Computer Quizzes 2 November 2016
Question 1 -
The improvement of computer hardware theory is summarized by which law.?
Question 2 -
The most widely used computer device is.
Question 3 -
_______ are software which is used to do particular task.
Question 4 -
________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
Question 5 -
The difference between people with access to computers and the Internet and those without this access is known as the:
Question 6 -
All of the following are examples of real security and privacy risks EXCEPT:
Question 7 -
The term 'Pentium' is related to
Question 8 -
……….is the process of dividing the disk into tracks and sectors.
Question 9 -
Which computer memory is used for storing programs and data currently being processed by the CPU ?
Question 10 -
Which of the following is used for close a tab on a browser?
The improvement of computer hardware theory is summarized by which law.?
| A.) Metcalf’s law | B.) Bill’s Law |
| C.) Grove’s law | D.) Moore’s First Law |
Question 2 -
The most widely used computer device is.
| A.) Solid state disks | B.) External hard disk |
| C.) Internal hard disk | D.) Mouse |
Question 3 -
_______ are software which is used to do particular task.
| A.) Operating system | B.) Program |
| C.) Data | D.) Software |
Question 4 -
________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
| A.) The operating system | B.) The motherboard |
| C.) The platform | D.) Application software |
Question 5 -
The difference between people with access to computers and the Internet and those without this access is known as the:
| A.) digital divide. | B.) Internet divide. | ||
| C.) cyberway divide. | D.) Web divide |
Question 6 -
All of the following are examples of real security and privacy risks EXCEPT:
| A.) Viruses | B.) Hackers |
| C.) Spam | D.) Identity theft. |
Question 7 -
The term 'Pentium' is related to
| A.) DVD | B.) Hard Disk |
| C.) Microprocessor | D.) Mouse |
Question 8 -
……….is the process of dividing the disk into tracks and sectors.
| A.) Allotting | B.) Crashing |
| C.) Formatting | D.) Tracking |
Question 9 -
Which computer memory is used for storing programs and data currently being processed by the CPU ?
| A.) Internal memory | B.) Mass memory |
| C.) Non-volatile memory | D.) PROM |
Question 10 -
Which of the following is used for close a tab on a browser?
| A.) Ctrl + Y | B.) Ctrl + A |
| C.) Ctrl + W | D.) Ctrl + T |
Comments
Post a Comment