0% found this document useful (0 votes)
16 views21 pages

Cos 101 Past Q&a by King Jayyy - 20250510 - 185743 - 0000

The document contains a compilation of past questions and answers related to Computer Science, Data Science, Information Technology, and Cybersecurity. It covers various topics including definitions, principles, tools, and components within these fields. The questions are formatted in a quiz style, providing correct answers for each query.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views21 pages

Cos 101 Past Q&a by King Jayyy - 20250510 - 185743 - 0000

The document contains a compilation of past questions and answers related to Computer Science, Data Science, Information Technology, and Cybersecurity. It covers various topics including definitions, principles, tools, and components within these fields. The questions are formatted in a quiz style, providing correct answers for each query.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

COS 101 PAST QUESTIONS AND

ANSWERS BY KING JAY

Tap here And follow Our Community for More Past Questions
Follow FUTO GENG TODAY

Tap here
to Follow Our Channel for more information, PDF
materials, past questions, Giveaways and lot's more
Which of the following best defines Computer Science?
A. The study of hardware devices
B. The use of the internet for communication
C. The study of computation and information processing
D. The development of mobile applications
Answer: C

Who is known as the father of Computer Science?


A. Steve Jobs
B. Charles Babbage
C. Alan Turing
D. Bill Gates
Answer: C

Which branch of Computer Science focuses on creating algorithms?


A. Cybersecurity
B. Artificial Intelligence
C. Software Engineering
D. Theoretical Computer Science
Answer: D

What is the major aim of computer science?


A. Building networks
B. Managing data
C. Automating processes using logical computation
D. Creating web pages
Answer: C

What is the main goal of cybersecurity?


A. Hacking into systems
B. Designing software
C. Protecting computer systems from attacks
D. Developing games
Answer: C

Which of these is NOT a type of cybersecurity threat?


A. Phishing
B. Malware
C. Data encryption
D. Ransomware
Answer: C

What is a firewall used for in cybersecurity?


A. Destroying viruses
B. Enhancing memory speed
C. Blocking unauthorized access
D. Speeding up the internet
Answer: C

Which one of these is a strong password?


A. 123456
B. password
C. John2020
D. #J@y_K!nG2025
Answer: D

Which of the following best defines Data Science?


A. Drawing images using software
B. Managing office records
C. Extracting insights from data
D. Building operating systems
Answer: C

What is the primary tool used in Data Science for analysis?


A. Web browser
B. Spreadsheet
C. Statistical models
D. Word processor
Answer: C

Which language is most commonly used in Data Science?


A. HTML
B. Python
C. Java
D. C++
Answer: B

Big Data refers to:


A. A large file
B. Large, complex data sets
C. Multiple file formats
D. Fast internet connection
Answer: B

What does ICT stand for?


A. Information and Computing Tools
B. International Computer Training
C. Information and Communication Technology
D. Intelligent Computer Techniques
Answer: C

Which of the following is NOT a component of ICT?


A. Internet
B. Mobile phones
C. Typewriter
D. Software
Answer: C

Which of these best describes ICT's role in education?


A. Reduces learning
B. Disrupts classes
C. Enhances learning and communication
D. Deletes data
Answer: C

Which of the following is a benefit of ICT?


A. Slow communication
B. High cost of learning
C. Improved access to information
D. Manual data processing
Answer: C

What is an Information System?


A. Hardware only
B. A system for storing paper documents
C. A set of components for collecting, processing, storing, and distributing
information
D. A security software
Answer: C
A. Reduces learning
B. Disrupts classes
C. Enhances learning and communication
D. Deletes data
Answer: C

Which of the following is a benefit of ICT?


A. Slow communication
B. High cost of learning
C. Improved access to information
D. Manual data processing
Answer: C

What is an Information System?


A. Hardware only
B. A system for storing paper documents
C. A set of components for collecting, processing, storing, and distributing information
D. A security software
Answer: C

Which component is NOT part of an Information System?


A. People
B. Technology
C. Paper
D. Processes
Answer: C

Which of the following is an example of an Information System?


A. Antivirus software
B. MS Word
C. ATM
D. Scanner
Answer: C

A system that supports decision-making in an organization is called:


A. Communication system
B. Data entry system
C. Decision Support System (DSS)
D. Social media
Answer: C

Which best defines Information Technology?


A. Use of internet alone
B. Management of technological companies
C. Use of computers and software to manage information
D. Repairing computers
Answer: C

IT is most useful in:


A. Cooking
B. Bricklaying
C. Business operations
D. Fishing
Answer: C

Cloud computing is a concept under:


A. Cybersecurity
B. Data entry
C. Information Technology
D. Web design
Answer: C

An example of IT in health care is:


A. Scanning documents
B. Electronic health records
C. Using thermometers
D. Taking manual attendance
Answer: B

What is Software Engineering?


A. Repairing computers
B. Studying computer hardware
C. Systematic development and maintenance of software
D. Writing HTML code only
Answer: C

Which of these is a Software Development Life Cycle (SDLC) model?


A. Waterfall
B. Drainfall
C. Circular
D. Modular
Answer: A

Which of these is NOT a phase of software development?


A. Planning
B. Testing
C. Cooking
D. Deployment
Answer: C

The process of finding and fixing errors in software is called:


A. Debugging
B. Compiling
C. Encrypting
D. Running
Answer: A

Which of the following is a popular programming language used in Software Engineering?


A. MySQL
B. Excel
C. Python
D. Adobe Photoshop
Answer: C

Agile methodology in software engineering emphasizes:


A. Fixed planning
B. Slow delivery
C. Flexibility and collaboration
D. Water transport
Answer: C
Which of the following is an application of Computer Science?
A. Painting
B. Driving
C. Machine Learning
D. Carpentry
Answer: C

The Turing Machine is important in Computer Science because:


A. It makes tea
B. It stores music
C. It provides a model for computation
D. It is used to build houses
Answer: C

Social engineering attacks rely on:


A. Software errors
B. Hardware faults
C. Human interaction and manipulation
D. Electrical surges
Answer: C

Which of these is an antivirus software?


A. MS Excel
B. Photoshop
C. Avast
D. WhatsApp
Answer: C

Two-factor authentication is a method used to:


A. Reduce computer speed
B. Increase screen brightness
C. Improve system security
D. Scan documents
Answer: C

The first step in data analysis is usually:


A. Sharing the data
B. Cleaning and preparing the data
C. Uploading to social media
D. Deleting irrelevant files
Answer: B

Which field combines statistics and computer programming?


A. Data Science
B. Software Engineering
C. Cybersecurity
D. System Administration
Answer: A

What is a data set?


A. A hardware device
B. A collection of related data items
C. A type of virus
D. A computer brand
Answer: B

E-learning is an example of:


A. Traditional education
B. Manual instruction
C. ICT in education
D. Classroom-only learning
Answer: C

Which of these is NOT an ICT tool?


A. Projector
B. Internet
C. Landline telephone
D. Abacus
Answer: D

ICT can help in governance through:


A. Paper filing
B. E-Government platforms
C. Handwritten letters
D. Oral announcements only
Answer: B

Which of the following supports day-to-day business operations?


A. Transaction Processing System (TPS)
B. Scanner
C. Firewall
D. Paint software
Answer: A

MIS stands for:


A. Main Internet Software
B. Management Information System
C. Mobile Information Source
D. Modern Input System
Answer: B

An example of input in an information system is:


A. Printer
B. Scanner
C. Monitor
D. Speaker
Answer: B

A career in IT includes:
A. Welding
B. Network administration
C. Farming
D. Tailoring
Answer: B

Which of the following is used for IT-based presentations?


A. MS PowerPoint
B. MS Excel
C. CorelDraw
D. VLC Media Player
Answer: A

Digital divide refers to:


A. Broken laptops
B. Differences in access to technology
C. Outdated processors
D. Hacking passwords
Answer: B

Which of the following is used for version control in software development?


A. Python
B. Git
C. MySQL
D. Notepad
Answer: B

The purpose of software testing is to:


A. Slow down development
B. Increase bugs
C. Ensure software works correctly
D. Backup data
Answer: C

The person who writes code is called a:


A. Designer
B. Coder or programmer
C. Scanner
D. Hacker
Answer: B
Which of the following best describes the Church-Turing thesis?
A. Every problem can be solved using a smartphone
B. All computers are based on vacuum tubes
C. Any function computable by an algorithm is computable by a Turing machine
D. All data must be stored in cloud systems
Answer: C

Which cybersecurity principle ensures that only authorized users can access data?
A. Integrity
B. Confidentiality
C. Availability
D. Authentication
Answer: B

In data science, what does dimensionality reduction refer to?


A. Increasing dataset size
B. Reducing number of programming lines
C. Removing unnecessary features from a dataset
D. Changing binary to decimal
Answer: C

Which of these best explains the difference between IT and IS?


A. IT is older than IS
B. IS includes IT and focuses on how information is processed and used
C. IS is purely about hardware
D. IT is about communication only, while IS is about security
Answer: B

Which of the following software engineering models is most suited for rapidly changing
requirements?
A. Waterfall model
B. V-model
C. Agile model
D. Spiral model
Answer: C

Which ICT component is most essential for cloud computing?


A. Barcode readers
B. High-speed internet infrastructure
C. Compact disks
D. CRT monitors
Answer: B

Which statistical method is used in data science for classifying data into categories?
A. Clustering
B. Regression
C. Classification
D. Filtering
Answer: C

Which of these is a non-relational type of database used in large-scale data science projects?
A. Oracle
B. MySQL
C. PostgreSQL
D. MongoDB
Answer: D

The principle of least privilege in cybersecurity means:


A. Giving all users admin access
B. Restricting users to only the permissions they need
C. Encrypting all passwords
D. Removing firewalls for internal users
Answer: B

Which of the following is a key challenge in software engineering today?


A. Manual data collection
B. Managing legacy codebases
C. Installing operating systems
D. Playing multimedia files
Answer: B
Which of the following is an input device?
A. Monitor
B. Keyboard
C. Speaker
D. Projector
Answer: B

The device used to convert physical documents into digital form is?
A. Plotter
B. Microphone
C. Scanner
D. Printer
Answer: C

Which device allows users to control the cursor on the screen?


A. Joystick
B. Microphone
C. Projector
D. Scanner
Answer: A

Which of these is an example of an output device?


A. Keyboard
B. Mouse
C. Monitor
D. Scanner
Answer: C

A device that produces hard copies of documents is called?


A. Printer
B. Monitor
C. Flash drive
D. Keyboard
Answer: A

Which of the following is used to play sound from a computer?


A. Speaker
B. Webcam
C. Scanner
D. Keyboard
Answer: A

Which of these inputs sound into a computer?


A. Speaker
B. Microphone
C. Webcam
D. Monitor
Answer: B

A touchpad is usually found on a?


A. Scanner
B. Printer
C. Laptop
D. Desktop
Answer: C

Which of these is NOT an input device?


A. Mouse
B. Keyboard
C. Projector
D. Scanner
Answer: C

What is known as the brain of the computer?


A. RAM
B. ROM
C. CPU
D. SSD
Answer: C

Which part of the computer processes data and instructions?


A. Monitor
B. CPU
C. RAM
D. Printer
Answer: B

What does ALU stand for?


A. Advanced Logic Unit
B. Arithmetic and Logic Unit
C. Arithmetic Learning Unit
D. Array Logic Unit
Answer: B

Which part of the CPU performs arithmetic operations?


A. RAM
B. CU
C. ALU
D. ROM
Answer: C

The component that controls the activities of the CPU is?


A. ALU
B. Control Unit
C. RAM
D. Cache
Answer: B

Temporary storage that holds data currently in use is?


A. ROM
B. RAM
C. Flash drive
D. SSD
Answer: B

ROM is also known as?


A. Read-On Memory
B. Random Onboard Memory
C. Read Only Memory
Answer: B

Temporary storage that holds data currently in use is?


A. ROM
B. RAM
C. Flash drive
D. SSD
Answer: B

ROM is also known as?


A. Read-On Memory
B. Random Onboard Memory
C. Read Only Memory
D. Run On Memory
Answer: C

Which of these is non-volatile memory?


A. RAM
B. ROM
C. Cache
D. Register
Answer: B

Which of the following uses magnetic storage?


A. SSD
B. CD-ROM
C. Flash Drive
D. Hard Disk
Answer: D

The main advantage of SSD over HDD is?


A. Slower boot time
B. Mechanical operation
C. Faster data access
D. More moving parts
Answer: C

Flash drives are also called?


A. Optical disks
B. USB drives
C. RAM
D. CDs
Answer: B

Which is a secondary storage device?


A. CPU
B. ROM
C. CD-ROM
D. Register
Answer: C

Which of these does NOT describe an output device?


A. Displays information
B. Accepts data from users
C. Produces sound or visuals
D. Gives processed results
Answer: B

The function of an input device is to?


A. Process data
B. Display output
C. Send data into the computer
D. Store data
Answer: C

Which of these is a visual output device?


A. Printer
B. Monitor
C. Speaker
D. Scanner
Answer: B

The hardware that links all components together is?


A. Power supply
B. CPU
C. RAM
D. Motherboard
Answer: D

Which of these is both input and output device?


A. Scanner
B. Projector
C. Touchscreen
D. Microphone
Answer: C

What type of memory is closest to the CPU?


A. RAM
B. ROM
C. Cache
D. Hard disk
Answer: C

The part of the CPU that fetches instructions is the?


A. ALU
B. RAM
C. Control Unit
D. ROM
Answer: C

A joystick is commonly used for?


A. Printing
B. Gaming
C. Typing
D. Scanning
Answer: B

The primary function of storage hardware is to?


A. Process instructions
B. Input sound
C. Save data
D. Display output
Answer: C
Which of the following is NOT a storage device?
A. SSD
B. RAM
C. Monitor
D. Hard disk
Answer: C

Which of the following is considered volatile memory?


A. Hard disk
B. SSD
C. RAM
D. ROM
Answer: C

What type of device is a barcode scanner?


A. Output device
B. Input device
C. Storage device
D. Communication device
Answer: B

Which of the following is NOT a characteristic of CPU?


A. It stores documents permanently
B. It executes instructions
C. It contains ALU and CU
D. It performs logical operations
Answer: A

Which output device is used for presentations?


A. Keyboard
B. Scanner
C. Projector
D. Mouse
Answer: C

The smallest and fastest memory in a computer is?


A. ROM
B. Hard disk
C. Cache
D. RAM
Answer: C

Which of the following is an optical storage device?


A. Flash drive
B. Hard disk
C. CD-ROM
D. RAM
Answer: C

What is the function of the motherboard?


A. Supplies power
B. Inputs data
C. Connects all components
D. Displays output
Answer: C

Which of the following is NOT an example of output hardware?


A. Monitor
B. Printer
C. Speaker
D. Joystick
Answer: D

Which of these can store the largest amount of data?


A. RAM
B. ROM
C. SSD
D. Cache
Answer: C

Which device is mainly used in ATMs for user input?


A. Monitor
B. Scanner
C. Keypad
D. Printer
Answer: C

What does CPU stand for?


A. Central Processing Unit
B. Central Programming Unit
C. Control Process Utility
D. Central Power Unit
Answer: A

Which unit of the CPU is responsible for logic and comparison?


A. RAM
B. CU
C. ALU
D. ROM
Answer: C

A light pen is used for?


A. Typing text
B. Drawing on the screen
C. Printing text
D. Projecting images
Answer: B

Which of these is not used for data storage?


A. SSD
B. Flash Drive
C. Keyboard
D. Hard disk
Answer: C

What does RAM stand for?


A. Read and Memory
B. Random Access Memory
C. Read Access Memory
D. Remote Access Memory
Answer: B

Which device is typically used to print large architectural designs?


A. Inkjet Printer
B. Plotter
C. Laser Printer
D. Speaker
Answer: B

The unit that manages and coordinates activities of all other units is?
A. ALU
B. CU
C. ROM
D. RAM
Answer: B

A webcam is classified as?


A. Storage device
B. Output device
C. Input device
D. Processing device
Answer: C

The main function of the ALU is to?


A. Control data flow
B. Execute arithmetic and logic operations
C. Store data
D. Convert images
Answer: B
Which of the following best describes a device that digitizes analog audio signals into a computer?
A. Microphone
B. Sound Card
C. Webcam
D. Speaker
Answer: B

What is the role of the system bus in the CPU?


A. It stores instructions
B. It performs calculations
C. It connects CPU components and memory
D. It manages power supply
Answer: C

Which component interprets and executes instructions fetched from memory?


A. ALU
B. Cache
C. Control Unit
D. RAM
Answer: C

A RAID system is associated with which hardware category?


A. Input hardware
B. Output hardware
C. Storage hardware
D. Processing unit
Answer: C

Which level of cache is embedded directly in the processor chip?


A. L1 Cache
B. L2 Cache
C. L3 Cache
D. Virtual Cache
Answer: A

The processor register used to store the memory address of the next instruction is?
A. MAR
B. PC
C. IR
D. MDR
Answer: B

Which of the following input devices uses light sensors to detect movement?
A. Mechanical mouse
B. Optical mouse
C. Touchpad
D. Joystick
Answer: B

In modern CPUs, what technique is used to execute multiple instructions at once?


A. Time sharing
B. Multitasking
C. Pipelining
D. Multithreading
Answer: C

What hardware component typically handles input/output requests in advanced systems?


A. CPU
B. ALU
C. I/O Controller
D. RAM
Answer: C

Which of these represents an internal storage device?


A. External hard drive
B. Flash drive
C. Solid-state drive
D. Optical disc
Answer: C

Which output device can also be classified as both analog and digital depending on configuration?
A. Monitor
B. Plotter
C. Projector
D. Speaker
Answer: A

Which of the following has the fastest data access speed?


A. Optical disk
B. Hard disk
C. Cache memory
D. RAM
Answer: C

What type of memory is EEPROM?


A. Volatile memory
B. Temporary memory
C. Programmable ROM
D. Static RAM
Answer: C

What distinguishes SRAM from DRAM?


A. DRAM is faster
B. SRAM requires refreshing
C. SRAM uses flip-flops
D. DRAM is used in cache
Answer: C

Which component provides a direct interface between the user and system software?
A. RAM
B. Keyboard
C. BIOS
D. Monitor
Answer: B

Which CPU register holds data to be processed by the ALU?


A. Program Counter
B. MAR
C. MDR
D. Instruction Register
Answer: C

Which of the following is true about virtual memory?


A. It is a type of physical memory
B. It speeds up CPU operations
C. It uses part of the hard drive as RAM
D. It is faster than cache
Answer: C

What is the typical function of a BIOS chip in computer hardware?


A. Enhances video output
B. Manages audio playback
C. Initiates hardware during boot
D. Boosts RAM speed
Answer: C

What does the term “hot-swappable” typically refer to in storage hardware?


A. Requires cooling fan
B. Can be replaced while system runs
C. Heats up quickly
D. Needs shutdown to remove
Answer: B

What is the function of DMA (Direct Memory Access) in CPU operations?


A. Reduces CPU load by allowing hardware to access memory directly
B. Stores device drivers
C. Controls cache usage
D. Refreshes DRAM
Answer: A
1. What is software in computing?
A. Physical components of a computer
B. Invisible power supply of a computer
C. A collection of programs that instruct a computer
D. Input devices of a computer
Answer: C
2. One primary function of software is to:
A. Connect hardware parts
B. Execute instructions
C. Build the CPU
D. Increase screen size
Answer: B
3. Software that enables the computer to run and manage its resources is called:
A. Application software
B. Operating system
C. Utility software
D. Game software
Answer: B
4. The major types of software include:
A. Application and system software
B. Cloud and offline software
C. ROM and RAM
D. Input and output software
Answer: A
5. Which of the following is a criterion for selecting appropriate software?
A. Popularity of brand
B. Compatibility with existing hardware
C. Presence of colorful icons
D. Sound volume
Answer: B
6. Which guideline is important when selecting hardware and software?
A. Price of accessories
B. Support and updates availability
C. Number of USB ports
D. Type of keyboard
Answer: B
7. First generation programming languages are known as:
A. Assembly languages
B. Machine languages
C. High-level languages
D. Object-oriented languages
Answer: B
8. A programming term that refers to fixing errors in code is:
A. Coding
B. Debugging
C. Compiling
D. Interpreting
Answer: B
9. Software can be defined as:
A. Tangible computer parts
B. Logical components that direct hardware
C. The casing of a computer
D. Voltage regulators
Answer: B
10. A system software that helps manage hardware and other software is:
A. Browser
B. Word processor
C. Operating system
D. Spreadsheet
Answer: C
11. Which is a type of application software?
A. Linux
B. Windows
C. MS Word
D. DOS
Answer: C
12. An example of utility software is:
A. Antivirus
B. Paint
C. Google Chrome
D. Facebook
Answer: A
13. What factor should be considered when selecting software?
A. Ability to play music
B. Ease of use
C. Size of the monitor
D. Weight of the mouse
Answer: B
14. Programming languages have evolved through how many generations?
A. Two
B. Four
C. Five
D. Six
Answer: C
15. A high-level programming language is designed to be:
A. Readable only by machines
B. Difficult to debug
C. Easy for humans to understand
D. Interpreted by humans only
Answer: C
16. Second generation languages are also called:
A. High-level languages
B. Assembly languages
C. Machine languages
D. Binary codes
Answer: B
17. Software that performs specific user tasks is called:
A. Application software
B. Utility software
C. Firmware
D. System software
Answer: A
18. An important function of an operating system is:
A. Writing documents
B. Managing system resources
C. Designing software
D. Providing electricity
Answer: B
19. One of the criteria for choosing software is:
A. Size of the processor
B. Licensing and cost
C. Brand of monitor
D. Color of keyboard
Answer: B
20. Third generation programming languages are also known as:
A. Low-level languages
B. Object languages
C. High-level languages
D. Source languages
Answer: C
21. Translating high-level code into machine code is done by:
A. Editor
B. Translator
C. Compiler
D. Debugger
Answer: C
22. Guidelines for software selection should include:
A. Program size only
B. Hardware compatibility
C. Mouse configuration
D. Printer ink brand
Answer: B
23. A key reason to consider documentation in software is:
A. It helps repair broken parts
B. It shows installation procedures
C. It stores hardware data
D. It prevents booting
Answer: B
24. Programming related terms include the following except:
A. Algorithm
B. Syntax
C. Compiler
D. Scanner
Answer: D
25. What is the role of a compiler?
A. Finds online errors
B. Executes code line by line
C. Converts source code to machine code
D. Creates GUI
Answer: C
26. Software that provides basic functions like file management is:
A. Operating system
B. Application software
C. Gaming software
D. Browser
Answer: A
27. Fourth generation programming languages are best described as:
A. Machine-dependent
B. User-friendly and closer to human language
C. Binary code
D. Hard to learn
Answer: B
28. Debugging refers to:
A. Checking for network
B. Removing program errors
C. Installing software
D. Creating tables
Answer: B
29. One important selection guideline for hardware/software is:
A. Type of floor tiles
B. Power consumption
C. Room color
D. Internet memes
Answer: B
30. Fifth generation programming languages are associated with:
A. Assembly codes
B. Artificial intelligence
C. Binary logic
D. File transfer
Answer: B
31. Which of the following is NOT a type of system software?

A. Compiler
B. Word processor
C. Operating system
D. Device drivers
Answer: B
32. Which term refers to a sequence of instructions for solving a problem?

A. Syntax
B. Algorithm
C. Flowchart
D. Loop
Answer: B
33. A key benefit of using high-level programming languages is:

A. Slower execution
B. Hardware control
C. Easier to learn and understand
D. Binary operations
Answer: C
34. Which software controls the execution of application programs?

A. MS Excel
B. MS Word
C. Operating system
D. Chrome
Answer: C
35. One of the roles of system software is to:

A. Design webpages
B. Control hardware
C. Scan books
D. Create logos
Answer: B
36. Which of the following is true about application software?

A. Controls the printer directly


B. Only used by programmers
C. Helps users perform specific tasks
D. Handles system booting
Answer: C
37. A translator that converts and executes code line-by-line is called:

A. Compiler
B. Interpreter
C. Assembler
D. Debugger
Answer: B
38. Utility software is designed to:

A. Play games
B. Maintain and optimize performance
C. Connect to the internet
D. Design databases
Answer: B
39. Firmware is best described as:

A. Temporary hardware
B. Software stored permanently on chips
C. External application software
D. Outdated software
Answer: B
40. A fourth-generation language is mostly used for:

A. Artificial Intelligence
B. Data processing and report generation
C. Operating system design
D. Device management
Answer: B
41. One basic function of software is to:

A. Provide physical memory


B. Display 3D objects
C. Give instructions to the hardware
D. Build keyboards
Answer: C
42. Programming language syntax refers to:

A. Logic of a problem
B. The structure and rules of a language
C. The computer hardware
D. Software installation
Answer: B
43. Which is an example of system software?

A. CorelDraw
B. MS Excel
C. Linux
D. WhatsApp
Answer: C
44. A software selection guideline for businesses includes:

A. Looks of the packaging


B. Vendor support and maintenance
C. Speed of the mouse
D. Brightness of monitor
Answer: B
45. A fifth-generation language focuses more on:

A. User interface
B. AI and natural language processing
C. Speed of coding
D. Web development
Answer: B
46. What does a programming “loop” mean?

A. Ignoring errors
B. Stopping a program
C. Repeating a set of instructions
D. Storing user data
Answer: C
47. Software that helps to back up files is classified as:

A. Application software
B. Utility software
C. System software
D. Driver software
Answer: B
48. A key term that describes writing computer programs is:

A. Hacking
B. Typing
C. Coding
D. Debugging
Answer: C
49. When choosing software, it is important to consider:

A. Software name length


B. Internet data usage
C. Training and user support
D. Monitor color
Answer: C
50. Which generation of programming language uses visual tools and AI integration?

A. First
B. Third
C. Fifth
D. Second
Answer: C
51. The software that translates assembly language into machine code is called:
A. Compiler
B. Interpreter
C. Assembler
D. Debugger
Answer: C
52. Software that helps in recovering lost files is known as:
A. Operating software
B. Utility software
C. Word processor
D. Compiler
Answer: B
53. Which of these is considered a high-level programming language?
A. Machine code
B. Assembly
C. Python
D. Binary
Answer: C
54. The fifth-generation languages aim to make programming more:
A. Complex
B. Dependent on hardware
C. Machine-friendly
D. Human-like
Answer: D
55. Which of the following is a function of system software?
A. Drawing pictures
B. Playing media
C. Managing hardware
D. Scanning photos
Answer: C
56. A good software selection strategy includes evaluating:
A. Price, support, and scalability
B. Screen resolution
C. Keyboard length
D. Printer ink level
Answer: A
57. A compiler:
A. Translates line by line
B. Directly executes code
C. Converts source code to object code at once
D. Manages input devices
Answer: C
58. The term "source code" refers to:
A. Binary output
B. The original program written by the programmer
C. Output of a compiler
D. Hardware code
Answer: B
59. System software and application software are examples of:
A. Hardware types
B. Output devices
C. Categories of software
D. Storage media
Answer: C
60. What is debugging in programming?
A. Creating user interfaces
B. Erasing old files
C. Fixing errors in code
D. Upgrading systems
Answer: C
61. Which of the following is not an application software?
A. MS Excel
B. VLC Media Player
C. Disk Defragmenter
D. Google Chrome
Answer: C
62. What is the major difference between system software and application software?
A. System software is optional
B. Application software manages hardware
C. System software runs the computer, application software helps do tasks
D. Both are used only by programmers
Answer: C
63. Which generation of programming language introduced the concept of artificial intelligence?
A. First
B. Second
C. Third
D. Fifth
Answer: D
64. Which of these terms is related to software maintenance?
A. Cooling fan
B. Bug fixing
C. Screen brightness
D. ROM
Answer: B
65. A user-friendly software means it is:
A. Difficult to install
B. Hard to understand
C. Easy to use and interact with
D. Expensive
Answer: C
66. In selecting hardware, one must consider:
A. Keyboard color
B. Software compatibility
C. Window size
D. Desk design
Answer: B
67. Which software enables multitasking on a computer?
A. Antivirus
B. Operating system
C. MS Word
D. Game software
Answer: B
68. The process of executing instructions written in a programming language is called:
A. Processing
B. Running
C. Compilation
D. Execution
Answer: D
69. Software documentation is important because it:
A. Helps store passwords
B. Guides users and developers
C. Deletes old data
D. Helps scan files
Answer: B
70. The term “loop” in programming is mostly used to:
A. Repeat instructions
B. Stop program execution
C. Format code
D. Display errors
Answer: A
1. Who is responsible for translating system requirements into a working solution?
A. System Designer
B. System Analyst
C. System Builder
D. User
Answer: C
2. One key skill of a System Analyst is:
A. Strong analytical thinking
B. Painting
C. Dancing
D. Wiring electronics
Answer: A
3. A person who designs the framework of an information system is called:
A. Builder
B. Designer
C. Operator
D. Analyst
Answer: B
4. In an organization, those who interact directly with the system for daily tasks are:
A. System Builders
B. Technicians
C. End-users
D. Engineers
Answer: C
5. A system analyst acts as a bridge between:
A. The company and its computers
B. IT and business needs
C. Hardware and electricity
D. Data and paper
Answer: B
6. Computers have improved businesses by:
A. Delaying reports
B. Reducing accuracy
C. Speeding up processing
D. Increasing paperwork
Answer: C
7. One role of computers in modern society is:
A. Slowing down communication
B. Storing and retrieving data
C. Increasing traffic
D. Reducing literacy
Answer: B
8. A System Designer must understand:
A. Hardware structure only
B. Organizational needs and technical constraints
C. Social media trends
D. Fashion
Answer: B
9. System Builders are also known as:
A. Database users
B. Software developers
C. Marketers
D. Typists
Answer: B
10. A good system analyst must have which of the following abilities?
A. Ability to dance
B. Effective communication and critical thinking
C. Ability to sing
D. High typing speed
Answer: B
11. Humanware refers to:
A. Physical computer parts
B. Human resources involved in computing systems
C. Electronic gadgets
D. System software
Answer: B
12. Computers play an important role in society by:
A. Reducing employment
B. Automating processes
C. Causing pollution
D. Lowering productivity
Answer: B
13. A business can use computers to:
A. Make tea
B. Monitor sales and inventory
C. Build furniture
D. Cut grass
Answer: B
14. One advantage of computer use in the economy is:
A. Increases cost of production
B. Decreases communication
C. Promotes e-commerce and online businesses
D. Makes transport slower
Answer: C
15. Which of the following is NOT a skill required by a system analyst?
A. Communication skills
B. Problem-solving skills
C. Acting skills
D. Technical knowledge
Answer: C
16. What is a major function of a System Designer?
A. Data collection only
B. Developing technical solutions
C. Typing letters
D. Operating printers
Answer: B
17. One major use of computers in hospitals is:
A. Managing health records
B. Replacing doctors
C. Drawing blood
D. Sweeping floors
Answer: A
18. Which of the following is true about human resources in computing?
A. They only write code
B. They include analysts, designers, builders, and users
C. They are part of computer hardware
D. They operate mobile phones only
Answer: B
19. A major benefit of computers in education is:
A. Limiting access to books
B. Enabling e-learning and virtual classrooms
C. Making teaching harder
D. Reducing school fees
Answer: B
20. What role does a system analyst play in system development?
A. Codes the entire system
B. Translates business needs into technical solutions
C. Fixes hardware
D. Designs websites only
Answer: B
21. Computers help in economic growth by:
A. Increasing unemployment
B. Supporting digital financial services
C. Wasting resources
D. Slowing production
Answer: B
22. One benefit of computer usage in businesses is:
A. Low data accuracy
B. Manual stocktaking
C. Automation of repetitive tasks
D. Lack of coordination
Answer: C
23. Which of the following best describes a System Builder’s job?
A. Debugging washing machines
B. Designing user interfaces
C. Writing and testing programs
D. Filing documents
Answer: C
24. Which is NOT a role of computers in business?
A. Payroll processing
B. Inventory control
C. Employee scheduling
D. Cutting grass
Answer: D
25. A skill that helps a System Analyst gather user requirements is:
A. Cooking
B. Interviewing and listening
C. Dancing
D. Singing
Answer: B
26. Computers support online business transactions through:
A. Trading physical cash
B. E-commerce platforms
C. Manual ledgers
D. Human agents only
Answer: B
27. Which role do computers play in banks?
A. Cleaning vaults
B. Tracking and managing accounts
C. Driving customers
D. Making announcements
Answer: B
28. A system analyst must be able to:
A. Create system documentation
B. Clean keyboards
C. Buy servers
D. Repair networks
Answer: A
29. Computers help government agencies by:
A. Reducing citizen records
B. Increasing paper use
C. Managing databases and automating services
D. Blocking emails
Answer: C
30. An end-user is someone who:
A. Builds the computer
B. Designs the software
C. Uses the final system
D. Writes the operating system
Answer: C
31. Computers assist in modern communication through:
A. Paper-based memos
B. Digital messaging and email
C. Manual signals
D. Notice boards only
Answer: B
32. A system designer must consider:
A. User needs and system performance
B. Latest movies
C. Road safety rules
D. Hardware painting
Answer: A
33. A builder who writes and tests code is often called a:
A. Driver
B. Programmer
C. Messenger
D. Waiter
Answer: B
34. Which human resource defines the software and hardware to be used?
A. System Builder
B. System Designer
C. Typist
D. End-user
Answer: B
35. A major role of computers in the economy includes:
A. Promoting digital payment systems
B. Increasing manual labor
C. Decreasing access to information
D. Spreading viruses
Answer: A
36. What makes a System Analyst effective?
A. Ability to play games
B. Understanding user needs and technology
C. Good cooking skills
D. Knowing celebrities
Answer: B
37. Computers are used in modern society for:
A. Making clothes
B. Social networking, data processing, and research
C. Acting in movies
D. Planting trees
Answer: B
38. One key feature of a good analyst is:
A. Physical strength
B. Strong documentation and design skills
C. Ability to run
D. Musical talent
Answer: B
39. System Builders work closely with:
A. System Designers and Analysts
B. Drivers and Cleaners
C. Gardeners
D. Librarians only
Answer: A
40. The use of computers in economic development includes:
A. Encouraging digital innovation and startups
B. Preventing online learning
C. Reducing internet access
D. Making business slower
Answer: A
1. What is an Information System?

A. A type of operating system


B. A set of components for collecting, storing, and processing data
C. A social media app
D. A computer virus
Answer: B
2. Which of the following is a role of information systems in a business enterprise?

A. Increasing manual workload


B. Automating business processes
C. Replacing human workers only
D. Sending promotional text messages
Answer: B
3. A major trend in information systems is:

A. Use of typewriters
B. Cloud computing
C. Manual filing
D. Handwritten records
Answer: B
4. One common type of information system is:

A. Transaction Processing System (TPS)


B. Analog System
C. Mechanical Calculator
D. Security Light System
Answer: A
5. What is the key function of an information system department?

A. Manage system software only


B. Maintain, secure, and support business systems
C. Wash company vehicles
D. Train dancers
Answer: B
6. Data processing refers to:

A. Destroying documents
B. Converting raw data into useful information
C. Writing with ink
D. Making phone calls
Answer: B
7. Batch processing is best suited for:

A. Real-time sales
B. Payroll processing
C. Sending emails
D. Scanning documents
Answer: B
8. One method of data processing is:

A. Filing data in boxes


B. Manual data entry
C. Real-time processing
D. Writing on chalkboards
Answer: C
9. Which type of system helps managers make decisions?

A. Transaction Processing System


B. Decision Support System (DSS)
C. Operating System
D. Billing Software
Answer: B
10. Which trend is shaping the future of information systems?

A. Typewriting
B. Artificial Intelligence
C. Using abacuses
D. Fax machines
Answer: B
11. A business derives value from information systems by:

A. Increasing paper usage


B. Enhancing productivity and efficiency
C. Reducing automation
D. Eliminating computers
Answer: B
12. Which system is primarily used at the operational level of an organization?

A. Executive Support System


B. Transaction Processing System
C. Strategic Information System
D. Networking System
Answer: B
13. Real-time data processing is used when:

A. Delays are acceptable


B. Immediate response is required
C. Data can be ignored
D. Emails are involved
Answer: B
14. In information systems, “data” is:

A. Processed facts
B. Raw facts and figures
C. Printed documents
D. Paperwork
Answer: B
15. One perspective of information systems sees it as:

A. A recreational tool
B. A technical and social system
C. A kitchen appliance
D. An advertisement platform
Answer: B
16. What is a key component of every information system?

A. Refrigerator
B. People
C. Lightbulbs
D. Chairs
Answer: B
17. One function of the IS department is to:

A. Clean office desks


B. Develop and support applications
C. Operate cameras
D. Write exams
Answer: B
18. Which type of information system is used for long-term decision-making?

A. Executive Support System


B. Transaction System
C. Email System
D. Spreadsheet System
Answer: A
19. Online banking uses which type of data processing?

A. Batch
B. Manual
C. Real-time
D. Offsite
Answer: C
20. What is one business trend supported by information systems?

A. Industrial backwardness
B. E-commerce
C. Paper documentation
D. File cabinets
Answer: B
21. A good information system helps to:

A. Increase delays
B. Improve decision-making
C. Reduce data accuracy
D. Waste storage
Answer: B
22. Which of the following is NOT a type of information system?

A. Management Information System


B. Washing Machine
C. Decision Support System
D. Executive Support System
Answer: B
23. Distributed processing involves:

A. Centralized computation only


B. Using multiple computers to share processing tasks
C. Offline calculators
D. One single terminal
Answer: B
24. A function of information systems in business is to:

A. Record, analyze, and report data


B. Paint walls
C. Design clothes
D. Store irrelevant info
Answer: A
25. One trend that is changing how businesses use information systems is:

A. Digital transformation
B. Manual register use
C. Typewriter revival
D. Paper filing systems
Answer: A
26. The goal of data processing is to:

A. Enter incorrect information


B. Create useful information from raw data
C. Delete storage
D. Slow operations
Answer: B
27. One method of data processing that runs continuously is:

A. Manual processing
B. Real-time processing
C. Paper-based entry
D. Handwriting
Answer: B
28. Which system allows top-level managers to analyze long-term trends?

A. Transaction Processing System


B. Executive Support System
C. Customer Support System
D. Server System
Answer: B
29. The technical perspective of an information system focuses on:

A. Legal policies
B. Hardware, software, and networks
C. Employee behavior
D. Marketing
Answer: B
30. In business, the value of IS includes:

A. Lower data quality


B. Better decision-making and customer service
C. Increased expenses
D. Disorganization
Answer: B
31. Which type of data processing involves grouping data and processing later?

A. Online
B. Real-time
C. Batch processing
D. Serial processing
Answer: C
32. The social perspective of information systems focuses on:

A. System wires
B. Organizational and human behavior
C. Application software only
D. Graphics
Answer: B
33. A type of system that supports middle management is:

A. Management Information System (MIS)


B. Executive Support System
C. Operating System
D. Audit System
Answer: A
34. Which of the following processes involves analyzing collected data to produce useful output?

A. Hardware installation
B. Data processing
C. Office arrangement
D. Manual record-keeping
Answer: B
35. Information systems contribute to business strategy by:

A. Providing outdated reports


B. Supporting competitive advantage
C. Delaying processes
D. Increasing errors
Answer: B
36. What method of data processing is most efficient for live monitoring?

A. Batch
B. Manual
C. Real-time
D. Analog
Answer: C
37. Which of these is a function of the IS department?

A. Window cleaning
B. Software and hardware support
C. Mail delivery
D. Teaching yoga
Answer: B
38. What does data become after processing?

A. A letter
B. Raw facts
C. Information
D. Code
Answer: C
39. One of the major business values of IS is:

A. Lower productivity
B. Better efficiency and accuracy
C. Higher operating costs
D. Increased paperwork
Answer: B
40. The system used for processing customer transactions is:

A. Transaction Processing System (TPS)


B. Drawing App
C. Human Resource System
D. Design Framework
Answer: A
1. What is a computer network?

A. A group of disconnected computers


B. A collection of computers linked to share resources
C. A set of wires
D. A room full of computers
Answer: B
2. Which of the following is a type of computer network?

A. Powerline
B. LAN
C. Router
D. USB
Answer: B
3. What does LAN stand for?

A. Local Area Network


B. Long Access Node
C. Limited Active Network
D. Linked Antenna Network
Answer: A
4. What does WAN stand for?

A. Web Access Node


B. Wide Area Network
C. Wireless Application Network
D. Wired Access Node
Answer: B
5. Which network spans a large geographic area?

A. LAN
B. PAN
C. WAN
D. MAN
Answer: C
6. Data transmission is the process of:

A. Printing documents
B. Sending data from one device to another
C. Cleaning files
D. Coding websites
Answer: B
7. The smallest type of network is:

A. WAN
B. LAN
C. PAN
D. MAN
Answer: C
8. What is MAN in networking?

A. Mechanical Area Network


B. Metropolitan Area Network
C. Managed Access Network
D. Manual Access Node
Answer: B
9. Multiplexing in data transmission means:

A. Sending a single signal


B. Combining multiple signals into one
C. Breaking signals into bits
D. Repeating data
Answer: B
10. What does OSI stand for in networking?

A. Open Signal Interface


B. Open System Interconnection
C. Operating System Integration
D. Output Signal Interface
Answer: B
11. How many layers are in the OSI model?

A. 5
B. 6
C. 7
D. 8
Answer: C
12. Which layer of the OSI model is responsible for end-to-end communication?

A. Data Link Layer


B. Transport Layer
C. Application Layer
D. Network Layer
Answer: B
13. The Application Layer is the ___ layer of the OSI model.

A. 5th
B. 6th
C. 7th
D. 4th
Answer: C
14. The Data Link Layer is responsible for:

A. Routing
B. Email transfer
C. Error detection and correction
D. Encryption
Answer: C
15. Which OSI layer handles data encryption and compression?

A. Presentation Layer
B. Session Layer
C. Transport Layer
D. Application Layer
Answer: A
16. In a network, the device that routes data between different networks is:

A. Switch
B. Repeater
C. Router
D. Hub
Answer: C
17. What is an intranet?

A. A private network within an organization


B. A global network
C. A home-based network
D. A university Wi-Fi
Answer: A
18. What is an extranet?

A. A type of WAN
B. A secure network that allows outside access to internal data
C. A wireless LAN
D. A public browsing site
Answer: B
19. What is the Internet?

A. A personal network
B. A global interconnection of networks
C. A local area only
D. A hardware device
Answer: B
20. Which layer of the OSI model determines the route data takes?

A. Session Layer
B. Network Layer
C. Transport Layer
D. Physical Layer
Answer: B
21. What is the main role of the Physical Layer in OSI?

A. File sharing
B. Data compression
C. Transmission of raw bit stream over physical medium
D. Virus scanning
Answer: C
22. The Session Layer in the OSI model is responsible for:

A. File naming
B. Starting, maintaining, and ending communication sessions
C. Data formatting
D. Hardware compatibility
Answer: B
23. An example of a protocol used in the Application Layer is:

A. IP
B. HTTP
C. TCP
D. UDP
Answer: B
24. Which network is ideal for a small office?

A. WAN
B. MAN
C. LAN
D. PAN
Answer: C
25. One function of data transmission protocols is:

A. Making calls
B. Controlling how data is sent and received
C. Blocking content
D. Designing layouts
Answer: B
26. Which layer ensures data segments arrive in order and without errors?

A. Presentation Layer
B. Network Layer
C. Transport Layer
D. Data Link Layer
Answer: C
27. An advantage of multiplexing is:

A. Signal confusion
B. Efficient use of bandwidth
C. High cost
D. Limited speed
Answer: B
28. The term “protocol” in networking refers to:

A. Computer hardware
B. Set of rules for data communication
C. Internet company
D. Device connection
Answer: B
29. Which layer converts data into signals suitable for transmission?

A. Transport
B. Network
C. Physical
D. Session
Answer: C
30. A network that connects computers in a city is called:

A. LAN
B. MAN
C. WAN
D. PAN
Answer: B
1. Which of the following is not a type of computer network?

A. LAN
B. WAN
C. MAN
D. FAN
Answer: D
2. Which device helps in connecting different networks?

A. Monitor
B. Switch
C. Router
D. Keyboard
Answer: C
3. Which network type is typically used in homes?

A. WAN
B. LAN
C. PAN
D. MAN
Answer: C
4. The process of sending data to multiple destinations at once is called:

A. Unicasting
B. Broadcasting
C. Downloading
D. Transmitting
Answer: B
5. Which OSI layer is responsible for reliable message delivery?

A. Data Link Layer


B. Network Layer
C. Transport Layer
D. Presentation Layer
Answer: C
6. TCP stands for:

A. Transfer Control Protocol


B. Transmission Control Protocol
C. Total Control Protocol
D. Terminal Connection Protocol
Answer: B
7. Which type of network uses telephone lines to connect?

A. Satellite
B. Wireless
C. Dial-up
D. Bluetooth
Answer: C
8. One benefit of networking is:

A. Expensive hardware
B. Data duplication
C. Resource sharing
D. Virus spreading
Answer: C
9. The internet is an example of a:

A. LAN
B. MAN
C. WAN
D. PAN
Answer: C
10. The main purpose of OSI is to:

A. Create hardware
B. Define how software should be written
C. Standardize network communication
D. Control the power supply
Answer: C
11. Which of the following is a transmission medium?

A. RAM
B. Optical Fiber
C. CPU
D. SSD
Answer: B
12. Which layer of the OSI model handles file transfer and email?

A. Transport
B. Network
C. Application
D. Session
Answer: C
13. In networking, data is transferred in the form of:

A. Charts
B. Packets
C. Slides
D. Videos
Answer: B
14. The Session Layer in OSI:

A. Translates data
B. Manages communication sessions
C. Sends messages
D. Controls voltage
Answer: B
15. Which of the following is an advantage of computer networks?

A. Slower access
B. High cost
C. Centralized data access
D. Increased paper usage
Answer: C
16. Intranet is used for:

A. Global communication
B. Personal browsing
C. Private organizational communication
D. Shopping
Answer: C
17. What is used to prevent unauthorized access in a network?

A. Repeater
B. Firewall
C. Cable
D. Switch
Answer: B
18. A device that connects two similar networks is called a:

A. Modem
B. Gateway
C. Router
D. Bridge
Answer: D
19. What protocol is used for sending emails?

A. HTTP
B. FTP
C. SMTP
D. IP
Answer: C
20. A protocol is:

A. A software bug
B. A signal
C. A set of rules
D. A physical layer
Answer: C
21. HTTP stands for:

A. High Transfer Text Protocol


B. HyperText Transfer Protocol
C. Host Transfer Technical Protocol
D. Hyper Tool Text Protocol
Answer: B
22. What is bandwidth?

A. Speed of mouse
B. Signal strength
C. Data transfer rate
D. Type of file
Answer: C
23. In a client-server model, the client:

A. Provides resources
B. Manages traffic
C. Requests services
D. Builds websites
Answer: C
24. VPN stands for:

A. Virtual Personal Network


B. Visual Private Network
C. Virtual Private Network
D. Variable Protocol Network
Answer: C
25. The most secure network is usually:

A. Internet
B. Intranet
C. Extranet
D. WAN
Answer: B
26. The Presentation Layer handles:

A. Syntax and encryption


B. Session communication
C. Physical cabling
D. Error detection
Answer: A
27. What is a modem used for?

A. Enhancing screen quality


B. Modulating and demodulating signals
C. Storing programs
D. Blocking viruses
Answer: B
28. Which of the following is a wireless communication method?

A. Coaxial cable
B. Fiber optics
C. Bluetooth
D. Twisted pair
Answer: C
29. One function of the Network Layer is:

A. Virus detection
B. File management
C. Path determination and packet forwarding
D. Sound output
Answer: C
30. Which OSI layer compresses and encrypts data?

A. Application
B. Network
C. Presentation
D. Physical
Answer: C
1. Which of the following is considered an online resource?

A. Textbook
B. Library card
C. Wikipedia
D. Whiteboard
Answer: C
2. Online resources are useful because they:

A. Require no electricity
B. Provide fast and updated information
C. Replace school entirely
D. Are offline
Answer: B
3. A web browser is used to:

A. Edit photos
B. Play music
C. Access web pages
D. Design presentations
Answer: C
4. Which of these is a web browser?

A. Google
B. Mozilla Firefox
C. Bing
D. Wikipedia
Answer: B
5. An example of a search engine is:

A. Chrome
B. Internet Explorer
C. Bing
D. Opera
Answer: C
6. Which browser is owned by Microsoft?

A. Safari
B. Edge
C. Chrome
D. Firefox
Answer: B
7. Chrome browser is developed by:

A. Apple
B. Google
C. Microsoft
D. Opera Software
Answer: B
8. Which of these is not a web browser?

A. Firefox
B. DuckDuckGo
C. Safari
D. Opera
Answer: B
9. Which of the following search engines focuses on user privacy?

A. Yahoo
B. Bing
C. Google
D. DuckDuckGo
Answer: D
10. The main function of a search engine is to:

A. Store images
B. Display animations
C. Retrieve information from the web
D. Block websites
Answer: C
11. Which search engine is most widely used globally?

A. Bing
B. Yahoo
C. Ask
D. Google
Answer: D
12. Safari browser is used mainly on:

A. Windows devices
B. Linux systems
C. Apple devices
D. Android phones
Answer: C
13. Which browser was one of the earliest to be used widely?

A. Internet Explorer
B. Safari
C. Chrome
D. Brave
Answer: A
14. Online resources improve learning by providing:

A. Games only
B. Expired knowledge
C. Instant access to a wide range of materials
D. Physical textbooks
Answer: C
15. Which of these is a type of search engine?

A. Yahoo
B. Internet Explorer
C. Linux
D. Spotify
Answer: A
16. The difference between a browser and a search engine is:

A. None
B. A browser finds websites, a search engine opens them
C. A browser accesses websites, a search engine helps you search for them
D. A browser plays videos
Answer: C
17. A major benefit of using search engines in academics is:

A. They reduce test scores


B. They distract students
C. They provide access to up-to-date information
D. They replace teaching
Answer: C
18. Examples of online educational resources include:

A. Netflix and YouTube


B. Khan Academy and Coursera
C. WhatsApp and Twitter
D. Calculator and scanner
Answer: B
19. The browser address bar is used to:

A. Type and open website URLs


B. Open documents
C. Search PC files
D. Play music
Answer: A
20. Online encyclopedias are useful because:

A. They are printed


B. They are fixed and unchangeable
C. They are frequently updated
D. They use paper
Answer: C
21. Which of the following can be used as both a search engine and a web portal?

A. Google
B. YouTube
C. Facebook
D. Yahoo
Answer: D
22. A feature common in modern browsers is:

A. Tabbed browsing
B. Disk formatting
C. Photo editing
D. Video production
Answer: A
23. Which of these is not a valid browser?

A. Vivaldi
B. Brave
C. Spotify
D. Opera
Answer: C
24. A search engine index is:

A. A database of internet content


B. A virus
C. An internet provider
D. A webpage
Answer: A
25. Which of the following is not an importance of online resources?

A. Quick information access


B. Outdated data
C. Interactive learning
D. Remote accessibility
Answer: B
26. An online tool for file storage and sharing is:

A. WordPad
B. Excel
C. Google Drive
D. Paint
Answer: C
27. One key advantage of using browsers is:

A. Installing games
B. Writing notes
C. Accessing internet resources
D. Drawing graphics
Answer: C
28. Which of the following search engines existed before Google?

A. Ask Jeeves
B. Bing
C. DuckDuckGo
D. Yahoo
Answer: D
29. Browsers help users:

A. Buy computers
B. Connect to other networks
C. View web content
D. Format hard disks
Answer: C
30. Online resources are commonly accessed through:

A. Telephones
B. Paper
C. Computers and mobile devices
D. Whiteboards
Answer: C
1. Which of the following is used to create documents like letters and reports?

A. MS Excel
B. MS Word
C. MS PowerPoint
D. Google Chrome
Answer: B
2. Which software is best suited for creating slideshows?

A. MS Word
B. MS Excel
C. MS PowerPoint
D. Notepad
Answer: C
3. What is the default file extension of MS Word 2016 documents?

A. .pptx
B. .xlsx
C. .docx
D. .txt
Answer: C
4. Which of the following software is best for performing calculations and creating charts?

A. MS Word
B. MS PowerPoint
C. MS Excel
D. Paint
Answer: C
5. Which key combination is used to copy selected text in Word?

A. Ctrl + C
B. Ctrl + V
C. Ctrl + Z
D. Ctrl + X
Answer: A
6. In spreadsheets, what is the intersection of a row and column called?

A. Cell
B. Field
C. Box
D. Page
Answer: A
7. Which of the following is an example of spreadsheet software?

A. PowerPoint
B. Word
C. Excel
D. Access
Answer: C
8. Which function in Excel is used to calculate the sum of values?

A. ADD()
B. SUM()
C. TOTAL()
D. PLUS()
Answer: B
9. What type of chart is commonly used to show trends over time?

A. Pie chart
B. Line chart
C. Column chart
D. Bar chart
Answer: B
10. Which of the following is used to present visual content during a seminar?

A. Excel
B. Word
C. PowerPoint
D. Access
Answer: C
11. What does WYSIWYG stand for in word processing?

A. What You Say Is What You Get


B. What You See Is What You Get
C. What You Save Is What You Get
D. What You Send Is What You Get
Answer: B
12. What is the extension for a PowerPoint presentation file?

A. .doc
B. .xlsx
C. .pptx
D. .txt
Answer: C
13. What is the purpose of "Ctrl + P" in most applications?

A. Paste
B. Print
C. Pause
D. Paint
Answer: B
14. A browser allows a user to:

A. Save documents
B. Create spreadsheets
C. Access websites
D. Make charts
Answer: C
15. Which of these is not a spreadsheet function?

A. SUM
B. IF
C. FORMAT
D. VLOOKUP
Answer: C
16. MS Excel organizes data in:

A. Books and pages


B. Rows and columns
C. Paragraphs
D. Bullets
Answer: B
17. Which feature in Word allows you to check spelling?

A. Word Count
B. Thesaurus
C. Spell Checker
D. Grammar Box
Answer: C
18. Online resources like e-books and journals are important because:

A. They are printed


B. They are hard to access
C. They support academic research
D. They are not reliable
Answer: C
19. Which of these browsers is known for speed and integration with Google services?

A. Firefox
B. Edge
C. Safari
D. Chrome
Answer: D
20. The formula in Excel always starts with:

A. !
B. #
C. =
D. *
Answer: C
21. A presentation is typically made of:

A. Slides
B. Pages
C. Fields
D. Sheets
Answer: A
22. Which tool in PowerPoint helps apply consistent formatting across slides?

A. Slide Sorter
B. Slide Master
C. Transition
D. Layout
Answer: B
23. In Word, text alignment options include:

A. Top and Bottom


B. Center, Justify, Right, Left
C. Up, Down, Side
D. Grid, Page, Column
Answer: B
24. Which tab in Excel helps in inserting charts?

A. View
B. Insert
C. Data
D. File
Answer: B
25. Ctrl + Z is used to:

A. Redo
B. Undo
C. Zoom
D. Save
Answer: B
26. Which of these websites is best known as an online resource for learning?

A. WhatsApp
B. Netflix
C. Coursera
D. Instagram
Answer: C
27. You can save a Word document by pressing:

A. Ctrl + X
B. Ctrl + P
C. Ctrl + S
D. Ctrl + D
Answer: C
28. What is the function of transitions in PowerPoint?

A. Change text
B. Switch slides smoothly
C. Insert formulas
D. Create tables
Answer: B
29. Which of the following tools is used for editing cells in Excel?

A. Formula Bar
B. Slide Bar
C. Drawing Tool
D. Page Layout
Answer: A
30. Online resources are mainly accessed via:

A. Internet
B. Calculator
C. Flash drive
D. Printer
Answer: A

You might also like