1. Applications are often referred to as
a) data file
b) executable files
c) system software
d) the operating system
e) none of these
2. Collecting personal information and effectively posing as another individual is known as
a) spooling
b) spoofing
c) hacking
d) identify theft
e) none of these
3. The _______ file format is a method of encoding pictures on a computer.
a) HTML
b) JPEG
c) FTP
d) URL
e) none of these
4. The HTML code written in a text editor to make web-pages, is
a) HTML coding tags
b) source code
c) source element
d) tags
e) none of these
5. The basic building block of a database that contains related records is
a) Report
b) Form
c) Table
d) Edited Page
e) none of these
6. What are lists of programs waiting to be run called?
a) Shells
b) The background
c) Queues
d) Lists
e) none of these
7. An example of peripheral equipment is the
a) printer
b) CPU
c) ALU
d) microcomputer
e) none of these
8. A collection of related information sorted and dealt with as a unit is called a
a) disk
b) data
c) file
d) floppy
e) none of these
9. An error is also known as
a) bug
b) debug
c) cursor
d) icon
e) none of these
10. In a database, ________ fields store numbers used to perform calculations.
a) next
b) key
c) alphanumeric
d) numeric
e) none of these
Answers:
1. b) executable files
2. b) spoofing
3. b) JPEG
4. b) source code
5. a) Report
6. c) Queues
7. a) printer
8. c) file
9. a) bug
10. d) numeric
Thanks.