2001 - Computer Fundamentals 3
2001 - Computer Fundamentals 3
What is needed to translate a high-level program into a sequence of machine instructions that performs the
desired task?
(a) Compiler
(b) Debugger
(c) Interpreter
(d) Assembler
2. Text editors and formatters belong to which area of computing?
(a) Assembling
(b) Word processing
(c) Compilers
(d) Accounting
3. A computer program that appears to perform one function while actually doing something else, such as
inserting a virus into a computer system, or stealing a password.
(a) Trojan horse
(b) Hypertext
(c) Worm
(d) Computer virus
4. Which one refers to a device that amplifies a signal and passes it on?
(a) Repeater
(b) Trap
(c) Modulator
(d) Amplifier
5. Which port in a PC is a modem normally connected?
(a) Any of these
(b) Parallel port
(c) Serial port
(d) Special port
6. What is a network with continuous loop communication?
(a) Ring network
(b) Cascaded network
(c) Star network
(d) Local network
7. What do you call a group of sectors on a storage medium that, when accessed as a group speed up a data
access?
(a) Cluster
(b) Media
(c) Cell
(d) Track
8. A computer that interacts with a television set is called:
(a) Net computer
(b) Personal digital assistant
(c) Telecomputer
(d) Personal computer
9. What is the smallest unit of information handled by a computer?
(a) Byte
(b) Cell
(c) Bit
(d) Character
10. A collection of information that may be stored in more than one file is called _______.
(a) Databank
(b) Dataware
(c) Data module
(d) Database
11. Which one is a tiny electrically operated switch that can alternate between on and off million times?
(a) Transistor
(b) Diode
(c) Latch
(d) Pentode
12. A boot disk that contains operating system files plus antivirus software is called ________.
(a) restore disk
(b) rescue disk
(c) reserve disk
(d) boot disk
13. What do you call viruses designed to corrupt antivirus softwares?
(a) Antivirus eradicator
(b) Retro viruses
(c) Worm
(d) Anti-antivirus
14. A computer that is smaller and more portable than a computer notebook. It is sometimes called palm-top
computer.
(a) Micro PC
(b) Microcomputer
(c) Personal digital assistant (PDA)
(d) Minicomputer
15. What do you call a communication network covering a geographical area the size of a city or suburban?
(a) Multi-level network
(b) Metropolitan area network
(c) Local area network
(d) Wide area network
16. What is a large computer called?
(a) A desktop computer
(b) A mega computer
(c) A main frame computer
(d) laptop computer
17. This term refers to preparing the disk for usage so that the operating system can be written on it. Which
one?
(a) Formatting
(b) Multitasking
(c) Setting
(d) Debugging
18. What is a step-by-step drawing representing a specific procedure or algorithm?
(a) Flowchart
(b) Assembler diagram
(c) Block diagram
(d) Machine code
19. What is used to translate high level statements into machine language?
(a) Macros
(b) Assembler
(c) Loader
(d) Compiler or interpreter
20. What code is widely used in mainframe computers?
(a) BCD
(b) EBCDIC
(c) Hollerith code
(d) Baudot code
21. What is RS 232C?
(a) An interface standard
(b) A type of computer hard disk
(c) A computer cable connecting the hardwares
(d) A type of computer memory
22. The term that refers to the physical equipment or components of an electronic data processing system?
(a) Firmware
(b) Central processing unit
(c) Hardware
(d) Software
23. Which one is NOT needed to be connected to the internet?
(a) Security code
(b) Modem
(c) PC
(d) Telephone line
24. When the computer software is easy to use, it is termed as:
(a) User-friendly software
(b) Custom software
(c) Instant access software
(d) Shareware
25. What refers to a technique where each user of a computer takes turns, under the control of the operating
system, using the entire computer main memory for a certain length of time?
(a) Time-sharing
(b) Batch processing
(c) Handshaking
(d) Multitasking
26. A multi-user system is similar to a multi-tasking system except that all users are:
(a) using different programs
(b) using mobile computers
(c) using different computers
(d) using the same program
27. A computer virus that infects the macros that are attached to documents and spreadsheets is called
_______.
(a) Spread sheet virus
(b) Document virus
(c) File virus
(d) Micro virus
28. What do you call a computer that receives and stores e-mail data until retrieved by the email account
holder?
(a) POP server
(b) POST
(c) ISP
(d) MPEG
29. In computer work, an antivirus is
(a) a specific virus that protects a program from other unprecedented attacks by other virus
(b) a vaccine injected by the operator into the hard disk of a computer to remove interference
(c) a software full of virus in order to minimize a software against a specific defect.
(d) a software that scans a computer system to detect viruses or other harmful software
30. What do you call a microscopic plate of silicon that contains thousands of micro miniature electronic circuit
components?
(a) Microchip
(b) Memory
(c) Integrated transistor
(d) Central processing unit
31. Available-for-purchase software is known as:
(a) Market software
(b) Application software
(c) Package software
(d) System software
32. What code is a 7-bit code that allows only 128 different combinations and commonly used in
microcomputers?
(a) Hollerith code
(b) Baudot code
(c) ASCII
(d) EBCDIC
33. What do you call a person who gains illegal access to a computer system?
(a) All of the choices
(b) Hacker
(c) Electronic enthusiast
(d) Computer pirate
34. What do you call the process of retrieving a file from the internet and storing it in the PC?
(a) Downloading
(b) Uploading
(c) Browsing
(d) Scanning
35. All data processing systems involve the following operations regardless of the kind of data processed or the
kind of device or equipment used. Which one of the following are these?
(a) Input, storage and processing
(b) Input, processing and output
(c) Analyzing, logic determination and coding
(d) Processing, storage and distribution
36. What refers to a computer-base system in which a telephone message is recorded in digital form and then
forwarded to others?
(a) Teleconference
(b) Voice mail
(c) Audio conference
(d) Answering machine
37. It refers to the rate at which data is sent over communication lines. Which one?
(a) Uploading rate
(b) Propagation rate
(c) Attenuation rate
(d) Baud rate
38. What holds data and instructions for further manipulation in the ALU?
(a) Control bus
(b) Register
(c) Accumulator
(d) Data bus
39. What is in a machine that implies that it is capable of absorbing and organizing new data, learning new
concept, reasoning logically and responding to inquiries?
(a) All of the choices
(b) Man-free intelligence
(c) Artificial intelligence
(d) Self-Process Intelligence
40. "AT" Command is used in PC communications. What do you mean by "AT"?
(a) Attempt
(b) Attention
(c) Attack
(d) Attraction
41. Which of the following refers to a round piece of plastic that stores data and program as a magnetized spot?
(a) Digital disk
(b) None of these
(c) Floppy disk
(d) Hard disk
42. It is a very powerful small component of a computer.
(a) Internet
(b) Triode
(c) Chip
(d) Diode
43. What do you call a series of concentric or spiral storage areas created on a storage medium during the
formatting process?
(a) Tracks
(b) Routes
(c) Traces
(d) Domains
44. What do you call a device that provides the computer with electricity if there is a power failure?
(a) Automatic transfer switch (ATS)
(b) Power inverter
(c) Uninterruptible power supply (UPS)
(d) Power supply rectifier
45. What type of database stores all information in the equivalent of a matrix?
(a) Ordered database
(b) Relational database
(c) Hierarchical database
(d) Sequential database
46. What is the term for a computer professional who plans an entire computer system?
(a) Programmer
(b) Systems analyst
(c) Software developer
(d) All of the choices
47. What type of computer accepts input in handwriting on a screen?
(a) Stylus computer
(b) All of the choices
(c) Touch-screen computer
(d) Pen-based computer
48. A megabyte is a computer term which means
(a) a million kilobytes
(b) a thousand kilobytes
(c) a hundred thousand bytes
(d) a group of characters that can fill a computer storage
49. What is storage capacity of a 3½" floppy disk?
(a) 1.44 MB
(b) 1.5 MB
(c) 1.8 MB
(d) 1.25 MB
50. What is used to gain access to internet?
(a) Web page
(b) Browser
(c) Gopher
(d) Password