
Computer Quiz # 7
Q1. __________ Store data or information temporarily and pass it on as directed by the control unit?
(A) Address
(B) Register
(C) Number
(D) Memory
Q2. Select the Odd one from the following
(A) Operating system
(B) Interpreter
(C) Compiler
(D) Assembler
Q3. A________________ is a set of additional commands that the computer displays after selecting from the main menu?
(A) dialog box
(B) submenu
(C) menu selection
(D) All of the above
Q4. COBOL is an acronym for________________?
(A) Common Business Oriented Language
(B) Computer Business Oriented Language
(C) Common Business Operated Language
(D) Common Business Organized Language
Q5. All are real security and privacy threats. EXCEPT____?
(A) hackers
(B) Spam
(C) Viruses
(D) identity theft
Computer Science
Q6. Which of the following are NOT major data processing functions of a computer?
(A) gathering data
(B) processing data into information
(C) analyzing the data or information
(D) storing the data or information
Q7. All are storage devices EXCEPT____________?
(A) hard disk drives
(B) printers
(C) floppy disk drives
(D) CD drives
Q8. The CPU and memory are located on the__________?
(A) expansion board
(B) motherboard
(C) storage device
(D) output device
Q9. ______________is the science that attempts to produce machines that display the same type of intelligence that humans do?
(A) Nanoscience
(B) Nanotechnology
(C) Simulation
(D) Artificial intelligence (Al)
Q10. server computers provide resources for computers connected to ___________?
(A) network
(B) mainframe
(C) supercomputer
(D) client
Q11. When designing a software ____________is to design a software framework?
(A) End-user
(B) System Analyst
(C) Programmer
(D) All of the above
Q12. Computers process data and use only _____ to convert it into information?
(A) multimedia
(B) word
(C) numbers
(D) characters
Q13. Computers manipulate data in different ways and this manipulation is called ____________?
(A) upgrading
(B) processing
(C) batching
(D) utilizing
Q14. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called___________?
(A) robotics
(B) simulation
(C) computer forensics
(D) animation
Important Computer Mcqs
Q15. In Computer hierarchy data is first stored in _____?
(A) RA
(B) ROM
(C) BIOS
(D) CACHE
Q16. The_____________data mining technique derives rules from real-world case examples?
(A) Rule discover
(B) Signal processing
(C) Neural nets
(D) Case-based reasoning
Q17. Using _____________repeating visitors of a Website is determined.
(A) Cookies
(B) Plug-ins
(C) Scripts
(D) ASPs
Q18. Computer-readable codes consisting of lines are known as__________?
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
Q19. Why is it immoral to share copyrighted files with your friends?
(A) That is not immoral because it is legal.
(B) This is immoral as the files are provided for free.
(C) Sharing copyrighted files are against copyright law.
(D) This is not immoral as the files are provided for free.
Q20. Reusable optical storage will typically have the acronym________?
(A) CD
(B) DVD
(C) ROM
(D) RW