2. A set of rules for telling the computer what operations to perform is called a______________?
comments icon0
A. programming language

B. procedural language

C. natural language

D. structures

3. WWW stands for___________?
comments icon0

A. World Whole Web

B. World Wide Web

C. Wide World Web

D. Web World Wide

4. Which part of the computer is directly involved in executing the instructions of the computer program?
comments icon0

A. The main storage

B. The processor

C. The secondary storage

D. The scanner

6. The first computers were programmed using___________?
comments icon0

A. Object code

B. Assembly language

C. Machine language

D. Source code

7. What type of operating system MS-DOS is?
comments icon0

A. Multitasking

B. Menu Driven Interface

C. Graphical User Interface

D. Command Line Interface
8. VGA is____________?
comments icon0

A. Volatile Graphics Array

B. Video Graphics Array

C. Video Graphics Adapter

D. Visual Graphics Array

10. ____________is the measurement of things such as fingerprints and retinal scans used for security access?
comments icon0

A. Smart weapon machinery

B. Computer security

C. Bio measurement

D. Biometrics
11. What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page?
comments icon0
A. Vertical justifying

B. Dual centering

C. Horizontal centering

D. Vertical adjusting

12. The______________is the amount of data that a storage device can move from the storage medium to the Computer per second?
comments icon0

A. data access rate

B. data digitizing rate

C. data transfer rate

D. data migration rate

13. which statement describe Hackers?
comments icon0

A. may legally break into computers as long as they do not do any damage

B. are people who are allergic to computers

C. all have the same motive

D. break into other peoples computers
16. Select the Odd one from the following
comments icon0

A. Assembler

B. Compiler

C. Operating system

D. Interpreter

19. _______________is the ability of a device to jump directly to the requested data?
comments icon0
A. Random access

B. All of the above

C. Sequential access

D. Quick access

20. The scrambling of code is known as___________?
comments icon0

A. Scrambling

B. Encryption

C. a firewall

D. Password proofing

21. Father of C programming language?
comments icon0

A. Thomas Kurtz

B. Bill Gates

C. Prof John Keenly

D. Dennis Ritchie
22. Who designed the first electronics computer ENIAC?
comments icon0

A. All of above

B. J. Presper Eckert and John W Mauchly

C. Joseph M. Jacquard

D. Van-Neumann

23. What is a light pen?
comments icon0
A. Optical input device

B. Electronic input device

C. Optical output device

D. A Mechanical Input device

24. Which of these is a point and draw device?
comments icon0

A. Scanner

B. Printer

C. Mouse

D. CD-ROM

25. Forms that are used to organize business data into rows and coloumns are called_____________?
comments icon0

A. transaction sheets

B. registers

C. spread sheets

D. business forms

26. In 1999, the Melissa virus was a widely publicised:____________?
comments icon0

A. Macro virus.

B. Trojan horse.

C. Time bomb.

D. E-mail virus.
27. Second Generation computers were developed during___________?
comments icon0

A. 1949 to 1955

B. 1956 to 1965

C. 1970 to 1990

D. 1965 to 1970

28. What is meant by a dedicated computer?
comments icon0

A. Which is meant for application software

B. Which uses one kind of software

C. Which is used by one person only

D. Which is assigned one and only one task
33. _______________are specific to users needs?
comments icon0
A. Application software

B. Compilers

C. Assemblers

D. System software

35. Which device is required for the Internet connection?
comments icon0

A. Joystick

B. NIC Card

C. Modem

D. CD Drive

39. __________represents raw facts, where-as__________is data made meaningful?
comments icon0

A. Information, bits

B. Records, bytes

C. Data, information

D. Information, reporting

40. Cathode Ray Tube is a form of__________?
comments icon0

A. Mother board

B. Keyboard

C. Monitor

D. Mouse

42. Which of the following is a storage device?
comments icon0

A. Hard Disk

B. Floppy Disk

C. Tape

D. All of the above
43. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
comments icon0

A. Encryption safe wall

B. Firewall

C. Hacker-resistant server

D. Hacker-proof program

44. MAN stands for_______________?
comments icon0
A. Metropolitan Area Network

B. Maximum Area Network

C. Minimum Area Network

D. Main Area Network

45. RAM stands for___________?
comments icon0

A. Random only memory

B. Random origin money

C. Read only memory

D. Random access memory
46. Malicious software is known as____________?
comments icon0

A. Badware.

B. Maliciousware.

C. Malware.

D. Illegalware

50. BIOS stands for__________?
comments icon0

A. all the above

B. Basic Input Output system

C. Basic Input Off system

D. Binary Input output system