Professional Documents
Culture Documents
B. hertz
C. bits
D. none of the above
2. The backup technique where users copy only the files that have changed since the last full or
incremental backup is known as __________.
A. Selective backup
B. Incremental backup
C. Differential backup
D. Continuous data protection (CDP)
3. ___________ mode saves any open documents running programs or apps to memory, turns off all
unneeded functions, and then places the computer in a low-power state.
A. Sleep
B. Hibernate
C. Restart
D. Booting
4. A (n) ________ is a program designed by a computer programmer (malicious hacker) to do a certain
unwanted function.
A. Worm
B. Virus
C. Trojan Horse
D. Rootkit
5. A(n) _________ is a single chip with two or more separate processor cores.
A. Multitasking processor
B. Multicore processor
C. Multiuser processor
D. Multiprocessor core
6. All these are functions of operating systems except _______.
A. provide a user interface
B. manage programs
C. data input
D. schedule jobs
7. Green computing involves reducing the electricity consumed and environmental waste generated when
using a computer. Which of the following is not a strategy for green computing?
A. Recycling
B. Regulating manufacturing processes
C. Invest more into industrialization
D. Immediately donating or properly disposing of replaced computers
8.Which of the following is not example of an Operating System?
A. MS DOS
B. MS Windows
C. Android
D. Photoshop
9. Which of the following is not a Business Software?
A. Word Processing
B. Spreadsheet
C. Presentation
D. Personal Finance
10. One million bytes represent a __________
A. Megabyte
B. Gigabyte
C. Kilobyte
D. Terabyte
11. Which of these systems is not an example of a Data Processing (DP) system?
A. Automated Teller Machines (ATM)
B. Credit Sales terminal
C. Systems Software
D. Airline Reservation Systems
12. With _________, each department has its own set of files.
A. Database
B. File processing system
C. Transaction processing system
D. uploading
13. Web publishing is the development and maintenance of Web pages. The process of showing your
website to the world is termed as __________________.
A. Planning the website
B. Creating the website
C. Deploying the website
D. Maintaining the website
14. The use of computer workstations to send and receive messages is known as
A. electronic funds transfer
B. electronic message switching
C. electronic mail
D. electronic publishing
15. The jargon for navigating on the Internet is called _________
A. clicking
B. selecting
C. surfing
D. analyzing
16. __________ is end user software that is used to accomplish a variety of tasks.
A. Operating System
B. System Software
C. Utility Program
D. Application software
17. Which of the following is used to guarantee whether a user of a website is legitimate?
A. Digital signature
B. Encryption
C. Digital certificate
D. Secure site
18. The backup technique where users choose which folders and files to include in a backup is known as
__________.
A. Selective backup
B. Incremental backup
C. Differential backup
D. Continuous data protection (CDP)
19. A(n) _________________ is a number that uniquely identifies each computer or device connected to
the Internet
A. DNS Server
B. IP address
C. Domain Name
A. networking
B. pairing
C. interfacing
D. assembling
21. __________ is defined as a type of computing that relies on sharing computing resources rather than
having local servers or personal devices to handle applications.
A. Grid computing
B. Cloud computing
C. Parallel computing
D. Distributed computing
22. _____ transmits data wirelessly via infrared (IR) light waves.
A. RFID
B. Ethernet
C. Bluetooth
D. IrDA
23. All these are criteria for evaluating a Web Sites content except __________
A. Content
B. Affiliation
C. Currency
D. Subjectivity
24. To mitigate against software theft, many manufacturers incorporate _________ process into their
programs to ensure the software is not installed on more computers than legally licensed. A. License
B. Protection
C. Activation
D. Firewall
25. _________ are very expensive and are employed for specialized applications that require immense
amount of mathematical calculations (number crunching).
A. Minicomputers
B. Mainframes
C. Supercomputers
D. Tablet PCs
26. The actual execution of instructions in a computer takes place in ______
A. ALU
B. Control Unit
C. Storage unit
D. None of the above
27. The Internet was originated as ARPANET in September 1969, what is the full meaning of
ARPANET?
A. Advanced Research Project of American Network
B. False
38. Memories in which any location can be reached in a fixed (and short) amount of time after specifying
its address is called ______
A. sequential-access memory
B. random-access memory
C. secondary memory D. mass storage
39. Registers are small high-speed circuits used to store data, instructions and memory addresses.
A. TRUE B.
FALSE
A. system clock
B. register
C. machine cycle
B. attribute
C. table
D. columns
48. Which of the following is not a type of a communication link?
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. Software
49. When one uses the minus (-) search operator, (s)he wants to ___________.
A. Displays hits that include specific words
B. Displays hits that include only one word
51. Which of the following holds the ROM, CPU, RAM and expansion cards?
A. Hard disk
B. Floppy disk
C. Motherboard
D. None of the above
52. _______ is the process of converting data that is readable by humans into encoded characters to
prevent unauthorized access.
A. Algorithm
B. Cipher Text
C. Encryption
D. Decryption
53. What unit of storage is used to represent 10^9 bytes?
A. Kilobyte
B. Terabyte
C. Megabyte
D. Gigabyte
54. Which of the following computers is not a mobile computer?
A. Notebook computers
B. Laptop computers
C. Tablet PCs
D. None of the above
55. A notebook computer can fit in the palm of your hand.
A. TRUE
B. FALSE
56. A __________is a collection of individual programs available together as a unit.
A. Software suite
B. Personal information manager
C. Shareware
D. Freeware
57. A (n) __________ is a set of rules for the exchange of data between a terminal and a computer or
between two computers.
A. Cache
B. Protocol
C. Bus
D. Register
58. A(n) __________allows a user to perform maintenance-type tasks usually related to managing a
computer, its devices, or its programs.
A. Plug and play
B. Utility program
C. Operating system
D. Systems program
59. _______ automatically configures new devices as you install them
A. Driver
B. Plug and play
C. Configure
D. Console
60. With _____________, standard telephone line is used to connect to the Internet.
A. VDSL
B. Dial-up access
C. ISDN
D. Cable television Internet services
61. _______________is a portion of a storage medium functioning as additional Random-Access
Memory (RAM)
A. Flash memory
B. Registers
C. Cache memory
D. Virtual memory
62. All these are examples of Input Devices except ________.
A. Keyboard
B. Mouse
C. Monitor
D. Bar Code Readers
63. __________ may be defined as an illegal activity in which the person uses special knowledge of
computer technology. A. Internet crime
B. Computer crime
C. Online crime
D. Cyber crime
64. Which of the following functions of a computer is wrong?
A. it obtains data from an input device
B. it processes the data and delivers the final results to an output device
C. it stores the program and data in memory
D. It generates the program on its own
65. What is true about supercomputers __________
A. they can fit on a single small chip
B. they are found at thousands of places around the world
C. they cost only few thousand cedis
D. they can process billions of operations in a second
66. ___________ technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network.
A. Botnet
B. Spoofing
C. Back door
D. Denial of Service Attack
67. The digital system usually operated on __________system.
A. binary
B. decimal
C. octal
D. hexadecimal
B. 1,000,000,000 bytes
C. 1,000,000,000,000 bytes
D. None of the above
72. Which of the following key components is not present in a microcomputer system unit?
A. Motherboard
B. Software
C. Central Processing Unit (CPU)
D. Random Access Memory (RAM)
73. Open source software is mass-produced, copyrighted retail software that meets the needs of a wide
variety of users, not just a single user or company.
A. TRUE
B. FALSE
C. it is non-volatile
D. it is permanent
80. 10 Kilobytes of sales data can be expressed exactly as
A. 10000 bytes
B. 10240 bytes
C. 0.010000 Megabytes
D. 0.010240 Megabytes
81. Software can be defined as computer system system
A. a series of detailed instructions that control the operation of a computer system
B. a logical set of tangible instructions that manipulate the computer system
C. a series of logical and tangible instructions that control the operation of a
D. a logical set of tangible instructions that control the operation of a computer
82. Decision makers in organization will frequently
A. ask for transactions to extract data for analysis
B. enter data into records for querying
C. query master files to extract information for analysis
D. All of the above
83. Kofi is an accounts clerk in the Salaries office of Digital Ltd. The Accounts manager asked Kofi to
prepare a list of debtors. The list should be printed as a hard copy. Another description of the hard copy is
A. Source document
B. Operational document
C. Turnaround document
D. Chart of accounts
84. The name of a student is 32 characters long. When type on the computer it will require
A. 32 bits of main memory space
B. 32 bytes of main memory space
C. 256 bytes of main memory space
D. 4 bytes of main memory space
85. Files containing related data are combined to form
A. Transaction file
B. Master file
C. Records
D. Database
86. Digital Ltd. wants to purchase comparably fast computer machines for their branch operations.
Which one of the following machines would you advise they purchase?
A. CISC machine
B. RISC machine
D. All above
89. The larger the Word Size of a computer
A. the more information can be read by the ROM
B. the less information can be written by the ROM
D. All Above
91. When you turn on a PC the software that obtains the Operating system from the hard disk and loads it
into memory is
A. Operating software
B. Application software
C. BIOS
D. Bootstrap loader
92. T.A SENANU is an employee who has recently been promoted in his organization after 5 years of
working experience. His rank will be updated in the organization’s
A. History File
B. Master file
C. Transaction file
D. Record File
93. Data maintenance is
A. The periodic processing of transactions to update stored data
B. The updating of current data with current transactions
C. The periodic printing of transactions to do verification
D. Periodic printing and cleaning of the current transactions
94. A laser printer that has been functional on a computer system is later not recognized by the same
computer system. The hardware and its connections were checked and found to be ok. The most probable
software that must be checked and configured is
A. The printer device
B. The printer device driver
C. The utility device
D. The application driver
95. A laser printer that has been functional on a computer system is later not recognized by the same
computer system. The hardware and its connections were checked and found to be ok. The most probable
software that must be checked and configured is
A. The printer device
B. The printer device driver
C. The utility device
D. firewall
103. Software that can identify useless or dangerous messages in my computer is
A. Anti-virus programs
B. Anti-spyware programs
C. Anti-spam programs
D. firewall
104. When you see your hard disk LED blinks repeatedly, the OS is most probably
A. Failing
B. Idling
C. Thrashing
D. Executing application software
105. How many bit(s) per character is/are used by Unicode code set?
A. 1
B. 7
C. 8
D. 16
106. Application software that allows the accounts office to prepare company accounts, balance sheet,
trial balance with charts etc.
A. Word Processor
B. Integrated Software
C. Electronic Spreadsheet
D. Desktop Publishing Software
107. The Internet Protocol (IP) address of the CEO of Digital Ltd. is expressed as 4 octet binary number
as 10000000 . 00001010 . 00001011 . 10001010 The 4 octet decimal equivalent is A. 1.10.11.10
B. 8.2.3.3
C. 128.10.3.137
D. 128.10.11.137
108. Storage areas located in the CPU which can hold data or instructions are called
A. Scratch pad
B. Cache
C. ROM
D. Registers
109.The ROM is used
A. To store basic instructions that come with the computer e.g. boot program
B. To manipulate the instructions and data
C. To read instructions from the processor
D. To write instructions from the processor
110. Multiple programs being ran by the computer processor must be resident in
A. ROM
B. RAM
C. Hard disk
D. Buffer
111. POST is a function of
A. CPU
B. BIOS
C. RAM
D. ROM
112. The following are characteristics of main memory, except which one
B. Instruction register
C. Control unit
D. FPU
119. For Local Area Network to support multiple users, a key function of the OS must be
A. Provide a user interface
B. Network management
C. Configure devices
D. Manage memory
120. The printer buffer ______
A. Stores output from the printer
B. Stores output to the processor
C. Stores output from the screen
D. Stores output to be handled by the printer
stay blessed
bsg