ICT Past Questions Computer Studies

1. A website main page is called ____________

(a) Search Page (b) Home page (c) Browser Page (d) Bookmark

 

2. ________________ controls the way in which the computer system function and provides a means by which users can interact with the computer.

(a) Application Software (b)Internet (c) Operating system (d) Control Unit

 

3. Choose the web browser among the following:

(a) Bit torrent (b)Skype (c) Netscape Navigator (d)MSN messenger

 

4. Choose the Search Engine among the following:

(a) Microsoft (b) Bing (c) Twitter (d)Hotmail

 

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement, specially called___________

(a) simulation (b) animation (c) robotics (d) computer forensics

 

6. Computer software includes ____________

(a) packaged programs (b) application programs (c) operating system programs (d) All of the above

 

 

7. Junk e-mail is also called ___________

(a) spoof (b) spam (c) faulty (d) cookie

 

8. What are the two parts of an email-address?

(a) Username and street name (b) User domain and Homepage (c) Username and Domain name (d) Username and Domain page

 

9. A repair for a known software bug, usually available at no charge on the internet, is called_____

(a) version (b) patch (c) tutorial (d)rectifier.

 

10. A _____ is the term used when a search engine returns a Web page that matches the search criteria.

(a) hit (b)view (c) link (d) domain

[8/8, 8:40 PM] +234 806 129 0287: 1. A website main page is called ____________

(a) Search Page (b) Home page (c) Browser Page (d) Bookmark

 

2. ________________ controls the way in which the computer system function and provides a means by which users can interact with the computer.

(a) Application Software (b)Internet (c) Operating system (d) Control Unit

 

3. Choose the web browser among the following:

(a) Bit torrent (b)Skype (c) Netscape Navigator (d)MSN messenger

 

4. Choose the Search Engine among the following:

(a) Microsoft (b) Bing (c) Twitter (d)Hotmail

 

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement, specially called___________

(a) simulation (b) animation (c) robotics (d) computer forensics

 

6. Computer software includes ____________

(a) packaged programs (b) application programs (c) operating system programs (d) All of the above

 

 

7. Junk e-mail is also called ___________

(a) spoof (b) spam (c) faulty (d) cookie

 

8. What are the two parts of an email-address?

(a) Username and street name (b) User domain and Homepage (c) Username and Domain name (d) Username and Domain page

 

9. A repair for a known software bug, usually available at no charge on the internet, is called_____

(a) version (b) patch (c) tutorial (d)rectifier.

 

10. A _____ is the term used when a search engine returns a Web page that matches the search criteria.

(a) hit (b)view (c) link (d) domain

[8/8, 8:41 PM] +234 806 129 0287: 11. What is the storage area for e-mail messages called?

(a) A folder (b) A mail box (c) A directory (d) The hard disk

 

12. The process of transferring files from a computer on the internet to your computer is called____

(a) Downloading (b) Installing (c) File Transfer Protocol (d) Uploading.

 

13. ________ is the protocol used for browsing website.

(a) TCP (b)HTTP (c) FTP (d) POP

 

14. What is the commonly used unit for measuring the speed of data transmission?

(a) Bits per second (b) Megahertz (c) Characters per second

(d) Nano seconds

 

15. Verification of a login name and password is known as ___________

(a) Configuration (b)Accessibility (c) Authentication (d) Logging-in

 

16. A set of numbers that identify your computer on a network is called ___________

(a) Internet protocol file (b) Internet protocol address (c) Internet transfer protocol

(d) Internet protocol location

 

 

17. Which of the following is not a requirement of internet?

(a) Operating system (b) DOS (c)Web browser (d) Modem

 

18. What is the name of the software that allows us to browse through web pages?

(a) Yahoo Messenger (b) E-mail (c) Browser (d) Mail Client

 

19. What does HTTP stand for?

(a) Hypertext Transfer Procedure (b) High Technology Transfer Procedure

(c Hypertext Transfer Protocol (d) High Technology Transfer Protocol

 

20. Which of the following is a correct format of an e-mail address?

(a) [email protected] (b)[email protected]@sales (c) info.website.sales

(d)[email protected]/sales

[8/8, 8:43 PM] +234 806 129 0287: 21) Which can be the input and output devices both?

Scanner

Touch screen monitor

Speaker

Digitizer

 

22) Which is not a valid type of printer?

Dot matrix

Daisy wheel

OCR

Inkjet

 

23) Impact and Non Impact are related to?

Scanners

Printers

Keyboards

Monitors

 

24) What is the full form of MROM?

Masked Read Only Memory

Main Read Only Memory

Magnetic Read Only Memory

None of these

 

25) What is the full form of PCB?

Printed Circuit Board

Processing Central Board

Peripherals Combined Board

None of these

 

26) Which is the smallest memory measurement unit in given options?

Byte

Micro Byte

Kilo Byte

Nibble

 

27) One Nibble has?

2 Bits

4 Bits

8 Bits

16 Bits

 

28) In computer memory measurement units, PT stands for?

Perabyte

Pexabyte

Petabyte

None of these

 

29) One GB (Gega Byte) contains — bytes?

1073741824

1048576

83886808

8192

 

30) 1024 Bytes equivalent to?

213

212

211

210

[8/8, 8:46 PM] +234 803 517 1188: 1) The name for the way that computers manipulate data into information is called?

programming

processing

storing

organizing

 

2) Computers gather data, which means that they allow users to data?

present

input

output

store

 

3) After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered?

data

output

input

the process

 

4) Computers use the __________ language to process data?

processing

kilobyte

binary

representational

 

5) Computers process data into information by working exclusively with?

multimedia

words

characters

numbers

 

6) In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?

eight bytes

eight kilobytes

eight characters

eight bits

 

7) The term bit is short for?

megabyte

binary language

binary digit

binary number

 

8) A string of eight 0s and 1s is called a?

megabyte

byte

kilobyte

gigabyte

 

9) A is approximately one billion bytes?

kilobyte

bit

gigabyte

megabyte

 

10) A _____approximately a billion bytes?

gigabyte

kilobyte

megabyte

terabyte

[8/8, 9:32 PM] +234 803 517 1188: 1) The name for the way that computers manipulate data into information is called?

programming

processing

storing

organizing

 

2) Computers gather data, which means that they allow users to data?

present

input

output

store

 

3) After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered?

data

output

input

the process

 

4) Computers use the __________ language to process data?

processing

kilobyte

binary

representational

 

5) Computers process data into information by working exclusively with?

multimedia

words

characters

numbers

 

6) In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?

eight bytes

eight kilobytes

eight characters

eight bits

 

7) The term bit is short for?

megabyte

binary language

binary digit

binary number

 

8) A string of eight 0s and 1s is called a?

megabyte

byte

kilobyte

gigabyte

 

9) A is approximately one billion bytes?

kilobyte

bit

gigabyte

megabyte

 

10) A _____approximately a billion bytes?

gigabyte

kilobyte

megabyte

terabyte

[8/8, 9:33 PM] +234 803 517 1188: 11) is any part of the computer that you can physically touch?

Hardware

A device

A peripheral

An application

 

12) The components that process data are located in the?

input devices

output devices

system unit

storage component

 

13) All of the following are examples of storage devices EXCEPT?

hard disk drives

printers

floppy disk drives

CD drives

 

14) The ______ is also called the brains of the computer, is responsible for processing data?

motherboard

memory

RAM

central processing unit (CPU)

 

15) The CPU and memory are located on the?

expansion board

motherboard

storage device

output device

 

16) _________is a set of computer programs used on a computer to help perform tasks?

An instruction

Software

Memory

A processor

 

17) System software is the set of programs that enables your computers hardware devices and ________software to work together?

management

processing

utility

application

 

18) The PC (personal computer) and the Apple Macintosh are examples of two different?

platforms

applications

programs

storage devices

 

18) The PC (personal computer) and the Apple Macintosh are examples of two different?

platforms

applications

programs

storage devices

 

20) ________are specially designed computers that perform complex calculations extremely rapidly?

Servers

Supercomputers

Laptops

Mainframes

 

[mediator_tech]

 

21. The difference between people with access to computers and the Internet and those without this access is known as the?

digital divide

Internet divide

Web divide

broadband divide

 

22) A byte can hold one_______of data?

bit

binary digit

character

kilobyte

 

23) _________controls the way in which the computer system functions and provides a means by which users can interact with the computer?

The platform

The operating system

Application software

The motherboard

 

24) ________are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat?

Servers

Embedded computers

Robotic computers

Mainframes

 

25) The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called?

instructions

the operating system

application software

the system unit

 

26) The metal or plastic case that holds all the physical parts of the computer is the?

system unit

CPU

mainframe

platform

 

27) ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat?

Servers

Embedded computers

Robotic computers

Mainframes

 

28) Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation?

Mac

PC

None

All of the above

 

29) The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input or output devices?

Application software

System software

Operating System

None

 

30) ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet?

System

Application

Coded

Computer

[8/8, 9:33 PM] +234 803 517 1188: 31) ____________are the fastest and most expensive computers?

Workstation

Laptop

None

Super Computer

 

32) Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________?

Questions

Instructions

Answers

Processes

 

33) A computer gathers data, processes it, outputs the data or information, and ____________ the data or information?

Sends

Stores

None

Prints

 

34) ____________ are computers that excel at executing many different computer programs at the same time?

Super

Mini

Micro

Mainframes

 

35) ____________is the application of computer systems and techniques to gather legal evidence?

Computer process

Computer forensics

Computer facilitator

None

 

36) ____________ is the science that attempts to create machines that will emulate the human thought process?

None

Artificial Intellligence(AI)

Transistor

Vaccum tube.

 

37) Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system?

Microsoft Word

Microsoft access

Microsoft Windows

Microsoft operating system

 

38) ____________ are computers that support hundreds or thousands of users simultaneously?

Mini

Mainframes

Micro

Super

 

39) ____________ is the term given to the act of stealing someone`s identity and ruining their credit rating?

Authentication

Identity theft

Scanning

Forensic

 

40) Surgeons are using ____________ to guide robots to perform delicate surgery?

Scanner

Computers

Solar

Monitor

 

(Visited 460 times, 1 visits today)
error: Content is protected !!