Time limit: 0
Finish Test
0 of 50 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
Information
- Computer Knowledge Important Questions
- Free Online Test with Answers
- Very useful for all Competitive Exams
You have already completed the quiz before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 50 questions answered correctly
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Answered
- Review
- Question 1 of 50
1. Question
Which of the following menu types is also called a drop-down menu?
- Question 2 of 50
2. Question
Data (information) is stored in computer as __________
- Question 3 of 50
3. Question
The central processing unit contains which of the following as a component?
- Question 4 of 50
4. Question
Memory unit is one part of __________
- Question 5 of 50
5. Question
The process of writing out computer instructions is known as _________
- Question 6 of 50
6. Question
A Web site address is a unique name that identifies a specific __________ on the Web.
Hint
The web address contains information about the location of the webpage. It is also known as the URL (uniform resource locator). Like the address of your home, a web address identifies a specific webpage on the Web.
- Question 7 of 50
7. Question
A character of information is represented by a(n) __________
- Question 8 of 50
8. Question
An example of a telecommunications device is a __________
- Question 9 of 50
9. Question
__________ is a procedure that requires users to enter an identification code and a matching password.
- Question 10 of 50
10. Question
Which device is used as the standard pointing device in a Graphical User Environment?
Hint
A mouse is a small handheld device pushed over a horizontal surface. A mouse moves the graphical pointer by being slid across a smooth surface. It is used as the standard pointing device in a Graphical User Environment.
- Question 11 of 50
11. Question
Data that is copied from an application is stored in the __________
- Question 12 of 50
12. Question
Every component of your computer is either __________.
Hint
Hardware and software are essential parts of a computer system. Hardware components are the physical parts of a computer, like the central processing unit (CPU), mouse, storage, etc. Software components are the set of instructions that we store and run on our hardware. Together, they form a computer.
- Question 13 of 50
13. Question
A collection of interrelated records is called a __________
- Question 14 of 50
14. Question
Which of the following is the storage area within the computer itself which holds data only temporarily as the computer processes instructions?
Hint
The main memory in a computer is called Random Access Memory (RAM). RAM is primary-volatile memory. It is the storage area within the computer itself which holds data only temporarily when the computer processes instructions.
- Question 15 of 50
15. Question
Codes consisting of bars or lines of varying widths or lengths that are computer- readable are known as __________
- Question 16 of 50
16. Question
A __________ contains specific rules and words that express the logical steps of an algorithm.
- Question 17 of 50
17. Question
__________ is a set of keywords, Symbols and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.
- Question 18 of 50
18. Question
The general term “peripheral equipment” is used for __________
- Question 19 of 50
19. Question
If a memory chip is volatile, it will __________
- Question 20 of 50
20. Question
__________ is the process of finding errors in software code.
- Question 21 of 50
21. Question
What is usually used for displaying information at public places ?
- Question 22 of 50
22. Question
The real business and competitive value of information technology lies in____
- Question 23 of 50
23. Question
Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
- Question 24 of 50
24. Question
Which one of the following would be considered as a way that a computer virus can enter a compute system ?
- Question 25 of 50
25. Question
Collecting personal information and effectively posing as another individual is known as the crime of _____
- Question 26 of 50
26. Question
The first step in the transaction processing cycle is_____
- Question 27 of 50
27. Question
In the information systems concept, the output function involves_____
- Question 28 of 50
28. Question
When a computer runs a program, the _______ processes through the program’s sequence of instructions.
- Question 29 of 50
29. Question
The computer needs additional components called _________ to accomplish its input, output, and storage functions.
- Question 30 of 50
30. Question
Bytes combined to represent a named collection of instructions or data stored in the computer or digital device is a(n) —
- Question 31 of 50
31. Question
____ is a type of high-speed memory that a processor can access more rapidly than RAM.
- Question 32 of 50
32. Question
To contact people using the Internet, you most often use their _______ .
- Question 33 of 50
33. Question
The trend of digital electronic devices becoming smaller and increasingly powerful has fully supported the move to an increasingly _______ workforce.
- Question 34 of 50
34. Question
____ hard drives are permanently located inside the system unit and are not designed to be removed, unless they need to be repaired or replaced.
- Question 35 of 50
35. Question
A barcode is ____ code that represents data with bars of varying widths or heights.
- Question 36 of 50
36. Question
The Internet allows you to____
- Question 37 of 50
37. Question
The name that the User gives to a document is referred to as____
- Question 38 of 50
38. Question
Editing a document consists of reading through the document you’ve created, then ____ .
- Question 39 of 50
39. Question
Which of the following controls the manner of interaction between the user and the operating system ?
- Question 40 of 50
40. Question
What type of software is most useful for the creation of brochures, posters, and newsletters?
- Question 41 of 50
41. Question
Which of the following system components is the brain of the computer?
- Question 42 of 50
42. Question
A ______ shares hardware, software, and data among authorized users.
- Question 43 of 50
43. Question
A ______ typically connects personal computers within a very limited geographical area usually within a single building.
- Question 44 of 50
44. Question
Computers manipulate data in many ways, and this manipulation is called ______
- Question 45 of 50
45. Question
An e-mail address typically consists of a user ID followed by the ______ sign and the name of the e-mail server that manages the user’s electronic post office box.
- Question 46 of 50
46. Question
Software applies ______, also called algorithms, to process data.
- Question 47 of 50
47. Question
A file extension is separated from the main file name with a(n) ______ but no spaces.
- Question 48 of 50
48. Question
A(n) ______ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
- Question 49 of 50
49. Question
______ makes it possible for shoppers to make purchases using their computers.
- Question 50 of 50
50. Question
Networks are monitored by security personnel and supervised by – who set(s) up accounts and passwords for authorized network users.