Question 811 :
What is the process of copying software programs from secondary storage media to the hard disk called?
- configuration
- download
- storage
- istallation
Question 812 :
The word length of Micro computers lies in the range between ________
- 8 and 16 bits
- 8 and 21 bits
- 8 and 24 bits
- 8 and 32 bits
Question 813 :
Multiplexing involves _________ path and __________ channels.
- one, multiple
- one, one
- multiple, one
- multiple, multiple
Question 814 :
One megabyte equals approximately
- 1,000 bits
- 1,000 bytes
- 1 million bytes
- 1 million bits
Question 815 :
Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it ?
- Floppy Disk
- Hard Disk
- Tape Drive
- CDROM
Question 816 :
Which company is the biggest player in the microprocessor industry ?
- Motorola
- IBM
- Intel
- AMD
Question 817 :
Write!' is a`
- Text editor
- Word processor
- Line editor
- All the above
Question 818 :
Computer programs are also known as
- operating systems
- documents
- peripherals
- applications
Question 819 :
________ is the primay key of one file which also appears in another file.
- Physical key
- Primary key
- Foreign key
- Logical key
Question 820 :
Which refers to any program that is not copy righted?
- Freeware
- Shareware
- Open Source Software
- Public Domain Software
Question 821 :
To move to the beginning of a line of text, press the _____ key.
- Home
- A
- Page-up
- Enter
Question 822 :
________ is the process of dividing the disk into tracks and sectors
- Formatting
- Tracking
- Allotting
- None of the Above
Question 823 :
Which term is commonly used for copyrighted software given away free by its author?
- Freeware
- Shareware
- Open Source Software
- Public Domain Software
Question 824 :
Integrated Circuits (IC) chips used in computers are made with
- Gold
- Silver
- Silicon
- Coper
Question 825 :
Microprocessors can be used t make
- Computer
- Digital systems
- Calculators
- All of the above
Question 826 :
Which port doesn't exist in computer ?
- USB
- Parallel
- Com1 / Com2
- RAW
Question 827 :
The hardware device commonly referred to as the 'brain' of the computer is the
- RAM chip
- data input
- CPU
- secondary storage
Question 828 :
Storage that retains its data after the power is tuned off is referred to as
- volatile storage
- non-volatile storage
- sequential storage
- direct storage
Question 829 :
The ________file format is a method to encoding pictures on a computer.
- HTML
- JPEG
- FTP
- URL
Question 830 :
Secondary storage
- does not require constant power
- does not use magnetic media
- consists of foour main types of devices
- does not store information for later retrieval
Question 831 :
VIRUS stands for
- Vital Information Recourse Under Siege
- Vital Information Reason Under Siege
- Vital Information Recourse Under System
- Virus Information Recourse Under Siege
Question 832 :
Which of the followin is the largest unit of storage?
- GB
- KB
- MB
- TB
Question 833 :
When you cut or copy information it gets place in the
- clipart
- clipboard
- Internet
- motherboard
Question 834 :
The altering of data so that it is not usable unless the changes are undone is called
- biometrics
- compression
- encryption
- ergonomics
Question 835 :
Which of the following groups consist of only Input devices?
- Mouse, Keyboard, Monitor
- Mouse, Keyboard, Printer
- Mouse, Keyboard, Plotter
- Mouse, Keyboard, Scanner
Question 836 :
The average time required to reach a storage location in memory and obtain its contents is called_____
- Latency time.
- Access time.
- Turnaround time.
- Response time.
Question 837 :
Eight bits of data is called
- octabit
- word
- sentence
- byte
Question 838 :
A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is ........
- Bug
- Vice
- Lice
- Worm
Question 839 :
A device that generates the periodic signals used to control the timing of all CPU operations is
- COM
- Collate
- Chip
- Clock
Question 840 :
_________are symbols that represent any character or combination of characters.
- Playing cards
- Wildcards
- Private keys
- Public keys