Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Coded entries which are used to gain A computer cannot ‘boot’ if it does not
access to a computer system are have the__________?
called__________?
A. Compiler
A. Entry codes B. Loader
B. Passwords C. Operating System
C. Security commands D. Assembler
D. Code words
The amount of vertical space between
Which of the following statements is true lines of text in a document is
about Minicomputer and Microcomputer? called___________?
A. F5 A. File transfer
B. F6 B. File encryption
C. F9 C. File modification
D. F12 D. File copying
All of the following are examples of real When creating a computer program,
security and privacy risks the____________designs the structure of
EXCEPT____________? the program?
Which of the following is NOT one of the Computers process data into information
four major data processing functions of a by working exclusively
computer? with____________?
All of the following are examples of Computers manipulate data in many ways,
storage devices EXCEPT____________? and this manipulation is
called___________?
A. hard disk drives
B. printers A. upgrading
C. floppy disk drives B. processing
D. CD drives C. batching
D. utilizing
The CPU and memory are located on
the__________? The ability to recover and read deleted or
damaged files from a criminal’s computer
A. expansion board is an example of a law enforcement
B. motherboard speciality called___________?
C. storage device
D. output device A. robotics
B. simulation
______________is the science that C. computer forensics
attempts to produce machines that display D. animation
the same type of intelligence that humans
do? Where does most data go first with in a
computer memory hierarchy ?
A. Nanoscience
B. Nanotechnology A. RAM
C. Simulation B. ROM
D. Artificial intelligence (Al) C. BIOS
D. CACHE
Servers are computers that provide
resources to other computers connected
to a___________?
The_____________data mining technique A person who used his or her expertise to
derives rules from real-world case gain access to other people’s computers
examples? to get information illegally or do damage is
a____________?
A. Rule discover
B. Signal processing A. Hacker
C. Neural nets B. spammer
D. Case-based reasoning C. instant messenger
D. programmer
_____________are used to identify a user
who returns to a Website? To access properties of an object, the
mouse technique to use is_____________?
A. Cookies
B. Plug-ins A. Dragging
C. Scripts B. dropping
D. ASPs C. right-clicking
D. shift-clicking
Codes consisting of lines of varying
widths or lengths that are computer- A DVD is an example of a (n)___________?
readable are known as__________?
A. hard disk
A. an ASCII code B. optical disc
B. a magnetic tape C. output device
C. an OCR scanner D. solid-state storage device
D. a bar code
The process of transferring files from a
Reusable optical storage will typically computer on the Internet to your computer
have the acronym________? is called_____________?
A. CD A. Downloading
B. DVD B. uploading
C. ROM C. FTP
D. RW D. JPEG
The most common type of storage devices ___________is the process of dividing the
are_________? disk into tracks and sectors?
A. Steel A. Tracking
B. optical B. Formatting
C. magnetic C. Crashing
D. flash D. Allotting
Forms that are used to organize business Which of the following software could
data into rows and coloumns are assist someone who cannot use their
called_____________? hands for computer input?
In power point, the header and footer Memory unit is one part of____________?
button can be found on the insert tab in
what group? A. Input device
B. Control unit
A. Illustrations group C. Output device
B. Object group D. Central Processing Unit
C. Text group
D. Tables group Microprocessors can be used to
make________________?
A(n)_____________is a set of programs
designed to manage the resources of a A. Computer
computer, including starting the computer, B. Digital systems
managing programs, managing memory C. Calculators
and coordinating tasks between input and D. All of the above
output devices?
Which statement is valid about computer
A. application suite program?
B.compiler
C. input/output system A. High level languages must be converted
D. Operating system into machine language to execute
E. None of these B. High level language programs are more
efficient and faster to execute
A(n)_____________program is one that is C. It is more difficult to identify errors in high
ready to run and does not need to be level language program than in low level
altered in any way. programs
D. All of above
A. Interpreter
B. High level By programmable machine we
C. Compiler mean_____________?
D. Executable
A. computers
B. modern television
C. washing machines
D. anything that can be set to perform A. Data consists of numbers
different tasks with suitable programs B. Short access time is required
C. Each stored word is processed differently
Which of the following is a secondary D. Data naturally needs to flow in and out
memory device? in serial form
A. Computers are 100% accurate but it can The World Wide Web was invented
suffer from GIGO (Garbage In Garbage Out) by____________?
B. Computers are reliable because they use
electronic component which have very low A. Tim Berners-Lee
failure rate B. Bob Kahn
C. Computer is never tired and does not C. Steve Jobs
suffer from boredom D. Bill Gates
D. All of above
A. Static RAM
B. Dynamic RAM
C. EPROM
D. ROM
A. Compiler
B. Interpreter
C. Debugger
D. Assembler