1. A__________ typically identifies the type of file.
(A). Folder
(B). Path
(C). File Extension
(D). File Name
Right Answer: C
2. A device that copies or reproduces text and images is called a/an
(A). CPU
(B). Reader
(C). Memory
(D). Obtainer
Right Answer: E
3. Which menu should be selected to perform Cut and Paste in word
(A). Format menu
(B). Tools menu
(C). View menu
(D). Edit menu
Right Answer: D
4. In a spreadsheet, the point at which a column and a row intersect is called a ________
(A). Col-row
(B). Container
(C). Box
(D). Grid
Right Answer: E
5. Instruction or programs for controlling the computer are called
(A). Software
(B). Hardware
(C). Humanware
(D). Programmer
Right Answer: A
6. Which of the following would most likely NOT be a symptom of a virus?
(A). Existing program files and icons disappear.
(B). The CD-ROM stops functioning.
(C). The Web browser opens to an unusual home page.
(D). Odd messages or images are displayed on the screen.
Right Answer: B
7. Verification of a login name and password is known as:
(A). configuration
(B). accessibility
(C). authentication
(D). logging in
Right Answer: C
8. Which of the following statements is FALSE concerning file names?
(A). Files may share the same name or the same extension but not both
(B). Every file in the same folder must have a unique name
(C). File extension is another name for file type
(D). The file extension comes before the dot (.) followed by the file name
Right Answer: D
9. ____________ are lists of commands that appear on the screen.
(A). GUIs
(B). Icons
(C). Menus
(D). Windows
Right Answer: C
10. The internet is ......
(A). a large network of networks
(B). an internal communication system for a business
(C). a communication system for the Indian government
(D). All of these
Right Answer: D
11. Which of the following places the common data elements in order from smallest to largest
(A). character, file, record, field, database
(B). character, record, field, database, file
(C). character, field, record, file, database
(D). Bit, byte, character, record, field, file, database,
Right Answer: C
12. What is a backup?
(A). Restoring the information backup
(B). An exact copy of a system's information
(C). The ability to get a system up and running in the event of a system crash or failure
(D). All of these
Right Answer: D
13. Linux is a (n) ____________ operating system.
(A). open-source
(B). Microsoft
(C). Windows
(D). Mac
Right Answer: A
14. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A). Boot-sector viruses
(B). Macro viruses
(C). Time bombs
(D). Worms
Right Answer: C
15. _________ is the process of finding errors in software code.
(A). Debugging
(B). Compiling
(C). Testing
(D). Running
Right Answer: C
16. Making a field ______ meAns : that it cannot be left blank.
(A). numeric
(B). required
(C). calculated
(D). validated
Right Answer: B
17. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A). spyware
(B). adware
(C). spam
(D). malware
Right Answer: D
18. Which of the following is NOT a type of broadband Internet connection?
(A). Cable
(B). DSL
(C). Dial-up
(D). Satellite
Right Answer: C
19. The _____ manual tells you how to use a software program.
(A). documentation
(B). programming
(C). technical
(D). user
Right Answer: A
20. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A). command - based user interface
(B). GUI
(C). system utility
(D). API
Right Answer: B