1. The system BIOS and ROM chips are called :
A. Software
B. Firmware
C. Hardware
D. Bootware
E. None
2. What memory is located above the first 1024k of memory?
A. Conventional
B. Extended
C. Upper
D. Expanded
E. None
3. Which type of RAM is normally fastetst ?
A. DRAM
B. VRAM
C. SRAM
D. WRAM
E. NONE
4. Which computer system component is used for short –term data storage?
A. Hard drive
B. Floppy drive
C. CD-ROM
D. RAM
E. None
5. A SIMM has how many pins?
A. 36
B. 40
C. 34
D. 20
E. None
6. The _______Determines how many bits of date can be sent along a given bus at any one time
A. Control unit
B. Bus width
C. Bus speed
D. Amount of memory
E. None
7. The data flow diagram is for analysing
A. How to do a function effi-ciently
B. Restrict the number of times a function can be performed
C. Requirements of user
D. All of the above
E. None
8. The elements of computer processing system are
A. Hardware; software,information & people
B. Hardware, programs and people
C. Hardware,data,user and procedures
D. All of the above
E. None
9. On august 23, 2008 an accounting clerk prepared an invoice dated august 31,2008 .which control can check this?
A. Size check
B. Hash total
C. Range check
D. All of the above
E. None
10. Cpu contains __________
A. Logical unit
B. Arithmetical unit
C. Control unit
D. All of the above
E. None
11. Library management software is for
A. Documenting the changes that are made to programme
B. Controlling the version numbers of the programme
C. Both A) and B)
D. All the aboe
E. None
12. Steganography is .............
A. Hiding the datato make it necessarily invisible and not easily detectable
B. Hiding the data but not nec-essarily making it invisible and not easily detectable
C. Detecting and destroying the hidden data
D. All of the above
E. None
13. A computer is a__________ device
A. Calculating
B. Electrical
C. Electronic
D. All of the above
E. None
14. An online transaction is _____________
A. One that is done in realtime
B. One that is done via tele phone
C. Transaction done via internet
D. All of the above
E. None
15. Using anti virus software is ............
A. Detective measures
B. Preventive measure
C. Corrective measure
D. All of the above
E. None
A. Software
B. Firmware
C. Hardware
D. Bootware
E. None
2. What memory is located above the first 1024k of memory?
A. Conventional
B. Extended
C. Upper
D. Expanded
E. None
3. Which type of RAM is normally fastetst ?
A. DRAM
B. VRAM
C. SRAM
D. WRAM
E. NONE
4. Which computer system component is used for short –term data storage?
A. Hard drive
B. Floppy drive
C. CD-ROM
D. RAM
E. None
5. A SIMM has how many pins?
A. 36
B. 40
C. 34
D. 20
E. None
6. The _______Determines how many bits of date can be sent along a given bus at any one time
A. Control unit
B. Bus width
C. Bus speed
D. Amount of memory
E. None
7. The data flow diagram is for analysing
A. How to do a function effi-ciently
B. Restrict the number of times a function can be performed
C. Requirements of user
D. All of the above
E. None
8. The elements of computer processing system are
A. Hardware; software,information & people
B. Hardware, programs and people
C. Hardware,data,user and procedures
D. All of the above
E. None
9. On august 23, 2008 an accounting clerk prepared an invoice dated august 31,2008 .which control can check this?
A. Size check
B. Hash total
C. Range check
D. All of the above
E. None
10. Cpu contains __________
A. Logical unit
B. Arithmetical unit
C. Control unit
D. All of the above
E. None
11. Library management software is for
A. Documenting the changes that are made to programme
B. Controlling the version numbers of the programme
C. Both A) and B)
D. All the aboe
E. None
12. Steganography is .............
A. Hiding the datato make it necessarily invisible and not easily detectable
B. Hiding the data but not nec-essarily making it invisible and not easily detectable
C. Detecting and destroying the hidden data
D. All of the above
E. None
13. A computer is a__________ device
A. Calculating
B. Electrical
C. Electronic
D. All of the above
E. None
14. An online transaction is _____________
A. One that is done in realtime
B. One that is done via tele phone
C. Transaction done via internet
D. All of the above
E. None
15. Using anti virus software is ............
A. Detective measures
B. Preventive measure
C. Corrective measure
D. All of the above
E. None
No comments:
Post a Comment