This document contains a general computer knowledge assessment with two sections:
1) A 20 question multiple choice section testing knowledge of topics like computer hardware, software, operating systems, and digital devices.
2) A 14 question structural question section asking about common computer terms, components, and concepts. Questions cover topics such as operating system capabilities and limitations, computer memory, user interfaces, and input/output devices.
This document contains a general computer knowledge assessment with two sections:
1) A 20 question multiple choice section testing knowledge of topics like computer hardware, software, operating systems, and digital devices.
2) A 14 question structural question section asking about common computer terms, components, and concepts. Questions cover topics such as operating system capabilities and limitations, computer memory, user interfaces, and input/output devices.
This document contains a general computer knowledge assessment with two sections:
1) A 20 question multiple choice section testing knowledge of topics like computer hardware, software, operating systems, and digital devices.
2) A 14 question structural question section asking about common computer terms, components, and concepts. Questions cover topics such as operating system capabilities and limitations, computer memory, user interfaces, and input/output devices.
1. Since viruses are only a form of software, they primarily infect
a) Data b) Hardware c) Peripherals d) Programs 2. Which of the following is used to measure the speed of the processor? a) Unit b) Processing speed c) Clock speed d) Memory 3. bmp extension is used by a) MS-Powerpoint b) MS-Word c) MS-Excel d) Paint 4. Which of the following is a non-volatile memory chip used for storage and for transferring data between a personal computer (PC) and digital devices? a) Flash memory b) RAM c) Cache memory d) Registers 5. Which of the following is not correct? a) Web cache doesn’t has its own disk space b) Web cache can act both like server and client c) Web cache might reduce the response time d) Web cache contains copies of recently requested objects. 6. __________ is not the category of operating system’s task. a) Virus protection b) Processor management c) Memory management d) File management 7. What is also known as service program? (this type of program perform(s) specific tasks related to managing computer resources) a) Operating system b) Language translator c) Utility program d) Device driver 8. “GUI” stands for- a) Graphical Universal Interface b) Graphical User Interface c) Graphical Uninstall/install d) General Utility Interface 9. The first electronic digital computer contained _________? a) Electronic valves b) Neural Networks c) Fuzzy Logic d) Semiconductor memory 10. A set of instructions telling the computer what to do is called- a) Mentor b) Instructor c) Complier d) Program 11. Programs designed specifically to address general purpose applications and special purpose applications are called- a) Operating system b) System software c) Application software d) Management information system 12. __________ are created using computers and, more generally, the representation and manipulation of image data by a computer with help from specialized software and hardware. a) Computer graphics b) CorelDraw c) Photoshop d) All of these 13. Which of the following could be digital input devices for computers? a) Digital camera b) Microphone c) Scanner d) All of the above 14. Which of the following memory chip is faster? a) DRAM b) SRAM c) RAM d) All of these 15. The technique that extends storage capacities of main memory beyond the actual size of the main memory is called _______ a) switching b) virtual storage c) multitasking d) All of these 16. Which of the following memories must be refreshed many times per second? a) Static RAM b) Dynamic RAM c) EPROM 17. ________ is a technique made possible by a special program available on most computer systems. a) Spamming b) Vandalism c) Super zapping d) All of these 18. ______ is a computer program that performs malicious function such as extracting a user’s password or other data or erasing the hard disk a) Super zapping b) Vandalism c) Spamming d) All of these 19. An individual computer in “Botnet” group is known as a ____ computer. a) Zombie b) Computer Worm c) Malicious Spyware d) Rootkit 20. The _______ icon and bold message heading indicating that the e-mail message has not been read. a) Highlighted Envelope b) Closed Envelope c) Opened Envelope d) All of these
Question II: Structural questions (30 Marks)
1. What does download mean? (2marks)
2. What does a graphic card do? (2marks)
3. What is the brain of a computer system? (2marks)
4. What is Microsoft windows? State two examples. (2marks)
5. List two operating system capabilities. (2marks). 6. List two operating system limitations. (2marks) 7. State two characteristics of hard disk drive. (2marks) 8. Differentiate between local area network and cloud computing. (2marks) 9. Which kind of hardware is used the most in the input phase of a computer base information system? (2marks) 10. What is the common measurement of units of a computer? (2marks) 11. What is the component that is used to both read and write data in a computer? (2marks) 12. How many important type of memory are important in a computer? List them. (2marks) 13. What does processing mean. (2marks) 14. How many types of user interface consist in a computer? List and define them. (2marks)
AP PGECET CS and IT (CS-2015) Question Paper & Answer Key. Download All Previous Years Computer Science & Information Technology Sample & Model Question Papers.
Kindle Fire Owner's Manual: The ultimate Kindle Fire guide to getting started, advanced user tips, and finding unlimited free books, videos and apps on Amazon and beyond