Q51. What is the process of copying software programs from secondary storage media to the hard disk called ?
a) configuration
b) download
c) storage
d) upload
e) installation
Answer : e
Q52. Which process cheeks to ensure the components of the computer are operating and connected properly ?
a) Booting
b) Saving
c) Editing
d) Processing
e) Strarting
Answer : a
Q53. An error in a computer program
a) Crash
b) Power failure
c) bug
d) Virus
e) Fatal error
Answer : c
Q54. The software that allows users to surf the Internet is called a/an .
a) Search engine
b) Internet service provider (ISP)
c) Multimedia application
d) Browser
e) Internet Surfing provider
Answer : d
Q55. The issues that deal with the collection and use of data about individuals is
a) access
b) publicity
c) accuracy
d) property
e) privacy
Answer : e
Q56. Unauthorized copying of software to be used for personal gain instead of for personal backups is called
a) program thievery
b) data snatching
c) software piracy
d) program looting
e) data looting
Answer : c
Q57. What is an embedded system ?
a) A program that comes wrapped in a box
b) A program that is permanently part of a computer
c) A computer that is part of a larger computer
d) A computer and software system that controls a machine or appliance
e) None of these
Answer : d
Q58. The __________ controls a client computer’s resources .
a) application program
b) instruction set
c) operating system
d) server application
e) compiler
Answer : c
Q59. Every computer has a(n) _____many also have ______.
a)operating system a client system
b) operating system instruction sets
c)application programs an operating system
d)application programs ; a client system
e)operating system, application programs
Answer : e
Q60. Who invented Linux?
a) J.presper Eckert and John W. Mauchly
b) Dennis M. Ritchine
c) Seymour Papert
d) Torvalds
e) None of these
Answer : a