0 of 50 questions completed
You have already completed the quiz before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 50 questions answered correctly
Time has elapsed
You have reached 0 of 0 points, (0)
Which of the following menu types is also called a drop-down menu?
Data (information) is stored in computer as __________
The central processing unit contains which of the following as a component?
Memory unit is one part of __________
The process of writing out computer instructions is known as _________
A Web site address is a unique name that identifies a specific __________ on the Web.
A character of information is represented by a(n) __________
An example of a telecommunications device is a __________
__________ is a procedure that requires users to enter an identification code and a matching password.
Which device is used as the standard pointing device in a Graphical User Environment?
Data that is copied from an application is stored in the __________
Every component of your computer is either __________
A collection of interrelated records is called a __________
Which of the following is the storage area within the computer itself which holds data only temporarily as the computer processes instructions ?
Codes consisting of bars or lines of varying widths or lengths that are computer- readable are known as __________
A __________ contains specific rules and words that express the logical steps of an algorithm.
__________ is a set of keywords, Symbols and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.
The general term “peripheral equipment” is used for __________
If a memory chip is volatile, it will __________
__________ is the process of finding errors in software code.
What is usually used for displaying information at public places ?
The real business and competitive value of information technology lies in____
Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
Which one of the following would be considered as a way that a computer virus can enter a compute system ?
Collecting personal information and effectively posing as another individual is known as the crime of _____
The first step in the transaction processing cycle is_____
In the information systems concept, the output function involves_____
When a computer runs a program, the _______ processes through the program’s sequence of instructions.
The computer needs additional components called _________ to accomplish its input, output, and storage functions.
Bytes combined to represent a named collection of instructions or data stored in the computer or digital device is a(n) —
____ is a type of high-speed memory that a processor can access more rapidly than RAM.
To contact people using the Internet, you most often use their _______ .
The trend of digital electronic devices becoming smaller and increasingly powerful has fully supported the move to an increasingly _______ workforce.
____ hard drives are permanently located inside the system unit and are not designed to be removed, unless they need to be repaired or replaced.
A barcode is ____ code that represents data with bars of varying widths or heights.
The Internet allows you to____
The name that the User gives to a document is referred to as____
Editing a document consists of reading through the document you’ve created, then ____ .
Which of the following controls the manner of interaction between the user and the operating system ?
What type of software is most useful for the creation of brochures, posters, and newsletters?
Which of the following system components is the brain of the computer?
A ______ shares hardware, software, and data among authorized users.
A ______ typically connects personal computers within a very limited geographical area usually within a single building.
Computers manipulate data in many ways, and this manipulation is called ______
An e-mail address typically consists of a user ID followed by the ______ sign and the name of the e-mail server that manages the user’s electronic post office box.
Software applies ______, also called algorithms, to process data.
A file extension is separated from the main file name with a(n) ______ but no spaces.
A(n) ______ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
______ makes it possible for shoppers to make purchases using their computers.
Networks are monitored by security personnel and supervised by – who set(s) up accounts and passwords for authorized network users.