2.
File contains the updates to the current records.
Correct Answer
A. B) transaction
Explanation
A transaction typically refers to a set of operations that are executed as a single unit. In the context of the given statement, a file containing updates to the current records would most likely be associated with a transaction. This is because the updates are likely to be performed together as a cohesive unit to ensure data integrity. The other options, such as master, record, and update, do not specifically imply a collection of operations or changes being made to the records.
3.
In the early days of computers, tape was the only secondary storage, so all transaction processing was in mode.
Correct Answer
A. C) batch
Explanation
In the early days of computers, tape was the primary form of secondary storage. In batch processing, transactions are collected and processed together in groups or batches. This was the common mode of transaction processing at that time because it allowed for efficient use of resources and minimized the need for manual intervention. Real-time processing refers to immediate processing of transactions, while master file and tape transfer are not directly related to the mode of transaction processing in this context.
4.
Processing each transaction as it happens is an example of, processing.
Correct Answer
A. B) real-time
Explanation
Processing each transaction as it happens is an example of real-time processing. Real-time processing refers to the immediate processing and updating of data as soon as it is received, without any delay. In this case, each transaction is processed in real-time, meaning that it is immediately recorded and updated in the system as it occurs. This allows for instant access to the most up-to-date information and enables quick decision-making based on real-time data.
5.
Which of the following is an example of an input unit:
Correct Answer
A. D) Information
Explanation
An input unit is a device or component that allows data or information to be entered into a computer system. In this case, "Information" is the correct answer because it refers to the data or input that is being provided to the computer system. Options A, B, and C do not represent input units, as they are either general terms or specific types of software rather than physical devices used for inputting data.
6.
ROM stands for:
Correct Answer
A. C) Read only memory .
Explanation
ROM stands for Read Only Memory. It is a type of computer memory that can only be read and not written to. The data stored in ROM is permanently written during manufacturing and cannot be changed or erased by normal computer operations. ROM is used to store firmware and other essential software instructions that are required for the computer to boot up and perform basic functions. It retains its data even when the computer is turned off.
7.
Which of the following is an example of an input unit:
Correct Answer
A. D) A and C
Explanation
The correct answer is D) A and C. Both the keyboard and the screen are examples of input units. The keyboard allows the user to input data or commands into the computer, while the screen displays the output or results of the computer's processing.
8.
Software works as intermediate between user and computer is called:
Correct Answer
A. B) Operating system
Explanation
The correct answer is B) Operating system. An operating system is a software that acts as an intermediary between the user and the computer. It manages the computer's hardware and software resources, provides services to the user, and allows the user to interact with the computer. It controls and coordinates the execution of other software applications, making it an essential component for the computer to function properly.
9.
Your computer may be infected with Virus by one of the following reasons:
Correct Answer
A. D) Both a and b.
Explanation
The correct answer is D) Both a and b. This is because downloading files from the internet can expose your computer to potential viruses, as these files may contain malicious software. Similarly, using infected disks can also introduce viruses to your computer. Therefore, both scenarios pose a risk of infecting your computer with a virus.
10.
The device that converts a graphical image to digital data is:
Correct Answer
A. B) Scanner
Explanation
A scanner is a device that converts a graphical image into digital data. It uses optical sensors to capture the image and then converts it into a digital format that can be stored and manipulated on a computer. Unlike a printer, which produces a physical copy of an image, a scanner captures the image and creates a digital representation of it. The ALU (Arithmetic Logic Unit) is a component of a computer's CPU and is responsible for performing arithmetic and logical operations, while a screen is a display device that shows the digital data to the user.
11.
What is the function of a disk drive?
Correct Answer
A. B) to read from or write information to a floppy disk
Explanation
A disk drive is a hardware device used to read from or write information to a floppy disk. It is not used for printing sheets of paper, displaying information on a screen, or calculating numbers. Floppy disks were commonly used as a portable storage medium in the past, and the disk drive was essential for accessing the data stored on these disks.
12.
All of the following are various types of printers except:
Correct Answer
A. C) webcam.
Explanation
The question is asking to identify the type of printer that is not included among the given options. The options provided are dot-matrix, ink-jet, webcam, and laser. Dot-matrix, ink-jet, and laser printers are all types of printers that are commonly used for printing documents or images. However, a webcam is not a type of printer. It is a device used for capturing video and transmitting it over the internet. Therefore, the correct answer is C) webcam.
13.
Which of the following are computer languages?
Correct Answer
A. D) Visual basic
Explanation
Visual Basic is a computer language used for developing applications and programs. It is a programming language that allows users to create graphical user interfaces and perform various operations. Unlike Linux, Windows 2000, and Word 2000, which are operating systems and software applications, Visual Basic is specifically designed for programming purposes. Therefore, Visual Basic is the only option among the given choices that is a computer language.
14.
What is the maximum capacity for floppy diskette? do you like?
Correct Answer
A. B) 1.4 MB
Explanation
The correct answer is B) 1.4 MB. Floppy diskettes had a maximum capacity of 1.4 MB. These were a popular storage medium in the past, commonly used for transferring and storing small files. However, with advancements in technology, floppy disks have become obsolete and are rarely used today.
15.
What is most commonly used to enter text into a word processing program?
Correct Answer
A. A) keyboard
Explanation
The most commonly used method to enter text into a word processing program is through the keyboard. The keyboard allows users to type and input text characters, numbers, and symbols directly into the program. It provides a quick and efficient way to input information and make edits within the word processing software. The mouse is primarily used for navigating and selecting text or objects on the screen, while the printer is used for producing hard copies of the document. The monitor is the display screen that allows users to view and edit their documents.
16.
When electrical power is cut off, data and programs are lost in:
Correct Answer
A. C) Primary memory.
Explanation
When electrical power is cut off, data and programs are lost in primary memory. Primary memory, also known as main memory or RAM (Random Access Memory), is volatile memory that requires continuous power supply to retain data and programs. When the power is cut off, the data stored in primary memory is lost as it is not permanently stored. Secondary storage, such as hard drives or solid-state drives, and ROM (Read-Only Memory) are non-volatile and can retain data even without power. The operating system is responsible for managing the computer's hardware and software but does not store data or programs.
17.
The temporary memory of the computer is :
Correct Answer
A. C) RAM
Explanation
RAM stands for Random Access Memory. It is a type of temporary memory in a computer that is used to store data and instructions that are currently being used by the computer's processor. Unlike ROM, which is read-only memory, RAM is a volatile memory, meaning that its contents are lost when the computer is turned off or restarted. RAM allows for fast and easy access to data, making it an essential component for the smooth functioning of a computer system.
18.
All of the following are examples of secondary storage devices except:
Correct Answer
A. B) Printer
Explanation
A printer is not considered a secondary storage device because it does not store data for long-term use. It is primarily used to produce physical copies of documents or images. Secondary storage devices, on the other hand, are used to store data that can be accessed and retrieved at a later time, such as magnetic tapes, magnetic disks, and hard disks.
19.
A computer user can notice that there is a virus if he/she observes a:
Correct Answer
A. D) All of the above
Explanation
The correct answer is D) All of the above. A computer user can notice that there is a virus if they observe a lack of storage capability, a decrease in the speed of executing programs, or unexpected error messages. These are common symptoms of a computer virus infection.
20.
---------------- is an example of keyboard entry.
Correct Answer
A. A) Working from a source document
Explanation
Working from a source document involves manually entering data from a physical document, such as a paper form or a printed document, into a computer system using a keyboard. This method is commonly used when there is no electronic version of the document available or when the document needs to be converted into a digital format for further processing or storage. It requires the user to type the information accurately and can be time-consuming depending on the amount of data to be entered.
21.
A POS terminal is an example of:
Correct Answer
A. D) b and c.
Explanation
A POS terminal, which stands for Point of Sale terminal, is an example of both keyboard entry and direct data entry. Keyboard entry refers to the input of data using a physical keyboard, which is commonly done on a POS terminal by the cashier or user. Direct data entry refers to the input of data directly into a computer system, without the need for any intermediary steps or documents. In the case of a POS terminal, the data entered by the cashier is directly entered into the computer system, making it an example of both keyboard entry and direct data entry.
22.
The keys labeled 0 - 9 on the keyboard are called: .
Correct Answer
A. B) numeric keys.
Explanation
The keys labeled 0 - 9 on the keyboard are called numeric keys because they represent numbers. These keys are used for numerical input and calculations, making them different from function keys (which perform specific functions), typewriter keys (which include letters, symbols, and punctuation marks), and special purpose keys (which have specific functions related to the device or software being used).
23.
He keyboard keys that resemble regular letters on the keyboard are called:
Correct Answer
A. C) typewriter keys.
Explanation
The keyboard keys that resemble regular letters on the keyboard are called typewriter keys. This term refers to the keys that are designed to resemble the keys on a traditional typewriter, which are used for typing letters and characters. Function keys are a separate set of keys used for specific functions, numeric keys are used for numbers, and special purpose keys are used for specific tasks or commands.
24.
The keyboard keys that are labeled F1, F2, and so on are called:
Correct Answer
A. A) function keys.
Explanation
The keyboard keys that are labeled F1, F2, and so on are called function keys. These keys are typically located at the top row of the keyboard and are used to perform specific functions in various software applications and operating systems. They can be customized to perform different tasks depending on the user's preference. Numeric keys are the keys on the keyboard that are used for entering numbers. Typewriter keys are the keys used for typing letters and characters. Special purpose keys refer to keys on the keyboard that have specific functions, such as the Enter key or the Shift key.
25.
The keyboard keys that have arrows on them are called:
Correct Answer
A. B) navigation keys.
Explanation
The keyboard keys that have arrows on them are called navigation keys. These keys are used to move the cursor or highlight elements on the screen in different directions, such as up, down, left, and right. They are commonly found on computer keyboards and are essential for navigating through documents, web pages, and menus. The function keys (A) are a separate set of keys that have specific functions assigned to them, the typewriter keys (C) refer to the main letter and number keys on a keyboard, and the special purpose keys (D) are keys with specific functions that vary depending on the context.
26.
The keyboard keys like Caps Lock that turn a feature on or off are called:
Correct Answer
A. C) Toggle keys
Explanation
Toggle keys are keyboard keys that allow users to turn a specific feature on or off with a single press. Examples of toggle keys include the Caps Lock key, which toggles the capitalization of letters, and the Num Lock key, which toggles the functionality of the numeric keypad. These keys are called toggle keys because they toggle or switch between two states, turning a feature on or off. Therefore, the correct answer is C) Toggle keys.
27.
O protect your Data from computer viruses you should:
Correct Answer
A. D) All of the above
Explanation
To protect your data from computer viruses, it is recommended to buy original copies of software to ensure that they are free from any malicious code. Making backups of your files is also important as it allows you to restore your data in case of a virus attack. Additionally, using anti-virus programs like f-prot can help detect and remove any viruses that may have infected your system. Therefore, the correct answer is D) All of the above, as all these measures collectively contribute to safeguarding your data from computer viruses.
28.
Continuous-speech and discrete-speech are two forms of:
Correct Answer
A. A) speech recognition systems.
Explanation
The question asks for the two forms of speech, and the correct answer is A) speech recognition systems. This means that continuous-speech and discrete-speech are two different forms or types of speech recognition systems.
29.
Using _______ the computer can recognize phases like "He won the game" in context.
Correct Answer
A. B) continuous speech
Explanation
Continuous speech refers to the uninterrupted flow of spoken words. In the context of the given question, the computer can recognize phrases like "He won the game" in context by using continuous speech. This means that the computer can understand and process spoken language without any breaks or pauses between words. It allows for more natural and fluent communication with the computer, as it can accurately interpret the meaning and context of the spoken words.
30.
The general name for devices that convert machinereadable information into people-readable form is:
Correct Answer
A. D) output devices.
Explanation
The general name for devices that convert machine-readable information into people-readable form is output devices. These devices include printers, monitors, and speakers, which display or produce information in a format that can be easily understood by humans. Input devices, on the other hand, are used to enter data into a computer system, while scanning devices are used to convert physical documents or images into digital formats. Conversion devices are not a commonly used term in this context.
31.
The printer that sprays small droplets of ink on to the surface of the paper is the printer.
Correct Answer
A. C) ink jet
Explanation
An inkjet printer is a type of printer that uses small droplets of ink to create images or text on the surface of paper. It works by propelling tiny droplets of ink onto the paper through a series of nozzles. This method allows for precise and detailed printing, making inkjet printers popular for both text documents and high-quality photo printing. Laser printers, on the other hand, use a laser beam to transfer toner onto the paper, while dot matrix printers use a series of pins to strike an inked ribbon against the paper. Thermal printers use heat to transfer ink onto the paper.
32.
The printer that creates dot-like images using a beam of light is the ---------------- printer.
Correct Answer
A. A) laser
Explanation
A laser printer creates dot-like images using a beam of light. The laser beam scans across a drum, which attracts toner particles to create the image. This image is then transferred onto paper through a combination of heat and pressure. Laser printers are known for their high-quality prints and fast printing speeds, making them a popular choice for offices and professional environments.
33.
A very high quality printer that uses heat and specially treated paper is the printer.
Correct Answer
A. D) thermal
Explanation
The given statement mentions that the printer uses heat and specially treated paper, which is a characteristic of a thermal printer. Thermal printers use heat to transfer images or text onto specially coated paper, making them suitable for high-quality printing. Laser printers use a laser beam to create an image on a drum, dot matrix printers use a matrix of pins to create dots on paper, and inkjet printers use liquid ink droplets to create images on paper. Therefore, the correct answer is D) thermal.
34.
A terminal that cannot process any information is called a(n):
Correct Answer
A. D) dumb terminal.
Explanation
A terminal that cannot process any information is called a "dumb terminal." This type of terminal relies entirely on a central computer or server to perform all processing tasks. It lacks any built-in intelligence or processing capabilities, and simply acts as an input/output device, displaying information from the central system and accepting user input.
35.
A terminal that is essentially a PC with some communications software on board would be called a(n):
Correct Answer
A. B) intelligent terminal.
Explanation
An intelligent terminal refers to a terminal that is essentially a PC with some communications software on board. This type of terminal is capable of performing tasks beyond simple input and output operations, as it has additional processing capabilities. It can process and manipulate data before sending it to the main computer system, making it more advanced and capable compared to a dumb terminal. Therefore, the correct answer is B) intelligent terminal.