(1) Floppy
disk
(2) Magnetic tape
(3) Hard
disk
(4) All of the above
(5) None of
these
2. In computer
language, each letter, number, and an array of special characters consists of-
(1) 8
kilobytes
(2) 8 bytes
(3) a
bit
(4) 8 bits
(5) None of
these
3. Programming language
built into user programs such as word and Excel are known as ____.
(1) 4
GLs
(2) macro languages
(3)
object-oriented languages
(4) visual
programming languages
(5) None of
these
4. Firewalls are used to
protect against –
(1)
Unauthorized Attacks (2)
Virus Attacks
(3) Data
Driven
Attacks
(4) Fire Attacks
(5) All of
these
5. The ____ directory is
mandatory for every disk.
(1)
Root
(2) Base
(3) Sub
(4) Case
(5) None of
these
6. All of the
following are examples of storage devices EXCEPT:
(1) hard
disk
drives
(2) printers
(3) floppy
disk drives (4) CD drives
(5) None of
these
7. An e-mail account
includes a storage area, often called a(n)-
(1)
attachment
(2) hyperlink
(3)
mailbox
(4) IP address
(5) None of
these
8. DSL is an example
of a(n) –
(1)
Network
(2) Wireless
(3)
Slow
(4) Broadband
(5) None of
these
9. An area of a computer
that temporarily holds data waiting to be processed as-
(1)
CPU
(2) Memory
(3)
Storage
(4) File
(5) None of
these
10. Apple Macintoshes (Macs) and
PCs use different ____ to process data and different operating systems.
(1)
languages
(2) methods
(3)
CPUs
(4) storage
(5)
None of these
ALSO READ