1. To access properties of an object, the mouse technique to use is _______
a. Right clicking
b. Shift clicking
c. Dragging
d. Dropping
2. A ____________ shares hardware, software, and data among authorized users.
a. Network
b. Protocol
c. Hyperlink
d. Transmitter
3. Computer programs are written in a high level programming language: however the human readable version of a program is called _____
a. Cache
b. Instruction set
c. Source code
d. Word size
4. In word processing, an efficient way to move the 3 rd paragraph to place it after the 5 th paragraph is ________
a. Copy and paste
b. Copy cut and paste
c. Cut, copy and paste
d. Cut and paste
5. Which of the following is an example of connectivity?
a. Internet
b. Floppy disk
c. Power cord
d. Data
6. A disk on which you store information is caved
a. Plate
b. Data disk
c. Paper disk
d. TV disk
7. _______ is allows you to print.
a. Ribbon
b. Monitor
c. Go now
d. Control P
8. Microsoft office is an example of a __________
a. Closed source software
b. Open source software
c. Horizontal market software
d. Vertical market software
e. Compiler
9. A popular way to learn about computers without ever going to a classroom is called _______
a. i-learning
b. Isolated learning
c. E-learning
d. Close learning
e. Distance learning
10. A person who uses his or her expertise to gain access to other people‟s computers to get information illegally or do damage is a ________
a. Spammer
b. Hacker
c. Instant messenger
d. All of the above
ANSWERS
[dropshadowbox align="none" effect="lifted-both" width="500px" height="" background_color="#ffffff" border_width="1" border_color="#dddddd" ]1.(a) 2.(a) 3.(c) 4.(d) 5.(a) 6.(b) 7.(d) 8.(a) 9.(c) 10.(b)[/dropshadowbox]
Comment Policy : We invite you to comment on our posts, as long as they are respectful, to the point and approving. We do not perform pre-moderation of comments. However, in order to keep this site clean and useful, we reserve the right to remove any comment that is not in accordance with our Comment Policy.