Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.
Question No : 1
Malicious software is known as _____.
(1) Badware
(2) Malware
(3) Malicious ware
(4) liigalware
(5) None of these
Question No : 2
Integrated Circuit (IC) chips used in computers are made with _____.
(1) Copper
(2) Aluminium
(3) Gold
(4) Silicon
(5) Silver
Question No : 3
Firewalls are used to protect against _____.
(1) Unauthorised attacks
(2) Virus attacks
(3) Data-driven attacks
(4) Fire attacks
(5) None of these
Question No : 4
The main function of the ALU is to _____.
(1) perform arithmetic and logical operations
(2) store data and information for future use
(3) control computer output, such as printing
(4) monitor all computer activities
(5) None of these
Question No : 5
_____ this is the act of copying or downloading a program from a network and making multiple copies of it.
(1) Network piracy
(2) Plagiarism
(3) Software piracy
(4) Site-license piracy
(5) None of these
Question No : 6
Which of the following is not true about RAM?
(1) RAM is the same as hard disk storage
(2) RAM is a temporary storage area
(3) RAM is volatile
(4) RAM stands for Random Access Memory
(5) Information stored in RAM is gone when you turn the computer off
Question No : 7
If you wished to limit what you would see on an Excel worksheet, what data function would you use?
(1) Sort
(2) Filter
(3) None of these
(4) Data analysis
(5) Conditional format
Question No : 8
IDE stands for _____.
(1) Integrate Disk Error
(2) Input Data Error
(3) None of these
(4) Integrated Disk Environment
(5) Integrated Development Environment
Question No : 9
_____ are often delivered to a PC through an email attachment and are often designed to do harm.
(1) Viruses
(2) Spam
(3) Portals
(4) SMS messages
(5) None of these
Question No : 10
SMPS stands for_____
(1) Switched Mode Power Supply
(2) Start Mode Power Supply
(3) Store Mode Power Supply
(4) Single Mode Power Supply
(5) None of these
Question No : 11
Expansion cards are inserted into_____
(1) Slots
(2) Peripheral devices
(3) CPU
(4) The back of the computer
(5) pegs
Question No : 12
Managers use sophisticated tool to combat cyberslacking, especially involving the internet. Such tools include _____
(1) Web filters
(2) Surveillance Software
(3) Proxy Server
(4) Packet sniffer
(5) All of the above
Question No : 13
Who is the creator of PASCAL Language?
(1) Dijkstra
(2) Niklaus Writh
(3) D. Khuth
(4) Aho
(5) Dennis Ritchie
Question No : 14
The hardware device or software program that sends messages between network is known as a _____.
(1) Bridge
(2) Backbone
(3) Router
(4) Gateway
(5) None of these
Question No : 15
A repair for a known software bug, usually available at no charge on the internet, is called a(n) _____
(1) version
(2) patch
(3) tutorial
(4) FAQ
(5) None of these