Date post: | 18-Dec-2015 |
Category: |
Documents |
Upload: | alban-foster |
View: | 214 times |
Download: | 0 times |
Question 1
Software packages used to create financial statements using mathematical calculations are: Word processing. Electronic Spreadsheet. Database Computer graphics.
Question 3
What equipment is used like a copy machine to allow information to be input into the computer? Light pen Keyboard Scanner Mouse
Question 5
The components that make up a computer system are: Programs. Language. Hardware. Software.
Question 6
Which device is used to enter data into a computer? Input device Output device Microprocessor Storage
Question 7
The physical parts of a computer system are called: Hardware. Languages. Applications. Programs.
Question 9
The operating system capability that permits more than one program to run simultaneously is called: Multi-cycle. Multi-purpose. Multi-string. Multitasking.
Question 10
The operating system functions do NOT include: Managing input and output. Providing user with a password. Supervising other components. Providing software and hardware
management.
Question 11
Which utility is used to locate and disinfect a virus? Antiviral Data compression Data recover Translator
Question 12
The acronym MS-DOS stands for: Macintosh Disk Operating System. Microsoft Disk Operating System. Microsoft Operating System. Microsoft Output System.
Question 13
Which is NOT a characteristic of copyrighted software? An individual or a business copyrights it. It is given freely and it can be copied by
anyone. Permission is needed in order to copy
software. Programs are accompanied by supporting
documents.
Question 14
The technology used to scramble information so that only the sender and receiver can read the data is called: Encryption. Password. Public domain. Virus.
Question 15
To protect the computer from detecting a virus the user should install a/an: Database program. Spreadsheet program. User password. Anti-virus program.
Question 16
Which is a destructive computer code or virus that is designed to activate at a specific time? Bomb Hoax Trojan horse Worm
Question 17
Which is NOT a virus known to destroy or cause damage to computer files? Bomb Hacker Trojan Horse Worm
Question 18
Which software allows the user to pay a small fee after the trial period? Copyrighted Freeware Public domain Shareware