questions and answers on computer awareness€¦ · computer awareness 1. in a survey of more than...

41
1

Upload: others

Post on 16-Jul-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

1

Page 2: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

2

Questions and answers on

Computer Awareness

1. In a survey of more than 500 companies and

government agencies, ____________ percent detected

computer security breaches.

A. 20

B. 75

C. 85

D. 99

Answer: C

2. The survey showed that these businesses lost more

than ____________ due to security breaches.

A. $100,000 each

B. $377 million

C. five employees each

D. $1 million

Answer: B

3. The typical computer criminal is a(n):

A. young hacker.

B. trusted employee with no criminal record.

C. trusted employee with a long, but unknown criminal

record.

D. overseas young cracker.

Answer: B

Page 3: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

3

4. The majority of computer crimes are committed by:

A. hackers.

B. insiders.

C. overseas criminals.

D. young teenage computer geniuses.

Answer: B

5. The common name for the crime of stealing

passwords is:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing

as another individual is known as the crime of:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: B

7. Malicious software is known as:

A. badware.

B. malware.

C. maliciousware.

D. illegalware.

Answer: B

8. A program that performs a useful task while

simultaneously allowing destructive acts is a:

Page 4: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

4

A. worm.

B. Trojan horse.

C. virus.

D. macro virus.

Answer: B Moderate

9. An intentionally disruptive program that spreads from

program to program or from disk to disk is known as a:

A. Trojan horse.

B. virus.

C. time bomb.

D. time-related bomb sequence.

Answer: B

10. In 1999, the Melissa virus was a widely publicized:

A. e-mail virus.

B. macro virus.

C. Trojan horse.

D. Time bomb.

Answer: A

11. What type of virus uses computer hosts to reproduce

itself?

A. Time bomb

B. Worm

C. Melissa virus

D. Macro virus

Answer: B

12. The thing that eventually terminates a worm virus is

a lack of:

A. memory or disk space.

Page 5: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

5

B. time.

C. CD drive space.

D. CD-RW.

Answer: A

13. When a logic bomb is activated by a time-related

event, it is known as a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

14. A logic bomb that was created to erupt on

Michelangelo’s birthday is an example of a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

15. What is the name of an application program that

gathers user information and sends it to someone through

the Internet?

A. A virus

B. Spybot

C. Logic bomb

D. Security patch

Answer: B

16. Standardization of Microsoft programs and the

Windows operating system has made the spread of

Page 6: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

6

viruses:

A. more complicated.

B. more difficult.

C. easier.

D. slower.

Answer: C

17. HTML viruses infect:

A. your computer.

B. a Web page in the HTML code.

C. both a Web page and the computer that is viewing it.

D. No

Answer: B

18. Software programs that close potential security

breaches in an operating system are known as:

A. security breach fixes.

B. refresh patches.

C. security repairs.

D. security patches.

Answer: D

19. When customers of a Web site are unable to access it

due to a bombardment of fake traffic, it is known as:

A. a virus.

B. a Trojan horse.

C. cracking.

D. a denial of service attack.

Answer: D

20. ___________ is the measurement of things such as

fingerprints and retinal scans used for security access.

Page 7: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

7

A. Biometrics

B. Biomeasurement

C. Computer security

D. Smart weapon machinery

Answer: A

21. What is the most common tool used to restrict access

to a computer system?

A. User logins

B. Passwords

C. Computer keys

D. Access-control software

Answer: B

22. The most common passwords in the U.S. or Britain

include all EXCEPT:

A. love.

B. Fred.

C. God.

D. 123.

Answer: D

23. Hardware or software designed to guard against

unauthorized access to a computer network is known as

a(n):

A. hacker-proof program.

B. firewall.

C. hacker-resistant server.

D. encryption safe wall.

Answer: B

Page 8: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

8

24. The scrambling of code is known as:

A. encryption.

B. a firewall.

C. scrambling.

D. password-proofing.

Answer: A

25. If you want to secure a message, use a(n):

A. cryptology source.

B. encryption key.

C. encryption software package.

D. cryptosystem.

Answer: D Reference: How It Works: 10.2

Cryptography

26. To prevent the loss of data during power failures, use

a(n):

A. encryption program.

B. surge protector.

C. firewall.

D. UPS.

Answer: D

27. A(n) ____________ can shield electronic equipment

from power spikes.

A. encryption program

B. surge protector

C. firewall

D. UPS

Answer: B

Page 9: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

9

28. All of these are suggestions for safe computing

EXCEPT:

A. don’t borrow disks from other people.

B. open all e-mail messages but open them slowly.

C. download shareware and freeware with caution.

D. disinfect your system.

Answer: B

29. Freeware ___________ encrypts data.

A. encryption

B. firewall software

C. PGP

D. private and public keys

Answer: C

30. ____________ is defined as any crime completed

through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

Answer: B

31. Most computer systems rely solely on ___________

for authentication.

A. logins

B. passwords

C. encryption

D. lock and key

Answer: B

Page 10: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

10

32. Creating strong computer security to prevent

computer crime usually simultaneously helps protect :

A. privacy rights.

B. personal ethics.

C. the number of cookies downloaded to your personal

computer.

D. personal space.

Answer: A

33. Over ___________ was spent by businesses and

government to repair problems in regard to Y2K.

A. 20 million dollars

B. 100 million dollars

C. 1 billion dollars

D. 100 billion dollars

Answer: D

34. What is a complex system that takes on nearly

complete responsibility for a task eliminating the need

for people, verification, or decision making?

A. Autonomous system

B. Missile defense auto-system

C. Smart weapon

D. Independent system

Answer: D

35. Security procedures can:

A. will eliminate all computer security risk.

B. reduce but not eliminate risks.

C. are prohibitively expensive.

D. are inaccessible for the average home user.

Answer: B

Page 11: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

11

Fill in the Blank:

36. The field of computer ____________ uses special

software to scan hard drives of potential criminal

suspects.

Answer: forensics Reference: Online Outlaws:

Computer Crime Difficulty: Challenging

37. Computer ____________ often goes unreported

because businesses fear negative publicity.

Answer: crime

38. ____________ connections are the most frequent

point of attack for Internet commerce.

Answer: Internet

39. ____________ is the most common form of

computer crime.

Answer: Theft

40. A survey by eMarketer.com found that

____________ are the most often cited online fraud

cases.

Answer: online auctions Reference: Identity Theft

41. Theft of computers is most common for PDAs and

____________ computers.

Answer: notebook

42. When you use a disk in several different computers

within the same day, you are taking the chance of

contracting a(n) ____________.

Answer: virus Reference: Viruses Difficulty: Easy

Page 12: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

12

43. A(n) ____________ attaches itself to documents that

contain embedded programs that automate tasks.

Answer: macro virus

44. Both viruses and ____________ use computer hosts

to replicate.

Answer: worms

45. ____________ programs search for and eliminate

viruses.

Answer: Antivirus

46. A security patch is a software program that closes

possible security breaches in the operating system. The

cost to the consumer is ____________.

Answer: nothing or free

47. ____________ was once the word used for malicious

computer wizardry.

Answer: Hackers or hacking

48. ____________ refers to electronic trespassing or

criminal hacking.

Answer: Cracking

49. DoS stands for ___________.

Answer: denial of service

50. DDoS stands for ___________.

Answer: distributed denial of service

Page 13: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

13

51. ____________ hijack Web pages and redirect users

to other sites.

Answer: Webjackers

52. ___________ software monitors and records

computer transactions.

Answer: Audit-control

53. Each individual who uses a public key cryptosystem

has ___________ keys.

Answer: two Reference: How It Works: 10.2

Cryptography

54. PGP stands for ___________.

Answer: Pretty Good Privacy

55. Most operating systems, including Windows XP,

assign each user a unique ___________.

Answer: user identifier or user ID

56. It should now be common knowledge that users

should not open ___________ from e-mail recipients

that the user does not know.

Answer: attachments

Matching:

57. Match the acts and centers with their purposes:

I. Computer Fraud and Abuse Act A. created by

Attorney General Janet Reno in 1998

II. USA Patriot Act B. defines what kinds of

communications are legal online

Page 14: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

14

III. Digital Millennium Copyright Act C. created in 2001

as a response to the terrorist attacks of September 11,

2001

IV. Telecommunications Act of 1996 D. provides instant

information on crimes and criminals

V. Communications Decency Act E. declared

unconstitutional by the Supreme Court

VI. National Infrastructure Protection Center F. created

as a result of the first headline-making worm

VII. National Crime Information Center G. used to arrest

a student for writing to crack an Adobe product

Answers: F, C, G, B, E, A, D

58. Match the following rules of thumb about safe

computing with the proper descriptions:

I. share with care A. be aware of e-mail from what

appear to be legitimate companies

II. handle e-mail carefully B. don’t choose a dictionary

word

III. disinfect regularly C. keep your disks in your own

computer

IV. take your password seriously D. copy, copy, copy

V. if it’s important, back it up E. encrypt

VI. sensitive info over the Internet? F. use antivirus

software

Answers: C, A, F, B, D, E

Section two

1. Lotus Organizer and Corel Central are examples of

____________ software.

A. analytical

Page 15: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

15

B. database

C. presentation

D. PIM

Answer: D

2. For which of the following tasks would PIM software

be most useful?

A. Drafting a memo

B. Maintaining a schedule

C. Calculating a budget

D. Keeping track of recipes

Answer: B

3. The smallest unit of information in a database is called

a:

A. byte.

B. record.

C. field.

D. cell.

Answer: C

4. In a database of employees, all the information about a

particular person would constitute a:

A. file.

B. record.

C. field.

D. table.

Answer: B

5. A table is a collection of:

A. files.

B. worksheets.

Page 16: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

16

C. fields.

D. records.

Answer: D

6. A ____________ is a small program that helps to

automate a frequently used series of commands in most

productivity software tools.

A. template

B. macro

C. utility

D. wizard

Answer: B

7. If you are using a template in a productivity software

application, you are most likely trying to:

A. assign a basic theme or structure to the file with

which you are working.

B. perform a series of steps in a time-efficient manner.

C. gain assistance in performing complicated tasks.

D. combine different documents together to form a

single integrated whole.

Answer: A

8. Software providers who develop many productivity

tools may also provide stripped-down versions that

combine the simpler features of these tools bundled

together into a(n):

A. software suite.

B. personal information manager.

C. integrated software application.

D. limited software edition.

Answer: C

Page 17: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

17

9. Microsoft Office is an example of a(n):

A. software suite.

B. open-source product.

C. integrated software application.

D. business-management application.

Answer: A

10. When talking to a speech recognition program, the

program divides each second of your speech into 100

separate:

A. phonemes.

B. codes.

C. samples.

D. words.

Answer: C

11. A speech recognition system’s codebook values are

matched against a database of ____________ as an early

step in word construction.

A. phonemes

B. codes

C. samples

D. words

Answer: A

12. Quicken and TurboTax are both personal financial

products developed by:

A. Microsoft.

B. Corel.

C. Intuit.

D. Adobe.

Answer: C

Page 18: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

18

13. Individuals who want software to assist in automated

checkbook balancing and bill paying for their personal

bank and credit card accounts will likely use which of

the following software products?

A. Microsoft Project

B. QuickBooks

C. Acrobat

D. Quicken

Answer: D

14. Small business owners who want software to assist in

managing accounts payable and receivable will likely

use which of the following software products?

A. QuickBooks

B. Business Plan Pro

C. Quicken

D. Microsoft Project

Answer: A

15. If you want software to assist in estimating the time

it takes for a sequence of tasks to be accomplished and to

track the progress of people working on these tasks,

which of the following software products would you

use?

A. Microsoft Project

B. Front Page

C. Business Plan Pro

D. Visio

Answer: A

16. Which of the following software products is most

appropriate for plotting out your company’s corporate

Page 19: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

19

strategy?

A. Microsoft Project

B. Front Page

C. Business Plan Pro

D. Visio

Answer: C

17. The category of software most appropriate for

controlling the design and layout of complex documents

like newsletters and brochures is:

A. word processing.

B. computer-aided design.

C. Web page authoring.

D. desktop publishing.

Answer: D

18. Which of the following software products would you

use in order to enhance the quality of a photograph that

you have recently imported from your digital camera,

and would likely have been included with the digital

camera when you bought it?

A. ArcSoft

B. Visio

C. Dreamweaver

D. TurboCad

Answer: A

19. Drawing flow charts, block diagrams, and other

technical graphics is best accomplished using which of

the following software products?

A. Jasc Paint Shop Pro

B. Microsoft Visio

Page 20: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

20

C. Macromedia Dreamweaver

D. Adobe Illustrator

Answer: B

20. CAD software is most likely to be used by:

A. Web designers.

B. engineers.

C. project managers.

D. magazine editors.

Answer: B

21. All of the following are tasks performed by the

operating system EXCEPT:

A. managing hardware on the computer.

B. controlling the access that application programs have

to the CPU.

C. performing housekeeping tasks like file compression

and disk defragmentation.

D. providing an interface for users to interact with the

computer.

Answer: C

22. The category of operating system that you most

likely have running on your desktop or laptop computer

at home is a ____________ operating system.

A. real-time

B. single-user, single-task

C. single-user, multi-task

D. multi-user, multi-task

Answer: C

Page 21: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

21

23. The category of operating system that you most

likely have running on your PDA computer is a

____________ operating system.

A. real-time

B. single-user, single-task

C. single-user, multi-task

D. multi-user, multi-task

Answer: B

24. Which of the following is an example of a real-time

operating system?

A. Lynx

B. MS DOS

C. Windows XP

D. Symbian

Answer: A

25. A real-time operating system is most likely to be

used for which of the following tasks?

A. Controlling access to a shared printer in a network

B. Ensuring that the system clock works correctly on a

server

C. Managing the access to system files in a laptop

computer

D. Controlling the fuel injection system of an automobile

engine

Answer: D

26. An essential difference between the operating system

that runs a typical desktop computer and the operating

system that runs a typical PDA is that:

A. the desktop OS has a graphical user interface whereas

Page 22: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

22

the PDA OS does not.

B. the desktop OS can run several programs

simultaneously whereas the PDA OS cannot.

C. the desktop OS manages hardware resources whereas

the PDA OS does not.

D. the desktop computer has an OS whereas a PDA does

not.

Answer: B

27. The MS-DOS operating system is a:

A. graphical user interface, single-tasking operating

system.

B. graphical user interface, multi-tasking operating

system.

C. command-driven interface, single-tasking operating

system.

D. command-driven interface, multi-tasking operating

system.

Answer: C

28. Which of the following was an early desktop

operating system that included an integrated graphic user

interface with point-and-click features?

A. MS-DOS

B. Mac OS

C. Unix

D. Gnome

Answer: B

Page 23: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

23

29. The most recent version of the Mac OS is based on

the ____________ operating system.

A. Windows

B. Linux

C. Unix

D. CMOS

Answer: C

30. The ____________ operating system was initially

created in the early 1970s at AT&T’s Bell Labs.

A. Linux

B. DOS

C. Unix

D. GNU

Answer: C

31. The essential difference between an operating system

like Linux and one like Windows is that:

A. Windows can run with an Intel processor, whereas

Linux cannot.

B. Linux is proprietary, whereas Windows is not.

C. any programmer can modify Linux code, which is not

permitted with Windows.

D. there are multiple versions of Linux, but only one

version of Windows.

Answer: C

32. Which of the following is a correct association

between a vendor and an operating system?

A. Redhat ? Linux

B. AT&T ? MS DOS

C. Microsoft ? Unix

Page 24: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

24

D. Novell ? Linux

Answer: A

33. Which of the following is NOT an advantage of

open-source operating systems over proprietary

versions?

A. Free use and distribution

B. Availability of technical support

C. Availability of source code

D. Ability to modify code

Answer: B

34. Use of icons and windows are characteristic of a

____________ interface.

A. command-driven

B. windows-oriented

C. graphical-user

D. menu-driven

Answer: C

35. The ability of an operating system to control the

activities of multiple programs at the same time is called:

A. multitasking.

B. multi-processing.

C. multi-operating.

D. multi-paging.

Answer: A

36. The operating system controls access to the CPU by

assigning a(n) ____________ to each task requiring

CPU utilization.

A. interrupt handler

Page 25: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

25

B. slices of time

C. stack

D. event

Answer: B

37. When a peripheral device needs immediate attention

from the operating system, it generates a(n):

A. interrupt.

B. spool.

C. stack.

D. page file.

Answer: A

38. User actions such as keystrokes or mouse clicks are

referred to as:

A. interrupts.

B. tasks.

C. events.

D. processes.

Answer: C

39. An interrupt handler is a:

A. location in memory that keeps track of recently

generated interrupts.

B. hardware device that manages the interrupts generated

by peripheral units.

C. utility program that communicates interrupts to the

operating system.

D. special numeric code that indicates the priority of an

interrupt.

Answer: D

Page 26: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

26

40. A spooler is a:

A. location in memory that maintains the contents of a

document until it prints out.

B. queue of print jobs that are waiting to print.

C. program that coordinates the print jobs that are

waiting to process.

D. message sent from the printer to the operating system

when a print job is completed.

Answer: C

41. Virtual memory is typically located:

A. in RAM.

B. in the CPU.

C. in a flash card.

D. on the hard disk.

Answer: D

42. The purpose of a swap (or page) file is to:

A. maintain pages of documents that are being spooled

to the printer.

B. hold a program’s data or instructions in virtual

memory when it can’t fit in RAM.

C. prevent thrashing in a multi-tasking environment.

D. allow multiple print jobs to print their pages out

simultaneously.

Answer: B

43. Thrashing is caused by:

A. over-reliance on swapping to virtual memory.

B. insufficient hard disk space.

C. too many processors being managed by the operating

system.

Page 27: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

27

D. inaccurate information stored in the registry.

Answer: A

44. Communication between the operating system and a

peripheral device such as a CD-ROM drive or a printer is

facilitated by a(n):

A. spooler.

B. network card.

C. device driver.

D. application program interface.

Answer: C

45. Common functions and routines that need to be

executed by many computer programs can be made

available via a(n) ____________, which prevents the

necessity for programmers to duplicate the effort of

writing the same type of code.

A. utility program

B. system kernel

C. BIOS directory

D. application program interface

Answer: D

46. Which of the following is the correct sequence of

actions that take place during the boot-up process?

A. Load operating system ? Activate BIOS ? Perform

POST ? Check configuration settings

B. Activate BIOS ? Perform POST ? Load operating

system ? Check configuration settings

C. Perform POST ? Load operating system ? Activate

Page 28: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

28

BIOS ? Check configuration settings

D. Activate BIOS ? Check configuration settings ?

Perform POST ? Load operating system

Answer: B

47. The program that is responsible for loading the

operating system into RAM is the:

A. BIOS.

B. bootstrap program.

C. device driver.

D. supervisor program.

Answer: A

48. The Basic Input/Output system resides in:

A. RAM.

B. ROM.

C. the CPU.

D. memory cache.

Answer: B

49. When you start up the computer, the boot-up stage at

which the BIOS version, manufacturer, and data are

displayed on the monitor is called:

A. bootstrap.

B. power-on self test.

C. system configuration.

D. kernel loading.

Answer: B

50. Part of the POST process is to ensure that the test of

essential peripheral devices coincides with the hardware

configurations that are stored in:

Page 29: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

29

A. ROM.

B. the hard drive.

C. CMOS.

D. cache memory.

Answer: C

Page 30: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

30

Computer General Awareness

1. Programs from the same developer , sold bundled

together , that provide better integration and share

common features , toolbars and menus are known as ….

(A) software suites (B) integrated software packages

(C) software processing packages

(D) personal information managers

(E) none of these

2. A data warehouse is which of the following ?

(A) Can be updated by the end users

(B) Contains numerous naming conventions and formats

(C) Organized around important subject areas (D) Contains only current data

(E) None of these

3. ______________ servers store and manages files for

network users.

(A) Authentication

(B) Main

(C) Web

(D) File (E) None of these

4. All of the following are examples of real security and

privacy risks Except _____

(A) hackers

(B) spam

Page 31: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

31

(C) viruses

(D) identify theft

(E) None of these

5. ___________ terminals (formerly known as cash

registers) are often connected to complex inventory and

sales computer systems .

(A) Data

(B) Sales (C) Query

(D) (Point-of-sale (POS)

(E) None of these

6. The OSI model is divided into _______ processes

called layers.

(A) five

(B) six

(C) seven (D) eight

(E) None of these

7. System software is the set of programs that enables

your computer’s hardware devices and ______ software

to work together.

(A) management

(B) processing

(C) utility

(D) application (E) None of these

8. ________ are specially designed computer chips

reside inside other devices, such as your car or your

Page 32: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

32

electronic thermostat.

(A) Servers

(B) Embedded computers (C) Robotic computers

(D) Mainframes

(E) None of these

9. The following are all computing devices ,

except………

(A) notebook computers

(B) cellular telephones

(C) digital scanners (D) personal digital assistants

(E) None of these

10. in a ring topology , the the computer in possession of

the ______ can trasmit data

(A) packet

(B) data

(C) access method

(D) token (E) None of these

11. This part of operating system manages the essential

peripherals, such as the keyboard, screen , disk drives,

and parallel and serial ports ____

(A) basic input/output system (B) secondary input/output system

(C) peripheral input/output system

(D) marginal input/output system

(E) None of these

Page 33: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

33

12. ________ Viruses are often transmitted by a floppy

disk left in the floppy drive

(A) Trojan horse

(B) Boot sector (C) Script

(D) Logic bomb

(E) None of these

13. ________ controls the way in which the computer

system functions and provides a means by which users

can interact with the computer

(A) The platform

(B) Application software

(C) Operating system (D) The motherboard

(E) None of these

14. Servers are computers that provide resources to other

computers connected to a ___________

(A) mainframe

(B) network (C) supercomputer

(D) client

(E) None of these

15. A goal of data mining includes which of the

following?

(A) To explain some observed event or condition (B) To confirm that data exists

(C) To analyze data for expected relationships

(D) To create a new data warehouse

(E) None of these

Page 34: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

34

16. URL stands for ……..

(A) Universal Research List

(B) Universal Resource List

(C) Uniform Resource Locator (D) Uniform Research Locator

(E) None of these

17. A database management system (DBMS) is a

…………

(A) hardware system used to create , maintain and

provide controlled access to a database

(B) hardware system used to create, maintain, and

provide uncontrolled access to a database.

(C) software system used to create, maintain, and

provide uncontrolled access to a database.

(D) software system used to create, maintain, and

provide controlled access to a database. (E) None of these

19. A Proxy server is used for which of the following?

(A) To provide security against unauthorized users

(B) To process client requests for web pages (C) To process client requests for database access

(D) To provide TCP/IP

(E) None of these

20. When data changes in multiple lists and all lists are

not updated, this causes:

(A) data redundancy

(B) information overload

(C) duplicate data

Page 35: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

35

(D) data inconsistency (E) None of these

21. _____________ are words that a programming

language has set aside for its own use.

(A) Control worlds

(B) Reserved words (C) Control structures

(D) Reserved keys

(E) None of these

23. ______ describe what is database fields.

(A) Structures

(B) Field markers

(C) Field definition

(D) Field names (E) None of these

24. You must install a (n) ____________ on a network if

you want to share a broadband Internet connection.

(A) router (B) modem

(C) node

(D) cable

(E) None of these

25. A goal of normalization is to __________

(A) minimize the number of relationships

(B) minimize the number of entities

(C) minimize the number of tables

(D) minimize the number of redundancy (E) None of these

Page 36: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

36

26. Granting an outside organization access to internet

web pages is often implemented using a (n) ____

(A) extranet (B) intranet

(C) internet

(D) hacker

(E) None of these

27. Which term identifies a specific computer on the web

and the main page of the entire site

(A) URL (B) Web site address

(C) Hyperlink

(D) Domain name

(E) None of these

28. The code that relational database management

systems use to perform their database task is referred to

as …..

(A) QBE

(B) SQL (C) OLAP

(D) Sequel Server

(E) None of these

29. Chip is a common nickname for a (n):

(A) transistor

(B) resistor

(C) integrated circuit (D) semiconductor

(E) None of these

Page 37: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

37

30. The purpose of the primary key in a database is to:

(A) unlock the database

(B) provide a map of the data (C) uniquely identify a record

(D) establish constraints on database operations.

(E) None of these

31. The design of the network is called the network:

(A) architecture (B) server

(C) transmission

(D) type

(E) None of these

32. The most frequently used instructions of a computer

program are likely to be fetched from:

(A) the hard disk

(B) cache memory (C) RAM

(D) registers

(E) None of these

33. The ____________ contains data descriptions and

defines the name, data type, and length of each field in

the database.

(A) data dictionary (B) data table

(C) data record

(D) data field

(E) None of these

Page 38: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

38

34. Personal logs or journal entries posted on the Web

are known as:

(A) listservs

(B) Webcasts

(C) blogs (D) subject directories

(E) None of these

35. A(n) _______ uses pictures (called icons) and menus

displayed on the screen to send commands to the

computer system.

(A) command – based user interface

(B) GUI (C) system utility

(D) API

(E) None of these

36. Which of the following is NOT a type of broadband

Internet connection?

(A) Cable

(B) DSL

(C) Dial-up (D) Satellite

(E) None of these

37. Software, such as viruses, worms and Trojan horses,

that has a malicious intent, is known as:

(A) spyware

(B) adware

(C) spam

(D) malware (E) None of these

Page 39: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

39

38. Making a field ______ means that it cannot be left

blank.

(A) numeric

(B) required (C) calculated

(D) validated

(E) None of these

39. ____________ are viruses that are triggered by the

passage of time or on a certain date.

(A) Boot-sector viruses

(B) Macro viruses

(C) Time bombs (D) Worms

(E) None of these

40. Linux is a (n) ____________ operating system.

(A) open-source (B) Microsoft

(C) Windows

(D) Mac

(E) None of these

41. What is a backup?

(A) Restoring the information backup

(B) An exact copy of a system’s information

(C) The ability to get a system up and running in the

event of a system crash or failure

(D) All of these (E) None of these

Page 40: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

40

42. Which of the following places the common data

elements in order from smallest to largest

(A) character, file, record, field, database

(B) character, record, field, database, file

(C) character, field, record, file, database (D) Bit, byte, character, record, field, file, database,

(E) None of these

43. The internet is ……

(A) a large network of networks

(B) an internal communication system for a business

(C) a communication system for the Indian government

(D) All of these (E) None of these

44. ____________ are lists of commands that appear on

the screen.

(A) GUIs

(B) Icons

(C) Menus (D) Windows

(E) None of these

45. Which of the following statements is FALSE

concerning file names?

(A) Files may share the same name or the same

extension but not both

(B) Every file in the same folder must have a unique

name

(C) File extension is another name for file type

(D) The file extension comes before the dot (.)

Page 41: Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than 500 companies and government agencies, _____ percent detected computer security

41

followed by the file name (E) None of these

46. Verification of a login name and password is known

as:

(A) configuration

(B) accessibility

(C) authentication (D) logging in

(E) None of these

47. Which of the following would most likely NOT be a

symptom of a virus?

(A) Existing program files and icons disappear.

(B) The CD-ROM stops functioning. (C) The Web browser opens to an unusual home page.

(D) Odd messages or images are displayed on the screen.

(E) None of these