1. An example of a telecommunications device is a ____.
3. The ____ manual tells you how to use a software programs.
5. How many bits are there in a byte?
6. Most application software today come with an interface called a(n) ____.
(1) keyboard (2) mouse (3) modem (4) printer (5) scanner
2. Hackers-
(1) all have the same motive
(2) is another name of users
(3) many legally break into computers as long as they do not do any damage.
(4) are people who are allergic to computers
(5) break into other people’s computers
3. The ____ manual tells you how to use a software programs.
(1) documentation (2) programming (3) technical (4) user (5) dictionary
4. Data on a floppy disks is recorded in rings called ____.
(1) sectors (2) ringers (3) rounders (4) tracks (5) segments
5. How many bits are there in a byte?
(1) 20 (2) 4 (3) 16 (4) 24 (5) 8
6. Most application software today come with an interface called a(n) ____.
(1) graphical user interface (2) character user interface
(3) icon user interface (4) voice instructions system
(5) button user interface
7. Which type of memory holds only that programs and data that CPU in presently processing?
(1) CMOS (2) ROM (3) RAM (4) ASCII (5) CD
8. A device that copies or reproduces text and images is also called a(n)-
(1) optical scanner (2) bar code reader
(3) character device (4) digital camera
(5) printer
9. Storage that retains its data after the power is tuned off is referred to as-
(1) Volatile storage (2) Sequential storage
(3) Direct storage (4) non-volatile storage
(5) Mobile storage
10. You organize files by storing them in-
(1) archives (2) folders (3) indexes (4) lists (5) None of these
Answer:
Qns. | Ans. | Qns. | Ans. |
1 | 3 | 6 | 1 |
2 | 5 | 7 | 3 |
3 | 4 | 8 | 1 |
4 | 4 | 9 | 4 |
5 | 5 | 10 | 2 |
No comments:
Post a Comment