Anda di halaman 1dari 3

TEST - V : COMPUTER KNOWLEDGE

161. Memory, also called random access memory, or RAM. (1) contains the electronic circuits that cause processing to occur (2) makes the information resulting from processing available for use (3) allows data, programs, commands, and user responses to be entered into a computer (4) consists of electronic components that store data (5) None of these 162. A represent approximately one billion memory locations. (1) kilobyte (2) megabyte (3) gigabyte (4) terabyte (5) None of these 163. An interrupt handler is a(n): (1) location in memory that keeps track of recently generated interrupts. (2) peripheral device. (3) utility program. (4) special numeric code that indicates the priority of a request (5) None of these 164. All of the following are steps involved in the boot process EXCEPT: (1) load the operating system into RAM. (2) the power-on self-test. (3) activate the basic input/output system (BIOS). (4) load application programs. (5) None of these 165. A port that allows 8 bits at a time to be transmitted simultaneously is a(n) . (1) dedicated port (2) parallel port (3) SCSI port (4) USB port (5) None of these 166. Which of these terms refers to the feature of an OS that allows a single computer to process the tasks of several users at different stations, in round-robin fashion? (1) Multiprocessing (2) Multiprogramming (3) Multitasking (4) Time processing (5) Time-sharing 167. A program which helps create written documents and lets you go back and make corrections as necessary (1) spreadsheet (1) desktop (1) cursor (1) Master (2) personal writer (2) face to face (2) text (2) Slide Sorter (3) word printer (3) viewer (3) folder (3) Slide Show (4) word processor (4) view space (4) boot (4) Normal (5) None of these (5) None of these (5) None of these (5) Print preview 168. Screen that comes on when you turn on your computer that shows all the icons 169. A place that a user can create to store files 170. Electronic pens are used with the mouse to write on a slide in which view? 171. When you insert a picture and adjust the height, Word automatically adjusts the to maintain the correct proportion. (1) pixel size (1) Execute (1) 1 (2) resolution (2) Store (2) 8 (3) screen size (3) Decode (3) 16 (4) width (4) Pipelining (4) 32 (5) None of these (5) None of these (5) 64 172. Which of the following is NOT one of the steps in the machine cycle? 173. How many peripheral devices can be connected to a single SCSI port?

15

174. The four-step process of fetch, decode, execute, and store is called a(n): (1) machine cycle (2) instruction cycle (3) arithmetic operation (4) logical operation (5) None of these 175. All of the following are TRUE regarding virtual memory EXCEPT : (1) any amount of RAM can be allocated to virtual memory. (2) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed. (3) this temporary storage is called the swap file or page file. (4) virtual memory is physical space on the hard drive. (5) None of these 176. The operating system is the most common type of software. (1) communication (2) application (3) system (4) word-processing (5) None of these 177. The human-readable version of a program is called (1) source code (2) program code (3) human code (4) system code (5) None of these 178. Data are in client/server computing. (1) never sent to the client machine (2) sent in very large sections to save processing time (3) sent only upon the clients request (4) sent in complete copies for the client to filter and sort (5) sent from the client to the server for processing 179. The total set of interlinked hypertext documents worldwide is : (1) HTT (2) Browser (3) WWW (4) B2B (5) None of these 180. Which of the following is not one of the three Mail Merge Helper steps? (1) Merge the two files (2) Create the main document (3) Set the mailing list parameters (4) Create the data source (5) None of these 181. Which is the part of a computer that one can touch and feel ? (1) Programs (2) Software (3) Hardware (4) Output (5) None of these 182. A command to get a file you worked on from the memory where it was stored (1) close (2) delete (3) open (4) get it (5) None of these 183. There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall? (1) Proxy server (2) Intrusion-detection system (3) Terminal server (4) Web server (5) None of these 184. Array is (1) Linear data structure (2) non-linear data structure (3) simple data structure (4) complex data structure (5) None of these 16

185. A computer checks the of user names and passwords for a match before granting access. (1) website (2) network (3) backup file (4) database (5) None of these 186. Which of the following is the latest version of MS Word? (1) Word 2000 (2) Word 2007 (3) Word 2010 (4) Word 2011 (5) Word 2012 187. In the online world of electronic commerce, what do the initials CEM stands for ? (1) Costly E-Commerce Marketing (2) Customer Experience Management (3) Customer Experience Misleading (4) Cost Estimates are Mind Boggling (5) None of these 188. What type of program controls the various computer parts and allows the user interact with the computer ? (1) Utility software (2) Operating system (3) Word processing software (4) Database program (5) None of these 189. Which of the following transmission systems provide the highest data rate to in individual device? (1) computer bus (2) telephone lines (3) voice and mode (4) lease lines 190. The combination of the operating system and the processor is referred to as the computers: (1) CPU (2) platform (3) BIOS (4) CMOS (5) None of these 191. The operating system allows users to organize the computers contents in a hierarchical structure of directories that include all of the following EXCEPT: (1) files (2) folders (3) drives (4) systems (5) None of these 192. Leaves of which of the following trees are at the same level ? (1) Binary tree (2) B-tree (3) AVL-tree (4) Expression tree (5) None of these 193. The transformation of a message into an encoded form is known as : (1) Mnemonics (2) Encoding (3) Encryption (4) Decoding (5) None of these 194. Firewalls are used to protect against (1) Unauthorized Attacks (2) Virus Attacks (3) Data Driven Attacks (4) Fire Attacks (5) All of these 195. Auto correct was originally designed to replace words as you type. (1) Short, repetitive (2) Grammatically incorrect (3) Misspelled (4) Half (5) None of these 196. Ensuring that the essential peripheral devices are attached and operational is the process. (1) configuration (2) CMOS (3) POST (4) ROM (5) check 197. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an: (1) action (2) event. (3) interrupt (4) activity (5) None of these 198. Before a package can be used in a java program it must be (1) executed (2) referenced (3) imported (4) declared (5) None of these 199. The definition of thrashing is: (1) swapping data between virtual memory and RAM too frequently. (2) insufficient hard disk space. (3) too many processors being managed by the operating system. (4) inaccurate information stored in the registry (5) None of these 200. The primary device that a computer uses to store information (1) register (2) storehouse (3) desk (4) hard drive (5) None of these 17

Anda mungkin juga menyukai