1.
This is a programmable electronic data processing device designed to accept data and instructions, to transform into useful information.
Correct Answer
B. Computer
Explanation
A computer is a programmable electronic data processing device that accepts data and instructions, processes them, and transforms them into useful information. It is capable of performing various tasks and calculations, storing and retrieving data, and communicating with other devices. Unlike a rice cooker, hard disk, or DVD drive, a computer has the ability to execute instructions and perform complex operations, making it the correct answer.
2.
This is a classification of device in the history of computer development powered by hand and it requires physical effort.
Correct Answer
C. Manual Mechanical Device
Explanation
A manual mechanical device is a classification of device in the history of computer development that is powered by hand and requires physical effort. This means that the device is operated manually, without the use of electricity or any other external power source. Examples of manual mechanical devices include early calculators, abacuses, and mechanical adding machines. These devices were used before the invention of electronic devices and were operated by physically manipulating gears, levers, or other mechanical components.
3.
This is a classification of device in the history of computer development powered by electric motor and uses switches and relays .
Correct Answer
B. Electro-Mechanical Device
Explanation
The correct answer is Electro-Mechanical Device because it is powered by an electric motor and uses switches and relays. This suggests that it combines electrical and mechanical components to perform its functions.
4.
This is a classification of device in the history of computer development principal component circuit bards, transistors or silicon chips.
Correct Answer
D. Electronic Device
Explanation
The correct answer is "Electronic Device" because it is the only option that is related to the history of computer development. Principal component circuit boards, transistors, and silicon chips are all components of electronic devices used in computers. Micro-Mechanical Device, Electro-Mechanical Device, and Manual Mechanical Device do not specifically relate to computer development.
5.
Abacus, Napier’s Bone and Oughtred’s Slide Rule belong to what group of devices?
Correct Answer
C. Manual Mechanical Device
Explanation
Abacus, Napier's Bone, and Oughtred's Slide Rule belong to the group of devices known as Manual Mechanical Devices. These devices are operated manually and do not require any external power source or electricity to function. They are used for performing calculations and mathematical operations, with each device having its own unique method and design. These devices were widely used before the advent of electronic calculators and computers.
6.
Pascal’s Calculator, Leibniz’s Calculator, and Jacquard Weaving Loom belong to what group of devices?
Correct Answer
B. Electro-Mechanical Device
Explanation
Pascal's Calculator, Leibniz's Calculator, and Jacquard Weaving Loom are all examples of devices that combine mechanical and electrical components to perform their functions. They rely on mechanical parts for physical movement and electrical components for control and automation. Therefore, they belong to the group of devices known as electro-mechanical devices.
7.
MARK I, Atanasoff–Berry Computer (ABC), and Colossus belong to what group of devices?
Correct Answer
D. Electronic Device
Explanation
The correct answer is "Electronic Device" because MARK I, Atanasoff-Berry Computer (ABC), and Colossus are all electronic devices. They were early computers that used electronic components and circuits to perform calculations and process data, marking a shift from earlier mechanical or manual methods of computation.
8.
Who is the first computer programmer?
Correct Answer
B. Ada Lovelace
Explanation
Ada Lovelace is considered the first computer programmer because she wrote the first algorithm intended to be processed by a machine. In the 1840s, she worked with Charles Babbage on his Analytical Engine and wrote a series of notes that included an algorithm for calculating Bernoulli numbers. Her work demonstrated the potential of computers to go beyond simple calculations and laid the foundation for modern programming. Charles Babbage is often credited as the father of the computer, but Ada Lovelace's contributions to programming make her the first computer programmer.
9.
Who is the Father of Computers?
Correct Answer
A. Charles Babbage
Explanation
Charles Babbage is considered the Father of Computers because he is credited with inventing the concept of a programmable computer. In the 19th century, Babbage designed the Analytical Engine, which was a mechanical general-purpose computer capable of performing complex calculations. Although the Analytical Engine was never fully built during Babbage's lifetime, his work laid the foundation for modern computers. Babbage's ideas on computing and his contributions to the field make him a significant figure in the history of computers.
10.
Which of the following is NOT a characteristic of a computer?
Correct Answer
D. Waterproof
Explanation
The given options include characteristics of a computer such as being a machine, being automatic, and having memory. However, being waterproof is not a characteristic of a computer. Computers are electronic devices that are not designed to be waterproof and can be damaged if exposed to water.
11.
Which of the following is/are capabilities of a computer?
Correct Answer
D. All of the above
Explanation
A computer is capable of performing arithmetic and logical operations, which are enhanced by its fast speed and reliability. It is also capable of storing a large amount and variety of information and retrieving it quickly when needed. Therefore, all of the given options accurately describe the capabilities of a computer.
12.
Which of the following is NOT a limitation of a computer?
Correct Answer
D. Computers can derive meanings from objects.
Explanation
The given statement "Computers can derive meanings from objects" is not a limitation of a computer. Computers are not capable of deriving meanings from objects as they can only process data and perform operations based on the instructions provided to them. They do not possess the ability to interpret or understand the meaning of objects without explicit programming.
13.
Computers is NOT classified based on ______________?
Correct Answer
D. Data Size
Explanation
Computers are not classified based on data size. Classification of computers is typically based on their purpose, the type of data they handle, and their capacity or size. The size of data processed by a computer does not determine its classification.
14.
This refers to the internal and external physical compositions of the computer.
Correct Answer
A. Hardware
Explanation
The correct answer is hardware. The explanation is that hardware refers to the physical components of a computer system, both internally and externally. This includes things like the motherboard, CPU, memory, storage devices, and peripherals. Hardware is tangible and can be seen and touched. It is essential for the functioning of a computer system and is distinct from software, which refers to the programs and instructions that tell the hardware what to do.
15.
Collecting raw data and processing it into a computer useable form is the job of this hardware
Correct Answer
A. Input Hardware
Explanation
Input hardware refers to devices that allow users to input data into a computer system. This includes devices such as keyboards, mice, scanners, and microphones. These devices collect raw data from the user and convert it into a format that the computer can understand and process. Therefore, input hardware is responsible for collecting raw data and processing it into a computer-usable form.
16.
It interprets, and executes software instructions.
Correct Answer
B. Processing Hardware
Explanation
Processing hardware refers to the components of a computer system that interpret and execute software instructions. This includes the central processing unit (CPU), which performs calculations and logical operations, as well as other components such as the memory, motherboard, and graphics processing unit (GPU). These hardware components work together to process data and perform tasks according to the instructions provided by software programs.
17.
These are devices that display the information processed by the computer in a for that people can understand.
Correct Answer
D. Output Hardware
Explanation
Output hardware refers to devices that display the information processed by the computer in a format that people can understand. This includes devices such as monitors, printers, speakers, and projectors. These devices translate the processed data into a visual, auditory, or tangible form that can be easily perceived by the user. They play a crucial role in providing feedback and presenting the results of computations or tasks performed by the computer.
18.
It stores data and instructions in a permanent form.
Correct Answer
A. Storage Hardware
Explanation
Storage hardware refers to devices or components that are used to store data and instructions in a permanent form. This can include devices such as hard disk drives, solid-state drives, optical drives, and USB flash drives. These devices allow for the long-term storage and retrieval of data, ensuring that it is preserved even when the power is turned off. Storage hardware is essential for saving and accessing files, programs, and other digital information.
19.
This is made of a group of related programs, which refers to a set of instructions that is to be executed by the computer.
Correct Answer
A. Software
Explanation
The given correct answer is "Software". Software refers to a group of related programs that provide instructions for the computer to execute. It includes applications, operating systems, and other programs that enable the computer to perform specific tasks. Unlike hardware, which consists of physical components, software is intangible and can be installed, updated, and removed from a computer system. Peopleware and dataware are not commonly used terms in the context of computer programming, making them incorrect choices.
20.
It sends data, information, or programs from one computer or storage device to another.
Correct Answer
D. Communication Hardware
Explanation
Communication hardware refers to devices that enable the transmission of data, information, or programs from one computer or storage device to another. This can include devices such as modems, routers, network cards, and cables. These hardware components facilitate the exchange of information between different devices or networks, allowing for communication and data transfer.
21.
This consists of programs that allow the computer to manage its own resources and run basic programs.
Correct Answer
A. Systems software
Explanation
Systems software refers to programs that enable a computer to manage its own resources and run basic programs. This includes operating systems, device drivers, and utility programs. Systems software is essential for the computer to function properly and for other software applications to run smoothly. It is responsible for managing hardware resources, controlling input and output devices, and providing a platform for other software to operate on. Therefore, the given correct answer for this question is systems software.
22.
This consists of computer programs designed to satisfy a user's specific needs. Examples are programs to perform payroll processing or word processing
Correct Answer
B. Application Software
Explanation
Application software refers to computer programs that are designed to meet specific user needs. These programs are used for various purposes such as payroll processing or word processing. Unlike systems software, which is responsible for managing and controlling the computer hardware, application software is focused on providing functionality and features that cater to specific tasks or activities. Therefore, the correct answer is Application Software.
23.
This refers to the steps specifying the manner certain activities are to be accomplished. It consists of raw facts and figures that are processed into information.
Correct Answer
C. Dataware
Explanation
Dataware refers to the raw facts and figures that are processed into information. It is a term used to describe the data and databases used in a computer system. This includes the storage, organization, and retrieval of data. Dataware is an essential component of any computer system as it provides the necessary information for decision-making and analysis. It is different from systems software and application software, which are responsible for the functioning and execution of computer programs. Peopleware, on the other hand, refers to the human elements involved in the use and management of computer systems.
24.
It refers to the personnel involved within the computer installation or could be anybody who wants their job to be done using the computer.
Correct Answer
B. Peopleware
Explanation
The term "Peopleware" refers to the personnel involved within the computer installation or anyone who wants their job to be done using the computer. It encompasses the human aspect of computer systems, including the individuals who design, develop, operate, and use the hardware and software. Peopleware recognizes the importance of people in the successful implementation and utilization of computer technology.
25.
These are guidelines to follow for using hardware, software, or data. For example, when you buy a software package, you get a box that contains not only one or more floppy disks but also a booklet or two.
Correct Answer
A. Procedures
Explanation
Procedures refer to the guidelines or instructions that need to be followed when using hardware, software, or data. In the given example, when you purchase a software package, you not only receive the floppy disks but also a booklet or two that contain instructions on how to install and use the software. These instructions or procedures are essential for ensuring the proper and efficient utilization of the hardware, software, or data.
26.
Part of system software that performs specialized and repeatedly used functions such as sorting, merging, and transferring data from one I/O device to another
Correct Answer
A. Utility Programs
Explanation
Utility programs are part of system software that perform specialized and repeatedly used functions such as sorting, merging, and transferring data from one I/O device to another. These programs are designed to enhance the efficiency and functionality of the computer system by providing tools for tasks like file management, disk cleanup, data backup, and system optimization. They are not as essential as operating systems or device drivers, but they are still important for maintaining and managing the computer system effectively. Virus protection software, on the other hand, focuses on preventing and removing malware threats, while device drivers enable communication between hardware devices and the operating system.
27.
It is software and information that enables your operating system to establish the communications between your existing hardware and your new device. Device drivers are available for printers, displays, CD-ROM readers, diskette drives, and so on.
Correct Answer
B. Device Drivers
Explanation
Device drivers are software programs that allow the operating system to communicate with and control hardware devices. They act as a bridge between the hardware and the operating system, enabling the proper functioning of the device. In this context, device drivers would be the correct answer as they facilitate the communication between the operating system and new hardware devices.
28.
It is a software that continually scans RAM, storage devices, and incoming files for viruses and removes the viruses.
Correct Answer
C. Virus Protection software
Explanation
The given correct answer is "Virus Protection software". This software continuously scans RAM, storage devices, and incoming files for viruses and removes them. It is designed to protect the computer system from potential threats and ensure the security of the user's data and files.
29.
It is a collection of programs designed to permit a computer system to manage its operation.
Correct Answer
D. Operating System
Explanation
The given answer, "Operating System," is correct because an operating system is a collection of programs that allows a computer system to manage its operation. It provides the necessary software interface for users to interact with the computer hardware and coordinates the execution of other programs. Utility programs, device drivers, and virus protection software are all components or applications that run within the operating system to provide specific functionalities, but the operating system itself is responsible for overall system management.
30.
It is a type of processing where several user or application programs are grouped into a batch and processed one after the other into a continuous stream.
Correct Answer
A. Batch
Explanation
Batch processing is a type of processing where multiple user or application programs are grouped together and processed sequentially, one after the other, in a continuous stream. This method allows for efficient processing of large amounts of data or tasks without requiring constant user interaction. It is commonly used in scenarios where time constraints are not critical, such as overnight data processing or scheduled tasks.
31.
It is a type of processing where it receives data, immediately process it, and provide output fast enough to control an activity being performed.
Correct Answer
B. Real Time
Explanation
Real-time processing refers to a type of data processing where data is received, processed, and outputted immediately, allowing for the control of ongoing activities. This means that the processing occurs in real-time, without any delay, enabling quick responses and immediate actions based on the processed data. This type of processing is particularly useful in scenarios where timely and instantaneous output is required to control and monitor activities in various domains, such as industrial automation, financial transactions, and real-time monitoring systems.
32.
A capability of system software where tasks can be performed at the same time.
Correct Answer
B. Multitasking
Explanation
Multitasking refers to the capability of system software to perform multiple tasks simultaneously. It allows the computer to switch between different tasks, dividing the processor's time and resources efficiently. This feature enables users to run multiple applications or processes concurrently, improving productivity and efficiency.
33.
A capability of system software where work is being done with two or more microprocessors being used to simultaneously process more than one program.
Correct Answer
C. Multiprocessing
Explanation
Multiprocessing refers to the capability of system software to use two or more microprocessors simultaneously to process multiple programs. This allows for efficient and parallel processing, improving the overall performance and speed of the system. It enables the system to handle multiple tasks or programs concurrently, enhancing productivity and resource utilization.
34.
A capability of system software where system resources are shared by many users at the same time. Processes are scheduled in a front end computer.
Correct Answer
A. Time Sharing
Explanation
Time sharing is the correct answer because it refers to the capability of system software where system resources are shared by many users at the same time. In time sharing, multiple processes are scheduled and executed in a short time slice on a front end computer, allowing multiple users to interact with the system simultaneously. This enables efficient utilization of system resources and improves overall system performance.
35.
It is a common feature of application software. It is a blinking symbol that shows where data may be entered next.
Correct Answer
A. Cursor
Explanation
The explanation for the correct answer, "Cursor," is that it is a common feature of application software and is a blinking symbol that shows where data may be entered next. The cursor is used to indicate the current position on a screen and allows users to interact with the software by selecting, typing, or deleting text or objects.
36.
This is the activity or common feature of application software that lets you move through the document forward or backward.
Correct Answer
B. Scrolling/Scroll Bar
Explanation
Scrolling/Scroll Bar is the correct answer because it is the feature in application software that allows users to navigate through a document by moving it up or down. The scroll bar typically appears on the right or bottom side of the document and can be used to scroll through the content by clicking on the scroll bar or using the scroll wheel on a mouse. This feature is commonly found in word processors, web browsers, and other applications that display large amounts of content.
37.
It is a common feature of application software. It is the row of command options displayed across the top or bottom of the screen.
Correct Answer
C. Ribbons/Menu Bar
Explanation
The correct answer is Ribbons/Menu Bar because it is a common feature of application software. It is the row of command options displayed across the top or bottom of the screen. This feature allows users to access various commands and functions of the software easily.
38.
These are techniques of collecting, manipulating and distributing data to achieve certain objective.
Correct Answer
A. Data Processing
Explanation
Data processing refers to the techniques used to collect, manipulate, and distribute data in order to achieve a specific objective. This involves various steps such as data entry, validation, sorting, analysis, and reporting. By processing data, organizations can extract meaningful insights, make informed decisions, and achieve their desired outcomes. Data processing is an essential component of various industries and sectors, including finance, healthcare, marketing, and research. It plays a crucial role in managing and utilizing vast amounts of data effectively and efficiently.
39.
Which of the following is NOT part of the elements of data processing?
Correct Answer
D. Restart
Explanation
The elements of data processing include input, output, and process. Restart is not part of the elements of data processing as it refers to a specific action or command to start a process again, rather than being a fundamental component of data processing itself.
40.
This an element of data processing and it refers to source documents are collected and converted into a form acceptable for processing
Correct Answer
A. Input
Explanation
The given correct answer for this question is "Input". This answer is appropriate because it aligns with the description provided in the question. The question states that this element of data processing involves collecting and converting source documents into a form acceptable for processing. "Input" accurately represents this stage of data processing where the raw data is gathered and prepared for further processing.
41.
This an element of data processing and this includes arithmetic, logic, or simple movement operations (classifying, sorting, calculating, summarizing).
Correct Answer
C. Process
Explanation
The correct answer is "Process" because it refers to the element of data processing that includes arithmetic, logic, or simple movement operations such as classifying, sorting, calculating, and summarizing.
42.
A computer peripheral which consists of typewriter keys, cursor movement keys, numeric keys, function keys and special purpose keys.
Correct Answer
A. Keyboard
Explanation
A keyboard is a computer peripheral that consists of typewriter keys, cursor movement keys, numeric keys, function keys, and special purpose keys. It is used for inputting text and commands into a computer system. The other options, such as a mouse, monitor, and scanner, do not match the description provided. A mouse is used for cursor movement, a monitor is used for displaying visual output, and a scanner is used for digitizing physical documents.
43.
A computer peripheral that translates images of text, drawing, photos into digital form.
Correct Answer
D. Scanner
Explanation
A scanner is a computer peripheral that translates images of text, drawings, and photos into digital form. It does this by using optical sensors to capture the image and convert it into a digital file that can be saved, edited, and displayed on a computer. Scanners are commonly used for tasks such as scanning documents, photos, and artwork, and are essential for digitizing physical media and making it accessible in a digital format.
44.
A computer peripheral which is a vacuum tube used as a display screen in a computer or video display terminal.
Correct Answer
A. Cathode Ray Tube
Explanation
A computer peripheral that fits the description of "a vacuum tube used as a display screen in a computer or video display terminal" is the Cathode Ray Tube. This technology was commonly used in older computer monitors and televisions, where an electron beam is used to create an image on a phosphorescent screen.
45.
This is a program that attaches itself to a file, reproduces itself, and spreads to other files. It corrupts and destroy your data.
Correct Answer
A. Virus
Explanation
A virus is a type of malicious software that can attach itself to files, replicate, and spread to other files. It is designed to corrupt and destroy data on a computer. Unlike trojan horses or worms, viruses require a host file to attach themselves to and cannot spread independently. Anti-virus software is designed to detect and remove viruses from a computer system.
46.
This is a virus that attaches itself to an application program.
Correct Answer
A. File Virus
Explanation
A file virus is a type of virus that infects executable files, such as application programs. It attaches itself to these files and spreads when the infected file is executed or opened. This type of virus can cause damage to the infected files and can spread to other files on the computer or network.
47.
This is a virus that affects your system files every time you turn it on.
Correct Answer
B. Boot Sector Virus
Explanation
A boot sector virus is a type of virus that infects the boot sector of a computer's hard drive or floppy disk. When the infected system is turned on, the virus activates and infects the system files, causing damage or corruption. This type of virus is particularly dangerous as it can spread to other computers through infected disks or drives.
48.
It is a virus which infects a set of instructions called a macro
Correct Answer
C. Macro Virus
Explanation
A macro virus is a type of virus that infects a set of instructions called a macro. Macros are commonly used in applications like Microsoft Word and Excel to automate tasks. The virus attaches itself to these macros and spreads when the infected document or file is opened. Macro viruses can cause damage by corrupting files, stealing information, or spreading to other systems. They are often spread through email attachments or infected files shared online.
49.
Its objective is to perform one function while actually doing something else. It does not replicate itself.
Correct Answer
B. Trojan Horse
Explanation
A Trojan Horse is a type of malware that disguises itself as a legitimate program or file, tricking users into downloading or executing it. Once inside a system, it performs a different function than what it claims to do, often causing harm or allowing unauthorized access to the system. Unlike viruses or worms, Trojan Horses do not replicate themselves, but they can still cause significant damage to a computer or network.
50.
It is program designed to enter a computer system through security holes usually through a network from computer to computer
Correct Answer
C. Worms
Explanation
A worm is a type of malicious software that is designed to enter a computer system through security holes, typically by spreading from one computer to another via a network. Unlike viruses, worms do not require a host file to attach themselves to and can replicate and spread independently. They can cause damage to computer systems by consuming network bandwidth, slowing down computer performance, and potentially compromising sensitive data.