Computer Studies covers general knowledge of computers, computing terms, and technologies. It focuses on building interest and confidence in using computers.
-
Question 171:
The last cycle of data processing where data and information are preserved for future is called
Options:
A) processing
B) recording
C) storage
D) output
Show Answer
The correct answer is C .
-
Question 172:
Which of the following components of the computer is referred to as the administrative section ?
Options:
A) CPU
B) Output unit
C) Input unit
D) Memory Unit
Show Answer
The correct answer is A .
-
Question 173:
The joystick typically have a button on _________ used to select the option pointed by the cursor.
Options:
A) bottom
B) left
C) right
D) top
Show Answer
The correct answer is D .
-
Question 174:
The rules that govern the structure of a command or programming language is called
Options:
A) Syntax
B) Algorithm
C) Logic
D) Password
Show Answer
The correct answer is A .
-
Question 175:
The connection between two or more computers to share resources or allow electronic communication is called ?
Options:
A) Connection
B) Communication
C) Transfer
D) Network
Show Answer
The correct answer is D .
-
Question 176:
What is the major purpose of application software?
Options:
A) oversee the running of the computer
B) utilities
C) database management
D) recreation
Show Answer
The correct answer is B .
-
Question 177:
What category of application package does microsoft excel belong to ?
Options:
A) Word processing package
B) Graphics packages
C) Database management packages
D) Spreadsheet packages
Show Answer
The correct answer is D .
-
Question 178:
What is the primary purpose of Microsoft Excel?
Options:
A) To write essays
B) To show a slide presentation
C) To solve problems involving numbers
D) To keep students updated in the latest Microsoft Office product
Show Answer
The correct answer is C .
-
Question 179:
What differs a system software from application software?
Options:
A) ability to multi task
B) being minimal in terms of space
C) presence of cache memory
D) unique programs installed by the creators to help run the computer
Show Answer
The correct answer is D .
-
Question 180:
The illegal access to a network or computer system is___________
Options:
A) security
B) cracking
C) virus
D) piracy
Show Answer
The correct answer is B .