1. Which of the following is the most frequently used input device_________
(1) Microphone
(2) Scanner
(3) Touch screen
(4) Mouse
(5) None of these
2. MS Excel is a________
(1) Window based word processor package
(2) Window based spreadsheet package
(3) DOS based spreadsheet package
(4) Window based accounting package
(5) None of these
3. What term is used to describe software that monitors your online computer
activities_________
(1) Snooper ware
(2) Spyware
(3) Tracker ware
(4) Travel ware
(5) None of these
4. Which of the following is a memory management technique that makes the random access
memory appear larger than it is__________
(1) Byte mapping
(2) Preemptive multitasking
(3) Read-only memory
(4) Virtual memory
(5) None of these
5. A mistake in an algorithm that causes incorrect results is called a_________
(1) Logical error
(2) Syntax error
(3) Machine Error
(4) Compiler error
(5) None of these
6. The computers which are relatively rare because of their cost and size are__________
(1) Mini Computers
(2) Micro Computers
(3) Super Computers
(4) Mainframe Computer
(5) None of these
7. A(n)__________program is one that is ready to run and does not need to be altered in any
way.
(1) Interpreter
(2) High-level
(3) Compiler
(4) Executable
(5) None of these
8. A set of step-by-step procedures for accomplishing a task is known as a(n)________
(1) algorithm
(2) hardware program
(3) software bug
(4) rmware
program
(5) None of these
9. The main directory of a disk is called the___________directory.
(1) root
(2) sub
(3) folder
(4) network
(5) None of these
10. A_________is a collection of data that is stored electronically as a series of records in a table.
(1) spreadsheet
(2) presentation
(3) database
(4) web page
(5) None of these
ANSWER:-
1)(4) Mouse
2)(2) Window based spreadsheet package
3)(2) Spyware
4)(4) Virtual memory
5)(1) Logical error
6)(3) Super Computers
7)(4) Executable
8)(1) algorithm
9)(1) root
10)(3) database