Wednesday, April 15, 2020

General ICT questions

1) ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. 

 A.    The operating system

 B.    The motherboard
 C.    The platform
 D.    Application software
2) The difference between people with access to computers and the Internet and those without this access is known as the: 

 A.    digital divide.

 B.    Internet divide.
 C.    Web divide.
 D.    cyberway divide.
3) Servers are computers that provide resources to other computers connected to a: 

 A.    mainframe

 B.    supercomputer
 C.    network
 D.    client
4) Word processing, spreadsheet, and photo-editing are examples of: 

 A.    application software.

 B.    system software.
 C.    operating system software.
 D.    platform software.
5) A ____________ is approximately one billion bytes. 

 A.    bit

 B.    kilobyte
 C.    gigabyte
 D.    megabyte
6) All of the following are examples of input devices EXCEPT a: 

 A.    scanner

 B.    mouse
 C.    printer
 D.    keyboard
7) Computers use the ____________ language to process data. 

 A.    relational

 B.    megabyte
 C.    binary
 D.    processing
8) In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: 

 A.    eight bytes.

 B.    eight characters.
 C.    eight bits.
 D.    eight kilobytes.
9) ____________ is data that has been organized or presented in a meaningful way. 

 A.    A process

 B.    Information
 C.    Software
 D.    Storage
10) All of the following are examples of real security and privacy risks EXCEPT: 

 A.    Viruses

 B.    Identity theft.
 C.    Hackers
 D.    Spam
11) Which of the following is an input device? 

 A.    Mouse

 B.    Keyboard
 C.    Scanner
 D.    All the above
12) The set of instructions that tells the computer what to do is 

 A.    Softcopy

 B.    Software
 C.    Hardware
 D.    Hardcopy
13) Which of the following stores more data? 

 A.    DVD

 B.    CD ROM
 C.    Floppy Disk
 D.    CD RW
14) —- is the heart of the computer and this is where all the computing is done. 

 A.    Keyboard

 B.    Monitor
 C.    Central Processing Unit
 D.    Printer
15) One byte is equivalent to 

 A.    8 bit

 B.    16 bit
 C.    32 bit
 D.    64 bit
16) To move forward through the tabs 

 A.    CTRL+TAB

 B.    CTRL+SHIFT+TAB
 C.    SHIFT+TAB
 D.    None of these
17) Personal computers can be connected together to form a 

 A.    server

 B.    network
 C.    supercomputer
 D.    enterprise
18) Choose the smallest memory size 

 A.    kilobyte

 B.    megabyte
 C.    gigabyte
 D.    terabyte
19) The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: 

 A.    instructions

 B.    operating system
 C.    application software
 D.    system unit
20) The operating system is the most common type of ____________ software. 

 A.    system

 B.    communication
 C.    application
 D.    word-processing
21) The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: 

 A.    simulation

 B.    animation
 C.    robotics
 D.    computer forensics.
22) The base of the hexadecimal number system is 

 A.    2

 B.    8
 C.    10
 D.    16
23) Computer software includes 

 A.    Packaged programs

 B.    Application programs
 C.    Operating system programs
 D.    All of these
24) The Operating System Manages 

 A.    Processes

 B.    Memory
 C.    Disks and I/O devices
 D.    All of the above
25) Allocation of a resources in a time dependent manner to several program simultaneously called 

 A.    multi user

 B.    multi tasking
 C.    time sharing
 D.    None of these.
26) Data that are accumulated and processed in group called 

 A.    Group processing

 B.    Batch Processing
 C.    Time sharing
 D.    None of these.
27) Multiprocessing supports more then one_____ at the same time 

 A.    User

 B.    Process
 C.    Hardware
 D.    None of these.
28) Which of the following are true about firewalls? 

 A.    Follows a set of rules

 B.    Can be either a hardware or software device
 C.    Filters network traffic
 D.    All the above
29) What are the four things needed to connect to the Internet? 

 A.    Monitor, keyboard, mouse, modem

 B.    Telephone line, PDA, modem and computer
 C.    Telephone line, modem, computer, and an ISP
 D.    Modem, computer, PDA and ISP
30) 1024 bytes equals: 

 A.    1 KB

 B.    1 MB
 C.    1 GB
 D.    1 TB
31) What is e-commerce? 

 A.    Buying and selling computer products

 B.    Buying and selling products and services not found in stores
 C.    Buying and selling international goods
 D.    Buying and selling products and services over the Internet
32) The process of transferring files from a computer on the Internet to your computer is called 

 A.    Uploading

 B.    Forwarding
 C.    FTP
 D.    Downloading
33) A person who uses his expertise to gain access to other people’s computers to get information illegally or to cause damage is a 

 A.    Programmer

 B.    Analyst
 C.    Spammer
 D.    Hacker
34) What is the commonly used unit for measuring the sped of data transmission? 

 A.    Mega Hertz

 B.    Characters per second
 C.    Nano seconds
 D.    Bits per second
35) ‘Blue tooth’ technology allows 

 A.    Satellite communication

 B.    Wireless communication between equipments
 C.    Signal transmission on mobile phones only
 D.    Landline phone to mobile phone communication
36) All of the following statements concerning files are true EXCEPT: 

 A.    A file is a collection of related pieces of information stored together for easy reference.

 B.    Files can be generated from an application.
 C.    Files are stored in RAM.
 D.    Files should be organized in folders.
37) All of the following statements concerning windows are true EXCEPT: 

 A.    windows are an example of a command-driven environment.

 B.    windows can be resized and repositioned on the desktop.
 C.    more than one window can be open at a time.
 D.    toolbars and scrollbars are features of windows.
38) Verification of a login name and password is known as: 

 A.    configuration

 B.    accessibility
 C.    authentication
 D.    logging in
39) ____________ is the ability of an operating system to control the activities of multiple programs at the same time. 

 A.    Streamlining

 B.    Multiuser
 C.    Multitasking
 D.    Simulcasting
40) The operating system does all of the following EXCEPT: 

 A.    provide a way for the user to interact with the computer.

 B.    manage the central processing unit (CPU).
 C.    manage memory and storage.
 D.    enable users to perform a specific task such as document editing.
41) The term ‘Pentium’ is related to 

 A.    DVD

 B.    Hard Disk
 C.    Mouse
 D.    Microprocessor
42) Which of the following is a valid IP address? 

 A.    192.168.111.1111

 B.    192.168.1.1
 C.    192.168.900.1
 D.    192.900.168.1
43) ‘LAN’ means 

 A.    Least Area Network

 B.    Large Area Network
 C.    Local Area Network
 D.    Light Area Network
44) Java is a
 A.    Operating System

 B.    Compiler
 C.    Input Device
 D.    Programming Language
45) What is the shortcut key of printing a document for computer having windows? 

 A.    Shift + P

 B.    Alt + P
 C.    Ctrl + P
 D.    Ctrl + Shift + P
46) What does HTTP stands for? 

 A.    Head Tail Transfer Protocol

 B.    Hypertext Transfer Protocol
 C.    Hypertext Transfer Plot
 D.    Hypertext Transfer Plotter
47) Which of the following is a correct format of Email address? 

 A.    sales@website@info

 B.    sales@website.info
 C.    saleswebsite.info
 D.    sales.website.info
48) A Web site’s main page is called 

 A.    Browser Page

 B.    Search Page
 C.    Home Page
 D.    Bookmark
49) The basic unit of a worksheet into which you enter data in Excel is called a 

 A.    cell

 B.    table
 C.    box
 D.    column
50) Which of the following is an example of a binary number? 

 A.    A1BCD1

 B.    23456
 C.    005
 D.    100101

No comments:

Post a Comment