01) Cache is not a secondary storage device
02) Disk can be used to store sequential files and random files
03) Windows is not an application
04) When taking the output information is produced in hardcopy and/or softcopy form
05) Control unit‘s function is to decode program instructions
06) The most powerful type of computer amongst the following is supercomputer
07) GO TO statement is used in C, C++, basic language
08) File menu is selected to print
09) The name a user assigns to a document is called a filename
10) A processor is an electronic device that processes data, converting it into information
11) Control words are words that a programming language has set aside for its own use
12) Monitor and printer are the two types of output devices
13) To access properties of an object, the mouse technique to use is right-clicking
14) An operating system is a program that makes the computer easier to use
15) Connections to the internet using a phone line and a modem are called dial-up connections
16) To access a mainframe or supercomputer, users often use a terminal
17) A flaw in a program that causes it to produce incorrect or inappropriate results is called a bug
18) A web site address is a unique name that identifies a specific web site on the web
19) Every component of your computer is either hardware or software
20) To make the number pad act as directional arrows, you press the num lock key
21) When creating a word-processed document, formatting text involves the user changing how words on the page appear, both on the screen and in printed form
22) The ALU performs simple mathematics for the CPU
23) A computer program is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer
24) The another word for program is software
25) The name of the computer‘s brain is CPU
26) A computer is a device that electronically processes data, converting it to information
27) Laptops are computers that can be carried around easily
28) The secret code that restricts entry to some programs is password
29) The basic goal of computer process is to convert data into information
30) The disk is placed in the CPU in a computer
31) A hard copy of a document is printed on the printer
32) The name that the user gives to a document is referred to as file name
33) Restarting a computer that is already on is referred to as warm booting
34) E-mail is the transmission of messages and files via a computer network
35) The person who writes and tests computer programs is called a programmer
36) The information you put into the computer is called data
37) The output devices make it possible to view or print data
38) A chat is a typed conversation that takes place on a computer
39) Hardware includes the computer and all the devices connected to it that are used to input and output data
40) The most common method of entering text and numerical data into a computer system is through the use of a keyboard
41) Mouse, keyboard, plotter are the group consist of only input devices
42) 256 values can be represented by a single byte
43) Transformation of input into output is performed by the CPU
44) Vertical-market applications can handle most system functions that aren‘t handled directly by the operating system
45) Device drivers are small, special-purpose programs
46) LAN refers to a small, single-site network
47) A set of instructions telling the computer what to do is called program
48) Data going into the computer is called input
49) If you receive an e-mail from someone you don‘t know, then delete it without opening it
50) Two options does a binary choice offer
51) A collection of programs that controls how you computer system runs and processes information is called operating system
52) Rows and columns are data organized in a spreadsheet
53) When cutting and pasting, the item cut is temporarily stored in clipboard
54) When you are working on a document on a PC, the document is temporarily stored in flash memory
55) One megabyte equals approximately 1 million bytes
66) A cluster represents a group of sectors
67) Digital signals used in ISDN have discrete values
68) Assembler is language translation software
69) Manual data can be put into computer by scanner
70) Bandwidth means channel capacity amount of data following via cables and measure of speed
71) Chip can keep maximum data
72) Debugging is the process of finding errors in software code
73) Time Bomb are viruses that are triggered by the passage of time or on a certain data
74) Linux is an open source operating system
75) Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
76) Operating system controls the way in which the computer system functions and provides a medium by which users can interact with the computer
77) Servers are computers that provide resources to other computers connected to a network
78) Field names describe what a data field is
79) You must install router on a network if you want to share a broadband internet connection
80) A goal of normalization is to minimize the number of redundancy
81) Programs from the same developer, sold, bundled, together, that are provide better integration and share common features, tool box and menus are known as software suits
82) A data ware house is one that organizes important subject areas
83) URL term identifies a specific computer on the web and the main page of the entire site
84) A proxy server is used to process client request for web pages
85) When data changes in multiple list and list are not updated, this causes data inconsistency
86) Granting an outside organization access to internet web pages is often implemented using a extranet
87) The code that relational database management systems use to perform their database task is refer to as SQL
88) URL stands for Uniform resource locator
89) A data base management system is a software system used to create, maintain and provide controlled access to a database
90) The two broad categories of software are system and application
91) The metal or plastic case that holds all the physical parts of the computer is known as system unit
92) Data integrity means that the data contained in the database is accurate and reliable
93) A local area network is a private corporate network used exclusively by company categories
94) Eight bits equal to one byte 295) A byte can hold one character data
96) A characteristic of a file server is manages files operations and is shared on a network
98) The development process of computer started in 1617
99) The role of Blaze Pascal in the development of computer is addition and subtraction of numbers
100) The inventor of computer is Charles Babbage