Computer Knowledge Test – Page 3

Basic Computer Knowledge Test Question Answers – Page 3

Computer Knowledge 3

Congratulations - you have completed Computer Knowledge 3.You scored %%SCORE%% out of %%TOTAL%%.Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Question 1
A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is— 
A
(A) read-only
B
(B) memory-only
C
(C) run-only
D
(D) write-only
E
(E) None of these
Question 2
In an information system, alphanumeric data normally takes the form of— 
A
(A) Sentences and paragraphs
B
(B) Numbers and alphabetical characters
C
(C) Graphic shapes and figures
D
(D) Human voice and other sounds
E
(E) None of these
Question 3
A Website’s main page is called its— 
A
(A) home page
B
(B) browser page
C
(C) search place
D
(D) bookmark
E
(E) None of these
Question 4
When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk. 
A
(A) programming software
B
(B) system hardware
C
(C) applications hardware
D
(D) applications software
E
(E) None of these
Question 5
A collection of interrelated files in a computer is a— 
A
(A) file manager
B
(B) field
C
(C) record
D
(D) database
E
(E) None of these
Question 6
A _____________ computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.  
A
(A) server
B
(B) mainframe
C
(C) desktop
D
(D) tablet
E
(E) None of these
Question 7
Various applications and documents are represented on the Windows desktop by— 
A
(A) Symbols
B
(B) Labels
C
(C) Graphs
D
(D) Icons
E
(E) None of these
Question 8
What is usually used for displaying information at public places ? 
A
(A) Monitors
B
(B) Overhead Projections
C
(C) Monitors and Overhead Projections
D
(D) Touch Screen Kiosks
E
(E) None of these
Question 9
Collecting personal information and effectively posing as another individual is known as the crime of— 
A
(A) spooling
B
(B) dentity theft
C
(C) spoofing
D
(D) hacking
E
(E) None of these
Question 10
The first step in the transaction processing cycle is— 
A
(A) database operations
B
(B) audit
C
(C) data entry
D
(D) user inquiry
E
(E) None of these
Question 11
In the information systems concept, the output function involves— 
A
(A) Capturing and assembling elements that enter the system to be processed
B
(B) Transformation processes that convert input into output
C
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
D
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
E
(E) None of these
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 11 questions to complete.
List
Return
Shaded items are complete.
12345
678910
11End
Return

 

{{ reviewsOverall }} / 5 Users (0 votes)
Rating
What people asked Leave your query
Order by:

Be the first to leave a review.



User AvatarUser Avatar
Verified
{{{review.rating_comment | nl2br}}}

Show more
{{ pageNumber+1 }}
Leave your query