Q: 121 RAM is an example of___________?

  1. 
    Secondary memory
  2. 
    Primary memory
  3. 
    Both A. and B.
  4. 
    none

Q: 122 Magnetic disk is an example of____________?

  1. 
    Secondary memory
  2. 
    Primary memory
  3. 
    Main memory
  4. 
    Both (1) and (2)

Q: 123 Which one of the following is NOT a computer language?

  1. 
    MS-Excel
  2. 
    BASIC
  3. 
    COBOL
  4. 
    C++

Q: 124 ___________Store data or information temporarily and pass it on as directed by the control unit?

  1. 
    Address
  2. 
    Register
  3. 
    Number
  4. 
    Memory

Q: 125 Select the Odd one from the following

  1. 
    Operating system
  2. 
    Interpreter
  3. 
    Compiler
  4. 
    Assembler

Q: 126 A________________is an additional set of commands that the computer displays after you make a selection from the main menu?

  1. 
    dialog box
  2. 
    submenu
  3. 
    menu selection
  4. 
    All of the above

Q: 127 COBOL is an acronym for________________?

  1. 
    Common Business Oriented Language
  2. 
    Computer Business Oriented Language
  3. 
    Common Business Operated Language
  4. 
    Common Business Organized Language

Q: 128 All of the following are examples of real security and privacy risks EXCEPT____________?

  1. 
    hackers
  2. 
    Spam
  3. 
    Viruses
  4. 
    identity theft

Q: 129 Which of the following is NOT one of the four major data processing functions of a computer?

  1. 
    gathering data
  2. 
    processing data into information
  3. 
    analyzing the data or information
  4. 
    storing the data or information

Q: 130 All of the following are examples of storage devices EXCEPT____________?

  1. 
    hard disk drives
  2. 
    printers
  3. 
    floppy disk drives
  4. 
    CD drives

Q: 131 The CPU and memory are located on the__________?

  1. 
    expansion board
  2. 
    motherboard
  3. 
    storage device
  4. 
    output device

Q: 132 ______________is the science that attempts to produce machines that display the same type of intelligence that humans do?

  1. 
    Nanoscience
  2. 
    Nanotechnology
  3. 
    Simulation
  4. 
    Artificial intelligence (Al)

Q: 133 When creating a computer program, the____________designs the structure of the program?

  1. 
    End user
  2. 
    System Analyst
  3. 
    Programmer
  4. 
    All of the above

Q: 134 Computers process data into information by working exclusively with____________?

  1. 
    multimedia
  2. 
    word
  3. 
    numbers
  4. 
    characters

Q: 135 Computers manipulate data in many ways, and this manipulation is called___________?

  1. 
    upgrading
  2. 
    processing
  3. 
    batching
  4. 
    utilizing

Q: 136 The ability to recover and read deleted or damaged files from a criminal';s computer is an example of a law enforcement speciality called___________?

  1. 
    robotics
  2. 
    simulation
  3. 
    computer forensics
  4. 
    animation

Q: 137 Where does most data go first with in a computer memory hierarchy ?

  1. 
    RAM
  2. 
    ROM
  3. 
    BIOS
  4. 
    CACHE

Q: 138 The_____________data mining technique derives rules from real-world case examples?

  1. 
    Rule discover
  2. 
    Signal processing
  3. 
    Neural nets
  4. 
    Case-based reasoning

Q: 139 _____________are used to identify a user who returns to a Website?

  1. 
    Cookies
  2. 
    Plug-ins
  3. 
    Scripts
  4. 
    ASPs

Q: 140 Codes consisting of lines of varying widths or lengths that are computer-readable are known as__________?

  1. 
    an ASCII code
  2. 
    a magnetic tape
  3. 
    an OCR scanner
  4. 
    a bar code