What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation (correct)
When the pointer is positioned on a _____, it is shaped like a hand.
(A) Grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) Hyperlink (correct)
Personal computers can be connected together to form a-
(A) server
(B) Supercomputer
(C) Network (correct)
(D) Enterprise
(E) None of these
A _____ is the term used when a search engine returns a Web page that matches the search criteria.
(A) Blog
(B) Hit
(C) Link (correct)
(D) View
(E) Success
_____are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words (correct)
(D) Reserved keys
(E) None of these
Mobile Commerce is best described as-
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/ services through wireless hand-held devices (correct)
(D) Using notebook PC's in marketing
(E) None of the above
Which of the following controls the manner of interaction between the user and the operating system?
(A) Language translator
(B) Platform (correct)
(C) User interface
(D) Icon
(E) None of these
You can keep your personal files/folders in
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text (correct)
(E) My Collection
Three types of compact disks include CD-ROM, CD-R, and
(A) CD-W
(B) CD-RAM (correct)
(C) CD-DVD
(D) CD-RW
(E) None of these
All computers must have
(A) A word processing software
(B) An operating system (correct)
(C) An attached printer
(D) A virus checking program
(E) None of these
Collecting personal information and effectively posing as another individual is known as
(A) Spooling
(B) Spoofing(correct)
(C) Hacking
(D) Identity theft
(E) None of these
To change selected text to all capital Letters, click the change case buttons, then click
(A) UPPERCASE (correct)
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
(E) Large Size
A person who used his or her expertise to gain access to other people's computers to get information illegally or to do damage is a
(A) Hacker (correct)
(B) Analyst
(C) Instant messenger
(D) Programmer
(E) Spammer
A device that connects to a network without the use of cables is said to be
(A) Distributed
(B) Free
(C) Centralized
(D) Open Source
(E) None of these (correct)
Reusable optical storage will usually have the acronym
(A) CD
(B) DVD
(C) ROM
(D) RW (correct)
(E) ROS
The most common type of storage devices are:
(A) Persistent
(B) Optical
(C) Magnetic (correct)
(D) Flash
(E) Steel
Codes consisting of lines of varying widths or lengths that are computer-readable are known as
(A) An ASCII code
(B) A magnetic tape
(C) An OCR scanner
(D) A bar code (correct)
(E) None of these
A Website main page is called its
(A) Home Page (correct)
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Part number, part description, and number of parts ordered are examples of
(A) Control
(B) Output
(C) Processing
(D) Feedback
(E) Input (correct)
To access properties of an object, the mouse technique to use is
(A) Dragging
(B) Dropping
(C) Right-clicking (correct)
(D) Shift-clicking
(E) None of these
No comments:
Post a Comment