1. Which of the following groups consist of only output devices ?
(1) Scanner, Printer, Monitor
(2) Keyboard, Printer, Monitor
(3) Mouse, Printer, Monitor
(4) Plotter, Printer, Monitor
(5) None of these
2. A _____ sometimes called a boot sector virus, executes when a computer boots up because it
resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(1) system virus
(2) Trojan horse virus
(3) file virus
(4) macro virus
(5) None of these
3. A series of instructions that tells a computer what to do and how to do it is called a—
(1) program
(2) command
(3) user response
(4) processor
(5) None of these
4. The process of a computer receiving information from a server on the Internet is known as—
(1) pulling
(2) pushing
(3) downloading
(4) transferring
(5) None of these
5. Every computer connected to an intranet or extranet must have a distinct_____
(1) firewall
(2) proxy server
(3) IP address
(4) domain name
(5) Host name
6. The rectangular area of the screen that displays a program, data, and/or information is a —
(1) title bar
(2) button
(3) dialog box
(4) window
(5) output
7. Firewalls are used to protect against___.
(1) Unauthorized Attacks
(2) Virus Attacks
(3) Data Driven Attacks
(4) Fire Attacks
(5) All of these
8. Search menu is available at which of the following buttons?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
9. The ________ displays the name of the selected cell, table, chart, or object.?
(1) Name box
(2) Row Heading
(3) Formula bar
(4) Task pane
(5) None of these
10. In __________ generation computer the speed was measured in nanoseconds.
(1) first
(2) second
(3) third
(4) fourth
(5) fifth
Answers
1. (4) Plotter, Printer, Monitor are group of only output devices.
2. (5) Boot Sector/MBR infectors are the most commonly found viruses, and cannot normally spread across a network. These (normally) spread by accident via floppy disks.
3. (1) A series of instructions that tells a computer what to do and how to do it is called a program.
4. (3) The process of a computer receiving information from a server on the Internet is known as downloading.
5. (3) Every computer connected to an intranet or extranet must have a distinct IP address.
6. (4) The rectangular area of the screen that displays a program, data, and/or information is a window.
7.(1) Firewalls are used to protect against Unauthorized Attacks.
8. (2) Search menu is available at start buttons.
9. (1) The name box displays the name of the selected cell, table, chart, or object
10. (3) In third generation computer the speed was measured in nanoseconds.