Which storage type uses laser technology to store data? - (correct Answer) -
Optical Storage
State examples of Optical Storage. - (correct Answer) - CD-ROM
CD-R
CD-RW
DVD-ROM
DVD-R
DVD-RW
Blu-Ray
State examples of an embedded computer system. - (correct Answer) - Smart
Television
MP3 Players
Mobile Phones
Video Game Consoles
Digital Cameras
DVD Players
GPS
Microwave
Washing Machine
Traffic Lights
Printers
Digital Watches
When the computer is working on given instruction, it is called - (correct Answer)
- Processing
The most suitable device for the output of architectural drawing is a - (correct
Answer) - Plotter
An input device commonly used in marking multiple choice examination questions is -
(correct Answer) - Optical Mark Recognition (OMR)
What device is used in banks to process cheques? - (correct Answer) - Magnetic Ink
Character Recognition (MICR)
The primary input and control device for computer software like word-processing,
spreadsheet and database management is - (correct Answer) - The Keyboard
What are the two main categories of printers? - (correct Answer) - Impact and Non-
Impact
Which printer should a company choose for printing large quantities of mail-merged
letters? - (correct Answer) - Laser Printer
A ------------------- is an input device that converts printed material to a form
the computer can use. - (correct Answer) - Scanner
Errors that occur in a program when the rules of the programming languages are NOT
obeyed are called - (correct Answer) - Syntax Errors
When a mistake in a program's source code that results in incorrect or unexpected
behavior. This error is called - (correct Answer) - Logical Errors
State the functions of a modem. - (correct Answer) - Converts signals between
analogue and digital.
Define Data Validation. - (correct Answer) - Data Validation checks are carried out
by a computer system when data is entered.
What are the type of validation checks? - (correct Answer) - Range Checks
Data-type Checks
Inconsistency/Consistency Checks
Presence Checks
Type/Character Checks
Length Checks
Format Checks
Check Digits
Define Data Verification. - (correct Answer) - Data Verification takes place when a
person checks that data has been correctly keyed into a computer system.
, What are the type of verification checks? - (correct Answer) - Double Entry
Proofreading Data
State types of wireless transmission media. - (correct Answer) - Microwaves
Satellite
Cellular Radio
Line-of-sight
Infrared
State types of physical transmission media. - (correct Answer) - Twisted-Pair Cable
Coaxial Cable
Fibre-Optic Cable
What does Spreadsheet formulae uses? - (correct Answer) - Values, mathematical
operators or cell addresses
Which of the following symbols is used to perform assignments in the programming
language Pascal? - (correct Answer) - :=
State the valid data types in Microsoft Access. - (correct Answer) - Short Text
Long Text
Number
Yes/No
Currency
Autonumber
Date/Time
Large Number
Lookup Wizard
OLE Object
Hyperlink
Each website on the Internet can be accessed by entering a unique address. This
address is referred to as the - (correct Answer) - URL (Uniform Resource Locator)
While typing a a document it may be necessary to change the height of the
characters. Which feature in Microsoft Word would be used? - (correct Answer) -
Font Size
Uploading or downloading data to or from a remote computer is done using - (correct
Answer) - File Transfer Protocol (FTP)
The object that is used to produce a list of records that meets a particular
criterion is a - (correct Answer) - Query
Program debugging should be performed during the -------- - (correct Answer) -
testing phase
The LAST step in creating a program is to - (correct Answer) - Test and Implement
the algorithm
The intersection of a row and a column in a spreadsheet is called a - (correct
Answer) - Cell
State the functions of the control unit. - (correct Answer) - Fetch instructions
from memory
Decode instructions
Fetch data for required instructions
The primary storage device that holds the data currently being processed by the
computer is known as the ------- - (correct Answer) - Random Access Memory (RAM)
State a Non-Windows Application. - (correct Answer) - Microsoft Disk Operating
System (MS-DOS)
Persons at a downtown cafe realized that they were able to access the Internet on
their laptop computers. The cafe could be considered as a - (correct Answer) -
Hotspot
Scrambling of messages at the sending end and unscrambling them at the receiving
end is called - (correct Answer) - Encryption
Scanning an item at a computerized checkout station in a supermarket is an example
of - (correct Answer) - Input
Transferring data from a remote computer to your computer is referred to as -
(correct Answer) - Downloading
A webmaster is important to the company because he/she - (correct Answer) - Is
responsible for the company website