Você está na página 1de 7

40

Which of the below statements about formatting a floppy disk for the first time
is true?
1. Formatting prepares a floppy disk to store data.
2. Formatting backs up data onto a floppy disk.
3. Formatting copies a floppy disk.
4. Formatting unlocks a floppy disk.
1
Which software would you use to create a mailshot letter?
1. Web browsing software.
2. Spreadsheet software.
3. Accounting software.
4. Word processing software.
4
What is the best way of preventing your computer from being infected with a viru
s?
1. Only virus-check e-mail attachments.
2. Have updateable anti-virus software running on your computer.
3. Have anti-virus software running on your computer.
4. Never open any email attachments.
2
Which of the following statements describes shareware?
1. Shareware is software without copyright protection.
2. Shareware is free software.
3. Shareware is software you may pay for after an initial time period of use.
4. Shareware is software you can use in any way.
3
There are rules governing the storage and supply of computer-based information.
What are these rules called?
1. Data Privacy Policy.
2. Data Publicity Law.
3. Data Management Act.
4. Data Protection Act.
4
Which of these is an input device?
1. Scanner.
2. Speaker.
3. Monitor.
4. Plotter.
1
Which type of software controls the allocation of resources in the computer?
1. Application software.
2. Operating system software.
3. Browser software.
4. Utility software.
2
Which of the below is NOT a permanent storage medium?
1. Hard disk.
2. CD-ROM.
3. RAM.
4. Magnetic tape.
3
Which of the below is the MAIN advantage of a network system?
1. Increased speed of operation.
2. Allows sharing of data.
3. Backs up data.
4. Reduces cost.
2
Which is the best way of protecting a computer system from unauthorised use?
1. Using a screensaver.
2. Locking the office.
3. Maintaining an audit trail.
4. Ensuring all users have passwords.
4
Which type of memory holds the basic operating system commands?
1. ROM.
2. RAM.
3. Auxiliary.
4. Cache.
1
Which of the below computer based operations uses a barcode input?
1. Marking an online test paper.
2. Issuing a book in a library.
3. Paying for goods using a credit card.
4. Ordering goods from a web site.
2
What does RSI Mean?
1. Repeated Syndrome Injury.
2. Replicated Strain Injury.
3. Repetitive Syndrome Injury.
4. Repetitive Strain Injury.
4
Which type of software would you use to prepare a budget forecast?
1. Word processing.
2. Database.
3. Spreadsheet.
4. Presentation.
3
Which of the below storage devices holds the most data?
1. Hard disk.
2. Floppy disk.
3. CD-ROM.
4. Zip drive.
1
Which of the following is NOT a function of the Central Processing Unit?
1. Performing calculations.
2. Managing Memory.
3. Controlling programs.
4. Displaying graphics.
4
Why is it important to make regular backups of computer data?
1. To protect the computer.
2. To prevent loss of data.
3. To comply with the law.
4. To increase the storage company.
2
Where should you store back up copies of your data?
1. Near to the computer.
2. In your car.
3. In an off-site fire proof store.
4. In a different location.
3
What is connected to a LAN?
1. Computers on one site.
2. Computers in one office.
3. Computers in many sites.
4. Computers on the Internet.
1
Which of the below would you use to find information on the Internet?
1. Email.
2. Search Engine.
3. Word Processor.
4. Photo Editor.
2
Which is the smallest unit of computer storage?
1. Bit.
2. Byte.
3. Megabyte.
4. Kilo bit.
1
Which of these statements about Read Only Memory (ROM) is true?
1. Application programs can write date to the Read Only Memory.
2. The contents of the Read Only Memory are not deleted when the computer is swi
tched off.
3. The operating system is loaded into the Read Only Memory when the computer is
started.
4. Internet pages are stored in the Read Only Memory.
2
Which device would you use to send a map to a visitor?
1. Telephone.
2. VDU.
3. Telex.
4. Fax.
4
Which software would you use for creating a set of slides to be shown to an audi
ence?
1. Database.
2. Spreadsheet.
3. Presentation.
4. Desk Top Publishing.
3
Which device could you use for the output of a music file?
1. Microphone.
2. Speaker.
3. Digitiser.
4. Speech synthesiser.
2
What does GUI stand for?
1. General Utilities Intervention.
2. General User Intervention.
3. Graphical Utilities Interface.
4. Graphical User Interface.
4
In the home, which of the following would you use the Internet for?
1. Researching information for homework.
2. Re-booting your computer.
3. Storing friends and family names and addressess.
4. Storing your files.
1
Which of these computer passwords is the most secure?
1. George.
2. DavidBeckham.
3. 17March.
4. qYsTP57e9H.
4
Which of the following statements describes freeware?
1. Freeware is software without copyright protection.
2. Freeware is software that you pay for after 30 days.
3. Freeware is copyrighted software given away without charge by the author.
4. Freeware is software you would purchase from a large computer store.
3
What does the W in WAN stand for?
1. Wide.
2. Work.
3. Windows.
4. Web.
1
What is a trackball?
1. A monitoring system.
2. A type of speaker.
3. A storage device.
4. An alternative to the mouse.
4
Which of these is NOT a benefit of e-mail?
1. Ability to send attachments.
2. Receive junk e-mail.
3. Instant delivery of your message.
4. Send to more than one person at once.
2
What is the main advantage of a GUI?
1. Makes the computer easier to use.
2. Does not need updating.
3. Requires a less powerful computer.
4. Reduces the cost of computing.
1
What is an attachment?
1. A peripheral device.
2. A file sent with an email message.
3. A component of network software.
4. A password system.
2
Which of the following is a problem when downloading files from the Internet?
1. Viruses may be introduced onto your computer.
2. The display settings on your computer may be changed.
3. The cache memory on your computer may become full.
4. The files may not be able to be moved.
1
Which stage in the system life cycle ensures that the computer system will perfo
rm as expected?
1. Programming.
2. Systems design.
3. Testing.
4. Systems analysis.
3
A file on a network drive is available to all users. How can the data be protec
ted from being overwritten?
1. Make the file read only.
2. Keep a log of accesses to the file.
3. Make a copy of the file.
4. Create a new folder to store the file.
1
Which type of computer is most likely to be used to store a large database share
d by a number of users?
1. Notebook.
2. Desktop.
3. Workstation.
4. Mainframe.
4
How are computers in a WAN connected?
1. Cables.
2. Telephone Lines.
3. Internet.
4. Intranet.
2
Your modem runs at 56K bps. What does this represent?
1. Speed of your computer.
2. Speed of your hard disk.
3. Speed of transferring data.
4. Speed of cache memory.
3
End
****************************************************************************
* Computer Quiz *
* Created by George's Computer Quiz Writer *
* (c)2005 George Jopling. Available free from www.georgejopling.co.uk *
****************************************************************************

Você também pode gostar