Handout Computer
Handout Computer
14. A Microprocessor is
a. A CPU on only one electronic chip
b. A CPU on more than one electronic chip
c. A Cache memory
d. None of the Above
16. A byte is
a. 8 bits
b. 9 bits
c. 16 bits
d. None of the Above
21. The system that allows multiple computers to connect together to share
resources is called
a. Computer Network
b. Connected System
c. Shared Computers
d. None of the Above
22. The Internet is
a. A Local Area Network
b. A large Infrastructure of connected networks
c. A Wide Area Network
d. None of the Above
33. The pathway on a circuit board through which data moves is.
a. router
b. chipset
c. bus
d. motherboard
True/False Question
14. Embedded Operating Systems are used by Desktop and Laptop Computers
a. True
b. False
15. The router is the pathway on a circuit board through which data moves.
a. True
b. false
Question Bank – Topic2 – Computer Hardware
Multiple Choice Question
1. The large circuit board inside a desktop computer that controls the
operations of all other components is
a. Control unit
b. Motherboard
c. Device driver
d. None of the Above
4. The unit that tells the computer system how to carry out a program’s
instruction is
a. Control Unit
b. Arithmetic Logical Unit
c. System Unit
d. None of the Above
8. ALU contains the following storage units that store data to be processed.
a. Bytes
b. Registers
c. Words
d. None of the Above
14. A Microprocessor is
a. A CPU on only one electronic chip
b. A CPU on more than one electronic chip
c. A Cache memory
d. None of the Above
16. A byte is
a. 8 bits
b. 9 bits
c. 16 bits
d. None of the Above
24. The temporary, high-speed holding area between the main memory and CPU is
a. A Random Access Memory (RAM)
b. A Read Only Memory (ROM)
c. A Cache memory
d. None of the Above
25. The memory that contains special instructions used to start up the
computer is
a. A Random Access Memory (RAM)
b. A Read Only Memory (ROM)
c. A Cache memory
d. None of the Above
26. The storage type that holds data and programs even after electric power
to the computer system has been turned off, is
a. Random Access Memory (RAM)
b. Read Only Memory (ROM)
c. Secondary storage
d. None of the Above
28. The storage type that uses laser technology to store data and programs, is
a. Solid-State-Disk (SSD)
b. Hard Disk (HD)
c. Optical Disk
d. None of the Above
32. The device that converts a document into a form the system unit can process, is
a. Scanner
b. Printer
c. Plotter
d. None of the Above
33. The input device that reads and interprets bar codes such as UPC
(Universal Product Code) symbols, is
a. Quick Response Reade
b. Magnetic Card Reader
c. Bar Code Reader
d. None of the Above
34 The input device that reads and deciphers the information on the
magnetic strip on a credit card or other ID card.
a. Quick Response Reade
b. Magnetic Card Reader
c. Bar Code Reader
d. None of the Above
35. The electronic chip that communicates wirelessly with a device to authenticate
a user, is
a. Radio Frequency Identification chip
b. Electronic Circuit chip
c. Electronic Decoder chip
d. None of the Above
36. The following input device scans something about a human body that is
used to identify that person.
a. Fingerprint reader
b. Voice recognition
c. Facial recognition
d. All the Above
37. The output device that creates 3D shapes with a thin layer of material
repeatedly until created, is
a. 3D Scanner
b. 3D Printer
c. 3D Monitor
d. None of the Above
38. The pathway on a circuit board through which data moves is.
a. router
b. chipset
c. bus
d. motherboard
True/False Question
4. The Control Unit tells the computer system how to carry out a program’s
instruction.
a. True
b. False
8. CPU is composed of Arithmetic Logical Unit (ALU) and Control Unit (CU)
a. True
b. False
9. The Control Unit (CU) is the unit of CPU that performs computation.
a. True
b. False
10. The Control Unit (CU) is the unit of CPU that decodes and executes
instructions.
a. True
b. False
11. CPU performs Arithmetic and Logical operations using Decimal Number
System.
a. True
b. False
16. The RAM is used to store programs and data currently processed.
a. True
b. False
17. The ROM is used to store programs and data currently processed.
a. True
b. False
18. The Secondary Storage is used to store files, data and documents.
a. True
b. False
24. A Cache memory is a temporary, high-speed holding area between the main
memory and CPU.
a. True
b. False
26. The Secondary storage holds data and programs even after electric
power to the computer system has been turned off.
a. True
b. false
28. Hard Disk (HD) uses laser technology to store data and programs.
a. True
b. False
31. The Universal Serial Bus (USB) is a general-purpose port for connecting
external devices to a PC.
a. True
b. False
32. Scanner is an input device that converts a document into a form the system unit
can process, is
a. True
b. False
33. Bar Code Reader is an input device that reads and interprets bar codes
such as UPC (Universal Product Code) symbols.
a. True
b. False
34 Magnetic Card Reader is an input device that reads and deciphers the
information on the magnetic strip on a credit card or other ID card.
a. True
b. False
37. 3D Printer is an input device that creates 3D shapes with a thin layer of
material repeatedly until created.
a. True
b. False
43. A desktop is a personal computer with input and output devices separate
from the system unit.
a. True
b. False
4. The Computer Network that has small scope, typically a single building or
a cluster of buildings, is
a. Wide Area Network
b. Metropolitan network
c. Local Area Network
d. None of the Above
5. The Computer Network that covers a large geographical area, such as city
or country, is
a. Wide Area Network
b. Metropolitan network
c. Local Area Network
d. None of the Above
10. The network in which each node connects to exactly two other nodes,
forming a single continuous pathway for signals, is
a. Bus Network
b. Star Network
c. Ring Network
d. None of the Above
12. The network in which each device connected to a central node either directly
or through subordinate nodes, is
a. Tree Network
b. Star Network
c. Bus Network
d. None of the Above
13. The network that does not use a specific physical layout, but requires
that each node have more than one connection to other nodes, is
a. Tree Network
b. Star Network
c. Mesh Network
d. None of the Above
18. The current dominant standard for local area networking devices, is
a. Ethernet
b. Bluetooth
c. Infrared
d. None of the Above
20. The communications device that provides a central gathering point for
all the computers in a LAN to connect, is
a. Router
b. Bridge
c. Switch/hub
d. None of the Above
28. The special network that only staff within the company network can
access, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above
29. The special network set up by a business for its customers, staff, and
business partners to access from outside the office network, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above
30. The special network set up by a business for its customers, staff, and
business partners to access from outside the office network, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above
True/False Question
1. The internal data rates of LANs are typically much smaller than those of
WANs.
a. True
b. False
23. The Windows utility software that rearranges files and unused disk
space to optimize operations, is
a. File history
b. Disk cleanup
c. Disk defragmenter
d. None of the Above
32. Which of these software would be most appropriate for managing and
storing patient records in a large hospital?
a. Presentation Software
b. Database Management System
c. Spreadsheet Software
d. None of the Above
33. Applications Software are
a. Programs to manage and control computer resource
b. Programs End-users use
c. Communications Software
d. None of the Above
10. Most operating systems store data and programs in a system of files
and folders
a. True
b. False
19. Disk defragmenter is the Windows utility software that identifies and
eliminates nonessential files.
a. True
b. False
20. Disk cleanup is the Windows utility software that rearranges files and
unused disk space to optimize operations.
a. True
b. False
30. Operating System and Utilities programs are the main components of
System Software.
a. True
b. false
32. Standalone Operating Systems are used by Smart phones and tablets.
a. True
b. False
4. The set of characters that we enter into our web browser’s address bar to
navigate to a specific web page is called
a. IP Address
b. Uniform Resource Locator (URL)
c. Page Address
d. None of the Above
6. The application that builds an index of sites on the Internet. Users can
then search that database using keywords or phrases to find sites that
contain the information they need.
a. File Download
b. World Wide Web (WWW)
c. Search Engine
d. None of the Above
7. Which of these IS NOT an Online Communications application on the
Internet?
a. Instant Messaging
b. Social Networking
c. Voice over IP (VoIP)
d. None of the Above
10. The web page where an individual or group publishes stories, essays,
or articles that are generically referred to as posts.
a. Wiki
b. Blog
c. Social Network
d. None of the Above
11. The online database of information that any user can copy or amend
using a web interface, is
a. A Wiki
b. A Blog
c. A Newsgroup
d. None of the Above
12. Skype, which is an Internet application used to make phone calls and
sometimes video calls over a broadband, Wi-Fi, or cellular mobile web
connection. Skype uses the online communications technique of
a. Social Networking
b. Instant Messaging (IM)
c. VoIP
d. None of the Above
True/False Question
3. The capability to capture copies of data packets as they travel across the
network and decode their content, is called
a. Spoofing
b. Sniffing
c. Phishing
d. None of the Above
6. Which of these is the malware program hides on a hard drive, CD, or e-mail
and causes unexpected side effects such as destroying or corrupting data.
a. virus
b. Worm
c. Trojan
d. None of the Above
7. Which of these is the malware program that copies itself repeatedly into a
computer’s memory or disk drive.
a. virus
b. Worm
c. Trojan
d. None of the Above
9. The encoding of data by a special algorithm that renders the data unreadable
by any program without the decryption key, is
a. Compression
b. Encryption
c. Decompression
d. None of the Above
True/False Question
1. All computer users should not be aware of the possible security risks and
know some safeguards to prevent against security problems since these
problems can cost you time and money, as well as be an inconvenience.
a. True
b. False
2. The internet is open-access and is used by some people who are not
trustworthy, who take advantage of the lack of built-in safeguards.
a. True
b. False
3. Hackers are those criminals who gain unauthorized access to computers
or networks to make illegal operations (not good/black hat)).
a. True
b. False
4. Crackers are malicious hackers who break into computers for malicious
purposes.
a. True
b. False
12. Denial of Service (DoS) is the Internet attack in which making repeated
requests of a computer or network device, thereby overloading it and causing
legitimate requests to be ignored.
a. True
b. False
20. Virus is a malware program that hides on a hard drive, CD, or e-mail that
causes unexpected side effects such as destroying or corrupting data.
a. True
b. False
11. Trojan is a malware program that hides on a hard drive, CD, or e-mail and
causes unexpected side effects such as destroying or corrupting data.
a. True
b. False
12. Worm is a malware program hides on a hard drive, CD, or e-mail and causes
unexpected side effects such as destroying or corrupting data.
a. True
b. False
13. Virus is a malware program that copies itself repeatedly into a computer’s
memory or disk drive.
a. True
b. false
14. Trojan is a malware program that copies itself repeatedly into a computer’s
memory or disk drive.
a. True
b. false
18. Encryption is the encoding of the data by a special algorithm that renders
the data unreadable by any program without the decryption key.
a. True
b. False
19. Virtual Private Network (VPN) is the technology that creates a secure,
tamper-resistant data tunnel between two points on the Internet.
a. True
b. False
Question Bank – Topic 7 – Data Representation & Number Systems
Multiple Choice Question
1. The number system that we are familiar with, that we use every day, is
a. Octal Number System
b. Binary Number System
c. Decimal Number System
d. None of the Above
2. The number system that every computer uses to represent, store and
process data, is
a. Octal Number System
b. Binary Number System
c. Decimal Number System
d. None of the Above
16. The addition of the two binary numbers 111 and 111 is
a. 1010
b. 222
c. 1011
d. None of the Above
17. The addition of the two binary numbers 1111 and 1111 is
a. 11110
b. 2222
c. 11111
d. None of the Above
20. The largest integer decimal that can be represented in 4 bits sign-and-
magnitude is
a. +8
b. +7
c. +6
d. None of the Above
21. The smallest integer decimal that can be represented in 4 bits sign-
and-magnitude is
a. -8
b. -7
c. -6
d. None of the Above
True/False Question
1. The Octal number system is the system we are familiar with, and we use
every day.
a. True
b. False
2. The decimal number system is the system we are familiar with, and we
use every day.
a. True
b. False
25. The addition of the two binary numbers 101 and 101 is 1010.
a. True
b. False
26. The addition of the two binary numbers 111 and 111 is 1110.
a. True
b. False
27. The addition of the two binary numbers 1111 and 1111 is 21111.
a. True
b. False
29. The largest unsigned integer that can be represented in 4 bits is 15.
a. True
b. False
30. The largest signed integer that can be represented in 4 bits sign-and-
magnitude is +7.
a. True
b. False
Question Bank – Topic 8 – Problem Solving Concepts
True/False Question