a) Capturing and assembling elements that enter the system to be processed
b) Transformation processes that convert input into output
c) Transferring elements that have been produced by a transformation process to their ultimate destination
d) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal.
e) None of The Above
a) Database operations
b) Audit
c) Data Entry
d) User Inquiry
e) None of The Above
Q3. Various applications and documents are represented on the Windows desktop by:
a) Symbols
b) Labels
c) Graphs
d) Icons
e) None of The Above
Q4. _____is the act of copying or downloading a program from a network and making multiple copies of it:
a) Network Piracy
b) Plagiarism
c) Software Piracy
d) Site - License Piracy
e) None of The Above
a) Network Piracy
b) Plagiarism
c) Software Piracy
d) Site - License Piracy
e) None of The Above
Q5. Approximately how many bytes make one Megabyte?
a) One Thousand
b) Ten Thousand
c) One Hundred
d) One Million
e) None of The Above
a) One Thousand
b) Ten Thousand
c) One Hundred
d) One Million
e) None of The Above
Q6. The Motherboard is the:
a) circuit board that houses peripheral devices
b) same as the CPU chip
c) the first chip that is assessed when the computer is turned on
d) circuit board that contains a CPU and other chips
e) None of The Above
a) circuit board that houses peripheral devices
b) same as the CPU chip
c) the first chip that is assessed when the computer is turned on
d) circuit board that contains a CPU and other chips
e) None of The Above
Q7. The trend in computer system is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as:
a) a roller ball which moves the cursor
b) a pen - shaped device which allows data to be entered through the CRT screen
c) a figure which resembles a familiar office device
d) an outdated input device
e) None of The Above
a) a roller ball which moves the cursor
b) a pen - shaped device which allows data to be entered through the CRT screen
c) a figure which resembles a familiar office device
d) an outdated input device
e) None of The Above
Q8. When installing ____, the user must copy and usually decompress program files from a CD - ROM or other medium to the hard disk:
a) programming software
b) system hardware
c) applications hardware
d) applications software
e) None of The Above
a) programming software
b) system hardware
c) applications hardware
d) applications software
e) None of The Above
Q9. In an information system, alphanumeric data normally takes the form of:
a) Sentences and Paragraphs
b) Numbers and Alphabetical Characters
c) Graphic Shapes and Figures
d) Human Voice and Other Sounds
e) None of The Above
a) Sentences and Paragraphs
b) Numbers and Alphabetical Characters
c) Graphic Shapes and Figures
d) Human Voice and Other Sounds
e) None of The Above
Q10. A telephone number, a birth date and a customer name are all examples of:
a) a record
b) data
c) a file
d) a database
e) None of The Above
a) a record
b) data
c) a file
d) a database
e) None of The Above
Q11. Networks are monitored by security personnel and supervised by ____who sets up accounts and passwords for authorized network users:
a) IT Managers
b)The Government
c) Network Administrators
d) Password Administrators
e) None of The Above
a) IT Managers
b)The Government
c) Network Administrators
d) Password Administrators
e) None of The Above
Q12. ______makes it possible for shoppers to make purchases using their computer:
a) E - World
b) E - Commerce
c) E - Spend
d) E - Merchant
e) None of The Above
a) E - World
b) E - Commerce
c) E - Spend
d) E - Merchant
e) None of The Above
Q13. BASIC, C, COBOL and Java are examples of _______languages:
a) Low Level
b) Computer
c) System Programming
d) High Level
e) None of The Above
a) Low Level
b) Computer
c) System Programming
d) High Level
e) None of The Above
Q14. Software applies______ also called algorithms, to process data:
a) arithmetic
b) procedures
c) objects
d) rules
e) None of The Above
a) arithmetic
b) procedures
c) objects
d) rules
e) None of The Above
Q15. The real business and competitive value of information technology lies in:
a) The software applications that are used by many companies
b) The capabilities of the software and value of the information a business acquires and uses
c) The infrastructure of hardware, networks and other IT facilities that are commonly used by many companies
d) The capabilities of the hardware and the speed at which it processes information
e) None of The Above
a) The software applications that are used by many companies
b) The capabilities of the software and value of the information a business acquires and uses
c) The infrastructure of hardware, networks and other IT facilities that are commonly used by many companies
d) The capabilities of the hardware and the speed at which it processes information
e) None of The Above