44. A byte can hold one ____________ of data.A. bitB. binary digit

  • 8/6/2019 comp awar

    34/49

    C. characterD. kilobyteAnswer: C45. ____________ controls the way in which the computer systemfunctions and provides a means by which users can interact with the

    computer.A. The platformB. The operating systemC. Application softwareD. The motherboardAnswer: B46. The operating system is the most common type of ____________software.A. communicationB. applicationC. system

    D. word-processing softwareAnswer: C47. ____________ are specially designed computer chips that resideinside other devices, such as your car or your electronic thermostat.A. ServersB. Embedded computersC. Robotic computersD. MainframesAnswer: B48. The steps and tasks needed to process data, such as responses toquestions or clicking an icon, are called:

    A. instructions.B. the operating system.C. application software.D. the system unit.Answer: A49. The two broad categories of software are:A. word processing and spreadsheet.B. transaction and application.C. Windows and Mac OS.D. system and application.Answer: D50. The metal or plastic case that holds all the physical parts of thecomputer is the:A. system unit.B. CPU.C. mainframe.D. platform.Answer: A

  • 8/6/2019 comp awar

    35/49

    1. Which of the following is a part of the Central Processing Unit?

    a. Printer

    b. Key board

    c. Mouse

    d. Arithmetic & Logic unit

    e. None

    2. CAD stands for

    a. Computer aided design

    b. Computer algorithm for design

    c. Computer application in design

    d. All of the above

    e. None

    3. Which of the following printer cannot printgraphics?

    a. Ink-jet

    b. Daisy Wheel

    c. Laser

    d. Dot-matrix

    e. None

    4. A program written in machine language is called?

    a. Assembler

    b. Object

    c. Computer

  • 8/6/2019 comp awar

    36/49

    d. Machine

    e. None

    5. The father of Modern Computer is

    a. Charles Babbage

    b. Von-nuumann

    c. Danies Ritchel

    d. Blaise Pascal

    e. None

    6. The Word FTP stands for

    a. File Translate Protocol

    b. File Transit Protocol

    c. File Transfer protocol

    d. file typing protocol

    e. None

    7. The lowest form of Computer language iscalled

    a. BASIC

    b. FORTRAN

    c. Machine Language

    d. COBOL

    e. None

    8. Best Quality graphics is produced by

    a. Dot Matix

    b. Laser Printer

  • 8/6/2019 comp awar

    37/49

    c. Inkjet Printer

    d. Plotter

    e. None

    9. Memory which forgets every thing when you switch off the power is known as

    a. Corrupted

    b. Volatile

    c. Non-Volatile

    d. Non-Corrupted

    e. None

    10. The linking of computers with acommunication system is called

    a. Networking

    b. Pairing

    c. Interlocking

    d. Assembling

    e. Sharing

    11. The 16 bit Microprocessor means that it has

    a. 16 address lines

    b. 16 Buses

    c. 16 Data lines

    d. 16 routes

    e. None

    12. Data going into the computer is called

    a. Output

  • 8/6/2019 comp awar

    38/49

    b. algorithm

    c. Input

    d. Calculations

    e. flow chart

    13. Which of the following refers to a small,single-site network?

    a. LAN

    b. DSL

    c. RAM

    d. USB

    e. CPU

    14. Microsoft Office is

    a. Shareware

    b.Public domain software

    c. Open-sourse software

    d. A vertical market application

    e. An application suite

    15. How many options does a BINARY choice offer

    a. None

    b. One

    c. Two

    d. it depends on the amount of memory on the computer

    e. It depends on the speed of the computer's processor

    16. A collection of program that controls how your computer system runs and

    processes information is called

  • 8/6/2019 comp awar

    39/49

    a. Operating System

    b. Computer

    c. Office

    d. Compiler

    e. Interpreter

    17. Computer connected to a LAN (Local AreaNetwork) can

    a. run faster

    b. go on line

    c. share information and /or share peripheral equipment

    d. E-mail

    e. None

    18. Information travels between components on the mother board through

    a. Flash memory

    b. CMOS

    c. Bays

    d. Buses

    e. Peripherals

    19. How are data organized in a spreadsheet?

    a. Lines & spaces

    b. Layers & Planes

    c. Height & Width

    d. Rows & Columns

    e. None

  • 8/6/2019 comp awar

    40/49

    20. The blinking symbol on the computer screen is called the

    a. mouse

    b. logo

    c. hand

    d. palm

    e. cursor

    21. A fault in a computer program which prevents it from working correctly is

    known as

    a. Boot

    b. Bug

    c. Biff

    d. Strap

    e. None

    22. A self replicating program, similar to a virus which was taken from a 1970s

    science fiction novel by John Bruner entitled the Shockwave Rider is _________

    a. Bug

    b. Vice

    c. Lice

    d. Worm

    e. None

    23. A _______ is a bi-stable electronic circuit that has two stable states.

    a. Multivibrator

    b. Flip-flop

    c. Logic gates

  • 8/6/2019 comp awar

    41/49

    d. laten

    e. None

    24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as

    a. Spam

    b. Trash

    c. Calibri

    d. Courier

    e. None

    25. DOS stands for

    a. Disk Operating System

    b. Disk operating session

    c. Digital Operating System

    d. Digital Open system

    e. None

    26. Who is the chief of Miocrosoft

    a. Babbage

    b. Bill Gates

    c. Bill Clinton

    d. Bush

    e. None

    27. Which of the following are input devices.

    a. Keyboard

    b. Mouse

  • 8/6/2019 comp awar

    42/49

    c. Card reader

    d. Scanner

    e. All of these

    28. Examples of output devices are

    a. Screen

    b. Printer

    c. Speaker

    d. All of these

    e. None

    29. Which of the following is also known as brain of computer

    a. Control unit

    b. Central Processing unit

    c. Arithmatic and language unit

    d. Monitor

    e. None

    30. IBM stands for

    a. Internal Business Management

    b. International Business Management

    c. International Business Machines

    d. Internal Business Machines

    e. None

    31.___________ translates and executes program at run time line by line

    a. Compiler

  • 8/6/2019 comp awar

    43/49

    b. Interpreter

    c. Linker

    d. Loader

    e. None

    32. ___________ is an OOP principle

    a. Structured programming

    b. Procedural programming

    c. Inheritance

    d. Linking

    e. None

    33. COBOL is widely used in _________ applications

    a. Commercial

    b. Scientific

    c. Space

    d. Mathematical

    e. None

    34. RAM stands for

    a. Random origin money

    b. Random only memory

    c. Read only memory

    d. Random access memory

    e. None

    35. 1 Byte = ?

  • 8/6/2019 comp awar

    44/49

    a. 8 bits

    b. 4 bits

    c. 2 bits

    d. 9 bits

    e. None

    36. SMPS stands for

    a. Switched mode power supply

    b. Start mode power supply

    c. Store mode power supply

    d. Single mode power supply

    e. None

    37. The device used to carry digital data on analog lines is called as

    a. Modem

    b. Multiplexer

    c. Modulator

    d. Demodulator

    e. None

    38. VDU is also called

    a. Screen

    b. Monitor

    c. Both 1 & 2

    d. printer

    e. None

  • 8/6/2019 comp awar

    45/49

    39. BIOS stands for

    a. Basic Input Output system

    b. Binary Input output system

    c. Basic Input Off system

    d. all the above

    e. None

    40. Father of 'C' programming language

    a. Dennis Ritchie

    b. Prof Jhon Kemeny

    c. Thomas Kurtz

    d. Bill Gates

    e. None

    ANSWERS

    1. dabaa, 6. ccdba, 11. ccaec, 16. accde, 21.bdbaa, 26.bedbc, 31.bcada, 36. aacaa

    1. Who is called as "Father of Computers''?(A) Charles Babage(B) Blaise Pascal(C) Hollirth(D) All of these(E) None of these

    2. The first Digital Computer introduced, was named as :(A) Univac(B) Mark-I

    (C) Eniac(D) All of these(E) None of these

    3. How many generations, computer can be classified?(A) 4(B) 5(C) 3

  • 8/6/2019 comp awar

    46/49

    (D) 6(E) None of these

    4. First Generation Computers contain :(A) Transistors

    (B) Vacume Tubes(C) LSI(D) VLSI(E) None of these

    5. II Generation Computers are made of :(A) Vaccume Tubes(B) Transistors(C) LSI(D) VLSI(E) None of these

    6. IV Generation Computers contain :(A) LSI(B) Vaccume Tubes(C) All Technology(D) Transistors(E) None of these

    7. Vth Generation Computers are based on:(A) Artificial Intelligence(B) Programming Intelligence(C) System Knowledge(D) All of these(E) None of these

    8. Computers, combine both measuring and counting, are called :(A) Analog(B) Digital(C) Hybrid(D) All of these(E) None of these

    9. In world today, most of the computers are :(A) Digital(B) Hybrid(C) Analog(D) Complex(E) None of these

    10. In any computer installation, how many elements consists?

  • 8/6/2019 comp awar

    47/49

  • 8/6/2019 comp awar

    48/49

    (E) None of these

    17. Who developed the `analytical engine'?(A) Jacquard loom(B) Charles Babbage

    (C) Shannon(D) IBM(E) None of these

    18. ENIAC stands for :(A) Electrical Numerical Integrator and Calculator(B) Electronic Numerical Integrator and Computer(C) Electronic Numerical Integrator and Calculator(D) Electronic Number Integrator and Calculator(E) None of these

    19. First Generation of computer was based on which technology?(A) Transistor(B) Vacuum Tube(C) LSI(D) VLSI(E) None of these

    20. Microprocessor was introduced in which generation of computer?(A) Second Generation(B) Fourth Generation(C) Both (A) & (B)(D) Third Generation(E) All of the above

    21. GUI stands for :(A) Graphical User Interface(B) Graph Use Interface(C) Graphical Universal Interface(D) None of these

    22. The time taken by CPU to retrieve and interpret the instruction to be executed iscalled as :(A) Instruction cycle(B) Fetch cycle(C) Both (A) & (B)(D) All of these(E) None of these

    23. Which of the following is responsible for all types of calculations?(A) ALU

  • 8/6/2019 comp awar

    49/49

    (B) Control Unit(C) Registers(D) BUS(E) None of these

    24. Internal memory in a CPU is nothing but :(A) A set of registers(B) A set of ALU(C) Microprocessor(D) BUS(E) None of these

    25. Which of the following is permanent memory?(A) SRAM(B) DRAM(C) ROM

    (D) All of these(E) None of these

    Answers :1. (A) 2. (B) 3. (B) 4. (B) 5. (B) 6. (A) 7. (A) 8. (C) 9. (A) 10. (C)11. (B) 12. (D) 13. (B) 14. (B) 15. (B) 16. (A) 17. (B) 18. (B) 19. (B) 20. (B)21. (A) 22. (A) 23. (A) 24. (A) 25. (C)