1.
The operating system controls the BIOS
Correct Answer
B. False
Explanation
The BIOS starts the operating system up and not controlled by it
2.
Which of these is an operating system?
Correct Answer
A. IOS
Explanation
iOS is the operating system for Apple products
3.
Can the system run without RAM?
Correct Answer
B. False
Explanation
The system cannot run without RAM. RAM (Random Access Memory) is a crucial component of a computer system as it is responsible for temporarily storing data that the CPU (Central Processing Unit) needs to access quickly. Without RAM, the CPU would not have a place to store and retrieve data, making it impossible for the system to function properly. Therefore, the correct answer is False.
4.
_________ covers the programm commands that makes a computer do the tasks we need it to
Correct Answer
Software
Explanation
Software refers to the collection of programs, data, and instructions that tell a computer how to perform specific tasks. It includes the operating system, applications, and other programs that enable users to interact with the computer and perform various functions. Software is essential for computers to execute commands and carry out the tasks required by users.
5.
Which of the following is the correct formula of the if function?
Correct Answer
B. =if(a1=a2,true,false)
Explanation
The correct formula for the if function is "=if(a1=a2,true,false)". This formula checks whether the value in cell A1 is equal to the value in cell A2. If they are equal, the function returns "true", otherwise it returns "false".
6.
Pick the correct example(s) of application software?
Correct Answer(s)
A. Internet explorer
D. MS office
Explanation
Internet Explorer and MS Office are examples of application software because they are programs designed to perform specific tasks for users. Internet Explorer is a web browser that allows users to access and navigate the internet, while MS Office is a suite of productivity tools including Word, Excel, and PowerPoint, used for creating documents, spreadsheets, and presentations.
7.
The healthy and safety at work act 1974 applies to students
Correct Answer
B. False
Explanation
The statement is false because the Health and Safety at Work Act 1974 does not specifically apply to students. This act is designed to ensure the health, safety, and welfare of employees at work, and it places responsibilities on employers to provide a safe working environment. Students, on the other hand, are typically not considered employees and are not covered by this act. However, educational institutions still have a duty of care towards their students and are required to provide a safe learning environment under other regulations and legislation.
8.
Which of these are input devices
Correct Answer(s)
B. Keyboard
D. OCR Scanner
Explanation
The keyboard and OCR scanner are input devices because they allow the user to input data into a computer system. The keyboard is a common input device that allows users to type and enter text or commands. The OCR scanner is also an input device as it allows users to scan physical documents and convert them into digital format for input into a computer system. However, the monitor and speaker are output devices as they display or produce information from the computer system.
9.
A teacher wants a quick way to input questionaire scores into a computer- which technique should they use?
Correct Answer
B. OMR
Explanation
The teacher should use OMR (Optical Mark Recognition) technique to input questionnaire scores into a computer. OMR involves using a scanning device to detect marks made on a specially designed answer sheet. This allows for quick and accurate data entry, as the computer can easily interpret the marked responses. OCR (Optical Character Recognition) and RFID (Radio Frequency Identification) are not suitable for this purpose as they are used for different types of data input and retrieval.
10.
Which of these describes what a length check does?
Correct Answer
A. Checking the correct amount of letters has been entered
Explanation
A length check is a process of verifying whether the correct amount of letters has been entered. It ensures that the input meets the required length criteria. This check is commonly used to validate text fields, such as passwords or usernames, where a specific number of characters is expected. By performing a length check, the system can ensure that the input is neither too short nor too long, thereby maintaining data integrity and preventing potential errors or security vulnerabilities.
11.
Which of the following is shortening Manchester Airport into MAN
Correct Answer
C. Coding
Explanation
The correct answer is "Coding" because shortening Manchester Airport into "MAN" involves the process of coding, which refers to the creation of a system or language to represent information in a concise and efficient manner. In this case, "MAN" is a coded representation of Manchester Airport. Encoding and decoding are related processes that involve converting information into a specific format and then converting it back to its original form, while testing is unrelated to the act of shortening the airport name.
12.
Using wrist rests helps people who suffer from?
Correct Answer
B. RSI
Explanation
Using wrist rests helps people who suffer from RSI (Repetitive Strain Injury). RSI is a condition that occurs due to repetitive movements, such as typing or using a computer mouse for extended periods. It can cause pain, inflammation, and discomfort in the muscles, tendons, and nerves of the hands, wrists, and arms. Wrist rests provide support and cushioning for the wrists, reducing strain and pressure on the affected areas. By using wrist rests, individuals with RSI can alleviate symptoms and prevent further injury or discomfort.
13.
Which of these are utilities?
Correct Answer(s)
B. Defragmentor
C. Firewall
Explanation
Defragmentor and Firewall are both examples of utilities. A defragmentor is a utility that rearranges fragmented files on a computer's hard drive to optimize performance. A firewall is a utility that monitors and controls incoming and outgoing network traffic to protect a computer or network from unauthorized access. Copying and pasting and saving a document are not utilities, as they are basic functions within an operating system or software application.
14.
Which of the following types are most likely to be purchased separately?
Correct Answer
D. Utilities
Explanation
Utilities are most likely to be purchased separately because they are software programs or tools that provide specific functionality or services to enhance the overall performance and efficiency of a computer system. Examples of utilities include antivirus software, disk cleanup tools, file compression software, and system optimization tools. These utilities are not typically included in the standard operating system package and need to be purchased separately to meet specific needs or preferences of the user.
15.
A GUI or a G___________ U__________ I_________ is provided by the operating system and allows the user to interact with electronic devices through graphical icons
Correct Answer
Graphical User Interface
raphical ser nterface
Explanation
The correct answer is "Graphical User Interface". A GUI, which stands for Graphical User Interface, is provided by the operating system and allows the user to interact with electronic devices through graphical icons. It provides a visual way for users to navigate and interact with applications and systems, making it easier and more intuitive for users to perform tasks.
16.
A computer can do multiple tasks at exactly the same time?
Correct Answer
B. False
Explanation
False. A computer cannot do multiple tasks at exactly the same time. While it may appear that a computer is multitasking, it is actually rapidly switching between tasks, giving the illusion of simultaneous execution. This is known as time-sharing or multitasking, where the computer allocates small time slices to each task in a round-robin fashion. In reality, the computer's processor can only execute one instruction at a time, making it unable to truly perform multiple tasks simultaneously.
17.
Which of the following has a context?
Correct Answer
B. Information
Explanation
Information has a context because it refers to processed or organized data that is meaningful and useful. Context provides the background or framework within which the information is relevant and can be understood. Without context, information may be meaningless or difficult to interpret. Therefore, information is the correct answer as it implies the presence of a context.
18.
Which of the following are used when someone makes a purchase on a credit card and stores the PIN?
Correct Answer
C. Magnetic stripe
Explanation
The magnetic stripe is used when someone makes a purchase on a credit card and stores the PIN. The magnetic stripe contains encoded information about the cardholder's account, which is read by the card reader at the point of sale. This information includes the card number, cardholder's name, and other relevant data. The PIN, on the other hand, is a personal identification number that the cardholder enters to authenticate the transaction. The magnetic stripe and PIN combination is commonly used for secure credit card transactions.