Computer Awareness MCQ - Part 6

1. One advantage of dial-up internet access is __________
(A) It utilizes broadband technology
(B) It uses a router for security
(C) It utilizes existing telephone service
(D) Modem speeds are very fast

2. When we run a program in HTML coding _____ is used as back end and ____ works as front en(D)
(A) Notepad, Internet Explorer
(B) Notepad, Msn messenger
(C) MS-Word, Internet Explorer
(D) Both (1) and (2)

3. Computers process data into information by working exclusively with :
(A) Sound
(B) Electric charge
(C) Numbers
(D) Pictures

4. You must install a (n) ......... on a network if you want to share a broadband Internet connection
(A) Modem
(B) Router
(C) Server
(D) Printer

5. The purpose of the primary key in a database is to _______
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations

6. The design of the network is called the network
(A) Architecture
(B) Server
(C) Transmission
(D) Type

7. The most frequently used instructions of a computer program are likely to be fetched from
(C) Hard Disk
(D) Cache Memory

8. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear
(B) The CD-ROM stops functioning
(C) The Web browser opens to an unusual home page 4
(D) Odd messages or images are displayed on the screen

9. The errors that can be pointed out by the compiler are
(A) Syntax error
(B) Symantec error
(C) Logical error
(D) Internal error

10. By default, your documents print in___________ mode
(A) Landscape
(B) Portrait
(C) Page setup
(D) Print preview

11. A Web site's main page is called its:
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark

12. The simultaneous processing of two or more programs by multiple processors is:
(A) Multi-programming
(B) Multi-tasking
(C) time-sharing
(D) multi-processing

13. Codes consisting of lines of varying widths or lengths that are computer readable are known as:
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code

14. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) AutoFit

15. Why is it un-ethical to share copyrighted files with your friends?
(A) It is not un-ethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.

16. Re-usable optical storage will typically have the acronym:
(A) CD
(D) RW

17. The most common type of storage devices are:
(A) Persistent
(B) Optical
(C) Magnetic
(D) Flash

18. A device that connects to a network without the use of cables is said to be:
(A) Distributed
(B) Free
(C) Centralized
(D) open source

19. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a:
(A) Hacker
(B) Analyst
(C) instant messenger
(D) programmer

20. To access properties of an object, the mouse technique to use is:
(A) Dragging
(B) Dropping
(C) right clicking
(D) shift clicking

0/Comments = 0 / Comments not = 0

Previous Post Next Post