You are on page 1of 4

1. Nowadays computer is used for the 9.

The Speed of a modem is measured by


following purposes, except …. ….
a. multimedia   a.  MHz
b. scientific processing b. kbps               
c. data processing            c. GHz                                
d. none of the above d. All false

2. The most commonly used input device 10. “This method is called wireless.” It
is …. means ….
a. keyboard                                  a. with wire
b. webcam   b. without cable       
c. joystick                                      c. with cable                   
d. Mouse d. lack of wire

3. A house size computer is … computer. 11. The two major software are ….
a. the second generation a. application and system software
b. the first generation b. application and instructional
c. the new generation software
d. the third generation c. system software and command
d. application software and processor
4. This is a picture of …. 
a. transistor 12. The term software was first used by …
b. VLSI          in 1958.
c. vacuum tube                         a. John W. Turkey
d. IC b. John W. Tukey    
c. John M. Tukey                   
5. Information can be stores in a storing d. Jack W. Tukey
device such as ….
a. CD-ROM (optical disk)              13. An open source software means it is
b. track ball                   ….
c. monitor                                       a. freely modified                             
d. printer  b. freely used            
c. prominent                        
6. CPU stands for …. d. freely redistributed
a. Central Processed Unit
b. Central Processing Unit 14. These are types of operating system
c. Center Processing Unit available to users, except ….
d. Central Processor Unit a. Windows
b. GUIs     
7. In Apple computer, motherboard  is c. Mac OS                                           
called …. d. Linux
a. planar board                                
b. baseboard       15. Word processor such as Microsoft
c. logic board                             Word 2007 and Open Office Writer are
d. system board examples of ….
a. system software        
8. Companies that produce processor are b. application software
Intel, IBM, and …. c. office application
a. AMD d. OS
b. NIC                16. In programming process, the first step
c. ADM                                      is ….
d. MAD a. compilation                   
b. debugging       
c. writing a code                 a. virus generator   
d. binary file b. virus instructor           
c. virus copier                 
17. The physical devices in a computer are d. virus emulator
….
a. tools 25. … actually spreads through a network
b. hardware      or the Internet using email.
c. software                  a. worm  
d. none of the above b. Time Bomb             
c. Trojan Horse                        
18. A programmer must compile the source d. Virus
code by using ….
a. compiler    26. Which is an example of a pointing
b. transformer        device?
c. collector              a. joystick                                            
d. Bugger b. scanner                  
c. trackball                        
19. Acts of finding and fixing error code d. Webcam
in all of the source code is called ….
a. debugging      27. AZERTY keyboard layout is used in
b. compiler             ….
c. bugging                             a. France
d. Decoding b. both a and b   
c. Belgium              
20. The following is a programming d. All Europe
language from Sun Microsystems.
a. Pascal 28. Computer speakers are commonly
b. JAVA             equipped with a low-power …
c. BASIC                    amplifier.
d. Borland  a. internal    
b. visual                              
21. One of these is not a malware. c. external                 
a. worm d. internal & external
b. Logic bomb        
c. Trojan Horse                          29. The trackball was invented by ….
d. Win Vista a. Tom Cruise                     
b. Tom Dooley         
22. All of them can be identified by their c. Tom Cranston         
…. d. Tom Longstaff
a. replication
b. identification          30. Visual Display Unit is another term for
c. multiplication                      ….
d. none of the above a. printer
b. monitor                
23. By its way to infect other file, virus c. scanner                         
can be divided into … categories. d. television 
a. one
b. three                  31. A NIC, …, and a hub are needed to
c. two                                               create a basic network.
d. Four a. repeaters
b. socket                     
24. The simplest and easiest way in c. modulator                        
creating virus is by using a tool called d. Jack
….
32. The network allows computers to … 40. This document can be used as a media
with each other. in steganography, except ….
a. commune a. text file
b. coordinate       b. mp3 or video file      
c. collaborate               c. picture file  
d. Communicate d. none of the above

33. NIC can be identified easily. It has a 41. Nazi used a machine called … to
special port called …. encrypt and decrypt the messages.
a. AJ-45                                               a. Sigma
b. RJ-54                      b. Enigma                    
c. RJ-45                            c. Encarta                       
d. AJ-54 d. all false

34. Another term for NIC is …. 42. A cryptographer is … who is master in


a. repeaters cryptography.
b. network adapter     a.  Something                    
c. adapter     b.  anything                            
d. Modem c. someone                 
d. Anyone
35. What does ARPA stand for?
a. Advance Research Projects Agency 43. “Graphy” is a Greek word means….
b. Advance Research Projects Affair a. spoken
c. Advanced Research Projects Agency b. written                     
d. Advanced Research Projects Affair c. uttered                      
d. Hidden
36. Steganography is the art and science of
writing … messages. 44. Cryptography is needed to … a secret
a. readable document.
b. hidden                 a. secure  
c. computer                            b. keep                      
d. Picture c. save                          
d. Run
37. Another secret coding technique
besides steganography is …. 45. A secret text resulting from encryption
a. cryptonite process is called ….
b. cryptography           a. plain text
c. cryptic                      b. cyber text                   
d. Steganalyst c. code text                  
d. cipher text
38. Steganography comes from …
language. 46. This component application allows
a. Greek               people connected over the Internet to
b. Latin               participate in discussions.
c. Greece                                   a. Telnet                                              
d. French b. FTP                    
c. IRC                               
39. Writing a hidden message can use an d. EDI
… ink.
a. invincible                                         47. This website is owned by a nonprofit
b. inevitable                      institution.
c. invisible                  a. http://www.cars.com
d. indispensable       b. http://www.car.org
c. http://www.carmagazine.co.uk 56. The first actual Web search engine
d. http://www.carzone.ie was developed by Matthew Gray in
1993 and was called ….
48. This website is a government agency. a. spandex
a. ocw.mit.edu b. wandex                      
b. http://www.language-learning.net c. wantex                    
c. training.fema.gov
d. Windex
d. http://www.carecourses.com

49. The Netiquette number 4 states that 57. Search engines powered by robots
“You shall not use a computer to ….” are called ….
a. steal     a. creepy crawlers
b. hack                   b. aunts                               
c. break                c. bugs                
d. Deal d. Spiders

50. Recreational newsgroups start with …. 58. At present there are still text-based
a. alt browsers like ….
b. rec                        
a. Lynx 
c. soc                            
d. Sci b. spynx                        
c. sync                      
51. The conventional mail is called …. d. none of the above
a. email                                
b. snake mail                59. The following are search engines,
c. snail mail       except ….
d. Blackmail a. Win Vista      
b. MSN                        
52. An email message made up of …. c. Google                        
a. server   d. Excite
b. header                         
c. message body                  
d. Signature 60. What does URL stand for?
a. Uniform Resource Location
53. Commercial offers sent to our email b. United Resource Local
without our request is called …. c. United Resource Locator
a. phishing d. Uniform Resource Locator
b. spam                           
c. worm                  
d. Bomb

54. In message header, “To” is for the ….


a. recipient’s address   
b. sender’s address             
c. topic           
d. Time

55. It uses e-mail to duplicate themselves


into vulnerable computers.
a. email bomb
b. phishing              
c. spam                           
d. email worm

You might also like