Q.1. The ____ allows you to choose where to go and is located below the Standards Buttons toolbar.
a) System menu
b) Address bar
c) Menu bar
d) Tool Bar
e) Status bar
Q.2. A graphical user interface displays ____.
a) graphics
b) text
c) CPU
d) both a) and b)
e) System Software
Q.3. 111000 compliment form is .
a) 000111
b) 0000
c) 001111
d) 11111
e) None of these
Q.4. Example of connectivity is_______
a) Internet
b) Floppy disk
c) Powercord
d) Data
e) None of these
Q.5. Junk e-mail is also called_____.
a) Spam
b) Spoof
c) Sniffer script
d) Spool
e) None of these
Q.6. Malicious software is known as _____.
a) bad ware
b) malware
c) malicious ware
d) illegal ware
e) Virus
Q.7. A ____ is a named location on a disk where files are stored.
a) folder
b) pod
c) version
d) System
e) All of the above
Q.8. Software programs that close potential security breaches in an operating system are known as:
a) security breach fixes.
b) refresh patches.
c) security repairs.
d) security patches
e) None of these
Q.9. The ____ is the drive containing the files to be copied.
a) Source drive
b) Destination drive
c) USB drive
d) Object drive
e) All of the above
Q.10. The ____ displays the name of every computer user on the computer.
a) Wish list screen
b) Command screen
c) Welcome screen
d) Desktop Screen
e) All of the above
Q.2. d) both a) and b)
Q.3. a) 000111
Q.4. a) Internet
Q.5. a) Spam
Q.6. b) malware
Q.7. a) folder
Q.8. d) security patches
Q.9. a) Source drive
Q.10. c) Welcome screen
a) System menu
b) Address bar
c) Menu bar
d) Tool Bar
e) Status bar
Q.2. A graphical user interface displays ____.
a) graphics
b) text
c) CPU
d) both a) and b)
e) System Software
Q.3. 111000 compliment form is .
a) 000111
b) 0000
c) 001111
d) 11111
e) None of these
Q.4. Example of connectivity is_______
a) Internet
b) Floppy disk
c) Powercord
d) Data
e) None of these
Q.5. Junk e-mail is also called_____.
a) Spam
b) Spoof
c) Sniffer script
d) Spool
e) None of these
Q.6. Malicious software is known as _____.
a) bad ware
b) malware
c) malicious ware
d) illegal ware
e) Virus
Q.7. A ____ is a named location on a disk where files are stored.
a) folder
b) pod
c) version
d) System
e) All of the above
Q.8. Software programs that close potential security breaches in an operating system are known as:
a) security breach fixes.
b) refresh patches.
c) security repairs.
d) security patches
e) None of these
Q.9. The ____ is the drive containing the files to be copied.
a) Source drive
b) Destination drive
c) USB drive
d) Object drive
e) All of the above
Q.10. The ____ displays the name of every computer user on the computer.
a) Wish list screen
b) Command screen
c) Welcome screen
d) Desktop Screen
e) All of the above
Answers:
Q.1. c) Menu barQ.2. d) both a) and b)
Q.3. a) 000111
Q.4. a) Internet
Q.5. a) Spam
Q.6. b) malware
Q.7. a) folder
Q.8. d) security patches
Q.9. a) Source drive
Q.10. c) Welcome screen
No comments:
Post a Comment