1.
What is a computer?
Correct Answer
B. Is made up of a combination of electronic and electromechanical components
Explanation
A computer is made up of a combination of electronic and electromechanical components. These components work together to process and store data, perform calculations, and execute instructions. The electronic components, such as transistors and integrated circuits, handle the electrical signals and logic operations. The electromechanical components, such as the hard drive and keyboard, provide physical input/output and storage capabilities. This combination of electronic and electromechanical components allows the computer to function and carry out tasks according to a set of instructions.
2.
A general-purpose computer system.
Correct Answer
C. The use of hardware, software, data / information, procedures, people and communications to make the computer function.
Explanation
The given answer describes the concept of a computer system as the use of various components such as hardware, software, data/information, procedures, people, and communication to enable the functioning of a computer. It emphasizes that a computer system is not just limited to the physical devices but also includes the necessary software, data, and human involvement to perform tasks and process information.
3.
Data
Correct Answer
A. Is the raw facts and figures that are processed into information.
Explanation
The correct answer is "is the raw facts and figures that are processed into information." This is because data refers to the raw and unprocessed facts and figures that are collected. It is through processing and analysis that data is transformed into meaningful information that can be used for decision-making or understanding. The other options provided in the question are incorrect as they do not accurately describe the concept of data.
4.
Software is ...?
Correct Answer
B. Electronic instructions that tell hardware how to perform a task.
Explanation
Software refers to the electronic instructions that are programmed to tell the hardware of a computer how to perform a specific task. Unlike hardware, which can be physically seen or touched, software is intangible and exists as a set of instructions or code that enables the computer to execute various functions. It acts as an intermediary between the user and the hardware, allowing the computer to perform specific operations based on the instructions provided by the software.
5.
What component performs the calculations and logic instructions on a computer?
Correct Answer
A. Arithmetic and Logic Unit
Explanation
The Arithmetic and Logic Unit (ALU) is responsible for performing calculations and logic instructions on a computer. It is a crucial component of the Central Processing Unit (CPU) that carries out arithmetic operations such as addition, subtraction, multiplication, and division. Additionally, the ALU also performs logical operations like AND, OR, and NOT, allowing the computer to make decisions based on conditions. Therefore, the ALU is the component that handles the calculations and logic instructions necessary for the computer to function.
6.
An example of multitasking is
Correct Answer
A. Doing a background save of a document while typing a document.
Explanation
Multitasking refers to the ability of a computer or system to perform multiple tasks simultaneously. In the given options, the example of doing a background save of a document while typing a document demonstrates multitasking. This scenario involves the computer simultaneously performing two tasks - saving the document in the background and allowing the user to continue typing in the foreground. This showcases the capability of the system to handle multiple tasks concurrently.
7.
A _____________ is an electronic device that stores, retrieves and processes data.
Correct Answer
Computer
Explanation
A computer is an electronic device that stores, retrieves, and processes data. It is capable of performing various tasks and calculations based on the instructions given to it. Computers have the ability to store large amounts of data, process it quickly, and provide the desired output. They are used in various fields such as education, business, entertainment, and research, making them an essential tool in today's digital world.
8.
Which ONE of the following statements BEST describes the term 'information'?
Correct Answer
C. It is meaningful
Explanation
The term 'information' refers to meaningful data that has been processed and organized in a way that it can be understood and used. Unlike raw facts, information has been analyzed and interpreted to provide value and insights. Therefore, the statement "It is meaningful" accurately describes the nature of information.
9.
Which of the following is NOT a type of application software?
Correct Answer
A. Microsoft Windows 7
Explanation
Microsoft Windows 7 is an operating system, not an application software. Application software refers to programs that are designed to perform specific tasks or functions for the user, such as web browsing (Google Chrome), word processing (Microsoft Word 2007), or software development (Lazarus Pascal). Operating systems, on the other hand, are the software that manages computer hardware and provides a platform for other software to run on.
10.
Which of the following technologies DOES facilitate the transferring of data between computers in adjacent buildings?
Correct Answer
A. Bluetooth
Explanation
Bluetooth is a wireless technology that allows for the transfer of data between devices in close proximity, typically within a range of 30 feet. It operates on radio waves and is commonly used for transferring data between computers, smartphones, and other devices. Therefore, Bluetooth can facilitate the transferring of data between computers in adjacent buildings by establishing a wireless connection between them.
11.
Which of the following storage media uses laser technology?
Correct Answer
C. CDROM
Explanation
CDROM uses laser technology to read and write data. The laser in a CDROM drive emits a beam of light that interacts with the surface of the CD, allowing the drive to read the data stored on the disc. This technology is based on the principle of laser reflection and refraction, where the laser beam is reflected differently depending on the presence or absence of data on the CD's surface. This enables the CDROM to retrieve and store information, making it an optical storage medium that relies on laser technology.
12.
Which of the following storage media provides sequential access only?
Correct Answer
C. Magnetic tape
Explanation
Magnetic tape provides sequential access only because it stores data in a linear manner, where data is written and read sequentially from the beginning to the end of the tape. Unlike random access media like USB Thumb Drive, Magnetic disk, and Optical Disk, which allow direct access to any part of the storage, magnetic tape requires the tape to be rewound or fast-forwarded to reach a specific location for accessing data. This makes it suitable for applications that require large amounts of data to be stored sequentially and accessed in the same order, such as backup and archival systems.
13.
Which of the following precautions is NOT a physical restriction with respect to data security?
Correct Answer
C. Firewall
Explanation
A firewall is a software or hardware-based network security system that controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, filtering out potentially malicious traffic. Unlike the other options listed, a firewall is not a physical restriction. It is a virtual security measure that monitors and controls network traffic, making it the correct answer to the question.
14.
Which of the following pairs of items is used to create a web page?
Correct Answer
A. HTML and authoring tool
Explanation
HTML is the standard markup language used to create web pages. It provides the structure and layout for the content on a webpage. An authoring tool, on the other hand, is a software program that allows users to create and edit web pages without having to write the HTML code manually. Therefore, HTML and an authoring tool are the correct pair of items used to create a web page.
15.
Which of the following output is an example of a hardcopy?
Correct Answer
C. A bill produced from a printer
Explanation
A bill produced from a printer is an example of a hardcopy because it is a physical, tangible document that can be held and stored. It is created by printing the information onto paper using a printer. Unlike digital or electronic copies, hardcopies can be physically handled and are often used for record-keeping or documentation purposes.
16.
Which of the following items CANNOT be sent via email?
Correct Answer
D. Parcels
Explanation
Parcels cannot be sent via email because email is a digital form of communication that only allows the transfer of electronic files such as graphics, sound, and text. Parcels are physical objects that cannot be transmitted through email. They require physical delivery methods such as postal services or courier services.
17.
Which of the following is NOT true of primary keys used in databases?
Correct Answer
C. They are always in text form
Explanation
The statement "They are always in text form" is not true of primary keys used in databases. Primary keys can be in various forms, such as integers, dates, or even binary values. The key requirement for a primary key is that it must be unique and able to uniquely identify each record in the database table. The choice of data type for a primary key depends on the specific requirements of the database and the nature of the data being stored.
18.
Which of the following is NOT a software interface?
Correct Answer
A. Touch Screen
Explanation
A touch screen is not a software interface but rather a hardware interface. It is a display screen that is sensitive to touch, allowing users to interact directly with the content displayed on the screen. Software interfaces, on the other hand, refer to the means by which users interact with software applications, such as graphical user interfaces (GUIs) or command-driven interfaces. Men-driven is not a recognized term in the context of software interfaces.
19.
Which of the following is NOT a function of the control unit?
Correct Answer
D. Execute instructions
Explanation
The control unit of a computer is responsible for coordinating and controlling the operations of the other components. It interprets instructions, directs operations, and reads instructions from memory. However, executing instructions is not a function of the control unit. This task is typically performed by the arithmetic logic unit (ALU) or other components within the CPU.
20.
Which of the following is NOT a function of an operating system?
Correct Answer
A. Perform calculations
Explanation
The operating system is responsible for managing and coordinating various tasks and resources of a computer system. It controls input/output operations by handling communication between hardware devices and software applications. It provides a friendly interface for users to interact with the system. It also ensures the security of the system by implementing access control and protecting against unauthorized access. However, performing calculations is not a direct function of the operating system. Calculations are typically carried out by application software or programming languages running on top of the operating system.
21.
Which of the following is a type of transmission medium?
Correct Answer
A. Coaxial
Explanation
Coaxial is a type of transmission medium used for transmitting data or signals. It consists of a central conductor surrounded by an insulating layer, a metallic shield, and an outer insulating layer. Coaxial cables are commonly used in telecommunications and computer networks to transmit high-frequency signals with low interference. They are capable of carrying a large amount of data over long distances, making them suitable for applications such as cable television, internet connectivity, and Ethernet connections.
22.
Which of the following formatting features is unique to numbers in spreadsheets?
Correct Answer
C. Custom
Explanation
The unique formatting feature for numbers in spreadsheets is the "Custom" option. This allows users to create their own custom number formats, such as adding currency symbols, decimal places, or specific date formats. Unlike the other options listed (Indent, Italics, and Bold), which are common formatting features available for text in spreadsheets, the "Custom" option specifically applies to formatting numbers in a customized way.
23.
Which of the following duties is NOT expected of a database administrator?
Correct Answer
A. Writing programs
Explanation
A database administrator is responsible for managing and maintaining databases, ensuring their performance, and implementing security measures to protect the data. They are also responsible for creating and maintaining a data dictionary, which is a centralized repository of information about the database's structure and contents. However, writing programs is not typically expected of a database administrator. This task is usually handled by software developers or programmers who specialize in writing code to interact with databases.
24.
Which of the following actions is NOT considered to be a computer crime?
Correct Answer
D. Encryption
Explanation
Encryption is not considered to be a computer crime because it is a security measure used to protect sensitive information. It involves converting data into a code that can only be accessed with a decryption key. Encryption is commonly used to safeguard data during transmission and storage, ensuring confidentiality and integrity. While hacking, piracy, and industrial espionage involve unauthorized access, theft, or unauthorized use of computer systems or data, encryption is a legitimate and essential practice for maintaining data security.
25.
Which component of the computer storages programs and data that are currently being used by the CPU?
Correct Answer
A. Main Memory
Explanation
Main Memory is the component of the computer that stores programs and data that are currently being used by the CPU. It is also known as RAM (Random Access Memory). Main Memory is a volatile memory, meaning that its contents are lost when the computer is powered off. The CPU fetches instructions and data from the Main Memory to perform operations and computations. It provides fast access to data, allowing the CPU to quickly retrieve and manipulate information during program execution. Secondary Storage, on the other hand, is used for long-term storage of programs and data, but it is not directly accessed by the CPU during normal operations.
26.
When the computer is working on given instructions, it is called
Correct Answer
D. Processing
Explanation
When the computer is working on given instructions, it is referred to as processing. Processing involves the execution of the instructions provided to the computer, which includes calculations, data manipulation, and decision-making. During processing, the computer takes input from the user or other sources, performs the necessary operations, and produces output as a result. Therefore, processing is the correct term to describe the computer's activity when it is executing instructions.
27.
Which of the following terms does NOT refer to a form of information processing?
Correct Answer
C. Data validation
Explanation
Data validation is not a form of information processing. It refers to the process of ensuring that data entered into a system is accurate, complete, and consistent. It is a method used to verify and validate data against predefined rules or criteria. Unlike automation, process control, and scientific data processing, which involve the manipulation, analysis, and transformation of data, data validation focuses on the quality and integrity of the data itself.
28.
What is the general name given to the collection of components in the picture?
Correct Answer
D. Hardware
Explanation
The general name given to the collection of components in the picture is "Hardware." Hardware refers to the physical components of a computer system, including the peripherals, storage devices, and other devices that are connected to the computer. It encompasses all the tangible parts of a computer system that can be seen and touched.
29.
To cente the title rows of a spreadsheet across the columns
Correct Answer
A. Merge and centre title columns
Explanation
To center the title rows of a spreadsheet across the columns, the appropriate action would be to merge and center the title columns. This means combining the cells in the title row and then aligning the text in the merged cells to the center. This will create a visually appealing and organized layout for the title of the spreadsheet.
30.
The unit of storage used to represent a character is
Correct Answer
B. Byte
Explanation
A byte is a unit of storage used to represent a character. It is the smallest addressable unit of memory in most computer architectures and typically consists of 8 bits. Each character in a computer system is represented by a unique combination of 8 bits in a byte. Therefore, a byte is the correct unit of storage used to represent a character.
31.
The term used to describe a memory location whose value changes during program execution is
Correct Answer
A. Variable
Explanation
A variable is a memory location that can hold different values during program execution. Unlike constants, which have fixed values, variables can be assigned and reassigned different values throughout the program. The term "dynamic" refers to the ability of a variable to change its value, making it the correct answer in this context. "Volatile" refers to a different concept related to memory access and is not the correct answer here.
32.
The technology used to read pencil or pen marks on a multiple choice answer sheet is
Correct Answer
A. OMR
Explanation
OMR (Optical Mark Recognition) is the technology used to read pencil or pen marks on a multiple choice answer sheet. It involves the use of an optical scanner that detects and reads the marks made by the test taker. OMR technology is commonly used in standardized tests, surveys, and other applications where multiple choice responses need to be quickly and accurately recorded. It is different from other technologies like MICR (Magnetic Ink Character Recognition), POS (Point of Sale), and OCR (Optical Character Recognition), which are used for different purposes.
33.
The pair of files used to produce merged letters duing a mail merge is
Correct Answer
A. Primary document and data source
Explanation
During a mail merge, the primary document is the template or the main document that contains the standard text and formatting. The data source is the file that contains the variable information such as names, addresses, and other personalized data. These two files are used together to merge the variable data from the data source into the primary document, resulting in the creation of merged letters.
34.
The name of the interface used by the blind person to perform operations on a computer is
Correct Answer
A. Braille
Explanation
Braille is a system of raised dots that can be felt with the fingertips, allowing blind individuals to read and write. It is commonly used as an interface for blind people to perform operations on a computer by using a braille display or keyboard. This enables them to access and interact with digital content, navigate through menus, and input text or commands. Therefore, braille is the correct answer as it specifically refers to the interface used by blind people for computer operations.
35.
The MOST suitable device for the output of architectural drawings is a
Correct Answer
B. Plotter
Explanation
A plotter is the most suitable device for the output of architectural drawings because it is capable of producing large-scale, high-quality prints with precise detail. Architectural drawings often require accurate scaling and intricate line work, which can be achieved by a plotter. Additionally, plotter technology allows for the use of different types of pens and inks, enabling architects to create drawings with varying line weights and colors. This makes the plotter an ideal choice for architects who need to produce professional-quality prints of their designs.
36.
The four-bit binary representation of the decimal number 8 is
Correct Answer
C. 1000
Explanation
The correct answer is 1000 because in binary representation, each bit represents a power of 2. Starting from the rightmost bit, the first bit represents 2^0, the second bit represents 2^1, the third bit represents 2^2, and so on. Therefore, in the four-bit binary representation, the leftmost bit is 2^3, which equals 8 in decimal.
37.
The decimal equivalent of the binary value 0010010 is
Correct Answer
B. 18
Explanation
The binary value 0010010 can be converted to decimal by multiplying each digit by the corresponding power of 2 and summing the results. In this case, the leftmost digit is 0, so it does not contribute to the sum. The next digit is 0, which also does not contribute. The third digit is 1, which contributes 2^4 = 16 to the sum. The fourth digit is 0, so it does not contribute. The fifth digit is 0, so it does not contribute. The sixth digit is 1, which contributes 2^1 = 2 to the sum. The seventh digit is 0, so it does not contribute. Adding 16 and 2 gives a total of 18.
38.
The BCD representation of ( -15 ) is
Correct Answer
A. 101100010101
Explanation
The BCD representation of (-15) is 101100010101 because BCD (Binary Coded Decimal) is a binary representation of decimal numbers where each decimal digit is represented by a 4-bit binary code. In this case, (-15) is represented as a negative number in BCD using the two's complement notation. The binary representation of 15 is 0000 1111, and then the two's complement is taken by inverting all the bits and adding 1, resulting in 1111 0001. Therefore, the BCD representation of (-15) is 101100010101.
39.
Text entered into a spreadsheet is aligned towards the left by default. These entries are called
Correct Answer
B. Labels
Explanation
In a spreadsheet, the default alignment for text is towards the left. This means that when you enter text into a cell, it will be aligned to the left side of the cell. The term used to refer to these text entries is "labels".
40.
Telecommuting can BEST be described as
Correct Answer
A. Working from home by connecting home and office
Explanation
Telecommuting refers to the practice of working from home by connecting the home and office. This means that employees have the ability to work remotely and access their work resources, such as files and systems, from their home office. It allows for greater flexibility in work arrangements and can be facilitated through the use of technology, such as virtual private networks (VPNs) and video conferencing tools. This option enables individuals to work efficiently without the need to physically be present in the office, increasing productivity and work-life balance.
41.
Select the parts indicated below which make up the CPU
Correct Answer(s)
A. Control Unit
C. Arithmetic & Logic Unit
Explanation
The CPU (Central Processing Unit) is made up of several components, including the Control Unit and the Arithmetic & Logic Unit (ALU). The Control Unit is responsible for coordinating and controlling the operations of the CPU, while the ALU performs arithmetic and logical operations, such as addition, subtraction, and comparison. The System Unit is not a part of the CPU, but rather refers to the main enclosure that houses all the components of a computer. The Scientific Unit is not a recognized component of the CPU.
42.
Presentation software such as Powerpoint 2007 allows users to
I. track changes
II. design tables
III. enhance public speaking
IV. develop graphs to report on sales data
Correct Answer
A. I, II, III and IV
Explanation
Powerpoint 2007 allows users to track changes, design tables, enhance public speaking, and develop graphs to report on sales data.
43.
Persons at a downtown cafe realized that they were able to access the Internet on their laptop computers. The cafe could be considered a
Correct Answer
C. Hotspot
Explanation
The correct answer is hotspot because a hotspot refers to a public location where people can access the internet wirelessly using their laptops or mobile devices. In this scenario, the downtown cafe is providing internet access to its customers, making it a hotspot.
44.
Nicole Developers is a company that writes programs to do specific jobs for other companies. These programs are called?
Correct Answer
C. Special-purpose software
Explanation
Nicole Developers writes programs that are specifically designed to perform particular tasks for other companies. These programs are known as special-purpose software because they are tailor-made to meet the specific requirements of each client. Unlike general-purpose software, which is designed to be used by a wide range of users for various purposes, special-purpose software is created to address the unique needs and objectives of a specific organization or industry. Custom-built software is another term that can be used interchangeably with special-purpose software, emphasizing the personalized nature of the programs developed by Nicole Developers. Off-the-shelf software, on the other hand, refers to pre-packaged software solutions that are readily available to the general public.
45.
Name the component that sends processed data from the shaded
Correct Answer
D. Central Processing Unit
Explanation
The Central Processing Unit (CPU) is the component that sends processed data. It is responsible for executing instructions, performing calculations, and managing the flow of data within a computer system. The CPU consists of the Control Unit, Arithmetic and Logic Unit, and Registers. While the other components mentioned play important roles in the overall functioning of a computer, it is the CPU that ultimately handles the processing and transmission of data.
46.
Methods that can be used for validation and verification of data are
Correct Answer
D. All of the above
Explanation
The answer "all of the above" is correct because all three methods mentioned - data type checks, inconsistency checks, and range checks - are commonly used for the validation and verification of data. Data type checks ensure that the data is of the correct type, inconsistency checks identify any discrepancies or contradictions in the data, and range checks ensure that the data falls within a specified range or set of values. By using all of these methods, data can be thoroughly validated and verified for accuracy and reliability.
47.
___________ are descriptions of how things are done, steps for accomplishing a result.
Correct Answer
C. Procedures
Explanation
Procedures are descriptions of how things are done and the steps required to achieve a specific result. They provide a systematic approach to completing tasks and ensure consistency and efficiency in the process. Procedures outline the necessary actions, sequence of steps, and any specific guidelines or rules that need to be followed. By following procedures, individuals can effectively accomplish their goals and achieve desired outcomes.
48.
In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is
Correct Answer
D. Cut and paste
Explanation
To move the 3rd paragraph after the 5th in word processing, use cut to remove it, place the cursor after the 5th paragraph, then paste. This method relocates content swiftly without duplicating it, ensuring efficient organization of the document's structure.
49.
In modern computers, the CPU speed is measured in
Correct Answer
B. Gigahertz
Explanation
The CPU speed in modern computers is measured in gigahertz. Gigahertz is a unit of frequency that represents one billion cycles per second. It indicates the clock speed of the CPU, which determines how many instructions the processor can execute in a given amount of time. A higher gigahertz value generally indicates a faster CPU and better performance.
50.
Hexadecimal has a base value of
Correct Answer
A. 16
Explanation
Hexadecimal is a number system that uses 16 different digits to represent values. It includes the digits 0-9 and the letters A-F, where A represents 10, B represents 11, and so on. Therefore, the base value of hexadecimal is 16.