Question 1:
The files deleted from a computer system are temporarily stored in
A. flash drive
B. folder
C. local disk
D. recycle bin
E. register
👉 Click to view answer & explanation
Answer: D (Recycle bin)
Explanation:
Deleted files are temporarily stored in the Recycle Bin where they can be restored or permanently deleted.
Question 2:
The pictorial representation of a program on a computer's desktop is a/an
A. animation
B. file
C. icon
D. menu
E. pointer
👉 Click to view answer & explanation
Answer: C (Icon)
Explanation:
An icon is a small graphical representation of a program or file on the desktop.
Question 3:
Which of the following discourages the use of computer for processing information?
A. Automation of processes
B. Ease of access to information
C. High cost of initial investment
D. Speedy processing of data
E. Storage of large amounts of data
👉 Click to view answer & explanation
Answer: C (High cost of initial investment)
Explanation:
High initial cost of purchasing and setting up computers discourages their use.
Question 4:
Which of the following activities requires a word processor?
A. Computer upgrade
B. Formatting of system
C. Installation of peripheral devices
D. Text document modification
E. Updating operating system
👉 Click to view answer & explanation
Answer: D (Text document modification)
Explanation:
Word processors are used for creating and modifying text documents.
Question 5:
The unit of computer operations that prints out information is
A. control
B. input
C. memory
D. output
E. processing
👉 Click to view answer & explanation
Answer: D (Output)
Explanation:
Output devices present processed data in a readable form such as printing.
Question 6:
Microsoft Paint is an example of a ____ package.
A. graphic
B. presentation
C. spreadsheet
D. web design
E. word processing
👉 Click to view answer & explanation
Answer: A (Graphic)
Explanation:
Microsoft Paint is used for creating and editing images, making it a graphics package.
Question 7:
The collective name for symbols used in writing programs is
A. alphabet
B. character
C. hieroglyph
D. numeral
E. sign
👉 Click to view answer & explanation
Answer: B (Character)
Explanation:
Characters include letters, numbers, and symbols used in programming.
Question 8:
A professional who writes, tests and maintains codes that instructs computers to perform specific tasks is a/an
A. administrator
B. analyst
C. manager
D. operator
E. programmer
👉 Click to view answer & explanation
Answer: E (Programmer)
Explanation:
A programmer develops and maintains software by writing code.
Question 9:
Which of the following is related to ICT?
A. Forecasting
B. Hawking
C. Hiking
D. Lumbering
E. Stakeboarding
👉 Click to view answer & explanation
Answer: A (Forecasting)
Explanation:
Forecasting often uses ICT tools for data analysis and prediction.
Question 10:
What is the equivalent of 3 bytes in bits?
A. 4
B. 8
C. 12
D. 16
E. 24
👉 Click to view answer & explanation
Answer: E (24 bits)
Explanation:
1 byte = 8 bits, so 3 bytes = 3 × 8 = 24 bits.
Question 11:
What is the full meaning of RAM?
A. Random Access Memory
B. Random Acute Memo
C. Rapid Access Memory
D. Read Access Memory
E. Read Accurate Memo
👉 Click to view answer & explanation
Answer: A (Random Access Memory)
Explanation:
RAM stands for Random Access Memory, which is the computer’s temporary memory used while processing data.
Question 12:
Which of the following is best produced using Microsoft Excel?
A. Journal
B. Letter
C. Logo
D. Memo
E. Payroll
👉 Click to view answer & explanation
Answer: E (Payroll)
Explanation:
Microsoft Excel is best used for calculations and tabular data such as payroll processing.
Question 13:
What is the name given to a processed data?
A. Document
B. Fact
C. Information
D. News
E. Program
👉 Click to view answer & explanation
Answer: C (Information)
Explanation:
Processed data becomes information because it is meaningful and useful.
Question 14:
An attempt by someone to obtain confidential information by falsifying his/her identity is
A. browsing
B. phishing
C. spying
D. surfing
E. updating
👉 Click to view answer & explanation
Answer: B (phishing)
Explanation:
Phishing is a cybercrime where attackers disguise themselves to steal sensitive information.
Question 15:
Which of the following is a modern way of transmitting information?
A. Electronic mail
B. Fire lighting
C. Gong beating
D. Hieroglyphy
E. Whistling
👉 Click to view answer & explanation
Answer: A (Electronic mail)
Explanation:
Email is a modern digital method of transmitting information using the internet.
Question 16:
Which computer language is solely based on binary code?
A. Assembly
B. High level
C. Hypertext mark-up
D. Low level
E. Machine
👉 Click to view answer & explanation
Answer: E (Machine)
Explanation:
Machine language uses binary code (0s and 1s) and is directly understood by the computer.
Question 17:
Which of the following is an advantage of database systems?
A. Complex to undertake
B. Difficulty of integration
C. Enhanced data integrity
D. Maintenance overhead
E. Security risk
👉 Click to view answer & explanation
Answer: C (Enhanced data integrity)
Explanation:
Database systems improve accuracy and consistency of data, ensuring better integrity.
Question 18:
The computer component that manipulates and transforms data into information is the
A. input system
B. memory
C. motherboard
D. output system
E. processor
👉 Click to view answer & explanation
Answer: E (processor)
Explanation:
The processor (CPU) performs calculations and processes data into meaningful information.
Question 19:
Which of the following is not a type of operating system?
A. Multi user
B. Network computer
C. Real time
D. Single tasking
E. Single user
👉 Click to view answer & explanation
Answer: B (Network computer)
Explanation:
“Network computer” is not an operating system type, while the others are OS classifications.
Question 20:
The value(s) of P in the program above is/are
A. 3
B. 1, 3, 5
C. 1, 2, 3, 4, 5, 6, 7
D. 1, 5
E. 3, 5
👉 Click to view answer & explanation
Answer: B (1, 3, 5)
Explanation:
The loop starts at 1, increases by step 2, and stops before 7 is exceeded, producing values 1, 3, and 5.
Question 21:
A computer is said to be versatile because it
A. can attend to several users at a time.
B. can be used for many purposes.
C. can deal with one data at a time.
D. is capable of storing just a type of data.
E. processes data fast.
👉 Click to view answer & explanation
Answer: B (can be used for many purposes)
Explanation:
A computer is called versatile because it can perform many different tasks such as calculations, typing, browsing, and designing.
Question 22:
Which of the following storage media has the highest capacity?
A. Flash drive
B. Hard disk drive
C. Magnetic tape
D. Punch card
E. Solid state drive
👉 Click to view answer & explanation
Answer: C (Magnetic tape)
Explanation:
Magnetic tape has the highest storage capacity and is commonly used for large-scale backup systems.
Question 23:
The keyboard shortcut "Ctrl + I" in Microsoft Word will ______ selected text.
A. bold
B. erase
C. indent
D. italicise
E. underline
👉 Click to view answer & explanation
Answer: D (italicise)
Explanation:
Ctrl + I is used to italicise selected text in Microsoft Word.
Question 24:
An aspect of computer science that develops programs to imitate human thinking is
A. artificial intelligence.
B. computer simulation.
C. data mining.
D. networking.
E. robotics.
👉 Click to view answer & explanation
Answer: A (artificial intelligence)
Explanation:
Artificial Intelligence (AI) focuses on creating systems that simulate human thinking and decision-making.
Question 25:
A set of moral principles that regulate the use of computer is
A. ethics.
B. laws.
C. protocol.
D. rules.
E. standard.
👉 Click to view answer & explanation
Answer: A (ethics)
Explanation:
Computer ethics refers to moral principles guiding the proper use of computers and technology.
Question 26:
Which of the following is not a component of spreadsheet?
A. Cell
B. Column
C. Form
D. Row
E. Value
👉 Click to view answer & explanation
Answer: C (Form)
Explanation:
Spreadsheet components include cells, rows, columns, and values. "Form" is not a basic spreadsheet component.
Question 27:
A software that can be used to create and manipulate images on a computer is ____ package.
A. database management system
B. graphics
C. presentation
D. spreadsheet
E. word processing
👉 Click to view answer & explanation
Answer: B (graphics)
Explanation:
Graphics packages are used for creating and editing images.
Question 28:
A smartphone is an example of a/an ____ computer.
A. analog
B. micro
C. special purpose
D. super
E. third generation
👉 Click to view answer & explanation
Answer: B (micro)
Explanation:
Smartphones are microcomputers because they are small, portable, and designed for individual use.
Question 29:
An operating system whose usage is based on the use of disk drives is
A. IOS
B. MS DOS
C. OS/2
D. MS Windows
E. Xenix
👉 Click to view answer & explanation
Answer: B (MS DOS)
Explanation:
MS-DOS is a disk operating system that relies on command-line instructions and disk-based operations.
Question 30:
The statement used for inserting comments into a source program in BASIC programming is
A. CLS
B. FOR
C. LET
D. PRINT
E. REM
👉 Click to view answer & explanation
Answer: E (REM)
Explanation:
REM is used in BASIC programming to insert comments that are not executed by the computer.
No comments:
Post a Comment