You are on page 1of 23

1

Always put God first\Never forget to pray

brianiacs study group


UNIVERSITY OF GHANA BUSINESS SCHOOL
UGBS INTRO TO COMPUTING QUESTIONS & SOLUTIONS

1. Computer processing speeds are measured in _______.


A. bytes

B. hertz
C. bits
D. none of the above
2. The backup technique where users copy only the files that have changed since the last full or
incremental backup is known as __________.
A. Selective backup
B. Incremental backup
C. Differential backup
D. Continuous data protection (CDP)
3. ___________ mode saves any open documents running programs or apps to memory, turns off all
unneeded functions, and then places the computer in a low-power state.
A. Sleep
B. Hibernate
C. Restart
D. Booting
4. A (n) ________ is a program designed by a computer programmer (malicious hacker) to do a certain
unwanted function.
A. Worm
B. Virus
C. Trojan Horse
D. Rootkit
5. A(n) _________ is a single chip with two or more separate processor cores.

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


2
Always put God first\Never forget to pray

A. Multitasking processor

B. Multicore processor
C. Multiuser processor
D. Multiprocessor core
6. All these are functions of operating systems except _______.
A. provide a user interface
B. manage programs

C. data input
D. schedule jobs
7. Green computing involves reducing the electricity consumed and environmental waste generated when
using a computer. Which of the following is not a strategy for green computing?
A. Recycling
B. Regulating manufacturing processes
C. Invest more into industrialization
D. Immediately donating or properly disposing of replaced computers
8.Which of the following is not example of an Operating System?
A. MS DOS
B. MS Windows
C. Android

D. Photoshop
9. Which of the following is not a Business Software?
A. Word Processing
B. Spreadsheet
C. Presentation
D. Personal Finance
10. One million bytes represent a __________
A. Megabyte
B. Gigabyte
C. Kilobyte

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


3
Always put God first\Never forget to pray

D. Terabyte
11. Which of these systems is not an example of a Data Processing (DP) system?
A. Automated Teller Machines (ATM)
B. Credit Sales terminal
C. Systems Software
D. Airline Reservation Systems
12. With _________, each department has its own set of files.
A. Database
B. File processing system
C. Transaction processing system
D. uploading
13. Web publishing is the development and maintenance of Web pages. The process of showing your
website to the world is termed as __________________.
A. Planning the website
B. Creating the website
C. Deploying the website
D. Maintaining the website
14. The use of computer workstations to send and receive messages is known as
A. electronic funds transfer
B. electronic message switching
C. electronic mail
D. electronic publishing
15. The jargon for navigating on the Internet is called _________
A. clicking
B. selecting
C. surfing
D. analyzing
16. __________ is end user software that is used to accomplish a variety of tasks.
A. Operating System

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


4
Always put God first\Never forget to pray

B. System Software
C. Utility Program
D. Application software
17. Which of the following is used to guarantee whether a user of a website is legitimate?
A. Digital signature
B. Encryption

C. Digital certificate
D. Secure site
18. The backup technique where users choose which folders and files to include in a backup is known as
__________.
A. Selective backup
B. Incremental backup
C. Differential backup
D. Continuous data protection (CDP)
19. A(n) _________________ is a number that uniquely identifies each computer or device connected to
the Internet
A. DNS Server
B. IP address
C. Domain Name

20. The linking of computers with a communication system is called __________

A. networking
B. pairing
C. interfacing
D. assembling
21. __________ is defined as a type of computing that relies on sharing computing resources rather than
having local servers or personal devices to handle applications.
A. Grid computing
B. Cloud computing
C. Parallel computing

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


5
Always put God first\Never forget to pray

D. Distributed computing
22. _____ transmits data wirelessly via infrared (IR) light waves.
A. RFID
B. Ethernet
C. Bluetooth
D. IrDA
23. All these are criteria for evaluating a Web Sites content except __________
A. Content
B. Affiliation
C. Currency
D. Subjectivity
24. To mitigate against software theft, many manufacturers incorporate _________ process into their
programs to ensure the software is not installed on more computers than legally licensed. A. License

B. Protection

C. Activation
D. Firewall
25. _________ are very expensive and are employed for specialized applications that require immense
amount of mathematical calculations (number crunching).
A. Minicomputers
B. Mainframes
C. Supercomputers
D. Tablet PCs
26. The actual execution of instructions in a computer takes place in ______
A. ALU
B. Control Unit
C. Storage unit
D. None of the above
27. The Internet was originated as ARPANET in September 1969, what is the full meaning of
ARPANET?
A. Advanced Research Project of American Network

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


6
Always put God first\Never forget to pray

B. Advanced Really Project Agency Network

C. Advanced Research Project Agency Network


D. Advanced Revolution Project Agency Network
28. The process of a computer receiving information from a server on the Internet is known as
__________
A. downloading
B. pulling
C. transferring
D. uploading
29. A (n) __________ is a private network that is accessible to selected outsiders.
A. Intranet
B. Extranet
C. LAN
D. WAN
30. Several other services run on the Internet aside the world wide web (www). Which of the following is
not an Internet Service?
A. Email
B. Mailing list
C. Instant messaging
D. Computer Software
31. The machine cycle instructions are organized as follows:
A. Fetch, process, store, decode
B. Fetch, store, process, decode
C. Fetch, store, process, decode
D. Fetch, decode, process, store
32. Advantages of computer network to businesses include:
A. Enables sharing and dissemination of company information
B. Enables sharing hardware resources such as printers, backup, and processing power.
C. Reduces time for information and transfer.
D. All of the above

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


7
Always put God first\Never forget to pray

33. Which of the following is not an example of volatile memory?


A. Cache memory
B. Registers
C. RAM
D. ROM
34. Modern computers do not work with decimal numbers. Instead, they process binary numbers i.e.,
groups of 0s and 1s because_______
A. electronic devices are most reliable when designed for two state (binary) operation
B. memory is only possible for binary numbers
C. with decimal numbers, the circuits are complex and costly
D. with decimal numbers, processing speed is slow
35. Data maintenance comprises of all these except ______.
A. additions
B. subtractions
C. deletions
D. updates
36. All these are examples of Output Devices except ________.
A. Printers
B. Monitors
C. Speakers
D. Keyboard
37. Freeware software is copyrighted software that is distributed on the honor system; consumers should
either pay for it or uninstall it after the trial period.
A. True

B. False
38. Memories in which any location can be reached in a fixed (and short) amount of time after specifying
its address is called ______
A. sequential-access memory
B. random-access memory
C. secondary memory D. mass storage

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


8
Always put God first\Never forget to pray

39. Registers are small high-speed circuits used to store data, instructions and memory addresses.
A. TRUE B.
FALSE

40. Which of these is not a common type of malware?


A. Trojan horse
B. Worms
C. Rootkit

D. None of the above


41. The basic operation performed by a computer is _________
A. arithmetic operations
B. logical operations
C. storage and retrieval operations
D. all the above
42. __________ is a protocol that defines how a network uses radio signals to communicate with a tag
placed in or attached to an object, an animal, or a person.
A. Wi-Fi
B. Ethernet
C. Bluetooth
D. RFID
43. _______ consists of the programs that control or maintain the operations of the computer and its
devices.
A. A graphical user interface (GUI)
B. A communications device
C. System software
D. Application software
44. The processor's ______________ controls the timing of all the computer operations.

A. system clock
B. register
C. machine cycle

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


9
Always put God first\Never forget to pray

D. arithmetic logic unit (ALU)


45. The backup technique where all data is backup whenever a change is made is known as __________.
A. Full backup
B. Incremental backup
C. Differential backup
D. Continuous data protection (CDP)
46. Stored instructions and data in digital computers consist of _________
A. alphabets
B. numerals
C. characters D. bits

47. Characteristics of interest, which need to be stored is referred to as __________.


A. field

B. attribute
C. table
D. columns
48. Which of the following is not a type of a communication link?
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. Software
49. When one uses the minus (-) search operator, (s)he wants to ___________.
A. Displays hits that include specific words
B. Displays hits that include only one word

C. Exclude a word from the search results


D. Search for an exact phrase of the in a certain manner
50. The shared resources that the operating system manages include the CPU, memory, storage device,
and the printer.
A. TRUE
B. FALSE

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
0 Always put God first\Never forget to pray

51. Which of the following holds the ROM, CPU, RAM and expansion cards?
A. Hard disk
B. Floppy disk

C. Motherboard
D. None of the above
52. _______ is the process of converting data that is readable by humans into encoded characters to
prevent unauthorized access.
A. Algorithm
B. Cipher Text

C. Encryption
D. Decryption
53. What unit of storage is used to represent 10^9 bytes?
A. Kilobyte
B. Terabyte
C. Megabyte
D. Gigabyte
54. Which of the following computers is not a mobile computer?
A. Notebook computers
B. Laptop computers
C. Tablet PCs
D. None of the above
55. A notebook computer can fit in the palm of your hand.
A. TRUE
B. FALSE
56. A __________is a collection of individual programs available together as a unit.
A. Software suite
B. Personal information manager
C. Shareware
D. Freeware

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
1 Always put God first\Never forget to pray

57. A (n) __________ is a set of rules for the exchange of data between a terminal and a computer or
between two computers.
A. Cache
B. Protocol
C. Bus
D. Register
58. A(n) __________allows a user to perform maintenance-type tasks usually related to managing a
computer, its devices, or its programs.
A. Plug and play

B. Utility program
C. Operating system
D. Systems program
59. _______ automatically configures new devices as you install them
A. Driver
B. Plug and play
C. Configure
D. Console
60. With _____________, standard telephone line is used to connect to the Internet.
A. VDSL
B. Dial-up access
C. ISDN
D. Cable television Internet services
61. _______________is a portion of a storage medium functioning as additional Random-Access
Memory (RAM)
A. Flash memory
B. Registers
C. Cache memory

D. Virtual memory
62. All these are examples of Input Devices except ________.
A. Keyboard

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
2 Always put God first\Never forget to pray

B. Mouse

C. Monitor
D. Bar Code Readers
63. __________ may be defined as an illegal activity in which the person uses special knowledge of
computer technology. A. Internet crime

B. Computer crime
C. Online crime
D. Cyber crime
64. Which of the following functions of a computer is wrong?
A. it obtains data from an input device
B. it processes the data and delivers the final results to an output device
C. it stores the program and data in memory
D. It generates the program on its own
65. What is true about supercomputers __________
A. they can fit on a single small chip
B. they are found at thousands of places around the world
C. they cost only few thousand cedis
D. they can process billions of operations in a second
66. ___________ technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network.
A. Botnet
B. Spoofing
C. Back door
D. Denial of Service Attack
67. The digital system usually operated on __________system.
A. binary
B. decimal
C. octal
D. hexadecimal

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
3 Always put God first\Never forget to pray

68. Which of the following does not represent an I/O device?


A. Speaker which beeps
B. Joystick
C. Plotter
D. ALU
69. RISC stands for __________.
A. Relay Instruction Set Computer
B. Retrieve Instruction Set Computer
C. Reliable Instruction Set Computer

D. Reduced Instruction Set Computer


70. A(n) ______ is a socket on a desktop or server motherboard that can hold an adapter card
A. Expansion slot
B. Bus
C. Adapter card
D. Power supply
71. A gigabyte (GB) is approximately ___________. A.
1, 000, 0000 bytes.

B. 1,000,000,000 bytes
C. 1,000,000,000,000 bytes
D. None of the above
72. Which of the following key components is not present in a microcomputer system unit?
A. Motherboard
B. Software
C. Central Processing Unit (CPU)
D. Random Access Memory (RAM)
73. Open source software is mass-produced, copyrighted retail software that meets the needs of a wide
variety of users, not just a single user or company.
A. TRUE

B. FALSE

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
4 Always put God first\Never forget to pray

74. HTML stands for _________


A. Hypertext Make up Language
B. HyperTerminal Markup Language

C. Hypertext Markup Language


D. HigherText Markup Language
75. If you want to improve the performance of your PC, you need to upgrade the _______
A. CPU
B. Monitor
C. Keyboard
D. Printer
76. Peripherals are devices which are attached to the _________.
A. Keyboard
B. Mouse
C. System Unit
D. Monitor
77.Which of the following is not an E-commerce model?
A. B2B
B. B2C
C. C2C
D. None of the above
78. A(n) __________ is a computer program allowing high-level computer programs to interact with
computer hardware device.
A. Bus
B. Device driver
C. Application software
D. System Software
79. Which of the following is not a characteristic of auxiliary storage?
A. computers use RAM as auxiliary storage
B. auxiliary storage holds what is not currently being processed

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
5 Always put God first\Never forget to pray

C. it is non-volatile
D. it is permanent
80. 10 Kilobytes of sales data can be expressed exactly as
A. 10000 bytes
B. 10240 bytes
C. 0.010000 Megabytes
D. 0.010240 Megabytes
81. Software can be defined as computer system system
A. a series of detailed instructions that control the operation of a computer system
B. a logical set of tangible instructions that manipulate the computer system
C. a series of logical and tangible instructions that control the operation of a
D. a logical set of tangible instructions that control the operation of a computer
82. Decision makers in organization will frequently
A. ask for transactions to extract data for analysis
B. enter data into records for querying
C. query master files to extract information for analysis
D. All of the above
83. Kofi is an accounts clerk in the Salaries office of Digital Ltd. The Accounts manager asked Kofi to
prepare a list of debtors. The list should be printed as a hard copy. Another description of the hard copy is
A. Source document

B. Operational document
C. Turnaround document
D. Chart of accounts
84. The name of a student is 32 characters long. When type on the computer it will require
A. 32 bits of main memory space
B. 32 bytes of main memory space
C. 256 bytes of main memory space
D. 4 bytes of main memory space
85. Files containing related data are combined to form

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
6 Always put God first\Never forget to pray

A. Transaction file
B. Master file
C. Records

D. Database
86. Digital Ltd. wants to purchase comparably fast computer machines for their branch operations.
Which one of the following machines would you advise they purchase?
A. CISC machine
B. RISC machine

C. INTEL PENTIUM PRO


D. INTEL PENTIUM
87. The two general categories of software are which one of the following?
A. Application software and Utility Software
B. Application software and Application specific software
C. Application software and Operating Software
D. Application software and System software
88. Worms are spread themselves very quickly unwanted programs
A. Unwanted programs that are transferred over network or internet connections to
B. Programs that take control over your computer and make use of it
C. Programs that hide inside something else in order to sneak in into my computer

D. All above
89. The larger the Word Size of a computer
A. the more information can be read by the ROM
B. the less information can be written by the ROM

C. the more information can be processed by the processor


D. the less information can be processed by the processor
90. The IT policy of the Digital Ltd is that Open Source software use must be encouraged in the
company. Which OS would you encouraged to be used in Digital Ltd.
A. LINUX
B. UNIX
C. WINDOWS

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
7 Always put God first\Never forget to pray

D. All Above
91. When you turn on a PC the software that obtains the Operating system from the hard disk and loads it
into memory is
A. Operating software
B. Application software
C. BIOS
D. Bootstrap loader
92. T.A SENANU is an employee who has recently been promoted in his organization after 5 years of
working experience. His rank will be updated in the organization’s
A. History File
B. Master file

C. Transaction file
D. Record File
93. Data maintenance is
A. The periodic processing of transactions to update stored data
B. The updating of current data with current transactions
C. The periodic printing of transactions to do verification
D. Periodic printing and cleaning of the current transactions
94. A laser printer that has been functional on a computer system is later not recognized by the same
computer system. The hardware and its connections were checked and found to be ok. The most probable
software that must be checked and configured is
A. The printer device
B. The printer device driver
C. The utility device
D. The application driver
95. A laser printer that has been functional on a computer system is later not recognized by the same
computer system. The hardware and its connections were checked and found to be ok. The most probable
software that must be checked and configured is
A. The printer device
B. The printer device driver
C. The utility device

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
8 Always put God first\Never forget to pray

D. The application driver


96. Application software that allows the user to create company newsletters, newspapers, brochures,
professional publications with graphics, pictures etc
A. Word Processor
B. Integrated Software
C. Electronic Spreadsheet
D. Desktop Publishing Software
97. The following are examples of Operating Systems except which one ?

A. Microsoft Office 2010


B. Windows 8
C. Windows XP
D. UNIX
98. A company’s Back-up policy is
A. a document that states how the back office of the company should operate
B. a document that specifies how new computer systems should be used
C. a document which explains how long data should be kept by the company
D. a document which explains how and when company data should be backed-up
99. Akos has a habit of moving her Desktop computer around while it is processing. What is the risk of
her habit?
A. The computer processing will be slow
B. The computer RAM could get damaged
C. The could be a head-crash
D. The booting process could fail
100. Open Source software offers an organization

A. Advantage of customizing and using well documented quality software


B. Information Technology transfer
C. Minimizing License fees
D. All Above
101. When a user sends multiple Word documents to the same printer simultaneously
A. The printer will print all immediately

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


1
9 Always put God first\Never forget to pray

B. The documents will be spooled

C. Multiple print jobs line up in a queue within the cache


D. The printer prints from cache at its own rate of speed
102. Software that can identify useless or dangerous messages in my computer is
A. Anti-virus programs
B. Anti-spyware programs
C. Anti-spam programs

D. firewall
103. Software that can identify useless or dangerous messages in my computer is
A. Anti-virus programs
B. Anti-spyware programs
C. Anti-spam programs
D. firewall
104. When you see your hard disk LED blinks repeatedly, the OS is most probably
A. Failing

B. Idling
C. Thrashing
D. Executing application software
105. How many bit(s) per character is/are used by Unicode code set?
A. 1
B. 7
C. 8
D. 16
106. Application software that allows the accounts office to prepare company accounts, balance sheet,
trial balance with charts etc.
A. Word Processor
B. Integrated Software
C. Electronic Spreadsheet
D. Desktop Publishing Software

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


2
0 Always put God first\Never forget to pray

107. The Internet Protocol (IP) address of the CEO of Digital Ltd. is expressed as 4 octet binary number
as 10000000 . 00001010 . 00001011 . 10001010 The 4 octet decimal equivalent is A. 1.10.11.10

B. 8.2.3.3
C. 128.10.3.137
D. 128.10.11.137
108. Storage areas located in the CPU which can hold data or instructions are called
A. Scratch pad
B. Cache
C. ROM
D. Registers
109.The ROM is used
A. To store basic instructions that come with the computer e.g. boot program
B. To manipulate the instructions and data
C. To read instructions from the processor
D. To write instructions from the processor
110. Multiple programs being ran by the computer processor must be resident in
A. ROM

B. RAM
C. Hard disk
D. Buffer
111. POST is a function of
A. CPU
B. BIOS
C. RAM
D. ROM
112. The following are characteristics of main memory, except which one

A. computers use ROM as main memory,


B. main memory keeps track of what is currently being processed
C. main memory is volatile

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


2
1 Always put God first\Never forget to pray

D. main memory is temporary


113. Device drivers are required for the following except which one
A. CPU
B. Network Cards
C. Video Cards
D. Sound Cards
114. The Plug and Play function means configuration by the OS

A. OS automatically configures new software you attached to the computer system


B. OS automatically recognizes new software you attached to the computer system
C. New devices you attached to the system do not require any device drivers or
D. None Above
115. How many possible different characters can be represented by extended ASCII
A. 8
B. 128
C. 256
D. 65536
116. The multiple choice exam paper of West African Exam Council that can be optically read by
computer input device is described as
A. Mark Sense form
B. Universal Product Form
C. Bar Code Form
D. Optical Character Form
117. Generally data is fetched and used by the processor in the order, which one
A. From the main memory to cache to buffer
B. From the buffer to main memory to register
C. From the register to cache to main memory

D. From the main memory to cache to register


118. The component of the CPU that directs the execution of stored programs and communicates with the
ALU is
A. Program counter

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)


2
2 Always put God first\Never forget to pray

B. Instruction register

C. Control unit
D. FPU
119. For Local Area Network to support multiple users, a key function of the OS must be
A. Provide a user interface
B. Network management
C. Configure devices
D. Manage memory
120. The printer buffer ______
A. Stores output from the printer
B. Stores output to the processor
C. Stores output from the screen
D. Stores output to be handled by the printer

stay blessed
bsg

Aziz Abdul Ankrah (0550088980) & Adjetey Sowah (0209736127)

You might also like