Professional Documents
Culture Documents
2. The most commonly used input device 10. “This method is called wireless.” It
is …. means ….
a. keyboard a. with wire
b. webcam b. without cable
c. joystick c. with cable
d. Mouse d. lack of wire
3. A house size computer is … computer. 11. The two major software are ….
a. the second generation a. application and system software
b. the first generation b. application and instructional
c. the new generation software
d. the third generation c. system software and command
d. application software and processor
4. This is a picture of ….
a. transistor 12. The term software was first used by …
b. VLSI in 1958.
c. vacuum tube a. John W. Turkey
d. IC b. John W. Tukey
c. John M. Tukey
5. Information can be stores in a storing d. Jack W. Tukey
device such as ….
a. CD-ROM (optical disk) 13. An open source software means it is
b. track ball ….
c. monitor a. freely modified
d. printer b. freely used
c. prominent
6. CPU stands for …. d. freely redistributed
a. Central Processed Unit
b. Central Processing Unit 14. These are types of operating system
c. Center Processing Unit available to users, except ….
d. Central Processor Unit a. Windows
b. GUIs
7. In Apple computer, motherboard is c. Mac OS
called …. d. Linux
a. planar board
b. baseboard 15. Word processor such as Microsoft
c. logic board Word 2007 and Open Office Writer are
d. system board examples of ….
a. system software
8. Companies that produce processor are b. application software
Intel, IBM, and …. c. office application
a. AMD d. OS
b. NIC 16. In programming process, the first step
c. ADM is ….
d. MAD a. compilation
b. debugging
c. writing a code a. virus generator
d. binary file b. virus instructor
c. virus copier
17. The physical devices in a computer are d. virus emulator
….
a. tools 25. … actually spreads through a network
b. hardware or the Internet using email.
c. software a. worm
d. none of the above b. Time Bomb
c. Trojan Horse
18. A programmer must compile the source d. Virus
code by using ….
a. compiler 26. Which is an example of a pointing
b. transformer device?
c. collector a. joystick
d. Bugger b. scanner
c. trackball
19. Acts of finding and fixing error code d. Webcam
in all of the source code is called ….
a. debugging 27. AZERTY keyboard layout is used in
b. compiler ….
c. bugging a. France
d. Decoding b. both a and b
c. Belgium
20. The following is a programming d. All Europe
language from Sun Microsystems.
a. Pascal 28. Computer speakers are commonly
b. JAVA equipped with a low-power …
c. BASIC amplifier.
d. Borland a. internal
b. visual
21. One of these is not a malware. c. external
a. worm d. internal & external
b. Logic bomb
c. Trojan Horse 29. The trackball was invented by ….
d. Win Vista a. Tom Cruise
b. Tom Dooley
22. All of them can be identified by their c. Tom Cranston
…. d. Tom Longstaff
a. replication
b. identification 30. Visual Display Unit is another term for
c. multiplication ….
d. none of the above a. printer
b. monitor
23. By its way to infect other file, virus c. scanner
can be divided into … categories. d. television
a. one
b. three 31. A NIC, …, and a hub are needed to
c. two create a basic network.
d. Four a. repeaters
b. socket
24. The simplest and easiest way in c. modulator
creating virus is by using a tool called d. Jack
….
32. The network allows computers to … 40. This document can be used as a media
with each other. in steganography, except ….
a. commune a. text file
b. coordinate b. mp3 or video file
c. collaborate c. picture file
d. Communicate d. none of the above
33. NIC can be identified easily. It has a 41. Nazi used a machine called … to
special port called …. encrypt and decrypt the messages.
a. AJ-45 a. Sigma
b. RJ-54 b. Enigma
c. RJ-45 c. Encarta
d. AJ-54 d. all false
49. The Netiquette number 4 states that 57. Search engines powered by robots
“You shall not use a computer to ….” are called ….
a. steal a. creepy crawlers
b. hack b. aunts
c. break c. bugs
d. Deal d. Spiders
50. Recreational newsgroups start with …. 58. At present there are still text-based
a. alt browsers like ….
b. rec
a. Lynx
c. soc
d. Sci b. spynx
c. sync
51. The conventional mail is called …. d. none of the above
a. email
b. snake mail 59. The following are search engines,
c. snail mail except ….
d. Blackmail a. Win Vista
b. MSN
52. An email message made up of …. c. Google
a. server d. Excite
b. header
c. message body
d. Signature 60. What does URL stand for?
a. Uniform Resource Location
53. Commercial offers sent to our email b. United Resource Local
without our request is called …. c. United Resource Locator
a. phishing d. Uniform Resource Locator
b. spam
c. worm
d. Bomb