1. A collection of unprocessed items is

A) information

B) data

C) memory

D) reports

Correct Answer: data

Explanation : A collection of unprocessed items is data.


2. Integrated Chips or ICs were started to be use from which generation of computers?

A) 1st Generation

B) 2nd Generation

C) 3rd Generation

D) 4th Generation

Correct Answer: 3rd Generation

Explanation : Integrated Chips or ICs were started to be use from 3rd generation of computers.


3. Communication between a computer and a keyboard involves ........ transmission.

A) half duplex

B) full-duplex

C) simplex

D) all

Correct Answer: simplex

Explanation : Communication between a computer and a keyboard involves simplex transmission.


4. The size of the register is also called ________.

A) word group

B) word limit

C) word size

D) word block

Correct Answer: word size

Explanation : The size of the register is also called word size.


5. Which type of file not allowed attaching with email?

A) .Zip file

B) .rar files

C) .doc files

D) .exe or .bin files

Correct Answer: .exe or .bin files

Explanation : .exe or .bin files type of file not allowed attaching with email.


6. To be able to boot, the computer must have a (n)

A) compiler

B) loader

C) operating system

D) assembler

Correct Answer: operating system

Explanation : To be able to boot, the computer must have an operating system. an operating system a group of instructions that tells a computer on how to operate when it is turned ON. It sets up a filing system to store files and tells the computer how to display information on a video display.


7. The main job of a CPU is to

A) carry out program instructions

B) store data/information for future use

C) process data and information

D) Both A and C

Correct Answer: Both A and C

Explanation : The main job of a CPU is to carry out program instructions and process data and information.


8. Junk e-mail is also called ......

A) spoof

B) spool

C) sniffer script

D) spam

Correct Answer: spam

Explanation : Junk e-mail is also called spam or unwanted e-mail.


9. Which of the following is a correct IP address for localhost?

A) 192.168.10.1

B) 255.255.255.255

C) 127.0.0.1

D) 127.0.0.0

Correct Answer: 127.0.0.1

Explanation : IP address for localhost is 127.0.0.1


10. In spread sheet, letters are used to represent

A) Columns

B) Block

C) Cells

D) Rows

Correct Answer: Columns

Explanation : In spread sheet, letters are used to represent Columns and numbers are used to to represent Rows.


11. How many layers are there in TCP/IP model?

A) 1

B) 2

C) 3

D) 4

Correct Answer: 4

Explanation : TCP/IP Model have 4 layers: Application, Transport, Internet and Network access layer


12. Another name for a pre-programmed formula in Excel is........

A) range

B) function

C) graph

D) cell

Correct Answer: function

Explanation : Another name for a pre-programmed formula in Excel is function .


13. Computers use the …… number system to store data and perform calculations.

A) Binary

B) Octal

C) Decimal

D) Hexadecimal

Correct Answer: Binary

Explanation : Computers use the binary number system to store data and perform calculations.


14. What is Quick Heal?

A) Software

B) Virus

C) Program

D) Antivirus

Correct Answer: Antivirus

Explanation : Norton, McAfee, Kapersky, AVAST, Comodo, Avira and AVG are examples of Antivirus.


15. Which of the following is used to browse Internet?

A) Skype

B) yahoo

C) Google

D) Firefox

Correct Answer: Firefox

Explanation : Mozilla Firefox is a browser which is used to browse content