1.
What is backup?
a) Adding more components to your network
b) Protecting data by copying it from the original source to a different destination
c) Accessing data on tape
d) Filtering old data from the new data
e) Using earlier data
2.
The legal right to use software based on specific restrictions is granted via a___________ .
a) software privacy policy
b) software license
c) software log
d) software password manager
e) None of these
3.
What is an e-mail attachment?
a) A receipt sent by the recipient.
b) A separate document from another program sent along with an e-mail.
c) A malicious parasite that feeds on your messages and destroys and contents
d) A friend to whom e-mail is sent regularly
e) A list of CC or BCC recipients
4.
Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its
parts?
a) Application software
b) Public domain software
c) Shareware
d) Operating system software
e) None of these
5.
When data changes in multiple lists and all lists are not updated, this causes ___________.
a) information overload
b) data redundancy
c) data consistency
d) duplicate data
e) data inconsistency
6.
What is the main folder on a storage device called?
a) Root directory
b) Device driver
c) interface
d) Platform
e) Main directory
7.
To view information on the Web you must have a _________.
a) cable modem
b) Web browser
c) hypertext viewer
d) domain name server
e) None of these
8.
A file is often referred to as a
a) pane
b) document
c) wizard
d) device
e) documentation
9.
To protect yourself from computer hacker intrusions you should install a
a) firewall
b) macro
c) mailer
d) script
e) None of these
10.
What type of computers are client computers (most of the time) in a client-server system?
a) Mainframe
b) Microcomputer
c) Mini-computer
d) PDA
e) None of these
Answers:
1. b) Protecting data by copying it from the original source to a different destination.2. b) software license3. b) A separate document from another program sent along with an e-mail.4. d) Operating system software5. e) data inconsistency6. a) Root directory7. b) Web browser8. b) document9. a) firewall10. a) Mainframe
Thanks.