Q51. What is the process of copying software programs from secondary storage media to the hard disk called ?

a) configuration
b) download
c) storage
d) upload
e) installation

Answer : e

Q52. Which process cheeks to ensure the components of the computer are operating and connected properly ?

a) Booting
b) Saving
c) Editing
d) Processing
e) Strarting

Answer : a

Q53. An error in a computer program

a) Crash
b) Power failure
c) bug
d) Virus
e) Fatal error

Answer : c

Q54. The software that allows users to surf the Internet is called a/an .

a) Search engine
b) Internet service provider (ISP)
c) Multimedia application
d) Browser
e) Internet Surfing provider

Answer : d

Q55. The issues that deal with the collection and use of data about individuals is

a) access
b) publicity
c) accuracy
d) property
e) privacy

Answer : e

Q56. Unauthorized copying of software to be used for personal gain instead of for personal backups is called

a) program thievery
b) data snatching
c) software piracy
d) program looting
e) data looting

Answer : c

Q57. What is an embedded system ?

a)    A program that comes wrapped in a box
b)    A program that is permanently part of a computer
c) A computer that is part of a larger computer
d)   A computer and software system that controls a machine or appliance
e) None of these

Answer : d

Q58. The __________ controls a client computer’s resources .

a) application program
b) instruction set
c) operating system
d) server application
e) compiler

Answer : c

Q59. Every computer has a(n) _____many also have ______.

a)operating system a client system
b) operating system instruction sets
c)application programs an operating system
d)application  programs ; a client system
e)operating system, application programs

Answer : e

Q60. Who invented Linux?

a) J.presper Eckert and John W. Mauchly
b) Dennis M. Ritchine
c) Seymour Papert
d) Torvalds
e) None of these

Answer : a