1.A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
A. Vice
B. Bug
C. Lice
D. Worm
2.In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of
A. Eight bytes
B. Eight kilobytes
C. Eight characters
D. Eight bit
3.The linking of computers with a communication system is called
A. Networking
B. Pairing
C. Interlocking
D. Assembling
E. Sharing
4.A collection of program that controls how your computer system runs and processes information is called
A. Operating System
B. Computer
C. Office
D. Interpreter
E. Compiler
5.The name for the way that computers manipulate data into information is called
A. Programming
B. Processing
C. Storing
D. Organizing
E. Compiler
6.A process known as ____________ is used by large retailers to study trends.
A. Data mining
B. Data selection
C. POS(Point of Sale)
D. Data conversion
E. None of these
7.___________ is data that has been organized or presented in a meaningful fashion.
A. Processing
B. Information
C. Software
D. Storage
E. None of these
8.DOS stands for____________
A. Direct Operation System
B. Disk Operation Software
C. Disk Operation System
D. Direct Operation Software
E. None of these
9.DSL is an example of a(n) ____________ connection.
A. Network
B. Wireless
C. Slow
D. Broadband
E. None of these
10.Memory which forgets every thing when you switch off the power is known as __________
A. Corrupted
B. Volatile
C. Non-Volatile
D. Non-Corrupted
E. None of these
11.How many options does a BINARY choice offer?
A. Two
B. One
C. Three
D. It depends on the amount of memory on the computer
E. None
12.A ____________ is approximately one billion bytes.
A. Kilobyte
B. Bit
C. Gigabyte
D. Megabyte
E. Terabyte
13.____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Artificial intelligence (AI)
B. Simulation
C. Nanotechnology
D. Nanoscience
E. None of these
14.Unwanted repetitious messages, such as unsolicited bulk e-mail is known as_________
A. Courier
B. Calibri
C. Trash
D. Spam
E. Bug
15.A process known as ____________ is used by large retailers to study trends.
A. Data mining
B. Data selection
C. Data conversion
D. POS Point of Sale