Computer Competition Exam Set 2

SET - 2

1. The first computers were programmed using
(1) assembly language (2) machine language (3) source code (4) object code (5) spaghetti code

2. You organize files by storing them in _
(1) archives (2) folders (3) indexes (4) lists (5) None of these

3. In order to create columnar data in Word you need to _
1) Tab consecutively until your cursor reaches the desired place
2) Set tabs or use the Table menu
3) You need to use Excel
4) Press the space bar untill cursor reaches the desired place
5) None of these

4. How many different documents can you have open at any one time?
1. No more than three
2. Only one
3. As many as your computers memory will hold
4. No more than you Taskbar can display
5. None of these

5. Hackers _
1. all have the same motive
2. break into other people’s computers
3. may legally break into computers as long as they do not do any damage
4. are people who are allergic to computers
5. None of these

6. In page preview mode _
1) You can see all pages of your document
2) You can only see the page you are currently working
3) You can only see pages that do not contain graphics
4) You can only see the title page of your document
5) None of these

7. What type of computers are client computers (most of the time) in a client-server system?
(1) Mainframe (2) Mini-computer (3) Microcomputer (4) PDA (5) None of these

8. What is the full form of ‘GUI’ ?
(1) Gnutella Universal Interface (2) Graphical User Interface
(3) Graphic Uninstall/Install (4) General Utility Interface (5) None of these

9. Junk e-mail is also called
(1) spam (2) spoof (3) sniffer script (4) spool (5) None of these

10. A word in a web page that, when clicked, opens another document
(1) anchor (2) URL (3) hyperlink (4) reference (5) None of these

11. Which of the following referes to a small, single-site network?
(1) LAN (2) DSL (3) RAM (4) USB (5) CPU

12. Which keystroke will take you at the beginning or the end of a long document?
(1) Ctrl + PageUP and Ctrl + PageDown (2) Shift + Home and Shift + End
(3) Ctrl + Home and Ctrl + End
(4) The only way is by using the right scroll ball (5) None of these

13. In Word you can force a page break _
1) By positioning your cursor or at he appropriate place and pressing the Fl Key
2) By using the Insert/Section Break
3) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
4) By changing the font size of your document
5) None of these

14. When you want to move some text from one page to a different page, the best method is _
(1) drag and drop (2) Cut and paste (3) delete and replace
(4) find and replace (5) None of these

15. To view information on the web you must have a __
(1) cable modem (2) web browser (3) Domain Name Server
(4) hypertext viewer (5) None of these

16. How many margins are on a page ?
(1) Two (header and footer) (2) Four (top, bottom, right, left)
(3) Two (landscape and Portrait) (4) Two (top and bottom) (5) None of these

17. Which key is used in combination with another key to perform a specific task?
(1) function (2) arrow (3) space bar (4) control (5) None of these

18. What is an embedded system?
1) A program that comes wrapped in a box
2) A program that is permanently part of computer
3) A computer that is part of a larger computer
4) A  computer and software  system that controls a machine or appliance
5) None of these

19. Text in a column is generally aligned
(1) justified (2) right (3) center (4) left (5) None of these

20. A directory within a directory is called
(1) Mini Directory   (2) Junior Directory (3) Part Directory
(4) Sub Directory   (5) None of these

21. Why should you delete unknown e-mail attachments?
1) You could go to jail
2) the person could track you down and hurt you
3) it is bad manners
4) it mights contains a virus that could hurt your computer
5) None of these

22. Of the five words listed below, which one does not belong to the group ?
(1) Applications (2) Peripherals (3) Programs (4) Software (5) Commands

23. Selecting the Zoom command ____
1) opens a copy of the document in a different view
2) prints a copy of the displayed document
3) changes the magnification of the displayed document
4) saves a copy of the displayed document
5) None of these

24. Name the hardware equipment that a computer is made up of _
1) monitor, the central processing unit (CPU) , me keyboard, mouse, software and network
2) monitor, the central processing unit (CPU) , the keyboard, mouse, programs and network
3) monitor, the central processing unit (CPU) , the keyboard, mouse, printer and modem
4) monitor, the central processing unit (CPU) , the keyboard, mouse, applications and network
5) None of these

25. Where are programs and data kept while the processor is using them?
(1) Main Memory (2) Secondary memory (3) Disk memory
(4) Program memory (5) None of these

26. The name of the computer’s brain is
(1) monitor (2) hardware (3) CPU (4) byte (5) None of these

27. A(n) ____ is a device that electronically processes data, converting it to information.
(1) algorithm (2) computer (3) software (4) program (5) None of these

28. Which of the following are computers that can be carried around easily?
(1) Minicomputers (2) Supercomputers (3) PCs (4) Laptops (5) None of these

29. The secret code that restricts entry to some programs
(1) password (2) passport (3) entry-code (4) access-code (5) None of these

30. The basic goal of computer process is to convert data into __
(1) files (2) tables (3) information (4) graphs (5) None of these

31. Where is the disk put in a computer?
(1) In the modem (2) In the hard drive (3) Into the CPU (4) In the disk drive (5) None of these

32. A hard copy of a document is _
(1) printed on the paper (2) stored on a floppy (3) stored on a CD
(4) stored in the hard disk (5) None of these

33. The name that the user gives to a document is referred to as ____
(1) document-name (2) filename (3) name-given (4) document-identity (5) None of these

34. Restarting a computer that is already on is referred to as ____
(1) shutdown (2) cold booting (3) warm booting (4) logging off (5) None of these

35. E-mail (electronic mail) is _
1) an Internet standard that allows users to upload and download files
2) a real-time typed conversation that takes place on a computer
3) an online area in which users conduct written discussions about a particular subject
4) the transmission of messages and files via a computer network
5) None of these

36. The person who writes and tests computer programs is called a _
(1) programmer (2) computer scientist (3) software engineer (4) project developer (5) None of these

37. The information you put into the computer is called ___
(1) facts (2) data (3) files (4) directory (5) None of these

38. The output devices make it possible to _
(1) view or print data (2) store data (3) scan data (4) input date (5) None of these

39. A chat is
1) an Internet standard that allows users to upload and download files
2) a typed conversation that takes place on a computer
3) an online area in which users conduct written discussions about a particular subject
4) the transmission of messages and files via a computer network
5) None of these


40. Hardware includes
(1) all devices used to input data into a computer
(2) sets of instructions that a computer runs or executes
(3) the computer and all the devices connected to it that are used to input and output data
(4) all devices involved in processing information including the central processing unit, memory, and storage
(5) None of these

41. The most common method of entering text and numerical data into a computer system is through the use of a ___
(1) keyboard (2) scanner (3) printer (4) plotter (5) None of these

42. Which of the following groups consists of only input devices?
(1) Mouse, Keyboard, Monitor (2) Mouse, Keyboard, Printer
(3) Mouse, Keyboard, Plotter (4) Mouse, Keyboard, Scanner (5) None of these

43. An example of a telecommunication device is a:
(1) keyboard (2) mouse (3) modem (4) printer (5) scanner

44. Every component of your computer is either ____.
(1) software or CPU/RAM (2) hardware or software
(3) application software or system software
(4) input devices or output devices (5) usable or unusable

45. A ____ is a unique name that you give to a file of information.
(1) folder (2) filename (3) filename extension
(4) device letter (5) username

46. A ____ contains specific rules and words that express the logical steps of an algorithm.
(1) programming language (2) syntax
(3) programming structure (4) logic chart (5) Graphs

47. ____ is the process of finding errors in software code.
(1) Hacking (2) Compiling (3) Testing (4) Running (5) Debugging

48. A ____ is a small hand-held computer that helps you surf the Web and perform simple tasks.
(1) desktop computer (2) mobile phone (3) notebook computer
(4) minicomputer (5) PDA

49. Most application software today comes with an interface called a(n) ____ .
(1) graphical user interface (2) character user interface (3) icon User interface
(4) button user interface (5) voice instruction system

50. A website address is a unique name that identifies a specific ____ on the Web.
(1) Web browser (2) PDA (3) Website (4) link (5) user

ANSWER

01. (1) 02. (2) 03. (2) 04. (3) 05. (2) 06. (2) 07. (2) 08. (2) 09. (1) 10. (3)
11. (1) 12. (3) 13. (3) 14. (2) 15. (2) 16. (2) 17. (4) 18. (4) 19. (4) 20. (4)
21. (4) 22. (2) 23. (3) 24. (3) 25. (1) 26. (3) 27. (2) 28. (4) 29. (1) 30. (3)
31. (4) 32. (1) 33. (2) 34. (3) 35. (4) 36. (3) 37. (2) 38. (1) 39. (2) 40. (3)
41. (1) 42. (4) 43. (3) 44. (2) 45. (2) 46. (1) 47. (3) 48. (E) 49. (1) 50. (3)


Comments

Popular posts from this blog

MS Access Competition Exam Set4

Computer Competition Exam Set 3