• What do you call the programs that are used to find out possible faults and their causes?
    1. operating system extensions
    2. cookies
    3. diagnostic software
    4. boot diskettes

  • What characteristic of read-only memory (ROM) makes it useful?
    1. ROM information can be easily updated.
    2. Data in ROM is non-volatile, that is, it remains there even without electrical power.
    3. ROM provides very large amounts of inexpensive data storage.
    4. ROM chips are easily swapped between different brands of computers.

  • __________represents raw facts, where-as__________is data made meaningful?
    1. Information, reporting
    2. Data, information
    3. Information, bits
    4. Records, bytes

  • Where are data and programme stored when the processor uses them?
    1. Main memory
    2. Secondary memory
    3. Disk memory
    4. Programme memory

  • When a file is saved for the first time?
    1. a copy is automatically printed
    2. it must be given a name to identify it
    3. it does not need a name
    4. it only needs a name if it is not going to be printed

  • What is embedded system?
    1. The programme which arrives by being wrapped in box.
    2. The programme which is the permanent part of the computer
    3. The computer which is the part of a larger system or machine
    4. The computer and software system that control the machine

  • Example of non-numeric data is_________?
    1. Employee address
    2. Examination score
    3. Bank balance
    4. All of these

  • The amount of vertical space between lines of text in a document is called___________?
    1. double-space
    2. line spacing
    3. single space
    4. vertical spacing

  • A computer cannot ';boot'; if it does not have the__________?
    1. Compiler
    2. Loader
    3. Operating System
    4. Assembler

  • What type of computers are client computers (most of the time) in a client-server system?
    1. Mainframe
    2. Mini-computer
    3. Microcomputer
    4. PDA

  • which statement describe ";Hackers";?
    1. all have the same motive
    2. break into other people';s computers
    3. may legally break into computers as long as they do not do any damage
    4. are people who are allergic to computers

  • Junk e-mail is also called_________?
    1. spam
    2. spoof
    3. sniffer script
    4. spool

  • CAD stands for_________?
    1. Computer aided design
    2. Computer algorithm for design
    3. Computer application in design
    4. Computer analogue design

  • Which of the following is a part of the Central Processing Unit?
    1. Printer
    2. Key board
    3. Mouse
    4. Arithmetic & Logic unit

  • EBCDIC stands for__________?
    1. Extended Binary Coded Decimal Interchange Code
    2. Extended Bit Code Decimal Interchange Code
    3. Extended Bit Case Decimal Interchange Code
    4. Extended Binary Case Decimal Interchange Code

  • MICR stands for_________?
    1. Magnetic ink character recognition
    2. Magnetic Ink Code Reader
    3. Magnetic Ink Cases Reader
    4. None of these

  • The capacity of 3.5 inch floppy disk was__________?
    1. 1.40 MB
    2. 1.44 GB
    3. 1.40 GB
    4. 1.44 MB

  • UNIVAC is___________?
    1. Universal Automatic Computer
    2. Universal Array Computer
    3. Unique Automatic Computer
    4. Unvalued Automatic Computer

  • What is a light pen?
    1. A Mechanical Input device
    2. Optical input device
    3. Electronic input device
    4. Optical output device

  • Which device is required for the Internet connection?
    1. Joystick
    2. Modem
    3. CD Drive
    4. NIC Card

  • What type of resource is most likely to be a shared common resource in a computer Network?
    1. Printers
    2. Speakers
    3. Floppy disk drives
    4. None of these

  • You can organize files by storing them in__________?
    1. archives
    2. folders
    3. indexes
    4. lists

  • Which of the following statements is true about Minicomputer and Microcomputer?
    1. Minicomputer works faster than Microcomputer
    2. Microcomputer works faster than Minicomputer
    3. Speed of both the computers is the same
    4. The speeds of both these computers cannot be compared with the speed of advanced

  • Coded entries which are used to gain access to a computer system are called__________?
    1. Entry codes
    2. Passwords
    3. Security commands
    4. Code words

  • __________is a combination of hardware and software that facilitates the sharing of information between computing devices.
    1. Network
    2. Peripheral
    3. Expansion board
    4. Digital device