Cis2110 End Of Semester Mock Exam - Provo Tcicc

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Andrewdunbar7
A
Andrewdunbar7
Community Contributor
Quizzes Created: 1 | Total Attempts: 68
| Attempts: 68 | Questions: 74
Please wait...
Question 1 / 74
0 %
0/100
Score 0/100
1. A web browser is (Hint: what kind of computer component?)

Explanation

A web browser is classified as software because it is a computer program that allows users to access and navigate websites on the internet. It is installed on a computer or mobile device and provides the interface for users to interact with web pages, display content, and perform various tasks such as searching, bookmarking, and downloading. As software, a web browser can be updated and customized to suit the user's preferences and needs.

Submit
Please wait...
About This Quiz
Cis2110 End Of Semester Mock Exam - Provo Tcicc - Quiz

The CIS2110 END OF SEMESTER MOCK EXAM at PROVO TCICC assesses foundational knowledge in computer science, covering data storage, input devices, and basic computer terminologies. This quiz prepares... see morestudents by testing essential concepts relevant to the field. see less

2. GUI stands for

Explanation

GUI stands for Graphical User Interface. It is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators. It provides a user-friendly way to navigate and operate software applications by using buttons, menus, and other graphical elements. The term "Graphical" refers to the use of graphics, such as images and icons, while "User Interface" refers to the means by which a user interacts with a computer or device. Therefore, the correct answer is Graphical User Interface.

Submit
3. Which device is responsible for converting digital data to music

Explanation

The MP3 device is responsible for converting digital data to music. MP3 is a widely used audio format that compresses audio files to reduce their size without significantly compromising the sound quality. It allows digital audio data to be stored, transmitted, and played back on various devices. Therefore, the MP3 device can take digital data and decode it into music that can be heard by the user.

Submit
4. ROM stands for

Explanation

ROM stands for Read Only Memory. This type of memory is non-volatile, meaning that it retains data even when the power is turned off. It is called "read only" because the data stored in ROM can only be read and not modified or erased. ROM is commonly used in devices to store firmware or permanent instructions that are essential for the operation of the device. It is often used to store the initial boot-up instructions of a computer or the operating system of a mobile phone.

Submit
5. CPU is

Explanation

The correct answer is Central Processing Unit. The CPU, or Central Processing Unit, is the main component of a computer system that performs most of the processing inside the computer. It is often referred to as the "brain" of the computer, as it carries out instructions of a computer program by performing basic arithmetic, logical, control, and input/output operations. The CPU is responsible for executing instructions, managing data, and controlling the overall operation of the computer system.

Submit
6. The Internet is best considered as a:

Explanation

The Internet is best considered as a WAN (Wide Area Network) because it is a network that spans a large geographical area, connecting multiple smaller networks together. The Internet connects computers and devices across the globe, allowing them to communicate and share information. It utilizes various technologies and protocols to ensure data transmission over long distances. WANs are designed to provide connectivity over large areas, making the Internet a fitting example of a WAN.

Submit
7. MMS is a service that allows you to send

Explanation

MMS stands for Multimedia Messaging Service, which allows users to send and receive multimedia content such as video, audio, and text messages. This service enables the transmission of various types of media files, including videos, audio recordings, and written text. It is not limited to email only or packet switches. Additionally, MMS supports the sending of JPEG images along with audio files, expanding the range of multimedia content that can be shared through this service.

Submit
8. What is a computer?

Explanation

A computer is an electronic machine that can process and store data. It is capable of performing various operations on data, such as calculations, sorting, and retrieving information. Additionally, a computer can store large amounts of data in its memory for future use. This definition accurately describes the essential characteristics of a computer and distinguishes it from other types of machines.

Submit
9. RAM stands for

Explanation

RAM stands for Random Access Memory. This is a type of computer memory that allows data to be stored and retrieved randomly, meaning that any piece of data can be accessed directly without having to go through all the other data. This makes RAM a fast and efficient form of memory for computers.

Submit
10. Which is NOT a type of network topology?

Explanation

A WAN (Wide Area Network) is not a type of network topology. It is a type of network that connects multiple LANs (Local Area Networks) over a large geographic area. Network topology refers to the physical or logical layout of a network, such as how devices are connected and how data flows. The options given, BUS, STAR, and RING, are all examples of network topologies.

Submit
11. Person who analyze information system and have practical experience of computers is classified as

Explanation

A person who analyzes information systems and has practical experience with computers is classified as a systems analyst. This individual is responsible for studying and understanding the current systems in place, identifying areas for improvement, and designing and implementing new systems to enhance efficiency and productivity. They have expertise in both technology and business processes, allowing them to bridge the gap between technical requirements and user needs. The role of a systems analyst is crucial in ensuring that information systems meet the organization's goals and objectives.

Submit
12. MMS means

Explanation

MMS stands for Multimedia Messaging Service. This service allows users to send and receive multimedia messages, such as text, images, audio, and video, from one mobile device to another. It is a popular feature on smartphones and is commonly used for sending pictures, videos, and other media content through text messages.

Submit
13. Keyboard is an

Explanation

The correct answer is "Input device" because a keyboard is primarily used to input data into a computer system. It allows users to type and enter commands or text into various applications or programs. The keyboard does not produce any output; instead, it sends signals to the computer to process the input and generate the desired output on other devices such as a monitor or printer. Therefore, a keyboard is classified as an input device.

Submit
14. Type of memory which is used to read data but not to write on it is classified as

Explanation

Read only memory (ROM) is a type of memory that can only be read from, meaning data can be retrieved from it but not written to it. This type of memory is commonly used to store permanent instructions or data that should not be changed, such as the firmware of a computer or the operating system. Unlike random access memory (RAM), which allows both reading and writing of data, ROM is non-volatile and retains its contents even when the power is turned off. Therefore, the correct answer is read only memory.

Submit
15. The main component of a computer is the

Explanation

The CPU (Central Processing Unit) is the main component of a computer. It is responsible for executing instructions and performing calculations. The CPU is often referred to as the "brain" of the computer as it controls all the other components and processes data. It consists of an arithmetic logic unit (ALU), control unit, and registers. The ALU performs mathematical and logical operations, while the control unit coordinates and manages the activities of the CPU. The CPU also interacts with other components such as memory and input/output devices.

Submit
16. Which is the largest in the ranking?

Explanation

In the given ranking, the units are listed from smallest to largest. Kilobyte is the smallest unit, followed by Megabyte, Gigabyte, and finally Terabyte. Therefore, Terabyte is the largest unit in the ranking.

Submit
17. What do we call computer programs ?

Explanation

Computer programs are commonly referred to as software. This term encompasses all types of programs that are designed to perform specific tasks or functions on a computer. Software can include utility programs, which are tools that assist in managing and optimizing computer systems, as well as operating systems that provide the foundation for running applications. Additionally, software can also include translators, which are programs that convert code from one programming language to another. Therefore, the correct answer for this question is software.

Submit
18. A small picture that is either a program or a shortcut:

Explanation

An icon is a small picture that represents either a program or a shortcut. Icons are commonly used in computer interfaces to provide a visual representation of an application or file. They are typically displayed on the desktop or in a menu, and clicking on an icon will open the associated program or file. Icons are designed to be easily recognizable and can vary in shape, color, and style to convey different meanings or functions.

Submit
19. What is a program?

Explanation

A program refers to a set of instructions that provide guidance to the computer on what tasks to perform. These instructions outline the specific actions and operations that the computer needs to execute in order to complete a particular task or achieve a desired outcome. Programs are essentially a sequence of commands that direct the computer's behavior and enable it to carry out various operations and functions.

Submit
20. The URL of a web site would look like which of the following?

Explanation

The correct answer is "http://www.website_domain_name.com". This is because in a URL, the protocol (http or https) is followed by a colon and two forward slashes. The "www" indicates the World Wide Web and is a common prefix for websites. The "website_domain_name.com" represents the specific domain name of the website.

Submit
21. What is a PC?

Explanation

A PC, or personal computational machine, refers to a computer that is designed for personal use. It is a general-purpose computer that can perform a wide range of tasks, such as word processing, internet browsing, gaming, and multimedia. PCs are typically used in homes, offices, and educational institutions. This term distinguishes personal computers from other types of computers, such as mini computers or mainframe computers, which are designed for more specialized purposes.

Submit
22. 1024 bytes make

Explanation

The given answer is correct because 1024 bytes is equal to 1 kilobyte. In digital storage, the unit kilobyte is commonly used to represent 1024 bytes, which is a binary multiple. This is because computers use a base-2 or binary system for storage and data calculation. Therefore, 1024 bytes is the equivalent of 1 kilobyte, making the answer accurate.

Submit
23. Large computers with wide range of peripheral devices are classified as

Explanation

Large computers with a wide range of peripheral devices are classified as mainframe computers because mainframes are designed to handle large-scale computing tasks and can support multiple users simultaneously. They have high processing power, extensive memory, and can handle massive amounts of data. Mainframes are commonly used in industries such as banking, government, and healthcare where reliability, security, and scalability are crucial. They are capable of running complex applications and managing large databases, making them suitable for organizations with heavy computing needs.

Submit
24. If any instruction consist of any arithmetic operation, data is transferred to the

Explanation

The correct answer is Arithmetic Logic Unit. The Arithmetic Logic Unit (ALU) is responsible for performing arithmetic and logical operations in a computer. It is a component of the Central Processing Unit (CPU) and is used to perform calculations, comparisons, and logical operations on data. The ALU receives data from the memory or registers, performs the specified arithmetic operation, and then transfers the result back to the memory or registers. It is an essential part of the CPU and plays a crucial role in executing instructions and processing data in a computer system.

Submit
25. File types are indicated by a three or four letter extension in Windows

Explanation

File types in Windows are indeed indicated by a three or four letter extension. This extension is added to the end of a file name and helps the operating system identify the type of file and the appropriate program to open it. For example, a file with the extension ".docx" is recognized as a Microsoft Word document, while a file with the extension ".jpg" is recognized as a JPEG image file. This system allows for easy identification and organization of different file types in Windows.

Submit
26. Computer stores

Explanation

A computer stores both data and instructions because it needs both to perform tasks. Data refers to the information that the computer processes, such as numbers, text, or images. Instructions, on the other hand, are the commands that tell the computer what operations to perform on the data. Without instructions, the computer would not know what to do with the data it receives. Similarly, without data, the computer would have nothing to work on. Therefore, a computer needs to store both data and instructions in order to function properly.

Submit
27. What do you understand by booting?

Explanation

Booting refers to the process of starting up a computer system. It involves loading the operating system and other necessary software into the computer's memory so that it can be used. Switching on the system is the correct answer because it initiates the booting process, allowing the computer to power up and begin the startup sequence.

Submit
28. The web browser is

Explanation

The web browser is classified as software because it is a computer program that allows users to access and navigate the internet. It is installed on a computer or mobile device and provides a graphical interface for users to interact with websites, display web pages, and execute various functions such as browsing history, bookmarks, and extensions. The browser itself is not a physical component or device, but rather a program that runs on hardware and utilizes firmware and middleware to perform its functions.

Submit
29. A thumb drive uses

Explanation

A thumb drive uses flash memory because it is a type of non-volatile storage that allows for quick and easy data transfer. Flash memory is known for its durability, portability, and ability to retain data even when not powered. Thumb drives, also known as USB flash drives, utilize this technology to store and transfer data between different devices. Unlike optical memory, copper memory, and RAM memory, flash memory does not require a power source to retain information, making it ideal for portable storage devices like thumb drives.

Submit
30. Person who writes system software

Explanation

A systems programmer is responsible for developing and maintaining system software, which includes operating systems, device drivers, and other low-level software that enables computer systems to function effectively. They work closely with hardware engineers and software developers to ensure that the system software meets the needs of the computer system. This role requires strong programming skills, knowledge of computer architecture, and an understanding of system-level software development.

Submit
31. When computer viruses starts to impact data, they are known as

Explanation

When computer viruses start to impact data, they are known as virus infections. Viruses are malicious programs that can infect and damage files, software, and systems. They can corrupt or delete data, disrupt computer operations, and spread to other computers. Therefore, the correct answer is "virus infection."

Submit
32. Externally connected components are called:

Explanation

Peripheral devices are external components that are connected to a computer system. These devices are not essential for the functioning of the computer but provide additional functionality and enhance the user experience. Examples of peripheral devices include printers, scanners, keyboards, mice, and external storage devices. These devices are connected to the computer system through various ports or interfaces, such as USB, HDMI, or Bluetooth. Therefore, the term "peripheral devices" accurately describes externally connected components.

Submit
33. Main memory is

Explanation

RAM stands for Random Access Memory, which is a type of computer memory that is used to store data and instructions that are currently being used by the computer's processor. It is a volatile memory, meaning that its contents are lost when the computer is powered off or restarted. RAM provides fast and temporary storage for data that is actively being processed by the CPU, allowing for quick access and retrieval of information. It is an essential component of a computer system and plays a crucial role in its overall performance and efficiency.

Submit
34. A terminal  allows:

Explanation

A terminal allows input/output because it is a device that allows the user to both input data (commands, text, etc.) and receive output (responses, information, etc.) from a computer system. It serves as a communication interface between the user and the computer, enabling interaction and data exchange in both directions.

Submit
35. Specific type of memory that can be erased anytime is classified as

Explanation

EPROM stands for Erasable Programmable Read-Only Memory. It is a specific type of memory that can be erased and reprogrammed multiple times. Unlike other types of memory, EPROM can be erased using ultraviolet light, allowing for its content to be modified as needed. This makes it a versatile and flexible memory option for various applications that require frequent updates or changes to the stored data.

Submit
36. Type of disc which has storage capacity of 40 megabytes to several megabytes is classified as

Explanation

A hard disc is the correct answer because it is a type of disc that has a storage capacity of 40 megabytes to several megabytes. Hard discs are commonly used for storing large amounts of data in computers and other electronic devices. They are known for their high storage capacity and fast data transfer rates. Other options such as fixed head discs, disc pack, and floppy discs do not typically have the same level of storage capacity as a hard disc.

Submit
37. Which is used to transmit data and is made of glass or plastic

Explanation

Fiber optic cables are used to transmit data and are made of glass or plastic. These cables use light signals to carry information over long distances at high speeds. The use of glass or plastic materials allows for the transmission of light signals without interference or loss of signal quality. This makes fiber optic cables ideal for applications that require high bandwidth and long-distance communication, such as telecommunications networks and internet connections. Ethernet cables, electrical cables, and ceramic cables do not have the same capabilities as fiber optic cables in terms of data transmission and are made of different materials.

Submit
38. Which is not a computer virus?

Explanation

McAfee is not a computer virus because it is actually an antivirus software developed by the McAfee Corporation. It is designed to protect computers from various types of malware, including viruses, trojan horses, and logic bombs. Therefore, McAfee cannot be classified as a computer virus itself.

Submit
39. The ALU is a peripheral device

Explanation

The statement is false because the ALU (Arithmetic Logic Unit) is not a peripheral device. It is actually a fundamental component of the CPU (Central Processing Unit) and is responsible for performing arithmetic and logical operations on data. Unlike peripheral devices, which are external to the CPU and used for input/output purposes, the ALU is an internal component that is essential for the execution of instructions and processing of data within the CPU.

Submit
40. A computer network, or data network, is a _____telecommunications _____ which allows nodes to _____ resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either _____ media or _____ media.

Explanation

A computer network, or data network, is a telecommunications system which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable or wireless media.

Submit
41. Hard discs, fixed head discs, floppy discs and optical discs all are types of

Explanation

Hard discs, fixed head discs, floppy discs, and optical discs are all types of direct access storage. Direct access storage refers to a storage system where data can be accessed directly and quickly, regardless of the physical location of the data within the storage medium. This is in contrast to serial access storage, where data can only be accessed sequentially. Direct access storage allows for random access and retrieval of data, making it more efficient for tasks that require frequent and quick access to specific data.

Submit
42. HTML is a best regarded as a type of______

Explanation

HTML (Hypertext Markup Language) is a markup language used for creating the structure and presentation of web pages. It is not a graphics code, compiler, or operating system. Instead, it is considered a high-level language because it provides a more abstracted and user-friendly way of creating web content compared to lower-level languages like machine code or assembly language. HTML allows developers to define the elements and formatting of a webpage using tags and attributes, making it easier to create and maintain web content.

Submit
43. Process of reading data from permanent store and writing it to computer's main store is called

Explanation

Loading data refers to the process of reading data from a permanent storage device, such as a hard drive or solid-state drive, and transferring it to the computer's main memory or RAM. This allows the computer to access and manipulate the data more quickly and efficiently. Saving data typically refers to the process of writing data from the computer's main memory to a permanent storage device for long-term storage. Writing data refers to the act of creating or modifying data in the computer's main memory. Reading data refers to the process of accessing and retrieving data from the computer's main memory.

Submit
44. Devices that are under control of computer and are directly connected to computer peripherals are termed as

Explanation

On-line devices refer to devices that are directly connected to a computer and are under its control. These devices can send and receive data from the computer in real-time. Examples of on-line devices include printers, scanners, and external hard drives. These devices are directly accessible by the computer and can be used to input or output data as needed.

Submit
45. When power is switched OFF, it will lost its data, such type of memory is classified as

Explanation

Volatile storage refers to a type of memory that loses its data when power is switched off. This means that any information stored in volatile storage will be erased once the power supply is cut off. Therefore, the correct answer is volatile storage.

Submit
46. Computer machinery is

Explanation

Computer machinery refers to the physical components of a computer system, such as the processor, memory, motherboard, and peripherals. These physical components are collectively known as hardware. The operating system, software, and utility are not considered the computer machinery itself but rather the programs and tools that run on the hardware. Therefore, the correct answer is hardware.

Submit
47. Main memory is also called

Explanation

Main memory is often referred to as "immediate access store" because it directly interacts with the CPU, providing fast and immediate access to data and instructions. Unlike secondary storage or auxiliary storage, which are slower and have longer access times, main memory is designed to quickly retrieve and store data that is actively being used by the CPU. The term "backing store" is not commonly used to describe main memory and is more commonly associated with secondary storage devices.

Submit
48. What is directory?

Explanation

A directory is a term commonly used in computing to refer to a folder. It is a way to organize and store files and other directories in a hierarchical structure. Just like a physical folder, a directory can contain multiple files and subdirectories, allowing for better organization and easy access to stored data.

Submit
49. System software creates its own environment to run itself

Explanation

System software, such as operating systems or device drivers, creates its own environment in order to run itself effectively. This environment includes various components and resources that are necessary for the proper functioning of the system software. By creating its own environment, system software can manage hardware resources, provide services to other software applications, and ensure the overall stability and security of the system. Therefore, the statement "System software creates its own environment to run itself" is true.

Submit
50. People who use terminals to enter data into computer systems for the computers to process

Explanation

The correct answer is "Data entry staff" because they are the people who use terminals to enter data into computer systems for processing. Terminal control staff may be responsible for managing the terminals themselves, while peripheral control staff may handle peripheral devices such as printers or scanners. "Computer entry staff" is not a commonly used term and does not accurately describe the role of entering data into computer systems.

Submit
51. A piece of data that can be transferred between CPU and backup storage is called

Explanation

A block is a unit of data that can be transferred between the CPU and backup storage. It is a fixed-sized data structure that allows for efficient data transfer and storage. Blocks are commonly used in backup and storage systems to manage and organize data. They provide a way for the CPU to access and transfer data to and from the backup storage, ensuring reliable and efficient data transfer.

Submit
52. System software executes only when required

Explanation

System software does not execute only when required. System software is a type of software that runs continuously in the background to manage and control the hardware and other software on a computer system. It is responsible for providing essential functions such as operating system services, device drivers, and utility programs. Therefore, system software is always running and executing tasks to ensure the proper functioning of the computer system.

Submit
53. A network consists of

Explanation

The correct answer is devices, cables, routers, modems. These components are essential in setting up a network. Devices such as computers, printers, and servers are connected through cables to routers, which help in directing network traffic. Modems are used to connect the network to the internet. These components work together to enable communication and data transfer within the network.

Submit
54. Computer virus programs are usually hidden in the

Explanation

Computer virus programs are usually hidden in the operating system because the operating system is a crucial part of a computer that controls all its functions. By hiding in the operating system, viruses can gain access to various system resources, manipulate files and settings, and spread to other parts of the computer. This allows them to evade detection and continue their malicious activities without being easily removed or detected by antivirus software.

Submit
55. An analogue device is a

Explanation

An analogue device refers to a device that operates using continuous data signals. Among the given options, a clock fits this description as it uses hands or dials to display time continuously, without any digital representation. A clock does not rely on discrete values or digital technology, making it an analogue device.

Submit
56. What is a window?

Explanation

The correct answer is "a rectangular that contains icons or data (information)". This answer accurately describes a window as a rectangular area on a computer screen that displays icons or data. It does not mention any specific shape or purpose, but focuses on the key characteristic of a window, which is to contain visual elements or information.

Submit
57. Material on which data is stored or an input/output is classified is termed as

Explanation

The term "medium" refers to the material on which data is stored or an input/output is classified. It can include physical media such as hard drives, CDs, or tapes, as well as virtual or cloud-based storage. The medium acts as a bridge between the device and the data, allowing for the storage, retrieval, and transfer of information. It is an essential component in the overall data storage and processing system.

Submit
58. Which is a type of software license?

Explanation

GPL, which stands for General Public License, is a type of software license. It is a widely used open-source license that allows users to freely use, modify, and distribute the software. This license ensures that the software remains open-source and that any modifications or derivative works also remain open-source. GPL is commonly used for software developed by the Free Software Foundation (FSF) and is known for promoting collaboration and sharing within the software community.

Submit
59. Secondary storage memory is basically

Explanation

Secondary storage memory is a type of memory that is used to store data for a long period of time, even when the power is turned off. Non-volatile memory refers to memory that retains its data even without power, making it an ideal choice for secondary storage. This type of memory is commonly used in devices such as hard disk drives, solid-state drives, and flash drives, as it allows for the persistent storage of data. Unlike volatile memory, which loses its data when power is lost, non-volatile memory ensures that the stored data remains intact, making it suitable for long-term storage purposes.

Submit
60. Which one do you like?

Explanation

not-available-via-ai

Submit
61. Destruction of files for malicious reasons such as access by fraudulent people is classified as being

Explanation

The given question asks for the classification of destruction of files for malicious reasons such as access by fraudulent people. Out of the options provided, "modified" is the most appropriate classification as it implies that the files have been altered or tampered with for malicious purposes. This classification indicates that the files have been changed in a way that allows unauthorized access or use by fraudulent individuals.

Submit
62. Example of serial access store is

Explanation

The correct answer is magnetic tape. Magnetic tape is an example of a serial access store because it stores data in a linear manner, where data is accessed sequentially from the beginning to the end of the tape. This means that to access a specific piece of data, the tape must be rewound or fast-forwarded until the desired location is reached. This type of storage is commonly used for archival purposes or for storing large amounts of data that is accessed infrequently, as it is not as fast or efficient for random access as other storage mediums like magnetic discs.

Submit
63. Another name of computer anti virus is

Explanation

The term "vaccine" is often used as another name for computer antivirus. This is because, similar to how a vaccine protects the human body from harmful viruses, a computer antivirus protects the computer system from malicious software and viruses. The use of the term "vaccine" in this context signifies the preventative nature of antivirus software in safeguarding against potential threats.

Submit
64. Person who works with high level to write software for end ussers is called

Explanation

An application programmer is responsible for writing software that is used directly by end users. They work at a high level, focusing on creating programs that are user-friendly and meet specific requirements. They may develop applications for various platforms such as desktop, mobile, or web. Their role involves understanding user needs, designing software solutions, and implementing them using high-level programming languages. They may also be involved in testing, debugging, and maintaining the applications they develop. Overall, an application programmer plays a crucial role in creating software that directly serves the needs of end users.

Submit
65. RAM is

Explanation

RAM stands for Random Access Memory, and it is a type of computer memory that is used to store data temporarily while the computer is running. It is often referred to as the "working memory" of a computer because it is where the computer stores the data that it is actively working on. Unlike permanent storage devices like hard drives, RAM is volatile, meaning that its contents are lost when the computer is powered off. Therefore, RAM is where you store and work on data during the computer's operation.

Submit
66. Computer

Explanation

The given answer "has no limitation" suggests that computers do not have any inherent limitations in terms of their thinking capabilities. This implies that computers can potentially process and analyze vast amounts of data and perform complex tasks without any restrictions. However, it is important to note that this statement may not be entirely accurate as computers do have limitations, such as being dependent on the algorithms and programming they are designed with, and lacking human-like intuition and creativity.

Submit
67. What is an Operating system?

Explanation

An operating system is a software responsible for controlling the allocation and usage of hardware resources. It manages the hardware components of a computer system and ensures that they are utilized efficiently. It handles tasks such as memory management, process scheduling, device management, and file system management. By controlling the allocation and implementation of hardware resources, an operating system allows multiple applications and processes to run simultaneously and ensures that they have access to the necessary resources.

Submit
68. What is a mouse used for?

Explanation

A mouse is used to execute programs on a computer. It is a pointing device that allows users to interact with graphical user interfaces by moving a cursor on the screen and selecting or activating items using buttons or wheels. The mouse does not program the computer or give instructions to it, but rather it enables the user to navigate and interact with the computer system.

Submit
69. What is a menu?

Explanation

A menu refers to a program that displays a list of options or commands for the user to choose from. It is commonly seen in computer software or applications, allowing users to navigate and select different functions or features. This can be seen in various contexts such as a dropdown menu on a website, a menu bar in a software application, or a menu screen on a digital device.

Submit
70. System software - Check all that apply

Explanation

System software is designed to operate the computer hardware, manage and control the computer system resources, and provide a platform for running application software. It includes operating systems, device drivers, and utility programs. General-purpose software refers to software that is designed to perform a wide range of tasks and is not limited to specific applications or industries. Time Sharing is a technique that allows multiple users to share a computer's resources simultaneously, enabling efficient use of the system. Therefore, the correct answer options are designed to operate the computer hardware, general-purpose software, and Time Sharing.

Submit
71. The Internet is web based

Explanation

The statement "The Internet is web based" is incorrect because the Internet is not solely based on the web. The Internet is a global network of interconnected computers that allows for the transmission of data and communication between devices. While the web is a major component of the Internet, there are other services such as email, file sharing, and instant messaging that also operate on the Internet. Therefore, the Internet is not exclusively web-based.

Submit
72. Hard drive storage would refer to

Explanation

Hard drive storage refers to SSD (Solid State Drive). SSDs are a type of storage device that use flash memory to store data, providing faster access times and higher data transfer rates compared to traditional hard disk drives (HDDs). They are commonly used in computers and other electronic devices as a primary storage medium. RAM (Random Access Memory) is a type of volatile memory used for temporary data storage, while BIOS (Basic Input/Output System) is a firmware used to initialize hardware during the boot process. ROM (Read-Only Memory) is a type of non-volatile memory used to store permanent data.

Submit
73. Check ALL that apply- Application software:

Explanation

Application software performs in an environment created by the System/Operating System because it relies on the underlying system to provide the necessary resources and services. It executes as and when required, meaning it runs when the user initiates it or when it is triggered by certain events. Application software is not essential for a computer as there are other types of software (such as system software) that are necessary for the basic functioning of a computer.

Submit
74. Match the following
Submit
View My Results

Quiz Review Timeline (Updated): Jun 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 17, 2018
    Quiz Created by
    Andrewdunbar7
Cancel
  • All
    All (74)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A web browser is (Hint: what kind of computer component?)
GUI stands for
Which device is responsible for converting digital data to music
ROM stands for
CPU is
The Internet is best considered as a:
MMS is a service that allows you to send
What is a computer?
RAM stands for
Which is NOT a type of network topology?
Person who analyze information system and have practical experience of...
MMS means
Keyboard is an
Type of memory which is used to read data but not to write on it is...
The main component of a computer is the
Which is the largest in the ranking?
What do we call computer programs ?
A small picture that is either a program or a shortcut:
What is a program?
The URL of a web site would look like which of the following?
What is a PC?
1024 bytes make
Large computers with wide range of peripheral devices are classified...
If any instruction consist of any arithmetic operation, data is...
File types are indicated by a three or four letter extension in...
Computer stores
What do you understand by booting?
The web browser is
A thumb drive uses
Person who writes system software
When computer viruses starts to impact data, they are known as
Externally connected components are called:
Main memory is
A terminal  allows:
Specific type of memory that can be erased anytime is classified as
Type of disc which has storage capacity of 40 megabytes to several...
Which is used to transmit data and is made of glass or plastic
Which is not a computer virus?
The ALU is a peripheral device
A computer network, or data network, is a _____telecommunications...
Hard discs, fixed head discs, floppy discs and optical discs all are...
HTML is a best regarded as a type of______
Process of reading data from permanent store and writing it to...
Devices that are under control of computer and are directly connected...
When power is switched OFF, it will lost its data, such type of memory...
Computer machinery is
Main memory is also called
What is directory?
System software creates its own environment to run itself
People who use terminals to enter data into computer systems for the...
A piece of data that can be transferred between CPU and backup storage...
System software executes only when required
A network consists of
Computer virus programs are usually hidden in the
An analogue device is a
What is a window?
Material on which data is stored or an input/output is classified is...
Which is a type of software license?
Secondary storage memory is basically
Which one do you like?
Destruction of files for malicious reasons such as access by...
Example of serial access store is
Another name of computer anti virus is
Person who works with high level to write software for end ussers is...
RAM is
Computer
What is an Operating system?
What is a mouse used for?
What is a menu?
System software - Check all that apply
The Internet is web based
Hard drive storage would refer to
Check ALL that apply- Application software:
Match the following
Alert!

Advertisement