Computer Awareness practices Sheet
Sheet-1
1. _____________ .aim at the boot sector of a hard drive by infecting a very crucial component of the boot process?(1) File infection virus (2) Boot virus (3) Network virus (4) E-mail virus (5) None of these
2. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as : _____________ (1) phishing (2) flaming (3) blogging (4) pop- ups (5) None of these
3. Malicious software is known as : _____________. (1) Badware (2) Malware (3) Malicious ware (4) Iiigalware (5) None of these
4. Hardware or software designed to guard against authorized access to computer network is known a _____________ . (1) Hacker proof program (2) Firewall (3) Hacker resistant serve (4) Encryption safe wall (5) None of these
5. The fastest and quietest type of printer is a(n):(1) dot-matrix printer (2) inkjet printer. (3) laser printer. (4) plotter.(5) None of these
6. The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n): _____________ (1) plotter. (2) inkjet printer.(3) laser printer (4) dot-matrix printer. (5) none of these
7. MICR stands for _____________ (1) Magnetic Ink Character Recognition (2) Magnetic Ink Code Reader (3) Magnetic Ink Cases Reader (4) None of the above (5) All of the above
8.
The main difference
between application and system software is that:
(1) Application software
is composed of program instructions but system
software is not.
(2) Application software is stored in memory
whereas system software is only in the
CPU.
(3) System software is unnecessary
whereas application software must be
present on the computer.
(4) System software manages hardware
whereas application software performs user tasks.
(5) None of these
9. ________ Viruses are often transmitted by a floppy disk left in the floppy drive (1) Trojan horse (2) Boot sector (3) Script (4) Logic bomb (5) None of these
10.
Servers are computers that provide
resources to other computers connected to a ___________
(1) mainframe
(2) network (3)
supercomputer (4)
client (5) None of
these
11.
A goal of data mining includes which
of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
12.
A Proxy server is used for which of the
following?
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these
13. In the URL http:/www.bankersadda.com, the portion labeled http is the______. (1) host (2) domain name (3) Protocol (4) toolbar (5) None of these.
14.
When data changes in multiple lists and all
lists are not updated, this causes:
(1) data redundancy
(2)
information overload (3) duplicate
data (4) data
inconsistency (5) None of
these
15. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)_____.
(1) version (2) patch (3) tutorial (4) FAQ (5) None of these.
16.
. _____________ are words that a
programming language has set aside for its own use.
(1) Control worlds (2) Reserved words (3) Control
structures (4) Reserved keys (5) None of these
17.
You
must install a (n) ____________ on a network if you want to share a
broadband Internet connection.
(1)
router
(2)
modem (3)
node
(4) cable (5) None of
these
18. The ____ shows all the web sites and pages that you have visited over a period of time. (1) status bar (2) taskbar (3) history list (4) toolbar (5) None of these.
19. A proxy server is used for which of the following?
(1) To provide security against unauthorized users (2) To process client requests for web pages
(3) To process client requests for database access (4) To provide TCP/IP (5) None of these
20. The ability to easily add additional users means that a network is: (1) scalable (2) dedicated (3) decent (4) secure (5) None of these.
Sheet-2
1. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer (a) The operating system (b). The motherboard (c). The platform (d). Application software.
2. The difference between people with access to computers and the Internet and those without this access is known as the: (a) digital divide.(b) Internet divide (c) Web divide (d) Cyberwaydivide
3. Register is a (a) Set of capacitors used to register input instructions in a digital computer (b) Set of paper tapes and cards put in a file (c) Temporary storage unit within the CPU having dedicated or general purpose use (d) part of the auxiliary memory (e) device to convert current signal into voltage signal
4. Errors in computer results could be due to (a) encoding of data (b) transmission of data (c) manipulation of data (d) all of the above (e) none of above
5. Terminal is a (a) device used to give supply to a computer (b) Point at which data may leave or enter the computer (c) ending point in a program (d) point where wires are interconnected (e) an input/output device
6. Pickup wrong definition (a) Off line - is a system peripheral equipment not controlled by CPU (b) Online - is system in which peripheral equipment is in direct contact with CPU (c) Peripherals - are hardware under the control of CPU, like punched card readers, tapes, drums, disk, output devices (d) PL/I is the acronym Peripheral Listing /Index (e) Program or routine is a set sequence of instructions given to computer for problem solving 6.
7. When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like colours are seen. This can be explained on the basis of phenomenon of
(a) reflection and diffraction (b) reflection and transmission (c) diffraction and transmission (d) refraction, diffraction and transmission (e) none of these
8. All of the
following are examples of real security and privacy risks EXCEPT:
(a). hackers. (b). spam. (c). viruses. (d). identity theft.
9. A process known as ____________ is used by large retailers to study trends. (a). data mining (b). data selection (c). POS (d). data conversion
10. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. (a). PSS (b). POS (c). inventory (d). data mining.
11. . ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. (a). Data (b) Point-of-sale (POS) (c)C. Sales (d). Query
12. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: (a). robotics. (b). simulation. (c). computer forensics. (d). animation
13. Which of the
following is NOT one of the four major data processing functions of a computer?
(a). gathering data (b). processing
data into information (c). analyzing
the data or information (d). storing the
data or information
14. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements. (a). POS (b). RFID (c). PPS (d). GPS
15. In database , a field is a____. (1) label (2) table of information (3) group of related records (4) category of information (5) None of these.
16. The number of pixels displayed on a screen is known as the screen_________ (1) resolution (2) colour (3) refresh rate (4)viewing size (5) None of these.
17. Word processing, spreadsheet, and photo-editing are example of ________. (1) application software (2) system software (3) operating system software (4) plateform software (5) None of these.
18. If you wish to extend the length of the network without having the signal degrade, you would use a (1) repeater (2) router (3) gateway (4) switch (5) None of these.
19. .The time it takes a device to locate data and instructions and make them available to the CPU is known as ________ (1) clock speed (2) a processing cycle (3) CPU speed (4) access time (5) None of these.
20.
A (n) _______ uses pictures (called
icons) and menus displayed on the screen to send commands to the computer
system. (a) command – based user interface (b)
GUI (c) system
utility
(d) API (5) None of
these
For Answers Contact Khyati Bhatia