1.Which type of system has their own programming and do not receive input?
(a)Embedded computer
(b)Super computer
(c)Microcomputer
(d)Both (b) and (c)
SHOW ANSWER
©navclasses
2.A simple automated program that scans the web for specific data and insert into a designated database is ________.
(a) Web mining
(b) Web database integration
(c) Web crawler
(d) Web scanning
SHOW ANSWER
©navclasses
3. Whose function is to convert computer generated result into human acceptable form?
(a) Mouse
(b) Input Interface
(c) ALU
(d) Output Interface
SHOW ANSWER
©navclasses
4.Which of the following is/are file extension(s) in DOS?
(a) EXE
(b) BAT
(c) COM
(d) All of these
SHOW ANSWER
©navclasses
5. Multi-user systems provide cost savings for small business as they use a single processing unit to link several ______.
(a) Personal computers
(b) Workstations
(c) Dumb terminals
(d) Mainframe
SHOW ANSWER
©navclasses
6. The most widely used type of database management system is the:
(a) Flat database
(b) Network database
(c) Relational database
(d) Hierarchical database
SHOW ANSWER
©navclasses
7. Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
(a) Toggle
(b) Cold booting
(c) Warm booting
(d) Logging off
SHOW ANSWER
©navclasses
8.To protect your system from computer hackers you must turn on a(n) _______.
(a) USP
(b) VLC
(c) Another system
(d) Firewall
SHOW ANSWER
©navclasses
9.The point at which the flow of text in a document moves to the top of a new page–
(a) Page insert
(b) Page break
(c) Page format
(d) All of the above
SHOW ANSWER
©navclasses
10. __________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.
(a) Phishing
(b) Computer viruses
(c) Spyware scams
(d) Viruses
SHOW ANSWER
©navclasses