0% found this document useful (0 votes)
32 views54 pages

Handout Computer

The document contains a question bank with multiple choice and true/false questions about computer hardware and systems. It covers topics like CPU components, memory types, storage devices, operating systems, and networking. The questions test fundamental concepts in information technology.

Uploaded by

shi88y1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views54 pages

Handout Computer

The document contains a question bank with multiple choice and true/false questions about computer hardware and systems. It covers topics like CPU components, memory types, storage devices, operating systems, and networking. The questions test fundamental concepts in information technology.

Uploaded by

shi88y1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Question Bank – Topic1 - Introduction

Multiple Choice Question


1. Which of these is NOT one of the five parts of an information system?
a. data
b. procedures
c. people
d. None of the Above

2. A computer is an electronic device that manipulates


a. procedures
b. data
c. operations
d. transactions

3. A computer has the following working model


a. Input-Processing-Output
b. Processing-Input-Output
c. Input-Output-Processing
d. Output-Processing-input

4. We need Information for


a. Supporting Decision Making
b. Planning
c. Monitoring & Controlling
d. All the Above

5. Which of these would be most appropriate for managing and storing


patient records in a large hospital?
a. peer-to-peer network
b. mainframe
c. personal computer
d. supercomputer

6. What that makes computer so powerful?


a. High speed of computation
b. Very large storage capacity
c. Generality & Connectivity
d. All the Above

7. Information Technology (IT) is a merging of two technologies


a. Computing technology and Industrial technology
b. Computing technology and Communications technology
c. Communications technology and Industrial technology
d. None of the Above

8. The rules or guidelines for people to follow when using software,


hardware, and data are
a. Transactions
b. Operations
c. Procedures
d. None of the Above

9. Which of these IS NOT a basic component of computer hardware?


a. CPU
b. Main memory
c. Secondary Storage
d. None of the Above

10. CPU is composed of the two units


a. Arithmetic Logical Unit (ALU) and Control Unit (CU)
b. ROM and RAM
c. Main Memory and Secondary Storage
d. None of the Above

11. The unit of a CPU that performs computation is


a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above

12. The unit of a CPU that decodes and executes instructions is


a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above

13. CPU performs Arithmetic and Logical operations using


a. Decimal Number System
b. Binary Number System
c. Hexadecimal Number System
d. None of the Above

14. A Microprocessor is
a. A CPU on only one electronic chip
b. A CPU on more than one electronic chip
c. A Cache memory
d. None of the Above

15. The main memory of a Computer is composed of


a. Words
b. Registers
c. Bits
d. None of the Above

16. A byte is
a. 8 bits
b. 9 bits
c. 16 bits
d. None of the Above

17. The smallest addressable unit of main memory is


a. Word
b. Bit
c. Byte
d. None of the Above

18. The RAM is used to store


a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above

19. The ROM is used to store


a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above

20. The Secondary Storage is used to store


a. Files, data and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above

21. The system that allows multiple computers to connect together to share
resources is called
a. Computer Network
b. Connected System
c. Shared Computers
d. None of the Above
22. The Internet is
a. A Local Area Network
b. A large Infrastructure of connected networks
c. A Wide Area Network
d. None of the Above

23. The Internet uses the following suite of protocols


a. HTTP
b. SMTP
c. TCP/IP
d. None of the Above

24. The Internet of Things (IoT) technology allows


a. All types of devices to communicate
b. Sharing data and resources
c. only computers to communicate
d. None of the Above

25. The two major types of computer software are


a. System Software and Communications Software
b. System Software and Applications Software
c. Applications Software and Communications Software
d. None of the Above

26. System Software are


a. Programs to manage and control computer resource
b. Programs End-users use
c. Applications Software
d. None of the Above

27. Applications Software are


a. Programs to manage and control computer resource
b. Programs End-users use
c. Communications Software
d. None of the Above

28. The main components of System Software are


a. Development and programming software
b. Applications and Communications programs
c. Operating System and Utilities programs
d. None of the Above
29. Embedded Operating Systems are used by
a. Super Computers
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above

30. Standalone Operating Systems are used by


a. Computer Networks
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above

31. Antivirus Programs are


a. Utilities programs
b. Applications programs
c. Development programs
d. None of the Above

32. Windows and Linux are examples of


a. Utilities programs
b. an Operating System
c. Programming language
d. None of the Above

33. The pathway on a circuit board through which data moves is.
a. router
b. chipset
c. bus
d. motherboard

True/False Question

1. Computer games are a type of application software.


a. True
b. False

2. A mouse is a type of output device.


a. True
b. False
3. The information processing cycle consists of three phases: input, output,
and storage.
a. True
b. False

4. The pathway on a circuit board through which data moves is a Bus.


a. True
b. False

5. Wi-Fi is a synonym for Bluetooth.


a. True
b. False

6. The Internet is based on Ethernet protocol suite.


a. True
b. False

7. A Client/server network contains at least one server.


a. True
b. False

8. A desktop is a personal computer with input and output devices separate


from the system unit.
a. True
b. False

9. A Laptop is touchscreen computer with no separate keyboard and mouse


a. True
b. False

10. A Tablet is a portable PC that folds for transport, containing a built-in


keyboard and built-in display screen.
a. True
b. False

11. A Server is a computer dedicated to serving the network to which it is


connected.
a. True
b. False

12. A mainframe is a large, powerful, cabinet-sized computer designed to


process large amounts of input and output
a. True
b. False
13. A supercomputer is a powerful, room-sized computer for scientific
research
a. True
b. False

14. Embedded Operating Systems are used by Desktop and Laptop Computers
a. True
b. False

15. The router is the pathway on a circuit board through which data moves.
a. True
b. false
Question Bank – Topic2 – Computer Hardware
Multiple Choice Question
1. The large circuit board inside a desktop computer that controls the
operations of all other components is
a. Control unit
b. Motherboard
c. Device driver
d. None of the Above

2. The microprocessor clock organizes and synchronizes all internal


operations, and determines its speed which is measured as
a. Bits per second (Bps)
b. Instructions per second
c. GHz
d. None of the Above

3. A computer has the following working model


a. Input-Processing-Output
b. Processing-Input-Output
c. Input-Output-Processing
d. Output-Processing-input

4. The unit that tells the computer system how to carry out a program’s
instruction is
a. Control Unit
b. Arithmetic Logical Unit
c. System Unit
d. None of the Above

5. Which of these would be most appropriate for managing and storing


patient records in a large hospital?
a. peer-to-peer network
b. mainframe
c. personal computer
d. supercomputer

6. What that makes computer so powerful?


a. High speed of computation
b. Very large storage capacity
c. Generality & Connectivity
d. All the Above
7. Information Technology (IT) is a merging of two technologies
a. Computing technology and Industrial technology
b. Computing technology and Communications technology
c. Communications technology and Industrial technology
d. None of the Above

8. ALU contains the following storage units that store data to be processed.
a. Bytes
b. Registers
c. Words
d. None of the Above

9. Which of these IS NOT a basic component of computer hardware?


a. CPU
b. Main memory
c. Secondary Storage
d. None of the Above

10. CPU is composed of the two units


a. Arithmetic Logical Unit (ALU) and Control Unit (CU)
b. ROM and RAM
c. Main Memory and Secondary Storage
d. None of the Above

11. The unit of a CPU that performs computation is


a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above

12. The unit of a CPU that decodes and executes instructions is


a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above

13. CPU performs Arithmetic and Logical operations using


a. Decimal Number System
b. Binary Number System
c. Hexadecimal Number System
d. None of the Above

14. A Microprocessor is
a. A CPU on only one electronic chip
b. A CPU on more than one electronic chip
c. A Cache memory
d. None of the Above

15. The main memory of a Computer is composed of


a. Words
b. Registers
c. Bits
d. None of the Above

16. A byte is
a. 8 bits
b. 9 bits
c. 16 bits
d. None of the Above

17. The smallest addressable unit of main memory is


a. Word
b. Bit
c. Byte
d. None of the Above

18. The RAM is used to store


a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above

19. The ROM is used to store


a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above

20. The Secondary Storage is used to store


a. Files, data and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above

21. The RAM is


a. a temporary storage
b. a permanent storage
c. a semi-permanent storage
d. None of the Above

22. The ROM is


a. a temporary storage
b. a permanent storage
c. a semi-permanent storage
d. None of the Above

23. The Hard Drive is


a. a temporary storage
b. a permanent/semi-permanent storage
c. a volatile storage
d. None of the Above

24. The temporary, high-speed holding area between the main memory and CPU is
a. A Random Access Memory (RAM)
b. A Read Only Memory (ROM)
c. A Cache memory
d. None of the Above

25. The memory that contains special instructions used to start up the
computer is
a. A Random Access Memory (RAM)
b. A Read Only Memory (ROM)
c. A Cache memory
d. None of the Above

26. The storage type that holds data and programs even after electric power
to the computer system has been turned off, is
a. Random Access Memory (RAM)
b. Read Only Memory (ROM)
c. Secondary storage
d. None of the Above

27. The storage type that doesn’t have moving parts, is


a. Solid-State-Disk (SSD)
b. Hard Disk (HD)
c. Optical Disk
d. None of the Above

28. The storage type that uses laser technology to store data and programs, is
a. Solid-State-Disk (SSD)
b. Hard Disk (HD)
c. Optical Disk
d. None of the Above

29. A Bus width is measured as a number of


a. Bytes
b. Words
c. Bits
d. None of the Above

30. The widely used communication device, is


a. Router
b. Modem
c. Switch
d. None of the Above

31. The general-purpose port for connecting external devices to a PC, is


a. HDMI
b. Ethernet port
c. Universal Serial Bus (USB)
d. None of the Above

32. The device that converts a document into a form the system unit can process, is
a. Scanner
b. Printer
c. Plotter
d. None of the Above

33. The input device that reads and interprets bar codes such as UPC
(Universal Product Code) symbols, is
a. Quick Response Reade
b. Magnetic Card Reader
c. Bar Code Reader
d. None of the Above

34 The input device that reads and deciphers the information on the
magnetic strip on a credit card or other ID card.
a. Quick Response Reade
b. Magnetic Card Reader
c. Bar Code Reader
d. None of the Above
35. The electronic chip that communicates wirelessly with a device to authenticate
a user, is
a. Radio Frequency Identification chip
b. Electronic Circuit chip
c. Electronic Decoder chip
d. None of the Above

36. The following input device scans something about a human body that is
used to identify that person.
a. Fingerprint reader
b. Voice recognition
c. Facial recognition
d. All the Above

37. The output device that creates 3D shapes with a thin layer of material
repeatedly until created, is
a. 3D Scanner
b. 3D Printer
c. 3D Monitor
d. None of the Above

38. The pathway on a circuit board through which data moves is.
a. router
b. chipset
c. bus
d. motherboard

39. The common wireless technology used to connect to speakers and


headsets, is
a. WiFi
b. Bluetooth
c. Infrared
d. None of the Above

True/False Question

1. The motherboard is large circuit board inside a desktop computer that


controls the operations of all other components.
a. True
b. False
2. The microprocessor clock organizes and synchronizes all internal
operations, and determines its speed which is measured as Bit per second
(Bps)
a. True
b. False

3. A computer has the working model: Processing-Input-Output


a. True
b. False

4. The Control Unit tells the computer system how to carry out a program’s
instruction.
a. True
b. False

5. A Personal Computer would be most appropriate for managing and


storing patient records in a large hospital.
a. True
b. False

6. Information Technology (IT) is a merging of Computing technology and


Industrial technology.
a. True
b. False

7. ALU contains registers that store data to be processed.


a. True
b. False

8. CPU is composed of Arithmetic Logical Unit (ALU) and Control Unit (CU)
a. True
b. False

9. The Control Unit (CU) is the unit of CPU that performs computation.
a. True
b. False

10. The Control Unit (CU) is the unit of CPU that decodes and executes
instructions.
a. True
b. False

11. CPU performs Arithmetic and Logical operations using Decimal Number
System.
a. True
b. False

12. A Microprocessor is a CPU on only one electronic chip.


a. True
b. False

13. The main memory of a Computer is basically composed of bits.


a. True
b. False

14. A byte is 9 bits.


a. True
b. False

15. The smallest addressable unit of main memory is bit.


a. True
b. false

16. The RAM is used to store programs and data currently processed.
a. True
b. False

17. The ROM is used to store programs and data currently processed.
a. True
b. False

18. The Secondary Storage is used to store files, data and documents.
a. True
b. False

19. The RAM is a temporary storage.


a. True
b. False
20. The ROM is a temporary storage.
a. True
b. False

21. The Hard Disk is a permanent/semi-permanent storage.


a. True
b. False

22. The Hard Disk is a volatile storage.


a. True
b. False

23. The main memory is a volatile storage.


a. True
b. False

24. A Cache memory is a temporary, high-speed holding area between the main
memory and CPU.
a. True
b. False

25. ROM contains special instructions used to start up the computer.


a. True
b. False

26. The Secondary storage holds data and programs even after electric
power to the computer system has been turned off.
a. True
b. false

27. Solid-State-Disk (SSD) doesn’t have moving parts.


a. True
b. False

28. Hard Disk (HD) uses laser technology to store data and programs.
a. True
b. False

29. A Bus width is measured as a number of bits.


a. True
b. False
30. Modem is a widely used communication device.
a. True
b. False

31. The Universal Serial Bus (USB) is a general-purpose port for connecting
external devices to a PC.
a. True
b. False

32. Scanner is an input device that converts a document into a form the system unit
can process, is
a. True
b. False

33. Bar Code Reader is an input device that reads and interprets bar codes
such as UPC (Universal Product Code) symbols.
a. True
b. False

34 Magnetic Card Reader is an input device that reads and deciphers the
information on the magnetic strip on a credit card or other ID card.
a. True
b. False

35. Radio Frequency Identification chip is an electronic chip that communicates


wirelessly with a device to authenticate a user.
a. True
b. False

36. Fingerprint reader is an input device scans facial features of a person in


order to authenticate such person.
a. True
b. False

37. 3D Printer is an input device that creates 3D shapes with a thin layer of
material repeatedly until created.
a. True
b. False

38. A bus is a pathway on a circuit board through which data moves.


a. True
b. False
39. Blurtooth is a common wireless technology used to connect to speakers
and headsets.
a. True
b. False

40. ROM is a volatile storage.


a. True
b. False

41. A mouse is a type of output device.


a. True
b. False

42. Wi-Fi is a synonym for Bluetooth.


a. True
b. False

43. A desktop is a personal computer with input and output devices separate
from the system unit.
a. True
b. False

44. A Laptop is touchscreen computer with no separate keyboard and mouse


a. True
b. False

45. A Tablet is a portable PC that folds for transport, containing a built-in


keyboard and built-in display screen.
a. True
b. False

46. A Server is a computer dedicated to serving the network to which it is


connected.
a. True
b. False

47. A mainframe is a large, powerful, cabinet-sized computer designed to


process large amounts of input and output.
a. True
b. False
48. A supercomputer is a powerful, room-sized computer for scientific research.
a. True
b. False
Question Bank – Topic4 – Computer Networks & Internet
Multiple Choice Question

1. Which of these is NOT a Computer Network?


a. Local Area Network
b. Wide Area Network
c. Internet
d. None of the Above

2. The system that exchanges data between two parties, is called


a. Data Communication System
b. Data Exchange System
c. Data Transmission System
d. None of the Above

3. The system that interconnects a variety of devices and provides a means


for information exchange among those devices, is
a. Data Communications System
b. Communications Network
c. Data Transmission System
d. None of the Above

4. The Computer Network that has small scope, typically a single building or
a cluster of buildings, is
a. Wide Area Network
b. Metropolitan network
c. Local Area Network
d. None of the Above

5. The Computer Network that covers a large geographical area, such as city
or country, is
a. Wide Area Network
b. Metropolitan network
c. Local Area Network
d. None of the Above

6. Local Area Network (LAN) uses


a. Circuit-switching technique
b. Packet-switching technique
c. Broadcasting technique
d. None of the Above
7. Standard Telephone Network uses
a. Circuit-switching technique
b. Packet-switching technique
c. Broadcasting technique
d. None of the Above

8. Wide Area Network uses


a. Circuit-switching technique
b. Packet-switching technique
c. Broadcasting technique
d. None of the Above

9. A WAN, typically consists of a number of interconnected


a. Routers
b. Switching Nodes
c. Bridges
d. None of the Above

10. The network in which each node connects to exactly two other nodes,
forming a single continuous pathway for signals, is
a. Bus Network
b. Star Network
c. Ring Network
d. None of the Above

11. The network in which each device connected directly to a central


network switch, is
a. Bus Network
b. Star Network
c. Ring Network
d. None of the Above

12. The network in which each device connected to a central node either directly
or through subordinate nodes, is
a. Tree Network
b. Star Network
c. Bus Network
d. None of the Above
13. The network that does not use a specific physical layout, but requires
that each node have more than one connection to other nodes, is
a. Tree Network
b. Star Network
c. Mesh Network
d. None of the Above

14. In Peer-to-Peer (P2P) network,


a. All nodes have equal authority
b. One node is a server and others are clients
c. Several servers and several clients
d. None of the Above

15. In Client/Server network,


a. All nodes have equal authority
b. One or more servers serving several clients
c. Only one server serving one client
d. None of the Above

16. The speed at which a communication device transfers data, is


a. Data rate
b. Communication rate
c. Transfer rate
d. None of the Above

17. The Transfer rate of a communication device is measured as


a. GHz
b. bits per second (bps)
c. Bytes per second
d. None of the Above

18. The current dominant standard for local area networking devices, is
a. Ethernet
b. Bluetooth
c. Infrared
d. None of the Above

19. The inexpensive short-range networking technology used for


computer-to-device connections such as computer-to-printer or phone-to-
headset, is
a. Ethernet
b. Bluetooth
c. Infrared
d. None of the Above

20. The communications device that provides a central gathering point for
all the computers in a LAN to connect, is
a. Router
b. Bridge
c. Switch/hub
d. None of the Above

21. The Internet is based on a protocol stack (a set of protocols) called


a. HyperText Transfer Protocol (HTTP)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Simple messaging Transfer Protocol (SMTP)
d. None of the Above

22. The Internet is based on a protocol stack (a set of protocols) called


a. HyperText Transfer Protocol (HTTP)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Simple messaging Transfer Protocol (SMTP)
d. None of the Above

23. Which of these is a valid IP address in IPv4?


a. 186-69-10-1
b. 186.69.10.1
c. 186,69,10,1
d. None of the Above

24. The system that allows multiple computers to connect together to


share resources is called
a. Computer Network
b. Connected System
c. Shared Computers
d. None of the Above

25. The Internet is


a. A Local Area Network
b. A large Infrastructure of connected networks
c. A Wide Area Network
d. None of the Above

26. The Internet uses the following suite of protocols


a. HTTP
b. SMTP
c. TCP/IP
d. None of the Above

27. The Internet of Things (IoT) technology allows


a. All types of devices to communicate
b. Sharing data and resources
c. only computers to communicate
d. None of the Above

28. The special network that only staff within the company network can
access, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above

29. The special network set up by a business for its customers, staff, and
business partners to access from outside the office network, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above

30. The special network set up by a business for its customers, staff, and
business partners to access from outside the office network, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above

True/False Question

1. The internal data rates of LANs are typically much smaller than those of
WANs.
a. True
b. False

2. The Transfer Control Protocol TCP is an End-to-End protocol allowing the


data transfer between two points (computers) on the Internet.
a. True
b. False
3. The Internet Protocol is an internetworking protocol. The IP provides a
connectionless, or data gram, service between end systems.
a. True
b. False

4. The Internet is structured as a mesh of routers and servers connected to


one another at multiple points.
a. True
b. False

5. In packet-switching networks, data are transmitted in short packets. A


typical upper bound on packet length is 1000 bytes.
a. True
b. False

6. Wi-Fi is a synonym for Bluetooth.


a. True
b. False

7. The Internet is based on Ethernet protocol suite.


a. True
b. False

8. A Client/server network contains at least one server.


a. True
b. False

9. A Server is a computer dedicated to serving the network to which it is


connected.
a. True
b. False

10. IP addresses are written and displayed in human-readable notations,


such as 172.16.254.1 in IPv4.
a. True
b. False
Question Bank – Topic3 – Computer Software
Multiple Choice Question

1. Which of these is NOT part of system software?


a. Operating System
b. Payroll application
c. Utilities
d. Device drivers

2. The component of system software that manages computer resources, is


a. Operating System
b. Payroll application
c. Utilities
d. Device drivers

3. The component of system software that provides user interface, is


a. Utilities
b. Payroll application
c. Operating System
d. Device drivers

4. The component of system software that monitors system performance, is


a. Utilities
b. Payroll application
c. Database Management System
d. None of the Above

5. The component of system software that support system security, is


a. Operating System
b. Payroll application
c. Database Management System
d. None of the Above

6. The component of system software that starts up the computer, is


a. Utilities
b. Payroll application
c. Operating System
d. None of the Above
7. The component of system software that schedules tasks, is
a. Utilities
b. Payroll application
c. Operating System
d. None of the Above

8. The component of system software that coordinates memory, processing,


storage, printers and monitors, is
a. Utilities
b. Payroll application
c. Operating System
d. None of the Above

9. The component of system software that schedules multitasking, is


a. Utilities
b. Payroll application
c. Operating System
d. None of the Above

10. Most operating systems store data and programs in a system of


a. Documents
b. Files and folders
c. Database
d. None of the Above

11. Most operating systems store data and programs in a system of


a. Documents
b. Files and folders
c. Database
d. None of the Above

12. Which of these is NOT a category of an Operating System?


a. Embedded Operating System
b. Standalone Operating System
c. Network Operating System
d. None of the Above

13. A Video game system runs with


a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above
14. A Smart Phone runs with
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above

15. A Desktop Computer runs with


a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above

16. A laptop Computer runs with


a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above

17. A Tablet runs with


a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above

18. The type of Operating System that coordinates the communications


between connected computers, is
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above

19. Android and iPhone OS are


a. Embedded operating systems
b. Standalone operating systems
c. Network operating systems
d. None of the Above

20. Which of these IS NOT a utility software?


a. Troubleshooting or diagnostic programs
b. Anti-virus programs
c. File compression programs
d. None of the Above
21. Which of these IS NOT Windows utility software?
a. File history
b. Disk cleanup
c. Disk defragmenter
d. None of the Above

22. The Windows utility software that identifies and eliminates


nonessential files, is
a. File history
b. Disk cleanup
c. Disk defragmenter
d. None of the Above

23. The Windows utility software that rearranges files and unused disk
space to optimize operations, is
a. File history
b. Disk cleanup
c. Disk defragmenter
d. None of the Above

24. The programming language a computer can execute and based on a


set of binary instructions, is
a. High-level programming Language
b. Machine Language
c. Assembly Language
d. None of the Above

25. The programming language whose instructions are in the form of


mnemonic codes and variable names, is
a. High-level programming Language
b. Machine Language
c. Assembly Language
d. None of the Above

26. The programming language which resembles human language, is


a. High-level programming Language
b. Machine Language
c. Assembly Language
d. None of the Above
27. The software that translates a High-level program to machine
language instructions, is
a. Assembler
b. Compiler
c. Utility
d. None of the Above

28. The software that translates an assembly program to machine


language instructions, is
a. Assembler
b. Compiler
c. Utility
d. None of the Above

29. A program written in a High-level programming language, is


a. An object program
b. A Machine program
c. A Source program
d. None of the Above

30. The software that enables end-user to perform a useful task on


computer, is
a. An application software
b. A system software
c. An utility software
d. None of the Above

31. The software that enables end-user to perform a useful task on


computer, is
a. An application software
b. A system software
c. An utility software
d. None of the Above

32. Which of these software would be most appropriate for managing and
storing patient records in a large hospital?
a. Presentation Software
b. Database Management System
c. Spreadsheet Software
d. None of the Above
33. Applications Software are
a. Programs to manage and control computer resource
b. Programs End-users use
c. Communications Software
d. None of the Above

34. The main components of System Software are


a. Development and programming software
b. Applications and Communications programs
c. Operating System and Utilities programs
d. None of the Above

35. Embedded Operating Systems are used by


a. Super Computers
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above

36. Standalone Operating Systems are used by


a. Computer Networks
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above

37. Antivirus Programs are


a. Utilities programs
b. Applications programs
c. Development programs
d. None of the Above

38. Windows and Linux are examples of


a. Utilities programs
b. an Operating System
c. Programming language
d. None of the Above
True/False Question

1. Operating System is NOT part of system software


a. True
b. False

2. The Operating System is the basic component of system software that


manages computer resources
a. True
b. False

3. The Operating System is the basic component of system software that


provides user interface.
a. True
b. False

4. The Operating System is the basic component of system software that


monitors system performance.
a. True
b. False

5. The Operating System is the basic component of system software that


supports system security.
a. True
b. False

6. The Operating System is the basic component of system software that


starts up the computer.
a. True
b. False

7. The Operating System is the basic component of system software that


schedules tasks.
a. True
b. False

8. Applications software id the basic component of system software that


coordinates memory, processing, storage, printers and monitors.
a. True
b. False
9. Utilities is the basic component of system software that schedules
multitasking.
a. True
b. False

10. Most operating systems store data and programs in a system of files
and folders
a. True
b. False

11. The basic categories of an Operating System are Embedded, Standalone


and Network.
a. True
b. False

12. A Video game system runs with a standalone operating system.


a. True
b. False

13. A Smart Phone runs with an embedded operating system.


a. True
b. False

14. A Desktop Computer runs with an embedded operating system.


a. True
b. False

15. A laptop Computer runs with an embedded operating system.


a. True
b. False

16. A Tablet runs with an embedded operating system.


a. True
b. False

17. The type of Operating System that coordinates the communications


between connected computers is an embedded operating system.
a. True
b. False
18. Android and iPhone OS are embedded operating systems.
a. True
b. False

19. Disk defragmenter is the Windows utility software that identifies and
eliminates nonessential files.
a. True
b. False

20. Disk cleanup is the Windows utility software that rearranges files and
unused disk space to optimize operations.
a. True
b. False

21. Machine language is the programming language a computer can execute


and based on a set of binary instructions.
a. True
b. False

22. Assembly language is a programming language whose instructions are


in the form of mnemonic codes and variable names.
a. True
b. False

23. High-level programming Language is a programming language which


resembles human language.
a. True
b. False

24. Assembler is the software that translates a High-level program to


machine language instructions.
a. True
b. Falsse

25. Compiler is the software that translates an assembly program to


machine language instructions.
a. True
b. False
26. A program written in a High-level programming language is an Object
program.
a. True
b. False

27. Applications software enables end-user to perform a useful task on


computer.
a. True
b. False

28. Database Management System would be most appropriate for managing


and storing patient records in a large hospital?
a. true
b. False

29. Applications Software are programs to manage and control computer


resource.
b. True
c. False

30. Operating System and Utilities programs are the main components of
System Software.
a. True
b. false

31. Embedded Operating Systems are used by Desktop and Laptop


computers.
a. True
b. False

32. Standalone Operating Systems are used by Smart phones and tablets.
a. True
b. False

33. Antivirus Programs are Utilities programs


a. true
b. False
34. Computer games are a type of application software.
a. True
b. False

35. Embedded Operating Systems are used by Desktop and Laptop


Computers
a. True
b. False
Question Bank – Topic5 – Emerging Internet Applications
Multiple Choice Question

1. Which of these is NOT an Internet application?


a. World Wide Web (WWW)
b. Electronic Mail
c. Online Communications
d. None of the Above

2. The World Wide Web is based on


a. HyperText Transfer Protocol (HTTP)
b. Transmission Control/Internet Protocol (TCP/IP)
c. Simple Messaging Transfer Protocol (SMTP)
d. None of the Above

3. A Web page on WWW is formatted using


a. High-level programming language
b. Extensible Markup Language (XML)
c. HyperText Markup Language (HTML)
d. None of the Above

4. The set of characters that we enter into our web browser’s address bar to
navigate to a specific web page is called
a. IP Address
b. Uniform Resource Locator (URL)
c. Page Address
d. None of the Above

5. Which of these is a valid Uniform Resource Locator (URL)?


a. http://www.bbc.co.uk/news/story24871.htm
b. smtp://www.bbc.co.uk/news/story24871.htm
c. ftp://www.bbc.co.uk/news/story24871.htm
d. None of the Above

6. The application that builds an index of sites on the Internet. Users can
then search that database using keywords or phrases to find sites that
contain the information they need.
a. File Download
b. World Wide Web (WWW)
c. Search Engine
d. None of the Above
7. Which of these IS NOT an Online Communications application on the
Internet?
a. Instant Messaging
b. Social Networking
c. Voice over IP (VoIP)
d. None of the Above

8. The Internet application in which the message is sent immediately rather


than waiting for the recipient to log on to the service to retrieve his
messages, is called
a. Voice over IP (VoIP)
b. Electronic Mail (Email)
c. Instant Messaging (IM)
d. None of the Above

9. WhatsApp is an Internet application of type


a. Instant Messaging (IM)
b. Newsgroups
c. Forums
d. None of the Above

10. The web page where an individual or group publishes stories, essays,
or articles that are generically referred to as posts.
a. Wiki
b. Blog
c. Social Network
d. None of the Above

11. The online database of information that any user can copy or amend
using a web interface, is
a. A Wiki
b. A Blog
c. A Newsgroup
d. None of the Above

12. Skype, which is an Internet application used to make phone calls and
sometimes video calls over a broadband, Wi-Fi, or cellular mobile web
connection. Skype uses the online communications technique of
a. Social Networking
b. Instant Messaging (IM)
c. VoIP
d. None of the Above
True/False Question

1. Electronic Mail (Email) is an instant messaging application on the


Internet.
a. True
b. False

2. Electronic Mail (Email) is a store-and-forward and not an instant


messaging application on the Internet.
a. True
b. False

3. A hashtag, or simply, a tag is a topic or a subject assigned to a social


networking post (Example: #Egypt)
a. True
b. False

4. The Uniform Resource Locator (URL) is a set of characters that we enter


into our web browser’s address bar to navigate to a specific web page.
a. True
b. False

5. A Search Engine is an application that builds an index of sites on the


Internet. Users can then search that database using keywords or phrases
to find sites that contain the information they need.
a. True
b. False

6. Electronic Mail (Email) is an Internet application in which the message is


sent immediately rather than waiting for the recipient to log on to the
service to retrieve his messages.
a. True
b. False

7. Instant messaging is an Internet application in which the message is sent


immediately rather than waiting for the recipient to log on to the service
to retrieve his messages.
a. True
b. False
8. A Wiki is an online database of information that any user can copy or
amend using a web interface.
a. True
b. False

9. Skype is an instant messaging Internet application used to make phone


calls and sometimes video calls over a broadband, Wi-Fi, or cellular
mobile web connection.
a. True
b. False

10. Wiki is a web page where an individual or group publishes stories,


essays, or articles that are generically referred to as posts.
a. True
b. False
Question Bank – Topic 6 – Cybersecurity
Multiple Choice Question

1. Which of these is NOT a computer security concern?


a. Having your PC stolen
b. Losing data
c. Buying pirated software
d. None of the Above

2. Which of these is NOT a common Internet threat?


a. Spoofing
b. Sniffing
c. Phishing
d. None of the Above

3. The capability to capture copies of data packets as they travel across the
network and decode their content, is called
a. Spoofing
b. Sniffing
c. Phishing
d. None of the Above

4. The Internet attack in which making repeated requests of a computer or


network device, thereby overloading it and causing legitimate requests to be
ignored, is called
a. Spoofing
b. Sniffing
c. Phishing
d. None of the Above

5. Which of these is NOT a malware program


a. Anti-virus program
b. Worm
c. Trojan
d. None of the Above

6. Which of these is the malware program hides on a hard drive, CD, or e-mail
and causes unexpected side effects such as destroying or corrupting data.
a. virus
b. Worm
c. Trojan
d. None of the Above
7. Which of these is the malware program that copies itself repeatedly into a
computer’s memory or disk drive.
a. virus
b. Worm
c. Trojan
d. None of the Above

8. Which of these is the malware program that pretend to be a useful program


such as a free game or screensaver.
a. virus
b. Worm
c. Trojan
d. None of the Above

9. The encoding of data by a special algorithm that renders the data unreadable
by any program without the decryption key, is
a. Compression
b. Encryption
c. Decompression
d. None of the Above

10. Which of these is the technology that creates a secure, tamper-resistant


data tunnel between two points on the Internet.
a. VPN (Virtual Private Network)
b. Encryption
c. Compression
d. None of the Above

True/False Question

1. All computer users should not be aware of the possible security risks and
know some safeguards to prevent against security problems since these
problems can cost you time and money, as well as be an inconvenience.
a. True
b. False

2. The internet is open-access and is used by some people who are not
trustworthy, who take advantage of the lack of built-in safeguards.
a. True
b. False
3. Hackers are those criminals who gain unauthorized access to computers
or networks to make illegal operations (not good/black hat)).
a. True
b. False

4. Crackers are malicious hackers who break into computers for malicious
purposes.
a. True
b. False

5. In Spoofing Internet attack, attackers try to trick unsuspecting users into


giving away personal information such as login details or credit card
information.
a. True
b. False

6. In Phishing Internet attack, attackers try to trick unsuspecting users into


giving away personal information such as login details or credit card
information.
a. True
b. False

7. In spoofing Internet attack, the attacker’s computer assumes a false


Internet address in order to gain access to a network.
a. True
b. False

8. In sniffing Internet attack, the attacker’s computer assumes a false


Internet address in order to gain access to a network.
a. True
b. False

9. In sniffing Internet attack, attacker’s computer tries to capture copies of


data packets as they travel across the network and decode their content.
a. True
b. False

10. In spoofing Internet attack, attacker’s computer tries to capture copies of


data packets as they travel across the network and decode their content.
a. True
b. False
11. Password cracking is the act of attempting to identify a user’s username in
order to gain access to a system or program.
a. True
b. False

12. Denial of Service (DoS) is the Internet attack in which making repeated
requests of a computer or network device, thereby overloading it and causing
legitimate requests to be ignored.
a. True
b. False

13. Spoofing is the Internet attack in which making repeated requests of a


computer or network device, thereby overloading it and causing legitimate
requests to be ignored.
a. True
b. False

14. Sniffing is the Internet attack in which making repeated requests of a


computer or network device, thereby overloading it and causing legitimate
requests to be ignored.
a. True
b. False

15. Phishing is the Internet attack in which making repeated requests of a


computer or network device, thereby overloading it and causing legitimate
requests to be ignored.
a. True
b. False

16. Worm is a malware program.


a. True
b. False

17. Trojan is a malware program.


a. True
b. False

18. Virus is a malware program.


a. True
b. False

19. Anti-virus is a malware program.


a. True
b. False

20. Virus is a malware program that hides on a hard drive, CD, or e-mail that
causes unexpected side effects such as destroying or corrupting data.
a. True
b. False

11. Trojan is a malware program that hides on a hard drive, CD, or e-mail and
causes unexpected side effects such as destroying or corrupting data.
a. True
b. False

12. Worm is a malware program hides on a hard drive, CD, or e-mail and causes
unexpected side effects such as destroying or corrupting data.
a. True
b. False

Worm is a malware program that copies itself repeatedly into a computer’s


memory or disk drive.
a. True
b. false

13. Virus is a malware program that copies itself repeatedly into a computer’s
memory or disk drive.
a. True
b. false

14. Trojan is a malware program that copies itself repeatedly into a computer’s
memory or disk drive.
a. True
b. false

15. Trojan is a malware program that pretend to be a useful program such as a


free game or screensaver.
a. True
b. False

16. Virus is a malware program that pretend to be a useful program such as a


free game or screensaver.
a. True
b. False

17. Worm is a malware program that pretend to be a useful program such as a


free game or screensaver.
a. True
b. False

18. Encryption is the encoding of the data by a special algorithm that renders
the data unreadable by any program without the decryption key.
a. True
b. False

19. Virtual Private Network (VPN) is the technology that creates a secure,
tamper-resistant data tunnel between two points on the Internet.
a. True
b. False
Question Bank – Topic 7 – Data Representation & Number Systems
Multiple Choice Question

1. The number system that we are familiar with, that we use every day, is
a. Octal Number System
b. Binary Number System
c. Decimal Number System
d. None of the Above

2. The number system that every computer uses to represent, store and
process data, is
a. Octal Number System
b. Binary Number System
c. Decimal Number System
d. None of the Above

3. The base of the decimal number system is


a. 8
b. 10
c. 2
d. None of the Above

4. The base of the binary number system is


a. 8
b. 10
c. 2
d. None of the Above

5. The binary number system uses only the digits


a. 0 and 1
b. 0, 1 and 3
c. 0, 1, 2, …, 8, and 9
d. None of the Above

6. The decimal number system uses the digits


a. 0 and 1
b. 0, 1 and 3
c. 0, 1, 2, …, 8, and 9
d. None of the Above

7. All data in a computer is represented in


a. decimal
b. binary
c. hexadecimal
d. None of the Above

8. The decimal value of the binary number 1110 is


a. 12
b. 14
c. 10
d. None of the Above

9. The decimal value of the binary number 1111 is


a. 12
b. 14
c. 10
d. None of the Above

10. The decimal value of the binary number 1001 is


a. 11
b. 9
c. 10
d. None of the Above

11. The decimal value of the binary number 10000 is


a. 12
b. 14
c. 16
d. None of the Above

12. The binary representation of the decimal number 15 is


a. 1111
b. 1110
c. 10000
d. None of the Above

13. The binary representation of the decimal number 9 is


a. 1101
b. 1110
c. 1000
d. None of the Above

14. The binary representation of the decimal number 16 is


a. 11010
b. 11100
c. 10000
d. None of the Above
15. The addition of the two binary numbers 101 and 101 is
a. 1010
b. 202
c. 1011
d. None of the Above

16. The addition of the two binary numbers 111 and 111 is
a. 1010
b. 222
c. 1011
d. None of the Above

17. The addition of the two binary numbers 1111 and 1111 is
a. 11110
b. 2222
c. 11111
d. None of the Above

18. The largest integer decimal that can be stored in 4 bits is


a. 8
b. 16
c. 15
d. None of the Above

19. The largest integer decimal that can be stored in 8 bits is


a. 128
b. 256
c. 64
d. None of the Above

20. The largest integer decimal that can be represented in 4 bits sign-and-
magnitude is
a. +8
b. +7
c. +6
d. None of the Above

21. The smallest integer decimal that can be represented in 4 bits sign-
and-magnitude is
a. -8
b. -7
c. -6
d. None of the Above

22. The 2’s complement representation of +4 in 4 bits is


a. 0100
b. 1100
c. 100
d. None of the Above

23. The 2’s complement representation of -4 in 4 bits is


a. 0100
b. 1100
c. 100
d. None of the Above

True/False Question

1. The Octal number system is the system we are familiar with, and we use
every day.
a. True
b. False

2. The decimal number system is the system we are familiar with, and we
use every day.
a. True
b. False

3. The octal number system is the system every computer uses to


represent, store and process data.
a. True
b. False

4. The binary number system is the system every computer uses to


represent, store and process data.
a. True
b. False

5. The decimal number system is the system every computer uses to


represent, store and process data.
a. True
b. False

6. The binary number system uses only the digits 0, 1 and 2.


a. True
b. False
7. The binary number system uses only the digits 0 and 1.
a. True
b. False

8. The decimal number system uses the digits 0, 1, 2, …, 8, and 9.


a. True
b. False

9. The base of the decimal number system is 10.


a. True
b. False

10. The base of the decimal number system is 8.


a. True
b. False

11. The base of the binary number system is 10.


a. True
b. False

a. The base of the binary number system is 2.


b. True
c. False

12. All data in a computer is represented in binary.


a. True
b. False

13. All data in a computer is represented in octal.


a. True
b. False

14. All data in a computer is represented in decimal.


a. True
b. False

15. All data in a computer is represented in hexadecimal.


a. True
b. False

16. The decimal value of the binary number 1110 is 13.


a. True
b. False
24. The addition of the two binary numbers 101 and 101 is 1000.
a. True
b. False

25. The addition of the two binary numbers 101 and 101 is 1010.
a. True
b. False

26. The addition of the two binary numbers 111 and 111 is 1110.
a. True
b. False

27. The addition of the two binary numbers 1111 and 1111 is 21111.
a. True
b. False

28. The largest unsigned integer that can be represented in 3 bits is 9.


a. True
b. False

29. The largest unsigned integer that can be represented in 4 bits is 15.
a. True
b. False

30. The largest signed integer that can be represented in 4 bits sign-and-
magnitude is +7.
a. True
b. False
Question Bank – Topic 8 – Problem Solving Concepts

True/False Question

1. An algorithmic problem is any problem whose solution can be expressed


as a list of executable instructions.
a. True
b. False

2. Taking the sum of a finite list of numbers is an algorithmic problem.


a. True
b. False

3. Taking the sum of all positive integers is an algorithmic problem.


a. True
b. False

4. Sorting a finite list of names is an algorithmic problem.


a. True
b. False

5. An algorithm is a sequence of infinite executable instructions that lead to


a solution.
a. True
b. False

6. An algorithm is a sequence of precise executable instructions that lead to


a solution.
a. True
b. False

7. An algorithm should include the minimal number of instructions leading to


the solution.
a. True
b. False

8. The Software Engineering methodology involves the development phases


of Analysis, Design, Implementation, Testing and Documentation.
a. True
b. False
9. A variable in a computer program is an identifier (name) that will be
carrying a value.
a. True
b. False

10. A variable in a computer program will be carrying only one value at a


time but could not be changed throughout the execution of the program.
a. True
b. False

11. A constant in a computer program is an identifier that will be given a


data type and a fixed value that is not subject change throughout the
execution of the program.
a. True
b. False

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy