1. Activities connected by a computer system are described as _____________.
A. Virtual
B. Distance
C. Network
d. Online
Answer: C
Rationale:
A computer network or data network is a
telecommunications network which allows nodes to share resources. In computer
networks, networked computing devices exchange data with each other using a
data link. The connections between nodes are established using either cable
media or wireless media. The best-known computer network is the Internet.
2. Which symbol is used to open a
document?
A. Ctrl + N
B. Ctrl + S
C. Ctrl + D
D. Ctrl + O
Answer: D
Rationale:
Ctrl N- Create a new, blank document in
some software programs
Ctrl + A- Select all text
Ctrl + S- Save current document file
Ctrl + O- Open a file in current
3. Messages are easily transported
anywhere in the world through the
A. E-shopping
B. E-registry
C. E-mail
D. E-learning
Answer: C
Rationale:
Electronic mail, or email, is a method of
exchanging digital messages between people using digital devices such as
computers, tablets and mobile phones.
4. ALT is the symbol for ____________
A, Back
space
B. Alter
key
C. Enter
key
D. Control
key
Answer: B
Rationale:
The Alt key on a computer keyboard is used
to change (alternate) the function of other pressed keys. Thus, the Alt key is
a modifier key, used in a similar fashion to the Shift key.
5. Which of the following is not an input
device?
A. Keyboard
B. Mouse
C. Gaming
Application
D. Scanner
Answer: C
Rationale:
An output device is any device used to
send data from a computer to another device or user. Most computer data output
that is meant for humans is in the form of audio or video. Thus, most output
devices used by humans are in these categories. Examples include monitors,
projectors, speakers, headphones and printers. Gaming application is not a
device but is a software.
6. A secret word that must be entered into
the computer before a person is allowed to get or change information is called
A. Program
B. Password
C. Statement
D. Input
Answer: B
Rationale:
A password is an unspaced sequence of
characters used to determine that a computer user requesting access to a
computer system is really that particular user. Typically, users of a multiuser
or securely protected single-user system claim a unique name (called a user ID)
that can be generally known.
7. Which refers to a single phase or word
that tells the computer to do something with a program or file?
A. Password
B. Computer program
C. Command
D. Computer language
Answer: C
Rationale:
A command is an instruction given by a
user telling a computer to do something, such as run a single program or a
group of linked programs. Commands are generally issued by typing them in at
the command line (i.e., the all-text display mode) and then pressing the ENTER
key, which passes them to the shell.
8. In writing a letter, which productivity
tool is used?
A. Page maker
B. Word Processing
C. Spreadsheet
D. Databases
Answer: B
Rationale:
Word Processing is a software
program that creates documents using text and/or graphics. An example would be
Microsoft Word. Spreadsheets quickly organize numerical information and
allows the creator to input formulas into the spreadsheet for easy calculation.
An example would be Microsoft Excel. Databases allow the user to save
collections of information in one easily accessible place. This allows the user
to find information about a specific topic much faster versus searching the
Internet. An example of a database would be Galileo.
9. Like the typewriter, the computer has a___________.
Screen
Cursor
Keyboard
Disk drive
Rationale: A typewriter is a
mechanical or electromechanical machine for writing characters similar to those
produced by printer's movable type. A typewriter operates by means of keys that
strike a ribbon to transmit ink or carbon impressions onto paper
10. Which one links the computers to base
computer making it possible to share software materials?
A. Modem
B. Interface
C. Local area network
D. Internet
Answer: C
Rationale: A local area
network (LAN) is a group of computers and associated devices that share a
common communications line or wireless link to a server. Typically, a LAN
encompasses computers and peripherals connected to a server within a distinct
geographic area such as an office or a commercial establishment. Computers and
other mobile devices use a LAN connection to share resources such as a printer
or network storage.
11. It
is the process of storing, recovering and disseminating recorded data through
the computer
A. Information
technology
B. Information
utilization
C. Information
retrieval
D. Information
science
Answer: A
Rationale: information
technology (IT) is the application of computers to store, study, retrieve,
transmit, and manipulate data, or information, often in the context of a
business or other enterprise. IT is considered a subset of information and
communications technology (ICT).
12. The acronym URL means Uniform _________
Locator.
A. Resource
B. Reform
C. Restrict
D. Reform
Answer: A
Rationale:
URL means Uniform Resource Locator which refers to the letters and symbol that are the address of a website.
13. CTRL
is a symbol for ________.
A. Control
key
B. Entry
key
C. Backspace
D. Alter
key
Answer: A
Rationale:
Control key is either of two keys on a PC
keyboard that are held down while pressing another key, as to issue a command
14. The acronym HTML means Hyper Text
Mark-up _________.
A. Line
B. Letter
C. Language
D. Label
Answer: C
Rationale:
HyperText Markup Language (HTML) is the
standard markup language for creating web pages and web applications.
15. Which task does an operating system
for a computer perform?
A. Data compression
B. Memory management
C. Storage of pictures
D. Search engine
Answer: B
Rationale:
An operating system is the most important
software that runs on a computer. It manages the computer's memory and
processes, as well as all of its software and hardware. it also allows you to
communicate with the computer without knowing how to speak the computer's
language. Without an operating system, a computer is useless.
16. Which enables the computer to
communicate with other computers over the telephone?
A. Modem
B. Network
C. Wi-Fi
D. Internet
Answer: B
Rationale:
Computer networks are made up of wired or
wireless communication pathways that transmit data, voice and video traffic
using protocols to organize traffic.
17. Which application program provides
users with a means to organize and present information through the use of text,
numbers, graphs, sounds and visual images?
A. Publisher
B. Multimedia
C. Word
D. Office
Answer: B
Rationale:
Multimedia is content that uses a
combination of different content forms such as text, audio, images, animations,
video and interactive content.
18. What symbol is used to make the text
bold?
A. Ctrl + B
B. Ctrl + V
C. Ctrl + L
D. Ctrl + E
Answer: B
Rationale:
Ctrl + B is used to make the text bold,
Ctrl + V to paste, Ctrl + L to put words on the left side, and Ctrl + E to put
them in the center.
19. Which form of data storage stores
frequently used instruction to increase the speed of a system?
A. RAM
B. CPU
C. CD-ROM
D. Flash Drive
Answer: A
Rationale:
Random-access memory is a form of computer
data storage which stores frequently used program instructions to increase the
general speed of a system_ A random-access memory device allows data items to
be read or written in almost the same amount of time irrespective of the
physical location of data inside the memory.
20. Three-dimensional image reproduced
from a pattern of interference is called
A. Hologram
B. Network
C. Images
D. Wi-Fi
Answer: A
Rationale:
A hologram is a three-dimensional image
formed by the interference of light beams from a laser or other coherent light
source.
21. Which among these types of graphs best
illustrates the progress in academic grades over four quarters?
A. Line graph
B. Circle graph
C. Scatter diagram
D. Histogram
Answer: A
Rationale:
A line graph, also known as a line chart,
is a type of chart used to visualize the value of something over time, For
example, a finance department may plot the change in the amount of cash the
company has on hand over time. The line graph consists of a horizontal x-axis
and a vertical y-axis,
22. What illustrate a particular data series
through rectangles?
A. Line graph
B. Bar graph
C. Pie graph
D. All of the above
Answer: B
Rationale:
A Bar Graph (also called Bar Chart) is a
graphical display of data using bars of different heights. It is a diagram in
which the numerical values of variables are represented by the height or length
of lines or rectangles of equal width.
23. A social network service available through
the computer is
A. I-pad
B. Facebook
C. Google
D. I-phone
Answer: B
Rationale:
Facebook (FB) is an American for-profit
corporation and online social media and social networking service based in
Menlo Park, California. Facebook gradually added support for students at
various other universities, and eventually to high school students as well.
24. What refers to a computer program?
A. Software
B. Terminal
C. Hardware
D. Peopleware
Answer: A
Rationale:
Software is defined as the programs and
other operating information used by a computer.
25. The information highway is called:
A. Internet
B. Information technology
C. Google
D. Facebook
Answer: A
Rationale: The internet is a
global computer network providing a variety of information and communication
facilities, consisting of interconnected networks using standardized
communication protocols.