Log in
Sign up for FREE
arrow_back
Library

Information Technology

star
star
star
star
star
Last updated almost 7 years ago
40 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Question 1
1.

Question 2
2.

Question 3
3.

Question 4
4.

Question 5
5.

Question 6
6.

Question 7
7.

Question 8
8.

Question 9
9.

Question 10
10.

Question 11
11.

Question 12
12.

Question 13
13.

Question 14
14.

Question 15
15.

Question 16
16.

Question 17
17.

Question 18
18.

Question 19
19.

Question 20
20.

Question 21
21.

Question 22
22.

Question 23
23.

Question 24
24.

Question 25
25.

Question 26
26.

Question 27
27.

Question 28
28.

Question 29
29.

Question 30
30.

Question 31
31.

Question 32
32.

Question 33
33.

Question 34
34.

Question 35
35.

Question 36
36.

Question 37
37.

Question 38
38.

Question 39
39.

Question 40
40.

Which of the following sequence of instructions does the Control Unit Perform?
Decodes, Executes and Fetches
Fetches, Decodes and Executes
Executes, Decodes and Fetches
Fetches, Executes and Decodes
Item 2 refers to the following diagram which shows a form being completed.

The data from the form above is captured by
MICR
OCR
OMR
USB
The barcode reader in a device used to
Input data
Output data
Store data
Process Data
Which of the following devices is NOT used in point-of-sale terminals?
Printer
Plotter
Barcode Reader
Electronic Cash Register
Which of the following units performs mathematical calculations?
Control
Central Processing
Fetch
Arithmetic and Logic
Which of the following actions must be taken to get to Record number 50 of 100 records on a Magnetic Tape?
Convert to disk
Fast forward to record 100, and then read backward
First read records 1 through 49
Go directly to record 50
Transferring data or files from a remote computer to your computer is referred to as
Uploading
Browsing
Data mining
Downloading
The scrambling of messages at the sending end and unscrambling them at the receiving end is called
Encryption
Espionage
Coding
Eavesdropping
In an email program, the icon below is used to

Send a file
Forward a file
Attach a file
Create a file
Which of the following is NEITHER Validation NOR a Verification Check?
Storage Media Check
Inconsistency Check
Date-type Check
Range Check
Which word processing feature must John use if he wants to include his company’s logo in the bottom margin of every page of a document?
Header
Footer
Endnote
Footnote
Which of the following is normally used for website- to-website connection?
Hyperlink
Modem
Monitor
Hypertext
Spreadsheet formulae use
Values, Labels or cell addresses
Values, mathematical operators or cell addresses
Labels or cell addresses
Values or Cell addresses
The MOST suitable device for the output of architectural drawing is a
lightpen
laser printer
graphics tablet
plotter
Which of the following output is an example of a hardcopy?
An oral speech delivered by a speaker
A bill produced from a printer
The display on a monitor
A picture on a wall produced from a multimedia projector
An example of multitasking is
allowing one user to use one program
allowing many users to use the same program
doing a background save while typing a document
opening one program by many users
Which of the following is NOT a software interface?
Command driven
Touch screen
Menu-driven
Graphical User lnterface (GUI)
An airline reservation system is an example of
batch processing
real time processing
interactive processing
distributed processing
Persons at a downtown cafe realized that they were able to access the Intemet on their laptop computers. The cafe could be considered as a
Metropolitan Area Network
Hotspot
Local area network
Satellite
Which of the following items CANNOT be sent via email?
Text documents
Sound files
Graphic images
Parcels
Which of the following pairs of items is used to create a web Page?
Home Page and Website
HTML and authoring tool
ISP and web browser
Internet and URL
In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is
copy and paste
copy, cut and paste
cut, copy and paste
cut and paste
Which of the following actions is NOT considered to be a computer crime?
Encryption
Piracy
Industrial Espionage
Hacking
Which of the following precautions is NOT a physical restriction with respect to data security?
Firewall
Locking up the hardware
Fireproof cabinets
Biometric systems
Which of the following has the largest data storage capacity?
Optical drive
USB flash drive
Hard drive
Flash memory card
The binary equivalent of the decimal number 7 is
1002
1012
1102
1112
To use a program stored on a flash drive, it must be transferred into
RAM
ROM
PALU
PROM
The use of Information and Communications Technology (ICT) to conduct meetings at different locations is called
teleconferencing
telecommuting
telemarketing
telephony
The MAIN function of a firewall is that it
is used by hackers to prevent detection
protects computer files
prevents unauthorized access to a computer on a network
protects a stand-alone computer from viruses
A new employee at a financial company has been asked to set a password on her computer. She has tried setting the password on several occasions but gets an error message which says "password not effective". The problem can be corrected by entering a password that is
made up of several numbers
a relative's name
composed of at least six uppercase characters
a mixture of mixed case and alphanumeric characters
The two major categories of software are:
Application and system software
Application and operating system software
Operating system and Integrated software
System and general purpose software
Software in which the source code is made freely available over the Internet is BEST known as
Microsoft office
expert system
open source software
proprietary software
The following best describes how to organize computer cables and chargers EXCEPT:
Tape cables to the floor or underside of the tables
Wrap it around the table foot
Store unused cables and chargers in a waterproof container
Colour code cables and devices
When printing documents which option saves on ink usage?
Avoid over filling the tray with paper
Send the document to a printer in another department
Buy a new printer to get a free re-fill of ink
Set the printer to econo-mode or draft mode
Your computer device is losing charge quickly; which of the following would you do?
Close apps that are running in the background
Charge the device using the appropriate charger
Turn on Battery Saver Mode
All of the above
If your device is not charging, which of the following sequence of steps would you follow?
i. Call an IT technician or electrician
ii. Use a different charger
iii. Ensure that the plug is attached firmly to the device and the outlet
iv. Switch to a surge protecting outlet to charge the device
i, iii, iv
ii, iii, iv
iii, iv, i
iii, ii, iv
The extra digit attached to the end of a string of digits in barcodes and ISBN book numbers for error detection is the:
Check digit
Format check
Data type check
Parity check

To complete her word processing assignment, Susie must align the text to both the left and right margins. Which type of alignment must Susie select to achieve this?
right
left
centre
justified
Which of the following features allows the user to insert individual names in a primary document?
Footers
Headers
Mail merge
Search and replace
The one's complement of 01010011 is:
11010011
10101100
01011111
11111111