Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 1 Report
Which of the following is not a type of computer on the basis of operation?
Answer Details
The computer type that is not based on the operation is "Remote." This is because "remote" does not refer to how a computer operates, but rather where it is located or how it is accessed. A remote computer is one that is accessed through a network connection, such as the internet, rather than being physically present with the user. On the other hand, "analog" and "digital" are types of computers based on their method of operation. Analog computers operate by processing continuous physical variables such as voltage, while digital computers operate by processing discrete data in the form of binary digits (bits). Finally, "hybrid" computers are a combination of both analog and digital computers, where they use both continuous and discrete data to perform calculations.
Question 2 Report
A half byte is known as ________.
Answer Details
A half byte is known as a nibble. A byte is a unit of digital information in computing, typically consisting of 8 bits. A nibble, on the other hand, is half of a byte, consisting of 4 bits. This unit is often used in computer architecture and data representation, especially when referring to memory addresses or data manipulation.
Question 3 Report
Fire fox is an example of __________
Answer Details
Firefox is an example of application software. Application software is a type of software that is designed to perform specific tasks for the user, such as creating documents, browsing the web, sending emails, etc. In other words, it is a program that is used to accomplish specific tasks and is meant to be used by the end-user, as opposed to system software, which is designed to run the computer itself and support the application software. Firefox is a web browser, which is a type of application software that allows users to access, browse and interact with websites on the Internet.
Question 4 Report
Computers that are portable and convenient for users who travel are known as _________________
Answer Details
Question 5 Report
The Internet is an example of which computer network?
Answer Details
The Internet is an example of a wide area network (WAN). A WAN is a type of computer network that covers a large geographical area, such as a city, a country, or even the entire world. The Internet is a global network of interconnected computers, servers, and other devices that communicate with each other using standardized communication protocols. It allows users to access and exchange information and resources, such as email, websites, and online services, from anywhere in the world. WANs are typically composed of multiple smaller networks, such as local area networks (LANs) and metropolitan area networks (MANs), connected together using high-speed communication links, such as satellite, cable, or telephone lines. The Internet is an example of a WAN because it spans multiple countries and continents, connecting millions of devices and users in a single network.
Question 6 Report
In any software package, which of the following versions represents a major improvement on the previous version?
Answer Details
In any software package, a new version number that increases the whole number before the decimal point represents a major improvement on the previous version. Therefore, the versions that represent a major improvement on the previous version is 2.0.
In software development, version numbers are used to identify different releases or iterations of a program. A new version number is typically assigned when significant changes or improvements are made to the software. The first number before the decimal point in a version number is known as the major version number. When this number increases, it indicates that there has been a significant change or improvement in the software that warrants a new release.
The second number after the decimal point is the minor version number, which typically represents smaller changes or bug fixes. Therefore, 2.0 is a major releases that represent significant improvements over the previous version, while 1.0, 1.5 and 2.5 are minor releases that represent smaller changes or bug fixes.
In summary, a new software version number that increases the major version number before the decimal point represents a major improvement on the previous version, indicating that significant changes or improvements have been made to the software.
Question 7 Report
Which part of a processor contains the hard ware necessary to perform all the operations required by a computer?
Answer Details
The part of a processor that contains the hardware necessary to perform all the operations required by a computer is the "Data path". The data path, also known as the "Arithmetic Logic Unit" (ALU), is a component of the processor that performs arithmetic and logical operations on data. It is responsible for carrying out the instructions of the computer program, performing calculations, and manipulating data. The controller, registers, and cache are also important components of a processor, but they do not contain the hardware necessary to perform all the operations required by a computer. The controller, also known as the "Control Unit", is responsible for directing the flow of data and instructions within the processor, as well as between the processor and other components of the computer. Registers are high-speed storage locations within the processor that store data temporarily for processing. Cache is a small amount of high-speed memory that stores frequently used data and instructions, making them quickly accessible to the processor. Therefore, out of the given options, the data path or ALU is the part of the processor that contains the hardware necessary to perform all the operations required by a computer.
Question 8 Report
The Caps key on a keyboard is used to___________
Answer Details
The Caps key on a keyboard is used to switch between upper and lower case letters. When you press the Caps key, it changes the letter case of the letters you type from lowercase to uppercase or vice versa. This means that if you type with the Caps key on, all the letters you type will appear in uppercase. Similarly, if you type with the Caps key off, all the letters you type will appear in lowercase. This feature is particularly useful when you want to emphasize certain words or phrases, such as in titles or headings. It can also be used to make your text easier to read by adding some variety to the letter case. For example, when typing a password or other sensitive information, you may want to use a combination of upper and lower case letters to make it more secure. In summary, the Caps key is used to switch between uppercase and lowercase letters in order to make text easier to read, emphasize words, or add security to sensitive information.
Question 9 Report
___________________ is a program meant to be sent from one computer to another across the world wide Web.
Answer Details
Question 10 Report
What differs a system software from application software?
Answer Details
System software and application software are two broad categories of computer software, each with different functions and purposes. System software is a collection of programs that control and manage the basic operations of a computer system. It is designed to provide a platform for other software applications to run on. System software includes operating systems, device drivers, utilities, and other tools that enable the computer to operate and perform its functions. On the other hand, application software refers to programs that are designed to perform specific tasks or applications for the user. These programs are used for word processing, spreadsheets, photo editing, web browsing, and other specialized tasks. Application software is often created by third-party developers and can be installed and used by end-users. The main difference between system software and application software is the purpose they serve. System software is responsible for managing the hardware and providing a platform for other software to run on, while application software is designed to perform specific tasks for the user. Other differences between system software and application software include: - Ability to multi-task: System software is designed to manage and allocate system resources, while application software is designed to perform specific tasks. Therefore, system software has more multitasking capabilities than application software. - Minimal in terms of space: System software is usually larger in terms of size and requires more storage space than application software. - Presence of cache memory: System software may use cache memory to improve the performance of the computer system, while application software does not typically use cache memory. - Unique programs installed by the creators to help run the computer: System software includes programs that are installed by the computer manufacturer or operating system developer to help run the computer, such as device drivers and system utilities. Application software does not include these types of programs.
Question 11 Report
_______ is the process of finding errors and fixing them within a program.
Answer Details
The process of finding errors and fixing them within a program is called debugging. When a program is being developed, it may contain errors, also known as bugs, that prevent it from functioning properly. Debugging is the process of identifying and fixing these errors. Debugging can involve a number of techniques, such as analyzing error messages, reviewing code, and stepping through the program line by line to find where errors occur. Once an error is identified, the programmer can make changes to the code to correct the issue. Compiling is the process of translating source code into machine code, which can then be executed. Execution is the process of running a program. Scanning, in the context of programming, typically refers to the process of analyzing code for security vulnerabilities rather than identifying and fixing errors. In summary, debugging is the process of identifying and fixing errors in a program, whereas compiling, executing, and scanning are different processes that serve different purposes in the development and operation of a program.
Question 12 Report
A computer can't boot if it does not have ____________
Answer Details
A computer cannot boot if it does not have an operating system (OS). An operating system is the most basic software that runs on a computer and is responsible for managing and coordinating all the activities of the computer hardware and software. It is the first program that runs when the computer starts up, and it is responsible for initializing the hardware and loading other software, such as device drivers and applications. Without an operating system, the computer would not be able to perform any useful tasks, as it would not have the necessary software to control and manage its hardware components. Examples of popular operating systems include Microsoft Windows, macOS, and Linux.
Question 13 Report
Which of the following system software resides in the main memory always?
Answer Details
The system software that always resides in the main memory is the Operating System (OS). In many operating systems, the loader resides permanently in memory. The OS manages the resources of the computer and acts as an interface between the user and the hardware. It is responsible for tasks such as memory management, process management, file management, and input/output operations. Text editors, assemblers, linkers, and loaders are all types of system software, but they do not always reside in the main memory. They are typically loaded into memory when needed, and can be swapped out of memory when other processes need more memory. This is because main memory is a limited resource and the OS dynamically allocates it to different processes as needed.
Question 14 Report
What tells the computer how to use its components?
Answer Details
The operating system (OS) tells the computer how to use its components. An operating system is a software program that manages the computer hardware and software resources and provides common services for computer programs. The operating system acts as an intermediary between the computer's hardware and the programs or applications that run on the computer. It is responsible for controlling and allocating memory, prioritizing system requests, ensuring security, and managing input/output operations. In short, the operating system acts as the foundation for the computer to function and allows different applications and programs to communicate with the hardware and work together.
Question 15 Report
Which term describes accessing files from a computer other than the one where the files are stored.
Answer Details
The term that describes accessing files from a computer other than the one where the files are stored is "remote access". Remote access means that you can access files, data or resources from a different computer or server that is located elsewhere, using a network connection like the internet. This allows you to work with files and data as if they were stored on your local computer, even though they are actually stored on a different computer or server. For example, if you are working from home and need to access files that are stored on your work computer, you can use remote access to connect to your work computer over the internet and access those files. Similarly, if you use cloud storage services like Dropbox or Google Drive, you can access your files from any computer with an internet connection, which is also a form of remote access.
Question 16 Report
The delete permission allows one to ____________
Answer Details
The delete permission allows someone to remove or delete files and directories. This means that if a user has the delete permission, they can get rid of files and folders that they have access to, and these files and folders will no longer be available on the system. This permission is typically used to allow users to clean up or manage their own files and directories, but it can also be used by system administrators to control access and prevent unwanted modifications or deletions.
Question 17 Report
What is a computer file.
Answer Details
A computer file is a place on a computer where information is stored in a package. A file can contain many different types of information, including text, images, audio, video, and executable programs. The information in a file is organized in a specific format, and the file can be opened and edited using appropriate software. For example, a text file contains plain text, while a Word document file contains formatted text and other elements like images and tables. A file is often saved with a specific name and extension that identifies the type of file and the type of information it contains. The extension is the part of the file name that comes after the dot, such as ".txt" for a plain text file or ".docx" for a Microsoft Word document file.
Question 18 Report
Which type of network is usually contained inside one office building?
Answer Details
The type of network that is usually contained inside one office building is called a Local Area Network or LAN. A LAN is a computer network that connects devices within a relatively small area, such as a single building, office, or campus. It is designed to allow computers and other devices to communicate with each other and share resources, such as printers, files, and internet access. LANs are typically owned and operated by a single organization, such as a business or government agency, and are often built using Ethernet cables or Wi-Fi technology. LANs are used to facilitate communication and data sharing between employees within an office building or other confined area, and are often more secure than other types of networks because they are not connected to the internet. In summary, a LAN is the type of network that you would most commonly find inside one office building.
Question 19 Report
Which of the following is termed as the minimum error code?
Answer Details
Gray codes are less error-prone because they only change in one-bit position at a time. Hence, they are considered as the minimum error code.
Question 20 Report
Encryption helps with what?
Answer Details
Encryption helps with safe delivery of messages to their destination without being accessed by a third party. Encryption is a process of converting plain text into coded or scrambled text so that only authorized parties who have the key can access and understand the original message. This means that even if an unauthorized person intercepts the message during transit, they cannot read or understand it because it is encrypted. Encryption is commonly used to protect sensitive data such as passwords, credit card numbers, and personal information when it is transmitted over the internet. It also helps to protect confidential business or government communications from hackers, cybercriminals, and other unauthorized third parties. Therefore, encryption helps to ensure that messages are delivered safely and securely to their intended recipients without being accessed or intercepted by unauthorized parties.
Question 21 Report
What is debugging?
Answer Details
Debugging is the process of finding and fixing errors, also known as "bugs", in a computer program. The goal of debugging is to ensure that the program runs smoothly and produces the expected results. This involves locating the source of the problem, understanding why it is happening, and then making changes to the code to correct the issue. Debugging can be a time-consuming and challenging task, but it is an important part of the software development process to ensure that the end-users have a positive experience when using the software.
Question 22 Report
Microsoft PowerPoint is a ________________ application
Answer Details
Microsoft PowerPoint is a presentation software application. This means that it is a program used to create visual aids or slideshows that are intended to enhance a live presentation. It allows users to create and design professional-looking slides that can contain text, images, videos, charts, and graphs. These slides can be used to convey information, ideas, or messages in a clear and visually appealing way. PowerPoint is often used in business, education, and other settings where presentations are a common means of communication. It is not a graphing or gaming software, nor is it considered a productivity software in the same sense as a word processor or spreadsheet program.
Question 23 Report
A permanent memory, which has data and instruction to start up the computer and does not erase data after power off.
Answer Details
The permanent memory that has data and instructions to start up the computer and does not erase data after power off is called ROM (Read-Only Memory). ROM is a type of computer memory that is pre-programmed with data and instructions during manufacturing. This means that once the data and instructions are written into ROM, they cannot be changed or erased, hence the name "read-only". When you turn on your computer, the CPU (central processing unit) looks to the ROM for the instructions on how to boot up the computer. These instructions include basic input/output system (BIOS) code that checks the hardware components to make sure they are working properly, and then loads the operating system from the hard drive or another storage device. The data and instructions stored in ROM are not affected by power outages or restarts, meaning that they are retained even when the computer is turned off. This is why ROM is called non-volatile memory. In summary, ROM is a type of permanent memory that contains data and instructions to start up a computer and does not lose this information when the computer is turned off.
Question 24 Report
An inventory management program can assist with ________
Answer Details
An inventory management program can assist with all of the above: distribution, purchasing, and planning. Inventory management involves keeping track of a company's stock of goods and materials, and making sure that there are enough items on hand to meet customer demand without having too much excess inventory that ties up capital. A good inventory management program can help with distribution by providing real-time updates on inventory levels and locations, allowing companies to quickly and accurately fulfill customer orders. It can also assist with purchasing by tracking inventory levels and alerting staff when it's time to reorder supplies, helping to ensure that stock is always available when needed. Additionally, an inventory management program can assist with planning by providing data and analytics on sales trends, inventory turnover, and other key performance indicators. This information can help companies make informed decisions about which products to stock, when to order supplies, and how much inventory to keep on hand. Overall, a well-designed inventory management program can help companies save time, reduce waste, and improve efficiency.
Question 25 Report
The joystick typically have a button on _________ used to select the option pointed by the cursor.
Answer Details
The joystick typically has a button on top, used to select the option pointed by the cursor. A joystick is an input device that allows a user to control the movement of a cursor on a screen or to interact with a virtual environment or game. The joystick typically has a stick or lever that can be moved in different directions to control the movement of the cursor. The button on the top of the joystick is used to select the option that the cursor is pointing to on the screen. This button is commonly referred to as the "trigger" button, and it allows the user to perform actions such as selecting a menu option, firing a weapon in a game, or interacting with objects in a virtual environment. Overall, the joystick and its trigger button provide a simple and intuitive way for users to interact with software and games, making them a popular input device for a wide range of applications.
Question 26 Report
What is the shortcut key to "undo" last action on a Microsoft word page?
Answer Details
The shortcut key to "undo" the last action on a Microsoft Word page is "Ctrl + Z". When you perform an action on a Word page, such as typing, deleting, formatting or copying text, you can undo that action by using the "Ctrl + Z" keyboard shortcut. This will revert the page to the state it was in before the action was performed. For example, if you accidentally delete a sentence, you can press "Ctrl + Z" to undo the deletion and restore the sentence. The "Ctrl + Z" shortcut is a very useful and commonly used feature in Microsoft Word as it allows you to quickly correct mistakes without having to manually undo each action. It can be used multiple times to undo several actions in a row. If you want to redo an action that was previously undone, you can use the "Ctrl + Y" keyboard shortcut. In summary, the "Ctrl + Z" keyboard shortcut is used to undo the last action performed on a Microsoft Word page, allowing you to easily correct mistakes and restore the previous state of the page.
Question 28 Report
At least how many keys is a keyboard made up of?
Answer Details
A keyboard is usually made up of around 101 to 105 keys, depending on the type and model of the keyboard. The most common keyboard layout is called the QWERTY layout, which includes letters, numbers, and various symbols and functions. The number of keys can vary based on the size of the keyboard and additional features, such as multimedia buttons or a numeric keypad. Overall, the number of keys on a keyboard can range from a basic 101-key layout to a more advanced 105-key layout with additional buttons.
Question 29 Report
What is the permanent memory built into your computer called?
Answer Details
The permanent memory built into a computer is called ROM (Read-Only Memory). It is called "read-only" because, unlike RAM (Random Access Memory), which can be written to and rewritten, the information stored in ROM cannot be changed by the computer or the user. ROM is a type of memory that is built into the computer's hardware and contains the basic instructions that the computer needs to boot up and run its basic functions. These instructions are often referred to as the "firmware" of the computer, and include the BIOS (Basic Input/Output System) that controls the startup process, as well as other low-level software that interacts directly with the computer's hardware. CD-ROM, on the other hand, is a type of storage medium that can be used to store data or programs, but it is not built into the computer itself. CDs and DVDs can be used to store data, programs, or other types of media, but they are not considered a type of permanent memory built into the computer.
Question 30 Report
The explorer bar is divided into _________ categories.
Answer Details
The explorer bar is divided into several categories. The exact number of categories can vary depending on the software and version you are using. The categories typically include items such as "File & Folders", "Search", "History", and "Favorites". The explorer bar provides a user-friendly interface for navigating and accessing different areas of your computer or device, and the categories help to organize and categorize the different types of information and resources that are available. The explorer bar is a common feature in many operating systems, including Microsoft Windows, and is used for accessing and managing files, folders, and other resources on your computer.
Question 31 Report
Running other software on idle computer without the knowledge of the organisation is called theft of ___________
Answer Details
Running other software on an idle computer without the knowledge of the organization is called theft of computer time. This means that the person is using the resources (e.g. processing power, memory, storage) of the computer without permission, which can slow down the performance of the computer and potentially interfere with the work of others. This unauthorized use of resources can be seen as equivalent to theft, since the person is taking something (in this case, computer time) without permission.
Question 32 Report
In the files, if order of operation on two or more files are similar, then operation will be
Answer Details
If the order of operation on two or more files is similar, then the operation will be sequential. Sequential operation means that the files will be processed one after the other in the same order as specified. For example, if we have two files A and B, and we want to perform the operations 'read', 'process', and 'write' on them in the order A->B, then the program will first read file A, process it, write the result, then move on to file B, read it, process it, and write the result. On the other hand, if the order of operation is not similar, the operation may be more complex or combinational. In that case, the files may be processed in a different order or simultaneously, which may require more complex programming logic. Therefore, having a similar order of operation on multiple files simplifies the programming and makes it more straightforward.
Question 33 Report
he rules that govern the structure of a command or programming language is called
Answer Details
The rules that govern the structure of a command or programming language is called Syntax. Syntax determines the proper order and format of the elements that make up a command or program, such as keywords, variables, and operators. These rules must be followed precisely to create a functioning program. Syntax errors occur when these rules are not followed, and the program will not execute properly. So, in summary, Syntax is a set of rules that define the correct structure and formatting of a command or programming language.
Question 34 Report
When does the output of a NAND gate =1?
Answer Details
The output of a NAND gate is equal to 1 only when one input is 0. The NAND gate is called a "NOT-AND" gate because it outputs the opposite of what an AND gate would output for the same inputs. In other words, if an AND gate would output 1 for a certain set of inputs, a NAND gate would output 0, and vice versa.
Question 35 Report
Which of these is not a job of the operating system
Answer Details
The job of the operating system that is not listed among the options is "Handling HTTP requests for Web pages." The operating system is the most important software that runs on a computer, providing an interface between the user and the computer hardware. It performs various functions to ensure that the computer system operates smoothly and efficiently. One of the key jobs of the operating system is to manage the computer's resources, such as allocating memory to programs that are running on the computer. The operating system is responsible for managing the computer's memory, ensuring that each program has enough memory to run efficiently, and preventing one program from using another program's memory. Another important job of the operating system is to provide security by preventing unauthorised access to files and data on the computer. It controls access to the computer's resources and ensures that only authorised users have access to the files and data that belong to them. However, handling HTTP requests for web pages is not a job of the operating system. Instead, this task is handled by web servers that run on top of the operating system. Web servers receive requests from clients, such as web browsers, and serve web pages to them over the internet. In summary, while the operating system performs many important tasks, such as managing resources and providing security, handling HTTP requests for web pages is not one of its jobs.
Question 36 Report
Which computer accessory is both an input and output device?
Question 37 Report
Java is a ______ language
Answer Details
Java is a high-level programming language. This means that it is designed to be easy to read and write for humans, and provides a higher level of abstraction from the hardware than lower-level languages. High-level languages like Java typically have built-in libraries and features that allow developers to write code more efficiently and focus on solving problems rather than worrying about low-level details like memory management or machine architecture. Additionally, high-level languages are typically platform-independent, which means that Java code can be compiled and run on different operating systems without needing to be rewritten.
Question 38 Report
Which can be the input and output devices both?
Answer Details
There are some devices that can be used as both input and output devices. These are: 1. Touch screen monitor: A touch screen monitor can be used as both an input and output device. It can display information to the user and also accept input from them through touch. 2. Digitizer: A digitizer is another device that can act as both an input and output device. It is used to convert analog signals, such as handwriting or sketches, into digital form. It can also display the digital output on a screen. In contrast, devices like a scanner and speaker are typically designed to perform just one function. A scanner is primarily an input device that converts physical documents into digital images, while a speaker is an output device that produces sound. To summarize, touch screen monitors and digitizers can be used as both input and output devices, while scanners and speakers are typically limited to a single function.
Question 39 Report
A display listing of program options which users can select is called?
Answer Details
A display listing of program options which users can select is called a menu. A menu is a list of options or choices that are presented to the user within a software program or an operating system. The user can then select one of the options from the menu to perform a specific task or access a specific feature. The menu is typically displayed as a list of text items or sometimes as a list of icons.
Question 40 Report
Which key deletes text?
Answer Details
The key that deletes text is the backspace key. When you type, the characters you enter are added to the right of the cursor, which shows you where the next character will be inserted. If you want to delete a character, you can move the cursor to the left of that character using the arrow keys, and then press the backspace key. This will remove the character to the left of the cursor. You can also use the backspace key to delete a selection of text. To do this, you first need to highlight the text you want to delete by clicking and dragging the cursor over it. Once the text is highlighted, you can press the backspace key to delete it. In summary, the backspace key is used to delete characters to the left of the cursor or to delete a selected portion of text.
Would you like to proceed with this action?