You are on page 1of 49

1 What is a computer network?

2 or more computers client and server a group or system interacting with computer game
connected together to of connected things others to share club with 10
share data information computers
2 Which network topology bus ring star WAN LAN
uses a switch?
3 Which network topology bus ring star hierarchical mesh
uses a terminator?
4 What do the first 2 sets of the network the the MAC address of the location of the the identification the individual
number on a IP address computer is on computer computer of client in computer
represent? network
5 How does a Bridge work? increases the speed in sends messages to all connects 2 LAN's sends messages boosts signal
LAN computers in the together to one computer strength
network in the network
6 A device which transfers data Hub Bridge Router Switch Modem
from one network to another
-
7 To avoid data collisions in a Hub Bridge Router Switch Modem
network piece of hardware is
needed?
8 A computer connected to a Cluster Mainframe Peer machine Work station Stand-alone
network is known as a what? machine
9 What device connects Hub Bridge Router Work station Modem
multiple computers together
in a network and allows them
to share data?
10 What type of device is Router Work station Hub Switch Wireless Access
needed to connect to a point
network over Wi-Fi
11 What hardware converts the Router Bridge Modem Switch Wireless Access
digital data from the point
computer into a continuous
analogue waveform
12 What does IP stand for? Intellectual Protocol Internet Password Internet Protocol Individual Intellectual
Password Property
13 A computer network within a WAN LAN INTERNET PAN DAN
small geographical area such
as a home, school and office
building.
14 A computer network within a WAN LAN INTRANET PAN DAN
large geographical area such
as the internet & a phone
company.
15 On a client server network On each workstation On a special data On a standalone On a server On a hub
where are users files and data storage machine
stored?
16 Translates domain names, DHCP FTP TCP/IP OSI DNS
such as enu.kz, into IP
addresses
17 Dynamically assigns IP DHCP FTP TCP/IP OSI DNS
addresses to client stations at
start-up
18 Set of rules for exchanging DHCP FTP TCP/IP OSI DNS
multimedia files on the
World Wide Web
19 A device that would store all Desktop Computer Work station Server Router Computer C Drive
your files on a network. It
might store all your emails as
well.
20 A device, such as a computer, Server Desctop Computer Client Machine Wi-Fi adapter
phone or TV which accesses
a Wi-Fi or wired network?
21 Wi-Fi stands for? Wired Fidelity Wired Frequency Wireless Wireless Fidelit Wireless
Frequency y Formulation
22 Program that initially loaded Kernel APPLICATIONS file manager Operating bios
into the computer by a system
boot program and manages
all the other programs in a
computer.
23 A software program that Kernel APPLICATIONS file manager Operating bios
enables the system
computer hardware to
communicate and operate
with the computer software
24 The first multicore Microsoft HP Control Data Intel Macintosh
processors were produced by Corporation
25 Program that manages data Kernel APPLICATIONS file manager Operating bios
flow between the computer's system
operating system and
attached devices.
26 Essential center of a Kernel APPLICATIONS file manager Operating bios
computer operating system, system
that provides basic services
for all other parts of the
operating system
27 Which program is an windows Explorer Internet Explorer Media Player windows Microsoft office
example of File Management calendar
System?
28 What is NOT an operating File Management Application Registers Built-in Utility Control of
system function? Management management Programs Computer
Hardware
29 What service is not provided Facilities for program Program execution Access to I/O and System access Internet access
by an OS? creation files
30 What type of OS does not Batch OS Multi-Tasking OS Multi-Users OS Single Single User OS
exist? Processing OS
31 Type of OS that allow many Batch OS Multi-Tasking OS Multi-Users OS Single User OS Single Processing
people, located at various OS
terminals, to use a particular
computer system at the same
time?
32 Type of OS that allow only Batch OS Multi-Tasking OS Multi-Users OS Single User OS Single Processing
one user to make use of a PC OS
at any given time.
33 What type of OS is usually Open source OS Closed source OS Free developed OS Single Public OS
developed as a public Processing OS
collaboration and it's source
code is made available for
use or modification as users
or other developers see fit.
34 What does FSF stands for? Fail Source File Free Software Free Source File famous software famous source file
Foundation foundation
35 Type of user interface which CLI GUI FSF DRM GPL
is based on elements such as
dialog boxes, icons, menus,
scroll bars
36 Type of interface where user CLI GUI FSF DRM GPL
provides the input by typing
a command string with the
computer keyboard
37 An integral part of any OS security Protection program process program counter
that allocate resources to management management
processes, protect the
resources of each process
from other processes etc
38 Single-threaded process has security protection program process program counter
one ________specifying management management
location of next instruction to
execute
39 Mechanism for controlling security protection program process program counter
access of processes or users management management
to resources defined by the
OS
40 Defense of the system security protection program process program counter
against internal and external management management
attacks
41 An operating system File manger Task manager program manager process manager program counter
component enables a user to
view each of the tasks
currently running on the
computer, each of the
processes, and the overall
performance of the computer.
42 An operating system File manger Task manager program manager process manager program counter
component that helps a user
to view, edit, copy, and delete
the files on their computer.
43 What helps to learn, earn and MOBILE GAMES MOBILE MOBILE BOOKS ITUNES
have fun in smartphone? APPLICATIONS ACCESSORIES
44 What were the most popular downloading surfing to the internet whatsapp calling and watching videos
functions of phones? applications sending texts
45 When appeared the first to the end of the XX to the beginning of the to the XXI century to the XIX 1921
mobile applications? century XIX century century
46 What are the most popular Windows, symbian symbian Android, mac ios windows mobile Rim, windows
operating system for
smartphones?
47 When and why Nokia came 1970; thanks to 1980; thanks to low 1990; thanks to 2000; thanks to 2010; thanks to
to be known? “Snake” prices improving battares “Tetris” operating system
48 What programming pascal, delphi delphi, javascript flash, 3dmax javascript, flash flash, pascal
languages work web-sites by
the end of the 90s?
49 SDK is typically a set of system development software system description software system
tools that allows to create keys development kit key description key Description Kit
mobile applications. 

What does SDK stand for?
50 How stands the term wireless application wireless application world applications world world wide web
“WAP”? program protocol program application
protocol
51 What is difference between Wap pages are much www pages are much wappageshave www pages are no difference
wap pages and www pages? simplier simplier more content more interesting
52 What is the first proprietary Symbian android mac ios Sun palm os
platform?
53 When joined the ranks IOS 2001 2005 2007 2008 2004
in Apple Iphone?
54 When came the Android? 2001 2005 2007 2008 2004
55 What is advantage of mobile easy to exchange data low prices difficult to serfing uncomfortably uncomfortably to
devices? and information to internet to control exchange data
56 Android based on the … Unix kernel linux kernel os c++ java
57 Which operating system is Windows phone android mac ios symbian sun
replaced Windows mobile
and Zune?
58 When was released publicly april 14, 2015 november 8, 2010 october 11, 2011 march 5, 2008 february 12, 2004
Windows phone7?
59 What was add in Windows google chrome safari internet explorer firefox 7 mozilla 4
phone8? 11
60 Framework to develop symbian Delphi XE Java script visual studio eclipse
mobile applications applications C++
61 Microsoft XNA is based on Windows nt zune windows net framework Linux
the …
62 … -is a freeware set of tools, Microsoft xna zune Windows linux windows nt
that facilitates video game
development
63 Software designed to help System software Application software General purpose Special purpose Off-the-shelf
the user to perform specific application application software
tasks. software software
64 Software designed to operate System software Application software General purpose Special purpose Off-the-shelf
the computer hardware and application application software
to provide a platform for software software
running application software
65 A type of software created to Personal Application Utility software General purpose Special purpose Off-the-shelf
execute one specific task. For Software application application software
example a camera software software
application on your phone
will only allow you to take
and share pictures.
66 A type of application that Personal Application Operating system General purpose Special purpose System software
can be used for a variety of Software application application
tasks. It is not limited to one software software
particular function.
67 A type of application that Personal Application Operating system General purpose Special purpose System software
made for a specific user and Software application application
purpose. software software
68 Example of a general R-Keeper Electronic Military control Media players Web browser
purpose application software Spreadsheets software
is…
69 Example of a special purpose Word processor Electronic R-Keeper Media players Presentation
application software is… Spreadsheets software
70 Type of database where data Relational Database Hierarchical Database Network Database Object-oriented Normal Database
items organized as a set of Database
formally-described tables
from which data can be
accessed or reassembled in
many different ways without
having to reorganize the
database tables.
71 Database where the basic Relational Database Hierarchical Database Network Database Object-oriented Normal Database
data modeling construct is Database
the set construct. This model
was formally defined in the
Conference on Data Systems
Languages (CODASYL)
72 Application which organize Pages (iWork) Microsoft Access Lotus Word Pro Lotus Freelance Corel
related data for easy access Graphics Presentations
73 Application which make it Pages (iWork) Microsoft Access Lotus Word Pro Lotus Freelance Corel
easy to professionally layout, Graphics Presentations
edit, and distribute
documents.
74 An interactive computer Pages (iWork) Corel Paradox Lotus Approach Microsoft Excel Corel
application for organization, Presentations
analysis and storage of data
in tabular form
75 A category of application Lotus Freelance Corel Paradox Lotus Approach Microsoft Excel Microsoft Word
program used to create Graphics
sequences of words and
pictures that tell a story or
help support a speech.
76 Web page which was Simple web page Static web page Dynamic web page Client web page Server web page
developed using HTML and
CSS and delivers information
without any bells and
whistlescalled…
77 A special-purpose HTML XML SQL PHP ASP
programming language
designed for managing data
held in a relational database .
78 One of common sever-side HTML XML SQL PHP Java Script
scripting technologies
79 Find awebsite builder among Cascading Style Sheets HTML Weebly Dreamweaver Turbosite
web development tools
80 National website builder uCoz.kz One.kz Altair.kz Jimdo.kz Turbosite.kz
81 WHO designed two Moore School Charles Babbage John von Neumann John W. J. Presper Eckert
mechanical machines that Mauchly
were capable of performing
calculations in the early
1800’s (the Difference
Engine and the Analytical
Engine)
82 Which of the following is the instructions could the instructions could the basic units are - the basic units stored program
NOT related to Neumann be converted into be placed in memory ALU, control unit, are - ALU, concept
principles? numbers along with the data memory, input and memory, input
output and output
83 Define computer type by the supercomputer minicomputer workstation server mainframe
definition «a powerful,
single-user computer. It is
like a personal computer, but
it has a more powerful
microprocessor and a higher-
quality monitor.»
84 What is NOT a component of Input device Output device Windows OS Processor (CPU) Secondary Storage
a computer system
85 Find FALSE statement about The processor is the PENTIUM, SPARC, CPU consist of CPU can CPU can storage
Central Processing Unit "brain" of the computer INTEL are types of ALU, Control Unit perform different types of
system Processor and Registers calculations and variables
decisions
86 What part of CPU Control Unit Arithmetic Unit Logic Unit Arithmmetic and Registers
coordinates all processing Logic Unit
steps
87 Computer memory divided Registers Bits/Bytes/Words Units/Sections Data types/Data Parts/Blocks
into …. addresses
88 Kilobyte (KB) = 1024 Megabytes 1024 Bytes 1024 Bits 1000 Bits 1000 Bytes
89 Terabyte (TB) = 1024 Megabytes 1024 Bytes 1024 Bits 1000 Bits 1000 Bytes
90 Find FALSE statement about Each computer has a Word size is an Each word within Each word Each word
Main Memory specific word size evenmultiple of a memory can hold within memory within memory
bytes data can hold can hold
program addresses of
instructions memory
locations
91 Each memory cell has a bytes parts numeric address processor server
………, which uniquely
identifies its location
92 Main Memory Very closely connected Contents are difficult Interacts with the all data is stored not contain
Characteristic to the CPU changed processor hundred in memory programs and data
of times per hour permanently that the processor
is actively
working with
93 How many ways the 1 2 3 4 5
processor interacts with the
main memory?
94 Secondary Storage Nothing permanent is Very closely Contents are Used for long- Holds the
Characteristic kept in main memory connected to the CPU quickly and easily term storage of programs and data
changed. programs and that the processor
data is actively
working with
95 Programs instructions are Internal memory RAM Primary storage Main memory Secondary
stored in …….. storage
96 What tell the computer’s Instructions Register Memory Storage RAM
CPU what to do?
97 What is measured by the Mb Gb Kg Hertz Km
clock speed ?
98 One Hertz is … two clock tick per one clock tick per two one clock tick per four clock tick two clock tick per
second second second per second two second
99 Fast memory is …. Cache memory Main memory Secondary memory Register Secondary storage
100 What refers to the hardware? UNIX CPU LINUX MSDOS WINDOWS 95
101 Interaction between users System software Application software Software and Software Hardware
and computers includes … hardware
102 Choice of interface will Special environment Application software Experience of life Special Physical
depend on: application environment and
experience of
users
103 “SAFELY” it means ... Tasks can be Being able to do the To carry out tasks Users should be Repetitive,
completed without right task and do it quickly and able to enjoy complex, simple
risk well correctly what they are
doing, not be
frustrated by the
interface
103 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
does print a command on the Interface Interface Interface Interface
keyboard and execute the
command?
104 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
where the user has a list of Interface Interface Interface Interface
items to choose from, and
can make selections by
highlighting one?
105 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
does use windows, icons, Interface Interface Interface Interface
menus and pointers
106 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
does can range from simple Interface Interface Interface Interface
command systems to voice
activated text processing
107 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
has the following Interface Interface Interface Interface
advantages: Good for
“expert” users - can quickly
access commands?
108 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
has the following Interface Interface Interface Interface
advantages: No need to learn
complex commands/
language?
109 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
has the following Interface Interface Interface Interface
disadvantages: User interface
may be limited by screen
space and number of options
available
110 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
has the following Interface Interface Interface Interface
advantages: Can be quicker
than keyboard entry
111 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
has the following Interface Interface Interface Interface
disadvantages: Artificial
languages are often more
precise
112 Which of the following is the Musical interaction Pen-based Gesture recognition Facial Gaze detection
example of sensor-based HCI interaction expression (eye movement
system interaction? analysis tracking)
113 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
has the following Interface Interface Interface Interface
disadvantages: use more
system resources
114 What application has Graphical application System Natural Language Off-the-shelf Web browser
Command Line Interface? administration software
115 What type of user interface Graphical User Menu Driven Natural Language Command Line System Interface
has the following Interface Interface Interface Interface
advantages: Uses the fewest
system resources
116 “EFFICIENTLY” it means ... Tasks can be completed Being able to do the To carry out tasks Users should be Repetitive,
without risk right task and do it quickly and able to enjoy complex, simple
well correctly what they are
doing, not be
frustrated by the
interface
117 Which of the following is Health and safety factor Uniqueness and System User interface Efficiently to
NOT the factors of HCI? specialty functionality carry out tasks
quickly and
correctly
118 What is meant by Human- The study of how The study of The study of The study of The study of
Computer Interaction (HCI)? people interact with interaction between interaction between how people used repetitive and
compute computer through people through computer for complex
human computer interaction interaction in ICT
field
119 What type of computers do Computer with Intel 200 computers which Supercomputer Turing machine Single computing
NOT belong to high Core I7 microprocessor are working as 1 component with
performance computers? computer two or more
independent actual
processing units
120 The study of the supercomputers minicomputers high performance quantum computer clusters
macrostructure of the large- computing computers
scale distributed computing
systems is a study about …..
121 Fastest high-performance Multi-core Supercomputers Quantum Used to solve Used to solve
systems are typically… computers standard molecular
problems modeling
122 First supercomputer built by 1975 1957 1955 1977 1961
Seymour Cray in Control
Data Corporation (CDC)
in ...
123 WHAT is NOT a feature of Large storage capacity Cryogenic fluids are Windows and Fortran is the More than one
supercomputers? used for cooling MAC OS are the language most CPU necessitated
most commonly preferred for by physical limits
used operating scientific of circuit
systems programming technology
124 What supercomputer was the Cray in 1957 Cray-1 in 1976 Cray X-MP in 1982 Cray X-MP in IBM 7030 (or
first successful 1983 Stretch) in 1961
implementation of vector
processing (can operate on
pairs of lists of numbers)
125 Processor which execute the SIMD MIMD SISD MISD MISD
same instruction on more
than one set of data at the
same time
126 Supercomputers NOT IBM CDC HP Thinking Bytes Computers
produced by machines
127 Supercomputer Deep Blue Gennady Golovkin Gary Kasparov Cray Corporation Gary Garrison Supercomputer
(IBM) in 1997 won in a Gary (Cray)
match with ….
128 Group of computers and quantum computers computer clusters supercomputers multi-core multi-core
servers (connected together) computers processors
that act like a single system
129 Quantum computer is… a machine that a model of multi-core an idea of how to an existing quantum Turing
performs calculations processor calculate using computer based machine
based on the laws of quantum energy on superposition
quantum mechanics and
entanglement
130 On what laws of quantum quantum logic arithmetic and logic superposition and conjunction and conjunction and
mechanics based calculations entanglement disjunction implementation
of quantum computers?
131 Each system with Processor, Computer Cluster Node Point System
Ram, Hard disk and LAN
card in a computer Cluster
called
132 We can increase Storage Processors RAM Network cards Nodes
performanceof Computer
Cluster by adding more
133 Nodes in a computer clusters one by one asynchronously independently parallel only central node
work… works
134 Standard for message passing Message Passing Parallel Virtual MIMD SIMD Beowulf
on computer clusters is Interface Machine
135 Term “core” means a machine that a control unit a processing unit an arithmetic instructions unit
performs calculations unit
136 How multi-core processors run multiple increase time to sending digital decrease number run multiple
increasing overall speed for instructions at the execute one signal to other of operations for digital signals on
programs? same time instruction cores one program one core
137 A processor with 2 cores can multi-core processor many core processor massively multi- single core supercomputer
process instructions double core processor
faster than

Questions A B C D E
1. A worldwide Routing Internet Web hosting Domain names Protocol
collection of computer system
networks that began as
a single network:
2. Set of rules for a Routing Web hosting Domain names Protocol Proxy server
particular type of
communication in
network?
3. Adistributed database INTERNET DNS TCP/IP PROTOCOL ROUTING
that handles the SYSTEM
mapping between host
names and the
numerical
Internetaddresses
4. A computer system WEB HOSTING DNS PROXY SERVER PROTOCOL ROUTING
that acts as SYSTEM
an intermediary for
requests
from clients seeking
resources from other
servers.
5. An Internet standard HTTP FTP TCP/IP SMTP POP3
for electronic mail
(email) transmission –
it is …
6. A network of INTERNET INTRANET APRANET WWW DARPANET
computers that
allowed
communication
between government
agencies and certain
educational centers
created by US
government
7. Which term refers to Protocol stack Protocol stark Protocol star DNS protocol ICP server
software that
implements a
protocol?
8. This may be either a Gateway Interface Destination Metric Genmask
single host, or a
network (in which
case a network mask is
also required)
9. The number of ’hops’ Gateway Interface Destination Metric Genmask
away that the gateway
is from this host
10. The device to which Gateway Interface Destination Metric Genmask
traffic with the defined
destination should be
sent
11. A high-level, dynamic, Javascript CSS DHTML HTML SQL
un typed and
interpreted
programming
language which is
used to developing
websites
12. How many layers of 8 6 4 5 7
OSI model are
classified on the home
page for the network
protocols?
13. That is the protocol HTTP FTP TCP/IP SMTP POP3
used to transmit all
data present on the
World Wide Web. This
includes text,
multimedia and
graphics
14. Organization that need WWW FTP e-mail HTTP TCP/IP
to provide access to
their repositories of
files should use…
15. Language used for HTML SQL CSS DHTML JavaScript
describing the
presentation of a
document written in a
markup language
16. Internet Explorer can POP3 SMTP HTTP IMAP FTP
work on a protocol
17. Protocol – a Organization to Software for The list of available Computer network Rule data
provide access communication via e- servers network
mail
18. The space on a Web Hypertext transfer Domain Names Web hosting Routing Proxy Server
server where you can protocol
upload files
19. Protocol for receiving POP3 FTP SMTP HTTP NNTP
messages from the
mailbox
20. The process by which Routing Web hosting DNS Proxy Server Hypertext
the path, that data markup
takes when travelling language
through a network
from one host to
another, is determined
21. Act of creating a not Data center Local network Cloud computing Cloud Virtualization
actual version of
something, including
operating
systems, storage
devices, and computer
network resources
22. A facility used to Data center Local network Cloud computing Cloud Virtualization
house computer
systems and associated
components
23. An Internet-based Data center Local network Cloud computing Cloud Virtualization
computing that
provides shared
computer processing
resources and data to
computers
24. An on-premise Data center Local network Cloud computing Cloud Virtualization
hardware that stores
data within an
organization's local
network
25. An off-premise form Data center Local network Cloud computing Cloud Virtualization
of computing that
stores data on the
Internet
26. Which is a Disaster Recovery No worries about Internet Dependent Increased Work from
disadvantage of Cloud running out of storage collaboration anywhere
Computing
27. Which services are Compute, Storage, Compute, Community, Compute, E-mail, Storage, Storage, E-
provided by Window Management E-mail Storage Management, Azure- mail,
Azure operating disc Community
system?
28. What is Cloud Corporate data centers Expensive personal Expensive software All of the above
Computing replacing? computer hardware upgrades
29. What is the number Too expensive Security concerns Too many platforms Access ability Internet
one concern about dependent
cloud computing
30. Which one of these is Free Pay Per Use Subscription Ladder Perpetual
NOT a cloud License
computing pricing
model?
31. How many types of 3 Public cloud, Private 3 Local cloud, Global 4 Public cloud, Private 4 Local cloud , 5 Public cloud,
deployment models cloud, Collective cloud, Hybrid cloud cloud, Community Global cloud, Private cloud,
are used in cloud cloud cloud, Hybrid cloud Collective cloud, Community
Hybrid cloud cloud, Local
cloud, Global
cloud
32. Two or more separate Collective cloud Public cloud Private cloud Community cloud Hybrid cloud
cloud services bound
together by proprietary
Tech
33. Where is information Several places Data center Your phone Server Sky
stored on the cloud?
34. Which region is the Europe America Asia Africa Australia
first in the list of cloud
usage?
35. How much space 5Gb 10Gb 15Gb 20Gb limitless
Google gives users as
free?
36. How many users 10 20 50 256 limitless
works together
(maximum number) in
Google Drive?
37. “Cloud” in cloud Wireless Internet Hard drives People Limitless
computing represents
what?
38. What widely used Twitter Skype Gmail YouTube All of the
services is built on above
cloud-computing
technology?
39. What August event Spread of Conficker Gmail outage for Theft of identities over Public cloud Power outages
was widely seen as an virus more than an hour the Internet in the Midwest
example of the risky
nature of cloud
computing
40. Which is not a Cloud Bing Google Drive Drop Box One Drive Icloud
Computing
Application?
41. In computer security, Confidentiality Integrity Availability Authenticity Disclosure
…………………….
means that computer
system assets can be
modified only by
authorized parities.
42. In computer security, Confidentiality Integrity Availability Authenticity Disclosure
……………………..m
eans that the
information in a
computer system only
be accessible for
reading by authorized
parities.
43. Which of the Trap doors Trojan horse Virus Worm Logic bomb
following is
independent malicious
program that need not
any host program?
44. The ……….. is code Trap doors Trojan horse Virus Worm Logic bomb
that recognizes some
special sequence of
input or is triggered by
being run from a
certain user ID of by
unlikely sequence of
events.
45. The …………….. is Trap doors Trojan horse Virus Worm Logic bomb
code embedded in
some legitimate
program that is set to
“explode” when
certain conditions are
met.
46. Which of the Trap doors Trojan horse Virus Worm Logic bomb
following malicious
program do not
replicate
automatically?
47. …………… programs Trap doors Trojan horse Virus Worm Logic bomb
can be used to
accomplish functions
indirectly that an
unauthorized user
could not accomplish
directly.
48. A ………….. is a Trap doors Trojan horse Virus Worm Logic bomb
program that can
infect other programs
by modifying them,
the modification
includes a copy of the
virus program, which
can go on to infect
other programs.
49. Which of the the ability to protect the use of digital data encryption the use of stored using
following does NOT stored information signatures encrypted password asymmetric
use a 'Cryptographical files keys at 'sender'
Technique' to protect and 'receiver'
data? nodes
50. Small text files created Cookies WiFi hot spots GPS coordinates Javascript Internet bot
to track your internet
activity
51. Phishing usually refers Phone Web site E-mail Advertising People
to using what?
52. What is the best way Install a firewall on Install anti-spyware/ Change your passwords Use two-factor All of these
to prevent being your computer adware programs onto often authentication
hacked? your system
53. When was the first 1980 1981 1982 1983 1986
virus created?
54. How fast can a Minutes within Hours within Days within Weeks within Hours without
computer get infected? connecting to the connecting to the connecting to the connecting to the connecting to
internet internet internet internet. the internet
55. What can you do to fix Delete cookies Reset the computer to You can buy a new Start antivirus Destroy the
your infected a secure Backup computer program computer
computer
56. The CIA Triad of Confidentiality Investigation Agency Confirmation All of these
information security
includes which of the
following elements?
57. Which of these is a Hackers Difficult to understand Corporate Regulations Big Data Competition
challenge for the CIA
Triad?
58. An email is sent from malware phishing adware spyware spam
identity thieves to get
you to respond or visit
a fraudulent website.
59. When a user is able to Identification Verification Authentication Authorization Auditing
provide a correct
combination of
username and
password, it is known
as:
60. Resources they are Identification Verification Authentication Authorization Auditing
permitted to access
and what actions they
will be allowed to
perform:
61.__ refers to any type of An executable file Desktop publishing Hypertext Multimedia Database
application or
presentation that
involves more than
one type of media,
such as text, graphics,
video, animation, and
sound.
62.3D computer animation 3D models of objects 3D models, hand hand "keyframed" virtual world, 3D models,
combine and programmed "keyframed" movement, virtual virtualization, virtual world,
movement, world, virtualization programmed virtualization
programmed
63.A process used for Virualization Computing Animation Accounting Coding
generating animated
mages is…
64.Audio may be saved as non-streaming off-streaming off-streaming Windows non-streaming all answers
Windows Media Windows Media Audio and video format Windows Media and are right
Audio format Audio format multimedia format
65.How many symbols 1024 128 512 256 424
can be encoded in
American standard cod
e
for information interch
ange?
66.How many symbols 255 1024 256 2048 65536
can be encoded with
Unicode?
67.Media distribution Film, mouse, pen videotape, videodisc, Sounds, picture, game, discs, server, Sounds,
systems integrate DVD cartoon audiodisk videodisc,
several media sources mouse
68.Most Media Players DivX Wav PackFree Lossless Audio Audio
will play back MP3 Codec
audio, JPEG images,
MPEG-2, ________
and AVI video, and a
variety of other
formats.
69.Multimedia games and Video game genres Computer simulation Simulation Social sciences Web-design
simulations may be
used in a physical
environment with
special effects, with
multiple users in an
online network, or
locally with an offline
computer, game
system, or________.
70.One of the Adaptability Cost Usability Relativity Quality
disadvantages of
multimedia is:
71.The basis for business to to providing value to to assist your to find an adequate to visualize
process visualization is controlling virtualizati every touch point virtualization approach for what a business
… on at an application acceleration layouting process does by taking
level by using graphs into account
roles
72.What advances in Advances in Advances in making Advances in the ability Advances in making Advances in
multimedia were made integrating computers supercomputers to fit more text in a computer program graphics,
in the early 1970's with CDs presentation movies, and
audio
73.What color model RGB HSV CMYK HLS PGB
use red, green and blue
light?
74.What free resources discs, server, internet Blogs, Wikis, friends YouTube, Online RAM, WWW, Online Games,
can you utilize for Games, Video clips internet server
teaching information
literacy?
75.What gives extended Seven base bits 128 additional One additional bit 256 symbols all answers are
ASCII the ability for characters right
extra characters, such
as special symbols,
foreign language
letters, and drawing
characters?
76.What graphical format WMF GIF MP3 BMP WAV
use to store bitmap
images?
77.What is “word length”? Bit depth Bit width Bit length Bit map Bit
78.What is multimedia? Moving images and Integration of still Images and audio Programs that Programs that
text and moving images, combine text and combine text
text, and sounds by images on a and sounds
means of computer television screen
technology
79.What type of images Bitmap graphic Digital graphic Virtual graphic Animation Vector graphic
does use geometrical
formulas?
80.Which of the following GIF WMF TIFF BMP TGA
graphical format
allows compress files
better?
81.When and who did In 2008, Nakamoto In 2005, Turing In 2002, Neumann In 2007, Ershov In 2006, Gates
publish Blockchain
technology?
82.What is a smart the communication or Programs that a continuously evolving an electronic an area of
device? exchange of combine text and group of methods and device, connected to computer
information between images on a television materials, from other devices or science that
two or more screen techniques for networks via emphasizes the
individuals who are in generating energy to different wireless creation of
different locations non-toxic cleaning protocols intelligent
products machines that
work and react
like humans
83.What protocols use NFC, Wi-Fi, HTTP Bluetooth, PHP, Wi- HTTP, Wi-Fi, 3G Bluetooth, NFC, Wi POP3,
smart devices? Fi, 3G -Fi, 3G Bluetooth, PHP
, Wi-Fi
84.How is called a term Green technologies Big data Smart Managing Artificial Data center
for data sets that are so Intelligence
large?
85.What characteristics of Variety, Variability, Volume, Variability, Volume, Variety, Variability, Veracity, Volume,
Big data do you know? Veracity Veracity, Viability Veracity, Simulation Viability Variety,
Variability,
Veracity
86.Which characteristic of Volume Variability Variety Veracity Viability
Big data does help
people who analyze it
to effectively use the
resulting insight?
87.What is a the communication a continuously an electronic device, an area of computer
teleconference? or exchange of evolving group of connected to other science that
information between methods and devices or networks via emphasizes the
two or more materials, from different wireless creation of
individuals who are techniques for protocols intelligent machines
in different locations generating energy to that work and react
non-toxic cleaning like humans
products
88.What does “Green the communication or a continuously an electronic device, an area of computer
technologies” mean? exchange of evolving group of connected to other science that
information between methods and devices or networks via emphasizes the
two or more materials, from different wireless creation of
individuals who are in techniques for protocols intelligent machines
different locations generating energy to that work and react
non-toxic cleaning like humans
products
89.What growing fields Simulation, Sustainability, Source Sustainability, Source Source
include Green Sustainability, Source reduction, Innovation, reduction, Innovation, reduction,
technologies? reduction, Innovation Social sciences Viability Innovation,
Viability,Web-
design
90.Interpretation of Specific Measurable Self-Monitoring Smart Managing of Software
abbreviation Achievable Relevant Analysis and Accessible Relevant Measurable
“SMART”: Time-based Reporting Technology Application
Technology Rsources of
Technologies
91.… is a distributed Artifical Intelligence Conversational DNA Applications SMART Blockchain
database that Interfaces
maintains a
continuously-growing
list
of records called block
s
92.What does Artificial the communication or a continuously an electronic device, an area of
Intelligence mean? exchange of evolving group of connected to other computer science
information between methods and devices or networks via that emphasizes the
two or more materials, from different wireless creation of
individuals who are in techniques for protocols intelligent machines
different locations generating energy to that work and react
non-toxic cleaning like humans
products
93.Why weuse Robots? Manipulation, Web-design Manipulation Smart Managing Addressing
navigation
94.An online event in the Artifical Intelligence Conversational Webinar SMART Blockchain
Internet or a corporate Interfaces
network in which one
or more speakers can
deliver presentations,
training, lessons,
meetings for groups
from several to several
thousand participants
is ?
95.Phishing usually refers Phone Web site E-mail Advertising People
to using what?
96.Two or more separate Collective cloud Public cloud Private cloud Community cloud Hybrid cloud
cloud services bound
together by proprietary
Tech
97.“Cloud” in cloud Wireless Internet Hard drives People Limitless
computing represents
what?
98.What is multimedia? Moving images and Integration of still Images and audio Programs that Programs that
text and moving images, combine text and combine text
text, and sounds by images on a and sounds
means of computer television screen
technology
99.What type of images Bitmap graphic Digital graphic Virtual graphic Animation Vector graphic
does use geometrical
formulas?
100.Which of the GIF WMF TIFF BMP TGA
following graphical
format allows
compress files better?
101.The use of electronic E-learning E-business E- government None of these All of these
communications
devices, computers
and the Internet to
provide public services
to citizens.
102.A learning system E-learning E-business E- government None of these All of these
through computer and
electronic technologies
103.The application of E-learning E-business E- government None of these All of these
information and
communication
technologies in
support of all the
activitiesof entertainm
ent.
104.An item which exists E-learning E-business E- government None of these All of these
only in banking
computer systems and
is not held in any
physical form
105.Which one is NOT a Effective Faster Environmentally Better More informative Lower cost
benefit of e-learning?
106.E-Learning online Book reader Laptop Computer Tablet Smart phone
courses will not work
on which one of the
following?
107.A key disadvantage of reduces learning increases costs for hasn’t got a global requires to travel a won't appeal to
e-Learning is that it … opportunities education reach lot all learning
108.E-business advantages Expanding Global Opening New Markets Improving Operations Growing Local Convenience
do NOT include: Reach & Effectiveness Customer Base
109.What does B2B Businesses Selling Business Purchasing Businesses Selling to Businesses Selling to Business
means Online Online Other Businesses Government Purchasing
Bills
110.Which of the Email Instant Messaging Video or Web Website Design Online
Following is NOT a Conferencing Communicatio
tool for e-Business for n
connecting and
communicating
111.Which of the Identifying Market Managing Customer Database Availability Adhering to Taxation Security and
following is NOT a Segment Trust rules Safety
challenge to E-
Business
112.A business that Paperless Business Pure-Play Android Business Cloud Business Electronic
operates only online is Business
refered to as:
113.A business with both a Paperless Business A dual presence A Hybrid Business A Click-and- Electronic
Physical and an Online business Mortar Business
Stores is called:
114.What does E- Facilities for The ability to gather The facility to securely The facility to The ability to
government provide? dissemination of taxes more efficiently communicate between enlarge commerce pay taxes faster
information and governments and activities
online services at government
local and national departments
levels
115.Who can NOT be a Citizens Local government Employees Administration Central
participation of e- government
government
interaction?
116.Model of e- G2C B2B B2C C2C G2D
government that
currently exist:
117.Model that G2A G2B G2C G2D G2G
approaches such as
setting up websites
where citizens can
download forms,
government
information, etc.
118.A digital certificate is an electronic is a summary of is a reliable third party is used to identify is
message uniquely a plain text document. that authenticates the the owner of a a summary of
identifying the message sender. private key and electronic
message sender. related public key messages and
public keys.
119.The example of E- Consumer goods Education Medical equipment Government All of
service which information the above
enhances original
service is
120.CRM stands for Customer Relationsh Customer Relations Consumer Relationship Consumers Customers
ip Management Management Management Relational Relevant
Management Management
121.A distinctive feature the source code is The source code of The source code of the The source code of the source code
of open source free the programs programs can be sold to the programs sold to is not available
software: available for viewing an unlimited number of a limited number of
and editing users persons
122.Application package - a set of interconnected programs unrelated any programs collected a program designed a set of
is ... software tools for targets among in one location on the to meet the interrelated
different purposes, information carrier challenges of a programs are
gathered into a single certain class not
library
123.Application software, text and image accounting software planning and network shells of expert application
general purpose editors management software systems and artificial development
software intelligence systems tools
124.The types of general purpose information and hardware-specific Object-Oriented global
application packages: (universal) referral networks
125.User Tasks for only the creation of document creation, setting the system adjustment of changes in
solutions, which are documents settlement, parameters peripheral devices modes of
designed application accelerate the peripheral
software: process of learning devices
126.The most famous Prompt Fine Reader Fine Writer Stylus Paint
program of OCR
127.Representatives of the means of access development tools, excel Microsoft power Microsoft word
application software and navigation n-p, Web-based point
WAN: Opera applications
128.Which of the opera alta vista google yandex fast search
following search
engines today is the
world leader in the
number of indexed
documents:
129.Meta-search engines searching for media The most complex a combination of a The most simple requests of
are designed to files queries plurality of key words queries (one or two average
perform: and sentences keywords) complexity
130.Which of the a weak system of no deficiencies is not possible to find an inability to index inability to
following parameter ranking results the files doc documents in look with the
refers to the Google formats other than help of audio
search engine HTML and TXT and video files
shortcomings:
131.Internet servers, file conduct a video to receive e-mail; participate in To obtain from participate in
archives containing, conference; teleconferences; them the necessary chat rooms.
allow ... files;
132.The most common Text Editor; reference systems; Hyperlinks; The search engines; Handbook.
way of finding
information on the
Internet is to use:
133.By searching for obtaining an e-mail the transmission of sorting information; reading fiction; obtain the
information to information; information over long necessary
understand: distances with the help information
of computer systems; through the
observation of
reality, the use
of directories,
files,
information
systems,
computer
networks,
databases and
knowledge
bases, etc.
134.Who is the main Middle management Senior management Owner User Director
responsible for
determining the level
of classification of
information?
135.What is the security Steps to implement General guidelines Step by Step Detailed documents The wide,
policy? safety tasks requirements to Instructions on the treatment of high-level
instructions achieve certain level security incidents statements of
of security management
136.Protection of the collection, storage, the conversion forming the subject of a set of rules activities to
information is: processing, storage, information in which the possibility of access governing the prevent
distribution and the information to information, procedure and the information
retrieval of content becomes including by technical subject of conditions leakage,
information; incomprehensible to means; of access to unauthorized
the subject, do not information and and
have access; media; unintended
effects on it.
137.Information security Human activities; errors in the design of The effects of The self-serving errors in
threats caused by ASIP, its components, objective physical aspirations of personnel
natural: or software processes, or criminals; actions.
development; spontaneous natural
phenomena,
independent of man;
138.Artificial information Human activities; errors in the design The effects of objective The self-serving errors in
security threats caused of ASIP, its physical processes, or aspirations of personnel
by: components, or spontaneous natural criminals; actions.
software phenomena,
development; independent of man;
139.The first means of radio phone; Telegraph; e-mail; computer
distance communications; networks.
communication is
considered to be:
140.The complex of highway; a computer network; the data bus; adapter; interface.
hardware and software
that allow computers
to communicate - is:
1. 
 Database Data and the database The user and the Database application Data integrity in the
The DBMS acts as an interface application and the database application and SQL database tables
between what two components of database
an enterprise-class database
system?
2. An application where only one multiuser database single-user database e-commerce database data mining database MS Access database
user accesses the database at a application application application application management system
given time is an example of a(n)
________
3. An on-line commercial site such multiuser database single-user database e-commerce data mining database MS Access database
as Amazon.com is an example of application application database application management system
a(n) ________ application

4. Which of the following products IDMS Oracle dBase-II R:base MS Access


was the first to implement true
relational algebra in a PC DBMS?
5. Helping people keep track of database table instance relationship data integrity
things is the purpose of a(n)
________
6. A DBMS that combines a DBMS Microsoft's SQL Microsoft's Access IBM's DB2 Oracle Corporation's dBase-II
and an application generator is Server Oracle
________
7. Which of the following is not a tree relational network chain logical
logical data-base structure?
8. After you _____ a record, many Delete Update Sort key Index Add
data management the
environments require you to
issue a command to save the
changes you made.
9. What is the language used by High level language SQL 4GL Query language HTML
most of the DBMSs for helping
their users to access data?
10. Which of the following hardware high-resolution printer high speed, large- plotter mouse
components is the most video display capacity disk
important to the operation of a
database management system?

11. Which two files are used during query language and data manipulation data dictionary and data dictionary and query language and
operation of the DBMS? utilities language and query transaction log query language transaction log
language
12. 
 One-to-one One-to-many Many-to-one Many-to many any relationship
A _____ means that one record relationship relationship relationship relationship
in a particular record type may
be related to more than one
record of another record type.

13. What name is given to the Database Directory Information tree Information provider Flat file
collection of facts, items of information
information or data which are
related in some way?

14. Which of the following registers is Memory Address Memory Data Instruction Register Program Counter ALU
used to keep track of address of Register Register
the memory location where the
next instruction is located?
15. Conversion of an octal number 100002 101112 101102 111102 100102
208 to its binary number is
16. 
 Blaise Pascal Charles Babbage Joseph Jacquard Dr. Herman Hollerith Alan Turing
Who is called the "grand father" of
the computer?

17. Which input device is able to scan Floppy disk Page reader Paper tape punch Optical card readers Optical mouse
& interpret an entire page that is
typed in a special font
18. Which company is the biggest Motorola IBM Intel AMD Apple
player in the microprocessor
industry?

19. A medium for transferring data Network Modem Bus Data Register Communication
between two locations is called channel
20. The OR, XOR & AND functions ALU CU Memory Register Bus
can be performed by _____ of the
computer in a CPU.
21. A prewritten program that's sold System software Package Utilities Program Manager
to perform a common task is
called an application
22. 
 Alphabets Data Characters Letters Words
Locations in the main memory of
a computer are called

23. Which of the following is used as Printer VDU TV Light pen monitor
"Input device" for the computer?
24. Primary storage is _____ as Slow and Fast and Fast and Slow and expensive the same
compared to secondary storage. inexpensive inexpensive expensive
25. 
 Hypertext Hypermedia HyperCard Wildcard Mediatext
What is the term which represents
the use of links between
information of all sorts whether
text, graphics, video oi audio-
based?

26. The two main components of the Control unit and Control unit and Registers and main ALU and bus Registers and bus
CPU is registers ALU memory
27. A device or system not directly On-line Keyboard Memory Off-line ALU
connected to the CPU is
28. The microprocessor of a secondary storage main storage ALU logic unit Accumulator
computer cannot operate on any
information if that information is
not in its.

29. What digits are representative of 0 1 0 and 1 2 1 and 2


all binary numbers?
30. The computer code for the ASCII BCD EBCDIC UniASC ICQ
interchange of information
between terminals is
31. The language that the computer Machine language Application software System program Programming Operating system
can understand and execute is language
called
32. The computer translates the 0 1 +2 -2 1,5
condition of each switch to a
number. What number is
represented by the ON state?
33. A disk with usable recording Hard disk Single-sided disk Double-sided disk High capacity Compact Disk
surfaces on each side is known
as
34. 
 Memory Pool Cache Processor Processor pool Bank
What is a portion of memory that
serves as a temporary repository
for data as it waits for a given
action?

35. From what location are the 1st ROM BIOS CPU boot.ini CONFIG.SYS Control Unit
computer instructions available on
boot up?
36. A hard disk is divided into tracks clusters sectors vectors heads blocks
which are further subdivided into:
37. What's the best way to protect regular backups periodically defrag it run check disk at run scan disk at run a regular
your hard drive data? least once a week least once a week diagnostic
38. Laser Jet printer speeds are lines per inch lines per sheet characters per inch characters per lines per minute
measured in pages per minute second
(ppm) what do we use to measure
dot-matrix printers?

39. Process is program in High contents of main a program in a job in secondary a job in a main
level language kept memory execution memory memory
on disk
40. 
 Security software Utility program Networking software Documentation Task manager
Which of the following systems system
software does the job of merging
the records from two files into
one?

41. 
 is required for all is usually done via is never necessary, allows processes is required for
Interprocess communication processes disk drives to synchronize supervisor
activity processes
42. User-Friendly Systems are: required for object- easy to develop common among becoming more does not exist
oriented traditional common
programming mainframe operating
systems
43. Memory is a device that is the device where is a sequence of is typically is a part of CPU
performs a information is instructions characterized by
sequence of stored interactive
operations specified processing and
by instructions in time-slicing of the
memory. CPU's time to allow
quick response to
each user.
44. What is the name given to the Working system Peripheral system Operating system Controlling system Process
organized collection of software management
that controls the overall operation system
of a computer?

45. The principle of locality of reenterable non reusable virtual memory cache memory referentiable
reference justifies the use of
46. 
 occurs only if the file can always be can be temporarily is a characteristic of is a part of OS
Fragmentation of the file system system is used prevented removed by all file systems
improperly compaction

47. 
 Router Bridge Repeater Modem Terminator


Frames from one LAN can be
transmitted to another LAN via
the device

48. 
 Router Bridge Repeater Modem Terminator


Which of the following is used for
modulation and demodulation?

49. Contention is One or more a continuous the condition when a collection of a connection
conductors that frequency capable two or more interconnected between 2 network
serve as a common of being modulated stations attempt to functional units that devices
connection for a or impressed with a use the same provides a data
related group of second signal channel at the communications
devices same time service among
stations attached to
the network
50. A modem is connected in network computer communication serial port other modem
between a telephone line and a adapter

51. The physical components of a Human ware Firm ware Hardware Software Iron ware
computer system is
52. A device used to bring information ALU Input device Control unit Output device Buses
into a computer is
53. The pieces of equipment which peripherals Input device Control devices Output device disk drive
are attached to the CPU of a
computer and which it can access
are called

You might also like