Computer Studies covers general knowledge of computers, computing terms, and technologies. It focuses on building interest and confidence in using computers.
-
Question 41:
How many bits are in one nibble ?
Options:
A) 2
B) 4
C) 8
D) 16
Show Answer
The correct answer is B .
-
Question 42:
When the computer reboots itself without triggering the hardware based reset, it is called ?
Options:
A) cold booting
B) hard reboot
C) cold reboot
D) soft reboot
Show Answer
The correct answer is D .
-
Question 43:
How many different values can a bit have?
Options:
A) 2
B) 4
C) 10
D) 256
Show Answer
The correct answer is A .
-
Question 44:
What is the difference between internal and external modem
Options:
A) external modems are PCI or ISA expansion cards while internal modems are traditionally plug into a serial port on the computer.
B) internal modems are PCI or ISA expansion cards while external modems are traditionally plug into a serial port on the computer.
C) external modems are PCI or ISA expansion cards while internal modems are USB modems
D) they are PCI or ISA expansion cards
Show Answer
The correct answer is B .
-
Question 45:
The process where a programmer converts a program specifications into computer instructions is called ?
Options:
A) Debugging
B) Coding
C) Testing
D) System design
Show Answer
The correct answer is B .
-
Question 46:
The acronym IP address has its full meaning to be _________
Options:
A) Internet protocol
B) Internet password
C) International processing
D) Internet processing
Show Answer
The correct answer is A .
-
Question 47:
System software has which major function?
Options:
A) Giving utility
B) making navigation easier for user
C) controlling the computer system
D) maintain the system
Show Answer
The correct answer is C .
-
Question 48:
The term used to describe when new information replaces old information or data is
Options:
A) file loss
B) delete
C) re-write
D) overwrite
Show Answer
The correct answer is D .
-
Question 49:
Which of the following does not replicate itself in an infected computer?
Options:
A) spyware
B) worm
C) trojan horse
D) virus
Show Answer
The correct answer is C .
-
Question 50:
How are the stages of SDLC implemented?
Options:
A) Randomly, without overlapping
B) sequentially, without overlapping
C) sequentially with overlapping
D) randomly with overlapping.
Show Answer
The correct answer is B .