Question 241 :
A set of step - by - step procedures for accomplishing a task is known as a(n) .....
- algorithm
- hardware program
- software bug
- firmware program
Question 242 :
Processing involves
- inputting data into a computer system
- transforming input into output
- displaying output in a useful manner
- providing relevant answers
Question 243 :
A __________ is an example of an input device.
- keyboard
- printer
- motheboard
- CPU
Question 244 :
What type of computer can support hundreds of people at any time?
- Desktop
- Laptop
- Microcomputer
- Mainframe Computer
Question 245 :
To change the selected text to all capital letters, click the change case button, then click
- Uppercase
- Upper all
- Capslock
- Lock Upper
Question 246 :
The _____ key will launch the start buttons.
- Esc
- Shift
- Windows
- Shortcut
Question 247 :
Digital photos and scanned images are typically stored as __________graphics with extensions such as bmp, png, jpg, tif and gif.
- vector
- bitmap
- either vector or bitmap
- neither vector nor bitmap
Question 248 :
A photograph, image or any other visual file which is displayed at the back ground of the windows main icon screen, is called
- Wall Paper
- Screen Saver
- Windows Theme
- Active Desktop
Question 249 :
The _______ becomes different shaped depending on the task you are performing.
- active tab
- insertion point
- mouse pointer
- ribbon
Question 250 :
Which of the following is the user programmed semiconductor memory?
- SRAM
- DRAM
- EPROM
- None of the Above
Question 251 :
The computer performs all mathematical and logical operations inside its _______
- Visual Display Unit
- Memory Unit
- Output Unit
- Central Processing Unit
Question 252 :
MS Excel contains _________rows.,
- 65,500
- 65,534
- 65,535
- 65,536
Question 253 :
What menu is selected to print?
- File
- Tools
- Social
- Edit
Question 254 :
In processing cheques which of the following I/O techniques have banks traditionally followed?
- OCR
- MICR
- Barcode
- VRT
Question 255 :
Any data and instruction entered in the memory of a computer is__________
- Storage
- Output
- Input
- Information
Question 256 :
______ printer is used for fax machines.
- Line
- Dot matrix
- Laser
- Thermal
Question 257 :
The hardware device commonly referred to as the 'brain' of the computer is the
- RAM chip
- data input
- CPU
- secondary storage
Question 258 :
Reel?to?reel tape drives are commonly used with
- mini computers
- micro computers
- mainframe computers
- laptops
Question 259 :
All of the following are examples of real security and privacy risks except
- Hackers
- Spam
- Viruses
- Identity theft
Question 260 :
A scanner that is moved by hand over the material being captured is known as ________
- Sheetfed scanner
- Flatbed scanner
- Drum scanner
- Handheld scanner
Question 261 :
The refresh rate of monitor is measured in _______
- byte
- seconds
- Hertz
- None of the Above
Question 262 :
Computers process data into information working exclusively with
- multimedia
- words
- characters
- numbers
Question 263 :
The _____ tells the computer how to use its components.
- Utility
- Network
- Operating system
- Application program
Question 264 :
The secondary storage devices can only store data but they cannot perform
- Arithmetic Operation
- Logic operation
- Fetch operstions
- Either of the above
Question 265 :
Which of the following terms is used to describe the movement of an item with the help of mouse to a new position on screen?
- click
- double click
- drag and drop
- point
Question 266 :
Which computer memory is used for storing programs and data currently being processed by the CPU ?
- Mass memory
- Internal memory
- Non-volatile memory
- PROM
Question 267 :
What are concentric circles on floppy disks known as
- Tracks
- Cylinders
- Segments
- Holes
Question 268 :
Which programming languages are classified as low level languages ?
- Basic, COBOL, FORTRAN
- Prolog 2, Expert Systems
- Knowledge based Systerms
- Assembly Languages
Question 269 :
_________ are attempts by individuals to obtain confidential information from you by falsifying their identity?
- Phising trips
- Computer viruses
- Special function cards
- Scanners
Question 270 :
Which of the following is NOT a part of the operating system?
- Supervisor
- Job?control program
- I/O control program
- Performance monitor