1) A USB communication device that supports data encryption for secure wireless communication for
notebook users is called as -----------
a) Router b) Wireless hub c) Wireless switch d) USB wireless network adaptor 2) Which kind of hardware is used the most in the input phase of a computer based information system? a) Hard disk b) Monitor c) Printer d) Keyboard 3) A(n) ____ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software. a) Classic b) Film c) Analog d) Digital 4) Peripheral devices such as printers and monitor are considered to be ---------- a) Information b) Hardware c) Data d) Software 5) When you save the following the data would remain intact even after turning off computer? a) Primary Storage Device b) Secondary and Storage Device c) Motherboard d) RAM 6) Programs or a set of electronic instructions that tell a computer what to do ----- a) Software b) Hardware c) Menu d) Monitor 7) The clock rate of a processor is measured in ---------- a) Megahertz or gigahertz b) Nanoseconds c) Micro hertz d) Milliseconds 8) --------- are words that a programming language has set aside for its own use. a) Reserved keys b) Reserved words c) Control structures d) Control words 9) The --------- directs and controls the activities of the computer system. a) Coordinating unit b) Memory unit c) Logic unit d) Control unit 10) The ----------- manual tells you how to use a software program. a) User b) Technical c) Programming d) Documentation 11) --------- are also desktop machines used for intensive graphical applications. a) Workstations b) Computer c) PC d) Nodes 12) --------- is widely used by banks to process cheques. a) OMR b) Touch screen c) OCR d) MICR 13) ----------- is used to convert images (photos) and text into a stream of data. a) Light pen b) Disk c) Mouse d) Scanner 14) An ultraviolet light is used to erase the contents of the ----------- a) ROM b) RAM c) PROM d) EPROM 15) The speed of processor of computer is measured in --------- a) Gigahertz b) Baud c) BPS d) MIPS 16. Which of the following computer language is written in binary codes only? a) pascal b) machine language c) C d) C ++ 17. Which of the following is not a characteristic of a computer? a) Versatility b) Accuracy c) Diligence d) I.Q. 18) Which of the following is the smallest unit of data in a computer? a) Bit b) KB c) Nibble d) Byte 19. Which of the following is not a type of computer code? a) EDIC b) ASCII c) BCD d) EBCDIC 20) Which of the following is designed to control the operations of a computer? a) User b) Application Software c) System Software d) Utility Software 21) Which of the following are physical devices of a computer? a) Hardware b) Software c) System Software d) Package 22) Which of the following can access the server? a) Web Client 23) Which part of a computer performs calculations? a) Monitor b) DVD c) CPU d) Hard disk 24) What is the term for the point of intersection of a row and column? a) Value b) Cell c) Label d) Worksheet 25) What is hardware? a) The physical parts of a computer b) Instructions what make programs work. c) Rules designed to enable computers to connect to with one another. d) An item of information 26) What is the Internet? a) A software program installed on a computer b) A power backup source c) An electric device for printing documents d) A worldwide collection of computer networks. 27) What is the purpose of Microsoft Windows Firewall? a) Installs security patches b) Blocks pop-up windows c) Restricts unauthorized access d) Blocks word-processing programs 28) What is the status of a computer that is connected to the Internet? a) Offline b) Stand by c) Online d) Logged Off 29) Which technology can a website use to allow you to listen to a concert live over the Internet? a) Streaming b) Speech recognition c) Sampling d) Speech synthesis 30) Which program can help you detect and prevent malicious activities on your computer? a) Spyware-fighting software b) trojan horse c) Ethernet d) worm