digital literacy

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

1) A USB communication device that supports data encryption for secure wireless communication for

notebook users is called as -----------


a) Router b) Wireless hub c) Wireless switch d) USB wireless network adaptor
2) Which kind of hardware is used the most in the input phase of a computer based information system?
a) Hard disk b) Monitor c) Printer d) Keyboard
3) A(n) ____ camera is a peripheral device used to capture still images in a digital format that can be easily
transferred into a computer and manipulated using graphics software.
a) Classic b) Film c) Analog d) Digital
4) Peripheral devices such as printers and monitor are considered to be ----------
a) Information b) Hardware c) Data d) Software
5) When you save the following the data would remain intact even after turning off computer?
a) Primary Storage Device b) Secondary and Storage Device c) Motherboard d) RAM
6) Programs or a set of electronic instructions that tell a computer what to do -----
a) Software b) Hardware c) Menu d) Monitor
7) The clock rate of a processor is measured in ----------
a) Megahertz or gigahertz b) Nanoseconds c) Micro hertz d) Milliseconds
8) --------- are words that a programming language has set aside for its own use.
a) Reserved keys b) Reserved words c) Control structures d) Control words
9) The --------- directs and controls the activities of the computer system.
a) Coordinating unit b) Memory unit c) Logic unit d) Control unit
10) The ----------- manual tells you how to use a software program.
a) User b) Technical c) Programming d) Documentation
11) --------- are also desktop machines used for intensive graphical applications.
a) Workstations b) Computer c) PC d) Nodes
12) --------- is widely used by banks to process cheques.
a) OMR b) Touch screen c) OCR d) MICR
13) ----------- is used to convert images (photos) and text into a stream of data.
a) Light pen b) Disk c) Mouse d) Scanner
14) An ultraviolet light is used to erase the contents of the -----------
a) ROM b) RAM c) PROM d) EPROM
15) The speed of processor of computer is measured in ---------
a) Gigahertz b) Baud c) BPS d) MIPS
16. Which of the following computer language is written in binary codes only?
a) pascal b) machine language c) C d) C ++
17. Which of the following is not a characteristic of a computer?
a) Versatility b) Accuracy c) Diligence d) I.Q.
18) Which of the following is the smallest unit of data in a computer?
a) Bit b) KB c) Nibble d) Byte
19. Which of the following is not a type of computer code?
a) EDIC b) ASCII c) BCD d) EBCDIC
20) Which of the following is designed to control the operations of a computer?
a) User b) Application Software c) System Software d) Utility Software
21) Which of the following are physical devices of a computer?
a) Hardware b) Software c) System Software d) Package
22) Which of the following can access the server?
a) Web Client
23) Which part of a computer performs calculations?
a) Monitor b) DVD c) CPU d) Hard disk
24) What is the term for the point of intersection of a row and column?
a) Value b) Cell c) Label d) Worksheet
25) What is hardware?
a) The physical parts of a computer b) Instructions what make programs work.
c) Rules designed to enable computers to connect to with one another. d) An item of information
26) What is the Internet?
a) A software program installed on a computer b) A power backup source
c) An electric device for printing documents d) A worldwide collection of computer networks.
27) What is the purpose of Microsoft Windows Firewall?
a) Installs security patches b) Blocks pop-up windows
c) Restricts unauthorized access d) Blocks word-processing programs
28) What is the status of a computer that is connected to the Internet?
a) Offline b) Stand by c) Online d) Logged Off
29) Which technology can a website use to allow you to listen to a concert live over the Internet?
a) Streaming b) Speech recognition c) Sampling d) Speech synthesis
30) Which program can help you detect and prevent malicious activities on your computer?
a) Spyware-fighting software b) trojan horse c) Ethernet d) worm

You might also like