Computer Studies covers general knowledge of computers, computing terms, and technologies. It focuses on building interest and confidence in using computers.
-
Question 31:
Which of the following components of the computer is referred to as the administrative section ?
Options:
A) CPU
B) Output unit
C) Input unit
D) Memory Unit
Show Answer
The correct answer is A .
-
Question 32:
In technical feasibility, the priority is ?
Options:
A) whether the probolem can be solved in the user's environment
B) if the likely benefits outweight the cost of solving the problem
C) whether the problem can be solved using existing technology and resources available
D) whether the problem can be solved without causing any social issues
Show Answer
The correct answer is C .
-
Question 33:
Which of the following is termed as the minimum error code?
Options:
A) binary code
B) gray code
C) excess 3 code
D) octal code
Show Answer
The correct answer is B .
-
Question 34:
Which of the listed is not a type of computer application?
Options:
A) Microsoft word
B) Firefox
C) Joy stick
D) VLC media player
Show Answer
The correct answer is C .
-
Question 35:
The type of computers that are designed to perform complex calculations extremely rapidly are called ?
Options:
A) supercomputer
B) micro computers
C) laptops
D) mainframe computer
Show Answer
The correct answer is A .
-
Question 36:
Computer Monitor is also known as
Options:
A) DVU
B) UVD
C) VDU
D) CCTV
Show Answer
The correct answer is C .
-
Question 37:
The process where a programmer converts a program specifications into computer instructions is called ?
Options:
A) Debugging
B) Coding
C) Testing
D) System design
Show Answer
The correct answer is B .
-
Question 38:
The joystick typically have a button on _________ used to select the option pointed by the cursor.
Options:
A) bottom
B) left
C) right
D) top
Show Answer
The correct answer is D .
-
Question 39:
At what stage in system development life cycle are all data documented in the form of detailed data flow diagrams(DFDs)
Options:
A) System design
B) Feasibility study
C) System analysis
D) Investigative study
Show Answer
The correct answer is C .
-
Question 40:
___________ is when someone steals another persons identity.
Options:
A) Cyber bullying
B) Identity Theft
C) Identity Phase
D) Cyber Know How
Show Answer
The correct answer is B .