Take This Computer Quiz To Test Your Knowledge

10 Questions | Total Attempts: 2411

SettingsSettingsSettings
Please wait...
Take This Computer Quiz To Test Your Knowledge

There are different types of computer companies, but one thing that is not so different is how one operates them. Since we can’t escape using computers in today’s world, we, therefore, should ensure that we keep ourselves updated on any changes. Take this computer quiz to test your knowledge on these devices and see if you should get a refresher.


Questions and Answers
  • 1. 
    Analyzing the current system is performed during the __________ phase.  
    • A. 

      1) development

    • B. 

      2) design

    • C. 

      3) implementation

    • D. 

      4) needs analysis

    • E. 

      5) None of these

  • 2. 
    In __________, team members start with the big picture and move to the details.  
    • A. 

      1) top-down design

    • B. 

      2) bottom-up design

    • C. 

      3) object oriented system analysis

    • D. 

      4) rapid application design

    • E. 

      5) None of these

  • 3. 
     Many teams use working models called __________ to explore the look and feel of screens with users.      
    • A. 

      1) demos

    • B. 

      2) prototypes

    • C. 

      3) objects

    • D. 

      4) designs

    • E. 

      5) None of these

  • 4. 
    In the needs analysis section of the SDLC, the __________ typically defines a need for a new system      
    • A. 

      1) manager

    • B. 

      2) system analyst

    • C. 

      3) user

    • D. 

      4) technical writer

    • E. 

      5) None of these

  • 5. 
    This phase of the SDLC may involve a small group of testers.      
    • A. 

      1) maintenance

    • B. 

      2) needs analysis

    • C. 

      3) implementation

    • D. 

      4) development

    • E. 

      5) None of these

  • 6. 
     Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?      
    • A. 

      1) Open source vendors

    • B. 

      2) Alliances

    • C. 

      3) Application service providers

    • D. 

      4) All of the above

    • E. 

      5) None of these

  • 7. 
    Which one of the following would be considered as a way that a computer virus can enter a computer system ?      
    • A. 

      1) Opening an application previously installed on the computer

    • B. 

      2) Borrowed copies of software

    • C. 

      3) Viewing a website without causing any additional transactions

    • D. 

      4) Running antivirus programs

    • E. 

      5) None of these

  • 8. 
    Collecting personal information and effectively posing as another individual is known as the crime of—      
    • A. 

      1) spooling

    • B. 

      2) dentity theft

    • C. 

      3) spoofing

    • D. 

      4) hacking

    • E. 

      5) None of these

  • 9. 
    The first step in the transaction processing cycle is___________      
    • A. 

      1) database operations

    • B. 

      2) audit

    • C. 

      3) data entry

    • D. 

      4) user inquiry

    • E. 

      5) None of these

  • 10. 
    In the information systems concept, the output function involves__________      
    • A. 

      1) Capturing and assembling elements that enter the system to be processed

    • B. 

      2) Transformation processes that convert input into output

    • C. 

      3) Transferring elements that have been produced by a transformation process to their ultimate destination

    • D. 

      4) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal

    • E. 

      5) None of these

Back to Top Back to top