1.What menu is selected to cut, copy, and paste?
(1) File (2) Tools (3) Special (4) Edit (5) None of these
2.The most important or powerful computer in a typical network is
(1) desktop (2) network client (3) network server (4) network station (5) None of these
3.The primary purpose of software is to turn data into
(1) Web sites (2) information (3) programs (4) objects (5) None of these
4. The ability to find an individual item in a file immediately ___ is used.
(1) File allocation table (2) directory (3) sequential access (4) direct access (5) None of these
5. To make a notebook act as a desktop model, the notebook can be connected to a ___ which is connected to a monitor and other devices.
(1) bay (2) docking station (3) port (4) network (5) None of these
6. An example of a telecommunications device is a ____.
(1) keyboard (2) mouse (3) modem (4) printer (5) scanner
10 .How many bits are there in a byte?
(1) 20 (2) 4 (3) 16 (4) 24 (5) 8
Answer
(1) File (2) Tools (3) Special (4) Edit (5) None of these
2.The most important or powerful computer in a typical network is
(1) desktop (2) network client (3) network server (4) network station (5) None of these
3.The primary purpose of software is to turn data into
(1) Web sites (2) information (3) programs (4) objects (5) None of these
4. The ability to find an individual item in a file immediately ___ is used.
(1) File allocation table (2) directory (3) sequential access (4) direct access (5) None of these
5. To make a notebook act as a desktop model, the notebook can be connected to a ___ which is connected to a monitor and other devices.
(1) bay (2) docking station (3) port (4) network (5) None of these
6. An example of a telecommunications device is a ____.
(1) keyboard (2) mouse (3) modem (4) printer (5) scanner
7. Hackers-
(1) all have the same motive (2) is another name of users
(3) many legally break into computers as long as they do not do any damage.
(4) are people who are allergic to computers
(5) break into other people’s computers
(1) all have the same motive (2) is another name of users
(3) many legally break into computers as long as they do not do any damage.
(4) are people who are allergic to computers
(5) break into other people’s computers
8. The ____ manual tells you how to use a software programs.
(1) documentation (2) programming (3) technical (4) user (5) dictionary
(1) documentation (2) programming (3) technical (4) user (5) dictionary
9. Data on a floppy disks is recorded in rings called ____.
(1) sectors (2) ringers (3) rounders (4) tracks (5) segments
(1) sectors (2) ringers (3) rounders (4) tracks (5) segments
10 .How many bits are there in a byte?
(1) 20 (2) 4 (3) 16 (4) 24 (5) 8
Answer
QUE | ANS | QUE | ANS |
1 | 4 | 6 | 3 |
2 | 3 | 7 | 5 |
3 | 2 | 8 | 4 |
4 | 4 | 9 | 4 |
5 | 2 | 10 | 5 |
No comments:
Post a Comment