1. One advantage of dial-up internet access is__________
[A] It utilizes broadband technology
[B] It utilizes existing telephone service
[C] It uses a router for security
[D] Modem speeds are very fast
[E] None of these
(Ans):-B
2. A computer checks the _____of user names and password for a match before granting access.
[A] Website
[B] Network
[C] Backup file
[D] Database
[E] None of these
(Ans):-D
3. Computer that is potable and convenient for users who travel is known as_______
[A] Super computers
[B] Laptops
[C] Mini computers
[D] File server
[E] None of these
(Ans):-B
4. Which of the following is true?
[A] Byte is a single digit in a binary number
[B] Bit represents a grouping of digital numbers
[C] Eight digit binary numbers is called a byte
[D] Eight digit binary numbers is called a bit
[E] None of these
(Ans):-C
5. Office LAN’s that are spread geographically apart on a large scale can be connected using a corporate________
[A] CAN
[B] LAN
[C] DAN
[D] VAN
[E] TAN
(Ans):-D
6. Which process check to ensure the components of the computer are operating and connected properly?
[A] Booting
[B] Processing
[C] Saving
[D] Editing
[E] None of these
(Ans):-A
7. How can the user determine what programs are available on a computer?
[A] Checking the hard disk properties
[B] Viewing the installed programs during the booting process
[C] Checking the operating system for a list of installed programs
[D] Checking the existing files saved on the disk
[E] None of these
(Ans):-D
8. In Dos, the ‘’Label’’ command is used to
[A] Display the label of disk
[B] Change the label of disk
[C] Remove the label of disk
[D] Both 1 and 2
[E] None of these
(Ans):-D
9. The subsystem of the kernel and hardware that virtual to physical addresses comprises.
[A] Process management sub-system
[B] Memory management sub-system
[C] Input/output management sub-system
[D] All the above
[E] None of these
(Ans):-B
10. Which of the following computer language is a mathematically oriented languages used for scientific problems?
[A] FORTRAN
[B] LISP
[C] COBOL
[D] APPLE
[E] None of these
(Ans):-A
11. Which of the following types of table’s constraints will prevent the entry of duplicate rows?
[A] Primary key
[B] Unique
[C] Null
[D] Foreign key
[E] None of these
(Ans):-A
12. The sharing of a medium and its path by 21 or more devices is called
[A] Modulation
[B] Encoding
[C] Line discipline
[D] Multiplexing
[E] None of these
(Ans):-D
13. Which multiplexing technique transmits along signals?
[A] FDM
[B] Synchronous TDM
[C] Asynchronous TDM
[D] Both 2 and 3
[E] None of these
(Ans):-A
14. How many values can be represented by a single byte?
[A] 4
[B] 16
[C] 64
[D] 256
[E] 512
(Ans):-D
15. Which of the following refers to a small, single-site network?
[A] LAN
[B] DSL
[C] RAM
[D] USB
[E] CPU
(Ans):-A
16. Microsoft office is
[A] Shareware
[B] Public-domain software
[C] Open-source software
[D] A vertical market application
[E] An application suite
(Ans):-E
17. Information travels between components on the mother board through
[A] Flash memory
[B] CMOS
[C] Bays
[D] Buses
[E] Peripherals
(Ans):-5
16. How are data organized in a spreadsheet?
[A] Lines and spaces
[B] Layers and planes
[C] Height and width
[D] Rows and columns
[E] None of these
(Ans):-D
17. The blinking symbol on the computer screen is called the
[A] Mouse
[B] Logo
[C] Hand
[D] Palm
[E] Cursor
(Ans):-E
18. Application software
[A] is used to control operating system
[B] is designed to help programmers
[C] Performs specific task for computer users
[D] is used for making design only
[E] All the above
(Ans):-C
19. The person contributing the idea of the stored program was
[A] John Neumann
[B] Charles Babbage
[C] Howard Aiken
[D] Daniel Thomas
[E] Dennis Ritenie
(Ans):-A
20.The speed at which the monitor accepts data is called
[A] Bandwidth
[B] Interlacing
[C] Response time
[D] Scanning
[E] Maximum speed
(Ans):-A