Computer Competition Exam Set 2
SET - 2
1. The first computers were programmed using
(1) assembly language (2) machine language (3) source code (4) object code (5) spaghetti code
2. You organize files by storing them in _
(1) archives (2) folders (3) indexes (4) lists (5) None of these
3. In order to create columnar data in Word you need to _
1) Tab consecutively until your cursor reaches the desired place
2) Set tabs or use the Table menu
3) You need to use Excel
4) Press the space bar untill cursor reaches the desired place
5) None of these
4. How many different documents can you have open at any one time?
1. No more than three
2. Only one
3. As many as your computers memory will hold
4. No more than you Taskbar can display
5. None of these
5. Hackers _
1. all have the same motive
2. break into other people’s computers
3. may legally break into computers as long as they do not do any damage
4. are people who are allergic to computers
5. None of these
6. In page preview mode _
1) You can see all pages of your document
2) You can only see the page you are currently working
3) You can only see pages that do not contain graphics
4) You can only see the title page of your document
5) None of these
7. What type of computers are client computers (most of the time) in a client-server system?
(1) Mainframe (2) Mini-computer (3) Microcomputer (4) PDA (5) None of these
8. What is the full form of ‘GUI’ ?
(1) Gnutella Universal Interface (2) Graphical User Interface
(3) Graphic Uninstall/Install (4) General Utility Interface (5) None of these
9. Junk e-mail is also called
(1) spam (2) spoof (3) sniffer script (4) spool (5) None of these
10. A word in a web page that, when clicked, opens another document
(1) anchor (2) URL (3) hyperlink (4) reference (5) None of these
11. Which of the following referes to a small, single-site network?
(1) LAN (2) DSL (3) RAM (4) USB (5) CPU
12. Which keystroke will take you at the beginning or the end of a long document?
(1) Ctrl + PageUP and Ctrl + PageDown (2) Shift + Home and Shift + End
(3) Ctrl + Home and Ctrl + End
(4) The only way is by using the right scroll ball (5) None of these
13. In Word you can force a page break _
1) By positioning your cursor or at he appropriate place and pressing the Fl Key
2) By using the Insert/Section Break
3) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
4) By changing the font size of your document
5) None of these
14. When you want to move some text from one page to a different page, the best method is _
(1) drag and drop (2) Cut and paste (3) delete and replace
(4) find and replace (5) None of these
15. To view information on the web you must have a __
(1) cable modem (2) web browser (3) Domain Name Server
(4) hypertext viewer (5) None of these
16. How many margins are on a page ?
(1) Two (header and footer) (2) Four (top, bottom, right, left)
(3) Two (landscape and Portrait) (4) Two (top and bottom) (5) None of these
17. Which key is used in combination with another key to perform a specific task?
(1) function (2) arrow (3) space bar (4) control (5) None of these
18. What is an embedded system?
1) A program that comes wrapped in a box
2) A program that is permanently part of computer
3) A computer that is part of a larger computer
4) A computer and software system that controls a machine or appliance
5) None of these
19. Text in a column is generally aligned
(1) justified (2) right (3) center (4) left (5) None of these
20. A directory within a directory is called
(1) Mini Directory (2) Junior Directory (3) Part Directory
(4) Sub Directory (5) None of these
21. Why should you delete unknown e-mail attachments?
1) You could go to jail
2) the person could track you down and hurt you
3) it is bad manners
4) it mights contains a virus that could hurt your computer
5) None of these
22. Of the five words listed below, which one does not belong to the group ?
(1) Applications (2) Peripherals (3) Programs (4) Software (5) Commands
23. Selecting the Zoom command ____
1) opens a copy of the document in a different view
2) prints a copy of the displayed document
3) changes the magnification of the displayed document
4) saves a copy of the displayed document
5) None of these
24. Name the hardware equipment that a computer is made up of _
1) monitor, the central processing unit (CPU) , me keyboard, mouse, software and network
2) monitor, the central processing unit (CPU) , the keyboard, mouse, programs and network
3) monitor, the central processing unit (CPU) , the keyboard, mouse, printer and modem
4) monitor, the central processing unit (CPU) , the keyboard, mouse, applications and network
5) None of these
25. Where are programs and data kept while the processor is using them?
(1) Main Memory (2) Secondary memory (3) Disk memory
(4) Program memory (5) None of these
26. The name of the computer’s brain is
(1) monitor (2) hardware (3) CPU (4) byte (5) None of these
27. A(n) ____ is a device that electronically processes data, converting it to information.
(1) algorithm (2) computer (3) software (4) program (5) None of these
28. Which of the following are computers that can be carried around easily?
(1) Minicomputers (2) Supercomputers (3) PCs (4) Laptops (5) None of these
29. The secret code that restricts entry to some programs
(1) password (2) passport (3) entry-code (4) access-code (5) None of these
30. The basic goal of computer process is to convert data into __
(1) files (2) tables (3) information (4) graphs (5) None of these
31. Where is the disk put in a computer?
(1) In the modem (2) In the hard drive (3) Into the CPU (4) In the disk drive (5) None of these
32. A hard copy of a document is _
(1) printed on the paper (2) stored on a floppy (3) stored on a CD
(4) stored in the hard disk (5) None of these
33. The name that the user gives to a document is referred to as ____
(1) document-name (2) filename (3) name-given (4) document-identity (5) None of these
34. Restarting a computer that is already on is referred to as ____
(1) shutdown (2) cold booting (3) warm booting (4) logging off (5) None of these
35. E-mail (electronic mail) is _
1) an Internet standard that allows users to upload and download files
2) a real-time typed conversation that takes place on a computer
3) an online area in which users conduct written discussions about a particular subject
4) the transmission of messages and files via a computer network
5) None of these
36. The person who writes and tests computer programs is called a _
(1) programmer (2) computer scientist (3) software engineer (4) project developer (5) None of these
37. The information you put into the computer is called ___
(1) facts (2) data (3) files (4) directory (5) None of these
38. The output devices make it possible to _
(1) view or print data (2) store data (3) scan data (4) input date (5) None of these
39. A chat is
1) an Internet standard that allows users to upload and download files
2) a typed conversation that takes place on a computer
3) an online area in which users conduct written discussions about a particular subject
4) the transmission of messages and files via a computer network
5) None of these
40. Hardware includes
(1) all devices used to input data into a computer
(2) sets of instructions that a computer runs or executes
(3) the computer and all the devices connected to it that are used to input and output data
(4) all devices involved in processing information including the central processing unit, memory, and storage
(5) None of these
41. The most common method of entering text and numerical data into a computer system is through the use of a ___
(1) keyboard (2) scanner (3) printer (4) plotter (5) None of these
42. Which of the following groups consists of only input devices?
(1) Mouse, Keyboard, Monitor (2) Mouse, Keyboard, Printer
(3) Mouse, Keyboard, Plotter (4) Mouse, Keyboard, Scanner (5) None of these
43. An example of a telecommunication device is a:
(1) keyboard (2) mouse (3) modem (4) printer (5) scanner
44. Every component of your computer is either ____.
(1) software or CPU/RAM (2) hardware or software
(3) application software or system software
(4) input devices or output devices (5) usable or unusable
45. A ____ is a unique name that you give to a file of information.
(1) folder (2) filename (3) filename extension
(4) device letter (5) username
46. A ____ contains specific rules and words that express the logical steps of an algorithm.
(1) programming language (2) syntax
(3) programming structure (4) logic chart (5) Graphs
47. ____ is the process of finding errors in software code.
(1) Hacking (2) Compiling (3) Testing (4) Running (5) Debugging
48. A ____ is a small hand-held computer that helps you surf the Web and perform simple tasks.
(1) desktop computer (2) mobile phone (3) notebook computer
(4) minicomputer (5) PDA
49. Most application software today comes with an interface called a(n) ____ .
(1) graphical user interface (2) character user interface (3) icon User interface
(4) button user interface (5) voice instruction system
50. A website address is a unique name that identifies a specific ____ on the Web.
(1) Web browser (2) PDA (3) Website (4) link (5) user
ANSWER
01. (1) 02. (2) 03. (2) 04. (3) 05. (2) 06. (2) 07. (2) 08. (2) 09. (1) 10. (3)
11. (1) 12. (3) 13. (3) 14. (2) 15. (2) 16. (2) 17. (4) 18. (4) 19. (4) 20. (4)
21. (4) 22. (2) 23. (3) 24. (3) 25. (1) 26. (3) 27. (2) 28. (4) 29. (1) 30. (3)
31. (4) 32. (1) 33. (2) 34. (3) 35. (4) 36. (3) 37. (2) 38. (1) 39. (2) 40. (3)
41. (1) 42. (4) 43. (3) 44. (2) 45. (2) 46. (1) 47. (3) 48. (E) 49. (1) 50. (3)
Comments
Post a Comment