Académique Documents
Professionnel Documents
Culture Documents
F.M.: 100
1. A Time sharing system is: A) Batch processing approach B) Interactive multi-user multiprogramming approach C) Single user system D) Single user Multiprocessing approach 2. Which keystroke will take you at the beginning of the next or previous page of the document? A) Ctrl+PageUp and Ctrl+PageDown B) Shift+Home and Shift+End C) Ctrl+Home and Ctrl+End D) The only way is by using the right scroll bar
Which of the following menu option is used to display the Custom Animation task pane in PowerPoint by choosing Custom Animation option
3. A) Format B) Tools C) Slide Show D) Window 4. The advantage of using a spreadsheet is: A) Calculations can be done automatically B) Changing data automatically updates calculations C) More flexibility D) All of the above 5.
Which of the following allows you to communicate with multiple users at the same time?
A) Instant messaging B) E-mail C) A chat room D) A photo community 6. Input: A=11/05/1983 Choose the right function to get Output: 198 A) ?SUBSTR(A,7,2) B) ?STUFF(A,7,3) C) ?SUBSTR(A,8,3) D) ?SUBSTR(A,7,3)
7. What is output of expression: A=CEILING(5.4)? A) 5 B) 4 C) 6 D) none of the Above 8. The operation carried out on an input data for examining its acceptability is termed A) Checking B) Moderation C) Verification D) Validation 9. Decision Table is a A) Tabular representation of a program logic B) Symbolic representation of a program logic C) Graphical representation of a program logic D) All of the above 10. The command to create a new database file based on two open database files is A) SET RELATION B) UPDATE C) JOIN D) None of the above 11. The ??? Indicates A) Print text to Output Screen B) Print text directly to printer C) Comment D) Logical Operation 12. Which one is A) Staffing B) Controlling C) Planning D) Co-operating
13. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers. B. spam. C. viruses. D. identity theft.
15. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data B. Point-of-sale (POS) C. Sales D. Query
16. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.
A. PSS B. POS C. inventory D. data mining
17. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
A. robotics. B. simulation. C. computer forensics. D. animation.
18. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information
19. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements.
A. POS B. RFID C. PPS D. GPS
20. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics. B. computer forensics. C. simulation.
D. forecasting.
22. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence
23. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI)
24. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process B. Software C. Storage D. Information
25. The name for the way that computers manipulate data into information is called:
A. programming. B. processing. C. storing. D. organizing.
26. Computers gather data, which means that they allow users to ____________ data.
A. present B. input C. output D. store
27. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data. B. output. C. input.
D. the process.
31. ____________ is any part of the computer that you can physically touch.
A. Hardware B. A device C. A peripheral D. An application
32. Array is of
(a)Scalar type (b)Aggregate type (c)Union type (d)Enumerated type
34. The only operator that can act on the array as a whole is
(a)indirection operator (b)sizeof operator (c){ } (d)[ ]
39. Need to retrieve a file from the file server for your word processing application, which layer of the OSI model is responsible for this function?
1. 2. 3. 4. 5.
Presentation layer Application layer Session layer Transport layer Datalink layer
40. IEEE subdivided the datalink layer to provide for environments that need connectionless or connection-oriented services. What are the two layers called?
1. 2. 3. 4. 5. Physical MAC LLC Session IP
41. Routers can be configured using several sources. Select which of the following sources can be used.
1. 2. 3. 4. 5. Console Port Virtual Terminals TFTP Server Floppy disk Removable media
42. Which layer is responsible for flow control with sliding windows and reliability with sequence numbers and acknowledgments?
1. 2. 3. 4. Transport Application Internet Network Interface
45. Where is the Internet's central hub and control center located?
a. Near Washington D.C. b. Near the Microsoft campus in Redmond, Washington c. In a top-secret location d. In Silicon Valley e. Nowhere, the Internet has no central hub
48. Which of these services would you probably not be able to get from a typical Internet service provider (ISP)?
a. An email address b. Access to a Web server c. A connection to the Internet d. Technical help e. Free Windows upgrades