question_answer 1) Which of the following statements is correct?
A)
www.google.com is the web site address to a popular search engine
done
clear
B)
www.google.com Is a computer virus
done
clear
C)
www.google.com is an email address to a computer company
done
clear
D)
www.google.com is the name of the person who invented the Internet
done
clear
E)
Other than those given as options
done
clear
View Answer play_arrow
question_answer 2) Which of the following statements is correct?
A)
johndow\[\]yahoo.com is a web site (url)
done
clear
B)
johndow\[\]yahoo.com is an email address
done
clear
C)
johndow\[\]yahoo.com is a computer name
done
clear
D)
johndow\[\]yahoo.com is a robot
done
clear
E)
johndow\[\]yahoo.com is a web builder
done
clear
View Answer play_arrow
question_answer 3) Files have been moved to the Trash Bin, and the trash bin has been emptied. Which of the following is true of the deleted files?
A)
They are no longer accessible
done
clear
B)
They can be selected and changed
done
clear
C)
They appear in light grey shade
done
clear
D)
They can be retrieved, edited, and saved in a new location
done
clear
E)
They cannot be selected but can be changed
done
clear
View Answer play_arrow
question_answer 4) You have a spreadsheet under the name "MathResults". You made changes to it and want to save it while maintaining a copy of the original spreadsheet, what do you do?
A)
Click
the icon
done
clear
B)
Click "Save" in the file menu
done
clear
C)
Click "Save As" in the file menu
done
clear
D)
Used the shortcut CTRL/S
done
clear
E)
Use the shortcut CTRL/V
done
clear
View Answer play_arrow
question_answer 5) What is the full form of PDF?
A)
Portable Document Format
done
clear
B)
Performable Document Format
done
clear
C)
Portable Deformed Format
done
clear
D)
Performable Deformed Format
done
clear
E)
Portable Distributed Format
done
clear
View Answer play_arrow
question_answer 6) ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A)
Operating system
done
clear
B)
Motherboard
done
clear
C)
Platform
done
clear
D)
Application software
done
clear
E)
Cookies
done
clear
View Answer play_arrow
question_answer 7) Servers are computers that provide access to other computers connected to a
A)
Mainframe
done
clear
B)
Supercomputer
done
clear
C)
Network
done
clear
D)
Client
done
clear
E)
Workstation
done
clear
View Answer play_arrow
question_answer 8) A ______ is approximately one billion bytes.
A)
bit
done
clear
B)
kilobyte
done
clear
C)
gigabyte
done
clear
D)
megabyte
done
clear
E)
byte
done
clear
View Answer play_arrow
question_answer 9) URL is an acronym for ________
A)
Uniform Resource Locator
done
clear
B)
Uniform Resource Link
done
clear
C)
Unique Resource Link
done
clear
D)
Unique Resource Locator
done
clear
E)
Universal Resource Location
done
clear
View Answer play_arrow
question_answer 10) All of the following are examples of real security and privacy risks except
A)
Hackers
done
clear
B)
Spam
done
clear
C)
Viruses
done
clear
D)
Identity theft
done
clear
E)
Phishing
done
clear
View Answer play_arrow
question_answer 11) The set of instructions that tells the computer what to do is
A)
Softcopy
done
clear
B)
Software
done
clear
C)
Hardware
done
clear
D)
Hardcopy
done
clear
E)
Softcopy
done
clear
View Answer play_arrow
question_answer 12) The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called
A)
instructions
done
clear
B)
operating system
done
clear
C)
application software
done
clear
D)
system unit
done
clear
E)
part programming
done
clear
View Answer play_arrow
question_answer 13) The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called
A)
simulation
done
clear
B)
animation
done
clear
C)
robotics
done
clear
D)
computer forensics
done
clear
E)
cryptography
done
clear
View Answer play_arrow
question_answer 14) Data that are accumulated and processed in group are called
A)
Group Processing
done
clear
B)
Batch Processing
done
clear
C)
Time Sharing
done
clear
D)
Process Planning
done
clear
E)
Other than those given as Options
done
clear
View Answer play_arrow
question_answer 15) The process of transferring files from a computer on the internet to your computer is called
A)
Uploading
done
clear
B)
Forwarding
done
clear
C)
FTP
done
clear
D)
Downloading
done
clear
E)
Browsing
done
clear
View Answer play_arrow
question_answer 16) 'Bluetooth' technology allows
A)
satellite communication
done
clear
B)
wireless communication between equipments
done
clear
C)
signal transmission on mobile phones only
done
clear
D)
landline phone to mobile phone communication
done
clear
E)
data modification on mobile phones only
done
clear
View Answer play_arrow
question_answer 17) Verification of a login name and password is known as
A)
Configuration
done
clear
B)
Accessibility
done
clear
C)
Authentication
done
clear
D)
Logging In
done
clear
E)
Other than those given as options
done
clear
View Answer play_arrow
question_answer 18) Which of the following is a valid IP address?
A)
192.168.111.1111
done
clear
B)
192.168.1.1
done
clear
C)
192.168.900.1
done
clear
D)
192.900.168.1
done
clear
E)
192.111.111.900
done
clear
View Answer play_arrow
question_answer 19) The basic unit of a worksheet into which you enter data in Excel is called a
A)
cell
done
clear
B)
table
done
clear
C)
box
done
clear
D)
column
done
clear
E)
row
done
clear
View Answer play_arrow
question_answer 20) Disk Operating System (DOS) was designed to work with which of the following input device?
A)
Mouse
done
clear
B)
Keyboard
done
clear
C)
Joystick
done
clear
D)
Xbox
done
clear
E)
Printer
done
clear
View Answer play_arrow