1.
The computer uses the .......... number system to store data and perform calculations.
Correct Answer
A. Binary
Explanation
The computer uses the binary number system to store data and perform calculations. In the binary system, numbers are represented using only two digits, 0 and 1. This is because computers use electronic circuits that can only represent two states, on and off. Each digit in a binary number is called a bit, and a group of 8 bits is called a byte. The binary system is fundamental to computer architecture and is used to encode and process all types of data, including text, images, and instructions.
2.
A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is:
Correct Answer
E. Read-only
Explanation
A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is referred to as "Read-only." This means that the data on the disk can only be accessed and read, but not modified or deleted. This type of memory is commonly used for distributing software, storing firmware, or preserving important data that needs to remain unchanged.
3.
Which of the following can be used to select the entire document?
Correct Answer
A. CTRL+A
Explanation
CTRL+A can be used to select the entire document. This keyboard shortcut is commonly used in various applications and text editors to quickly select all the content in a document or text field. By pressing CTRL+A, the user can easily highlight and manipulate the entire document without having to manually select each individual element.
4.
.......... are attempts by individuals to obtain confidential information from you by falsifying their identity.
Correct Answer
A. pHishing
Explanation
Phishing refers to the fraudulent practice of tricking individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers by disguising as a trustworthy entity in electronic communication. This can be done through emails, text messages, or fake websites. The individuals behind phishing attempts falsify their identity to gain access to confidential information.
5.
Part number, part description, and a number of parts ordered are examples of:
Correct Answer
E. Input
Explanation
Part number, part description, and a number of parts ordered are examples of input. In a system, input refers to the data or information that is entered into the system for processing. In this case, the part number, part description, and number of parts ordered are the data that is being provided as input to a system, possibly for inventory management or order processing.
6.
A Web site's main page is called its:
Correct Answer
A. Home Page
Explanation
A web site's main page is called its home page because it is the first page that users see when they visit the site. It typically contains an overview of the website's content and provides navigation options to other pages within the site. The home page serves as a starting point for users to explore the website and access the information or services they are looking for.
7.
The simultaneous processing of two or more programs by multiple processors is:
Correct Answer
D. Multiprocessing
Explanation
Multiprocessing refers to the simultaneous execution of multiple programs by multiple processors. This allows for improved performance and efficiency as tasks can be divided among different processors, enabling them to work on different programs simultaneously. Unlike multitasking, which involves switching between tasks on a single processor, multiprocessing utilizes multiple processors to execute multiple programs concurrently. Time-sharing refers to the sharing of computing resources among multiple users, and multiprogramming refers to the ability of a computer to execute multiple programs concurrently, but not necessarily on multiple processors. Therefore, the correct answer is multiprocessing.
8.
Codes consisting of lines of varying widths or lengths that are computer-readable are known as:
Correct Answer
D. A bar code
Explanation
A bar code is a code consisting of lines of varying widths or lengths that can be read by a computer. It is used to store information about a product or item and can be scanned using a barcode scanner. ASCII code is a character encoding standard, magnetic tape is a storage medium, and an OCR scanner is used to convert printed or handwritten text into digital format. Therefore, the correct answer is a bar code.
9.
To instruct Word to fit the width of a column to the contents of a table automatically, click the ..... button and then point to AutoFit Contents.
Correct Answer
E. Auto Fit
Explanation
To instruct Word to fit the width of a column to the contents of a table automatically, you need to click the "Auto Fit" button and then point to "AutoFit Contents". This will automatically adjust the width of the column to fit the content within it, ensuring that all the text is visible without any truncation or overflow.
10.
Why is it unethical to share copyrighted files with your friends?
Correct Answer
C. Sharing copyrighted files without permission breaks copyright laws.
Explanation
Sharing copyrighted files without permission is considered unethical because it violates the rights of the copyright holder. Copyright laws exist to protect the intellectual property of creators and to ensure that they have the exclusive right to distribute and profit from their work. Sharing copyrighted files without permission undermines the rights of the creator and can result in financial loss. Therefore, it is unethical to share copyrighted files without obtaining proper permission.
11.
Reusable optical storage will typically have the acronym:
Correct Answer
D. RW
Explanation
The correct answer is RW because the acronym stands for "rewritable." Reusable optical storage refers to a type of storage medium that can be written, erased, and rewritten multiple times. RW is commonly used for rewritable CDs and DVDs, allowing users to save and delete data as needed, making it a suitable choice for data storage that requires flexibility and frequent updates.
12.
The most common type of storage devices are:
Correct Answer
D. Flash
Explanation
Flash storage devices are the most common type of storage devices because they are widely used in various electronic devices such as smartphones, tablets, and USB drives. Flash storage is non-volatile, meaning it retains data even when power is removed. It is also faster, more durable, and consumes less power compared to other storage devices like magnetic hard drives or optical discs. Flash storage is compact, lightweight, and offers high storage capacities, making it a popular choice for portable devices and data storage solutions.
13.
A device that connects to a network without the use of cables is said to be:
Correct Answer
E. Wireless
Explanation
A device that connects to a network without cables is termed "wireless." This technology allows devices to communicate over distances without physical connections, using radio waves, infrared, or other methods. Wireless connectivity facilitates mobility and eliminates clutter from cables, making it ideal for smartphones, laptops, and other portable devices.
14.
A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a:
Correct Answer
A. Hacker
Explanation
A hacker is someone who uses their knowledge and skills to gain unauthorized access to other people's computers in order to obtain information illegally or cause damage. They are often highly skilled in computer programming and have a deep understanding of computer systems and networks. Hackers can exploit vulnerabilities in computer systems to gain access to sensitive information, disrupt services, or carry out malicious activities. They are different from analysts, instant messengers, programmers, and spammers, as these terms do not specifically refer to individuals engaging in illegal activities related to computer hacking.
15.
To access the properties of an object, the mouse technique to use is:
Correct Answer
C. Right-clicking
Explanation
To access the properties of an object, the mouse technique of right-clicking is used. Right-clicking on an object brings up a context menu that allows users to access various options and properties related to that object. This technique is commonly used in computer applications and operating systems to provide quick access to additional functionalities and settings for an object.
16.
To change selected text to all capital letters, click the change case button, then click:
Correct Answer
A. UPPERCASE
Explanation
To change selected text to all capital letters, the correct option is "UPPERCASE". This option will convert the selected text to uppercase letters.
17.
The basic unit of a worksheet into which you enter data in Excel is called a:
Correct Answer
B. Cell
Explanation
A cell is the basic unit of a worksheet in Excel where you enter data. It is a rectangular box that is formed by the intersection of a column and a row. Each cell can contain different types of data such as numbers, text, or formulas. Cells are used to organize and manipulate data in Excel, allowing users to perform calculations, create formulas, and analyze information. Therefore, the correct answer to the question is "cell".
18.
You can keep your personal files / folders in:
Correct Answer
B. My Documents
Explanation
"My Documents" is the correct answer because it is a default folder on Windows operating systems where users can store their personal files and folders. It is a commonly used location to organize and access documents, pictures, videos, and other types of files. The other options listed are not standard system folders for personal file storage.
19.
In Word you can force a page break:
Correct Answer
B. By positioning your cursor at the appropriate place and pressing Ctrl + Enter
Explanation
To force a page break in Word, you can position your cursor at the desired location and press Ctrl + Enter. This keyboard shortcut inserts a manual page break at the cursor's position, causing the content after the break to start on a new page. This is a quick and efficient way to control the layout and formatting of your document, ensuring that specific sections start on a fresh page. The other options listed, such as using the F1 key or changing the font size, do not directly relate to forcing a page break in Word.
20.
A DVD is an example of a(n)
Correct Answer
B. Optical disc
Explanation
A DVD is an example of an optical disc because it uses laser technology to read and write data. Optical discs are a type of storage medium that use a reflective surface to store data in the form of pits and lands, which can be read by a laser beam. DVDs are commonly used for storing and playing back video and audio content, as well as for data storage.
21.
The default view in Excel is ......... view.
Correct Answer
C. Normal
Explanation
The default view in Excel is the "Normal" view. This view displays the worksheet with a standard grid layout and allows for easy data entry and editing. It shows the cells, columns, and rows in a clear and organized manner, making it the most commonly used view for working with Excel spreadsheets.
22.
The process of transferring files from a computer on the Internet to your computer is called:
Correct Answer
A. Downloading
Explanation
Downloading refers to the process of transferring files from a computer on the Internet to your computer. It involves retrieving data or information from a remote server and saving it onto your local device. This can include downloading documents, images, videos, software, or any other type of file. Uploading, on the other hand, refers to the process of transferring files from your computer to a remote server on the Internet. FTP (File Transfer Protocol) is a network protocol used for transferring files between computers on a network. JPEG is a file format commonly used for storing and transmitting digital images. Downsizing refers to reducing the size or resolution of a file or image.
23.
.......... is the process of dividing the disk into tracks and sectors.
Correct Answer
B. Formatting
Explanation
Formatting is the correct answer because it refers to the process of dividing the disk into tracks and sectors. During the formatting process, the disk is prepared for data storage by creating the necessary structures for organizing and accessing data. This includes dividing the disk into tracks, which are concentric circles, and sectors, which are pie-shaped divisions within each track. Formatting is an essential step before using a disk for data storage as it sets up the necessary framework for storing and retrieving information.
24.
Help Menu is available at which button?
Correct Answer
B. Start
Explanation
The correct answer is "Start" because the help menu is typically accessible by clicking on the "Start" button on a computer or device. This button is commonly located in the bottom-left corner of the screen in Windows operating systems. Clicking on the "Start" button opens a menu that provides access to various system functions, including the help menu.
25.
The contents of .......... are lost when the computer turns off.
Correct Answer
D. Memory
Explanation
Memory refers to the temporary storage space in a computer where data and instructions are stored while the computer is running. It is a volatile form of storage, meaning that its contents are lost when the computer is turned off. Therefore, the contents of memory are not retained and are lost when the computer is powered off.
26.
When you enter text in a cell in Excel, it also appears in which of the following?
Correct Answer
B. Formula bar
Explanation
When you enter text in a cell in Excel, it also appears in the formula bar. The formula bar is located above the worksheet grid and displays the content of the selected cell. It allows you to view and edit the contents of a cell, including text, formulas, and functions. This feature is useful for easily accessing and modifying the data within a cell without directly editing it in the cell itself.
27.
Which elements of a Word document can be displayed in colour?
Correct Answer
E. All elements
Explanation
All elements of a Word document can be displayed in color. This includes graphics, text, the first word of each line, and any other elements present in the document. The option "All elements, but only if you have a color printer" suggests that the document can be displayed in color only if a color printer is available, but this is not accurate. Word documents can be displayed in color regardless of the type of printer being used.
28.
A workbook is a collection of
Correct Answer
E. Worksheets
Explanation
A workbook is a collection of worksheets. Worksheets are individual pages within a workbook where data can be entered, organized, and analyzed. They are used to store and manipulate data in a structured manner. Worksheets can contain tables, formulas, charts, graphs, and other elements that help in data analysis and presentation.
29.
__ appear at the bottom of the Excel Window.
Correct Answer
A. Sheet tabs
Explanation
Sheet tabs appear at the bottom of the Excel Window. They are used to navigate between different worksheets within a workbook. Each sheet tab represents a different worksheet and displays the name of that worksheet. By clicking on a sheet tab, you can easily switch to that particular worksheet and view or edit its contents.
30.
EPROM stands for
Correct Answer
A. Erasable Programmable Read-Only Memory
Explanation
EPROM stands for Erasable Programmable Read-Only Memory. This type of memory can be programmed and erased multiple times using UV light. It is non-volatile, meaning that it retains its data even when the power is turned off. EPROM is commonly used in devices that require firmware or software updates, as it allows for easy reprogramming without the need for replacing the entire memory chip.
31.
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
Correct Answer
B. RISC
Explanation
RISC stands for Reduced Instruction Set Computer, which is a type of microprocessor architecture that focuses on simplicity and efficiency. In RISC architecture, the microprocessor chip stores only the essential instructions needed to perform tasks, which allows for faster processing speed. This is because RISC processors have a smaller and simpler set of instructions, which can be executed more quickly than complex instructions used in other architectures like CISC (Complex Instruction Set Computer). Therefore, RISC technology enhances the speed of microprocessors by reducing the number of instructions and simplifying their execution.
32.
Which is not a basic function of a computer?
Correct Answer
D. Copy text
Explanation
The basic functions of a computer include accepting input (input), processing data (process), storing data (storage), and producing output (output). Copying text is a specific task or action that can be performed using software on a computer but is not considered one of the fundamental functions of a computer itself.
33.
ASCII is a coding system that provides
Correct Answer
D. 128 different characters
Explanation
ASCII (American Standard Code for Information Interchange) is a coding system that uses 7 bits to represent characters. With 7 bits, a total of 128 different characters can be represented. This includes uppercase and lowercase letters, numbers, punctuation marks, and special characters. Therefore, the correct answer is 128 different characters.
34.
Which part of the computer is directly invoked in executing the instructions of the computer program?
Correct Answer
E. The processor
Explanation
The processor is the part of the computer that is directly involved in executing the instructions of a computer program. It is responsible for performing calculations, making logical decisions, and managing the flow of data within the computer system. The processor fetches instructions from the main storage, decodes them, and then carries out the necessary operations to execute the instructions. Without the processor, the computer program would not be able to run or perform any tasks.
35.
In order to create column data in Word, you need to
Correct Answer
C. Use Excel
Explanation
Using Excel is not necessary to create column data in Word. Instead, you can set tabs or use the Table menu to create columns in Word.
36.
Files are organised by storing them in
Correct Answer
C. Folders
Explanation
Files are typically organized by storing them in folders. Folders provide a hierarchical structure that allows for easy categorization and organization of files. Each folder can contain multiple files and subfolders, enabling users to navigate and locate specific files efficiently. Folders are commonly used in operating systems and file management systems to manage and organize files in a logical manner. They provide a way to group related files together and maintain a structured filing system.
37.
When a computer is switched on, the booting process performs
Correct Answer
B. Power-On Self-Test
Explanation
When a computer is switched on, the booting process performs a Power-On Self-Test (POST). This test is designed to check the hardware components of the computer for any issues or failures. It ensures that the essential components such as the processor, memory, and input/output devices are functioning correctly. The POST is an important step in the booting process as it helps to identify and diagnose any hardware problems before the operating system is loaded.
38.
In Word, the feature that automatically detects common errors is called
Correct Answer
A. Autocorrect
Explanation
Autocorrect is the correct answer because it is a feature in Word that automatically detects and corrects common errors in spelling, grammar, and punctuation as you type. It helps to improve the accuracy and efficiency of writing by automatically fixing mistakes and suggesting corrections. Autograph, Spelling and Grammar, Go to, and Thesaurus are not the correct answers as they do not refer to the specific feature described in the question.
39.
A computer system that is old and perhaps not satisfactory is referred to as a (n)
Correct Answer
D. Legacy system
Explanation
A computer system that is old and perhaps not satisfactory is referred to as a legacy system. This term is commonly used in the technology industry to describe outdated systems that are still in use due to various reasons such as cost, complexity, or lack of resources to upgrade. Legacy systems are often difficult to maintain and may not be compatible with newer technologies, making them less efficient and less reliable compared to modern systems.
40.
Which of the following is not a binary number?
Correct Answer
C. 202
41.
Which of the following does not store data permanently?
Correct Answer
B. RAM
Explanation
RAM (Random Access Memory) does not store data permanently. It is a type of computer memory that is volatile, meaning it loses its data when the power is turned off or interrupted. RAM is used for temporary storage of data that is actively being used by the computer's processor. Once the power is turned off, the data stored in RAM is erased. In contrast, ROM (Read-Only Memory), floppy disks, and hard disks are all non-volatile storage devices that can retain data even when the power is off.
42.
Which of the following is the smallest storage?
Correct Answer
E. Nanobyte
Explanation
A nanobyte is the smallest unit of storage among the options given. While a kilobyte is 1,000 times larger than a byte, a megabyte is 1,000 times larger than a kilobyte, and a gigabyte is 1,000 times larger than a megabyte, a terabyte is 1,000 times larger than a gigabyte. In comparison, a nanobyte is even smaller than a byte, representing a fraction of a byte. Therefore, the nanobyte is the smallest storage unit among the given options.
43.
Which menu enables the user to choose toolbars?
Correct Answer
A. View
Explanation
The View menu enables the user to choose toolbars.
44.
By viewing the properties of the local hard disk of a computer, the user can find out
Correct Answer
A. The amount of space that has been used up and the remaining free space on the disk.
Explanation
By viewing the properties of the local hard disk, the user can determine the amount of space that has been used up and the remaining free space on the disk. This information is useful for managing storage and ensuring that enough space is available for new files and programs. The properties of the disk do not provide the name of the user viewing them, the number of programs available, or any other information that may not be useful to the user.
45.
Pre-defined and built-in formulas in Excel are known as
Correct Answer
E. Functions
Explanation
Functions in Excel are pre-defined and built-in formulas that perform specific calculations or tasks. They are designed to simplify complex calculations and automate repetitive tasks. Functions can be used to perform a wide range of operations, such as mathematical calculations, statistical analysis, date and time calculations, text manipulation, and more. By using functions, users can save time and effort by letting Excel handle the calculations automatically, ensuring accurate and consistent results.
46.
Which of the following contains permanent data and gets updated during the processing of transactions?
Correct Answer
A. Operating System File
Explanation
The operating system file contains permanent data and gets updated during the processing of transactions. The operating system is responsible for managing various aspects of a computer system, including file storage and access. It maintains important system data and configurations that are necessary for the functioning of the computer. During the processing of transactions, the operating system file may be updated to record changes made to the system or to store new data.
47.
The keyboard shortcut to centralise the selected text in Word is
Correct Answer
E. Ctrl + E
Explanation
The keyboard shortcut Ctrl + E is used to centralize the selected text in Word. This shortcut aligns the text in the center of the page or text box.
48.
Which of the following helps to protect floppy disks from data getting accidentally erased?
Correct Answer
B. Write-protect notch
Explanation
The write-protect notch helps to protect floppy disks from data getting accidentally erased. This notch is a small opening on the side of the floppy disk that can be covered or uncovered. When the notch is covered, it indicates that the disk is write-protected, meaning that no new data can be written or saved onto the disk. This prevents any accidental erasure or overwriting of the existing data on the floppy disk.
49.
A modem is connected to
Correct Answer
A. A telepHone line
Explanation
A modem is connected to a telephone line because it is used to transmit data over the telephone network. Modems convert digital signals from a computer into analog signals that can be transmitted over telephone lines, and vice versa. This allows computers to connect to the internet or communicate with other devices over a telephone line.
50.
Large transaction processing systems in automated organisations use
Correct Answer
B. Batch Processing
Explanation
Batch processing is used in large transaction processing systems in automated organizations. It involves collecting and processing a large amount of data together in batches. This allows for efficient processing of multiple transactions at once, reducing the need for manual intervention and increasing productivity. Batch processing is commonly used for tasks such as payroll processing, generating reports, and updating databases. It is a cost-effective and time-saving method that helps streamline operations in organizations.