1.
A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
Correct Answer
D. Worm
Explanation
The correct answer is "Worm". A self-replicating program that resembles a virus, originating from a science fiction novel called "Shockwave Rider" by John Bruner, is commonly referred to as a worm. Unlike viruses, worms do not require a host program to spread and can replicate themselves across networks or systems. They can cause harm by consuming system resources, disrupting network communication, or carrying out malicious activities.
2.
In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
Correct Answer
D. Eight bit.
Explanation
In the binary language, each letter of the alphabet, number, and special character is represented using a unique combination of bits. A bit is the smallest unit of data in a computer, and it can have a value of either 0 or 1. Therefore, the correct answer is "eight bit" because it accurately describes the unique combination used to represent each character in binary.
3.
The linking of computers with a communication system is called
Correct Answer
A. Networking
Explanation
Networking refers to the process of connecting computers and other devices together to share information and resources. It involves the use of communication systems to establish connections and enable data transfer between devices. The term "networking" accurately describes the action of linking computers together, making it the correct answer in this context.
4.
A collection of program that controls how your computer system runs and processes information is called
Correct Answer
A. Operating System
Explanation
An operating system is a collection of programs that manages and controls the hardware and software resources of a computer system. It provides an interface for users to interact with the computer and ensures that all the processes and tasks are executed efficiently. It manages memory, file systems, input/output devices, and other system resources. Therefore, the correct answer is Operating System.
5.
The name for the way that computers manipulate data into information is called:
Correct Answer
B. Processing.
Explanation
Processing is the correct answer because computers manipulate raw data and convert it into meaningful information through various operations such as calculations, sorting, filtering, and transforming. This involves executing instructions and algorithms to perform tasks and produce output. Programming refers to the process of creating instructions for the computer, while storing and organizing are related to data management. A compiler is a program that translates source code into machine code. Therefore, processing best describes the overall activity of transforming data into information.
6.
A process known as ____________ is used by large retailers to study trends.
Correct Answer
C. POS(Point of Sale)
Explanation
Large retailers use a process called POS (Point of Sale) to study trends. POS refers to the system that records and tracks sales transactions at the point of purchase. It collects data on items sold, prices, quantities, and customer information. This data is then analyzed to identify patterns, trends, and insights that can help retailers make informed business decisions, such as inventory management, pricing strategies, and marketing campaigns. Data mining and data selection are related processes but not specifically mentioned in the given question. Data conversion is not relevant to studying trends in large retailers. Therefore, the correct answer is POS (Point of Sale).
7.
____________ is data that has been organized or presented in a meaningful fashion.
Correct Answer
B. Information
Explanation
Information is data that has been organized or presented in a meaningful fashion. It is the result of processing raw data using software or other tools to make it understandable and useful. Storage refers to the physical or digital medium where data is stored, but it does not necessarily imply organization or presentation. Therefore, the correct answer is information.
8.
DOS stands for____________
Correct Answer
C. Disk Operation System
Explanation
DOS stands for Disk Operation System. This is a computer operating system that uses disk storage as its primary means of organizing and retrieving data. It was commonly used in the early days of personal computers, particularly with the introduction of IBM PC and compatible systems. DOS allowed users to interact with the computer through a command line interface, executing commands and managing files stored on disk drives.
9.
DSL is an example of a(n) ____________ connection.
Correct Answer
D. Broadband
Explanation
DSL (Digital Subscriber Line) is a type of broadband connection. It uses existing telephone lines to transmit data at high speeds, making it a faster and more reliable option compared to dial-up or slow connections. Therefore, the correct answer is broadband.
10.
Memory which forgets every thing when you switch off the power is known as__________
Correct Answer
B. Volatile
Explanation
The correct answer is Volatile. Volatile memory refers to a type of computer memory that loses its stored data when the power supply is turned off or interrupted. It is temporary and is used for storing data that needs to be accessed quickly by the computer's processor. Examples of volatile memory include RAM (Random Access Memory) and cache memory.
11.
How many options does a BINARY choice offer?
Correct Answer
A. Two
Explanation
A binary choice offers two options. In binary, there are only two digits, 0 and 1, which represent the two possible options. Therefore, a binary choice can only have two options.
12.
A ____________ is approximately one billion bytes.
Correct Answer
C. Gigabyte
Explanation
A gigabyte is a unit of digital information that is approximately one billion bytes. It is commonly used to measure the storage capacity of computer systems and storage devices.
13.
____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
Correct Answer
A. Artificial intelligence (AI)
Explanation
Artificial intelligence (AI) is the correct answer because it is the field of science that aims to create machines capable of exhibiting human-like intelligence. AI involves developing computer systems that can perform tasks that typically require human intelligence, such as problem-solving, learning, and decision-making. Through the use of algorithms and machine learning, AI seeks to replicate human intelligence and behavior in machines, enabling them to understand, reason, and interact with the world in a similar way to humans.
14.
Unwanted repetitious messages, such as unsolicited bulk e-mail is known as_________
Correct Answer
D. Spam
Explanation
Unwanted repetitious messages, particularly unsolicited bulk e-mails, are commonly referred to as spam. Spam is typically sent in large quantities to a wide range of recipients without their consent. It is often used for advertising purposes or to spread malicious content.
15.
A process known as ____________ is used by large retailers to study trends.
Correct Answer
A. Data mining
Explanation
Large retailers use a process called data mining to study trends. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used to make informed business decisions. By examining customer purchasing behavior, sales data, and other relevant information, retailers can identify trends and patterns that can help them optimize their inventory, improve marketing strategies, and enhance overall business performance.
16.
Computers gather data, which means that they allow users to ____________ data.
Correct Answer
B. Input
Explanation
Computers gather data by allowing users to input information. Inputting data refers to the process of entering or providing data to a computer system. This can be done through various means such as typing on a keyboard, using a mouse, or scanning documents. Therefore, the correct answer is "input".
17.
All of the following are examples of real security and privacy risks EXCEPT:
Correct Answer
D. Spam
Explanation
Spam is not typically considered a direct security or privacy risk like the other options listed. While it can be annoying and time-consuming to deal with, it does not typically involve stealing personal information, compromising system security, or invading privacy. Spam is usually just unsolicited and unwanted messages sent in bulk.
18.
Which of the following is a part of the Central Processing Unit?
Correct Answer
C. Arithmetic & Logic unit
Explanation
The Arithmetic & Logic unit is a crucial component of the Central Processing Unit (CPU). It is responsible for performing all arithmetic operations (such as addition, subtraction, multiplication, and division) and logical operations (such as comparisons and Boolean operations) required by the computer's programs. The Printer, Mouse, Keyboard, and Mother-Board are not part of the CPU, but rather peripheral devices or other components of the computer system.
19.
Which of the following refers to a small, single-site network?
Correct Answer
B. LAN
Explanation
A LAN (Local Area Network) refers to a small, single-site network. It is a network that connects computers and devices within a limited area such as a home, office, or building. LANs are commonly used for sharing resources, such as files and printers, and for facilitating communication between devices within the network. Unlike WANs (Wide Area Networks) that connect multiple LANs over a larger geographical area, LANs are confined to a specific location. DSL, CPU, and RAM are not specific to small, single-site networks and do not refer to the concept described.
20.
The lowest form of Computer language is called_______
Correct Answer
D. Machine Language
Explanation
Machine Language is considered the lowest form of computer language because it directly corresponds to the hardware and is understood by the computer's processor. It consists of binary code, represented by 0s and 1s, which the computer can execute directly. Unlike high-level languages like BASIC, FORTRAN, COBOL, and JAVA, which require a compiler or interpreter to convert the code into machine language, machine language instructions can be executed directly by the computer without any translation. Therefore, machine language is the most fundamental and basic form of programming language.