1) When the computer is working on given instructions, it is called a) Output b) Storage c) Processing d) Input 2) Which of the following types of computers would process information at the fastest rate? a) Embedded b) Super computer c) Mainfraimes d) Mobile Devices 3) Which of the following is a disadvantage of cloud storage? a) Accessibility (offline/without internet) b) Reduction of storage cost to organization c) Increased possibility for disaster recovery d) Efficient management of stored data 4) Which of the following storage media uses laser technology to store data? a) Flash Drive b) Magnetic tape c) C-ROM d) Hard disk 5) Which of the following is an example of an embedded computer system? a) Desktop b) IBM z system c) Smart TV d) Laptop 6) Which of the following input devices is used to read pencil or pen marks on a multiple choice answer sheet? a) OCR b) OMR c) POS d) MICR 7) The MOST suitable device for the output of architectural drawings is a a) plotter b) laser printer c) graphics tablet d) light pen 8) Which of the following output is an example of a hard copy? a) A bill produced from a printer b) An oral speech delivered by a speaker c) The display on a monitor d) A picture on a wall produced from a multimedia projector 9) Which of the following tasks would MOST likely require an advance graphics card? a) Program development b) Web browsing c) SBA development d) Video editing 10) In modern computers, the CPU speed is measured in  a) kilohertz b) gigabytes c) kilobytes d) gigahertz 11) Quality Developers is a company that writes programs to do specific jobs for other companies. These programs are called a) general-purpose software b) special-purpose software c) custom-purpose software d) off-the-shelf software 12) Desreen has a desktop computer system. She turns on the system and waits five minutes but no image is displayed. During troubleshooting, which of the following is MOST likely to be identified as the problem? a) Keyboard is disconnected b) The power cable to the monitor is loose c) The battery power connected to the system is loose d) Touchscreen is disabled 13) Which of the following is the name of the interface used by blind persons to perform operations on a computer? a) Icon b) Sensor c) Braille d) Touchscreen 14) John is required to email a copy of his SBA to his teacher. This emailed copy is referred to as a) soft copy b) hard copy c) tangible copy d) machine readable copy 15) Vera is taking an online class and is required to enter her password twice. This process is called the a) storing process b) validation process c) verification process d) authenticity process 16) Which of the following would be the BEST option to expand your laptop’s storage capacity? a) DVD b) CD-ROM c) Memory card d) Magnetic tape 17) James Café keeps payroll information stored in files on a cloud account. Which of the following BEST describes how these files can be accessed? a) Serial b) Random c) Sequential d) Indexed sequential 18) Which of the following statements BEST describes the term 'information'? a) It is raw facts. b) It is meaningful. c) It does not have any value. d) It is not the result of processing. 19) Which of the following technologies is MOST suitable for transferring data between two mobile phones? a) Bluetooth b) Fibre optics c) Microwave d) Twisted pair 20) Uploading or downloading data to or from a remote computer is done using a) blogging b) instant messaging c) internet relay chat d) file transfer protocol 21) Each website on the Internet can be accessed by entering a unique address. This address is referred to as the a) HTTP b) HTML c) FTP d) URL 22) Which of the following network components is BEST suited for connecting LANS in a metropolitan area network? a) Hub b) Switch c) Router d) Modem 23) Teachers are able to mark class registers online and provide instant feedback on assessment through the use of a) social media tools b) m-learning devices c) simulation software d) computer assisted learning 24) Which of the following BEST defines 'cyberbullying'? a) Connecting to a network b) Using an electronic device to harass someone c) Using electronic devices to connect to WiFi d) Using mobile devices to send a message to someone 25) You received an email from someone who claims to be a representative from your school. The email asked you to click on a link to reset your password. You should proceed with caution because the email may be a a) spam threat b) malware attack c) phishing attack d) legitimate request 26) Using electronic devices to view a chat conversation between two friends, in real time, without their knowledge is a) propaganda b) a violation of privacy c) a denial of service attack d) an electronic eavesdropping 27) The use of “*********” to hide a password being entered into a computer system is termed a) antivirus b) phishing c) biometrics d) encryption 28) In an effort to secure data on a system, users are required to set a password in a specific format. Which of the following types of measures is this an example of? a) Physical b) Software c) Hardware d) Personal 29) Which of the following is a job task of a social media specialist? a) Maintaining a website b) Developing software for social use c) Installing or upgrading social media software on a computer system d) Generating and sharing content daily over a social media network 30) Which of the following actions is NOT considered a computer crime? a) Piracy b) Hacking c) Encryption d) Industrial espionage 31) Including material obtained from online sources in an assignment and then submitting the assignment without giving credit to the online sources is referred to as a) plagiarism b) e-learning c) fraternization d) collaboration 32) Telecommuting can BEST be described as a) communicating between two companies b) working from home by connecting home and office c) working from home by having employees at home d) communicating between home and office 33) In word processing, an efficient way to move the third paragraph in order to place it after the fifth paragraph is a) cut and paste b) copy and paste c) copy, cut and paste d) cut, copy and paste 34) The two files used to produce merged letters during a mail merge are the a) primary document and data source b) primary document and merged letters c) data source and merged letters d) primary document and current letter 35) Which of the following should be considered when creating a website? a) Cost of each webpage b) Position of the homepage in the website c) Compiler needed to develop the website d) Intended audience for the website 36) Which of the following should be done before publishing a website? a) Compile the source code. b) Create the algorithm for the website. c) Ensure that all hyperlinks are working correctly. d) Purchase the software needed to develop the website. 37) What is the name of the highlighted word or picture in a webpage that a user can click on to go to another webpage? a) Hypertext b) Bookmark c) Hyperlink d) Connection 38) Text entered into a spreadsheet is aligned towards the left by default. These entries are called a) labels b) values c) formulae d) functions 39) Which of the following formatting features is unique to numbers in spreadsheets? a) Bold b) Italics c) Custom d) Indent 40) To centre the title rows of a spreadsheet across the columns a) centre align the title rows b) centre align the title columns c) merge and centre the title rows d) merge and centre the title columns 41) Which of the following is an example of a spreadsheet function? a) function sum(A1, A2, A3) b) sum = A1 + A2 + A3 c) = sum(A1:A3) d) = A1 + A2 + A3 42) Which type of application is BEST suited to prepare a budget? a) Database b) Spreadsheet c) Word processor d) Desktop publishing 43) Which of the following statements is NOT true of primary keys? a) They are unique identifiers. b) They are always in text form. c) They do not contain blank values. d) They may be composed of one or more attributes. 44) A field in a table that appears as a match of the primary key in another table iscalled a a) foreign key b) candidate key c) secondary key d) composite key 45) Which database feature can be used to list the names of the male students from a particular class? a) Table b) Form c) Query d) Report 46) What is the MOST appropriate database data type for a field holding the marks from a class test? a) Text b) Numeric c) Currency d) Date/Time 47) What is the name given to a collection of related fields in a database? a) Table b) Field c) Record d) Column 48) The following variables s, t and u, have been assigned the values shown. s = 5, t = 6, u = 3. Which of the following statements does NOT evaluate to true? a) u > 7 and t < = 7 b) s < t or u < = s − 2 c) t <> 4 or s = 5 d) u – 2 >= 1 49) Based on the following algorithm, what would be displayed for k? j = 5, k = j, j = j + k, k = j + 3, display k a) 10 b) 11 c) 13 d) 14 50) Which of the following algorithms does NOT display four consecutive numbers? a) for v = 2 to 5; display v b) h = 1; while h < 5; display h; h = h + 1; end while; c) for k = 7 down to 4 step −1; display k d) f = 6; while f < 3; display f; f = f – 1; 51) The term used to describe a memory location whose value changes during program execution is a) variable b) volatile c) constant d) dynamic 52) Program implementation involves a number of steps. Which of the following steps is NOT legitimate? a) Linking b) Bonding c) Executing d) Compiling 53) Which of the following languages is only understood by computers? a) 4 GLs b) Machine language c) Natural language d) Procedural language 54) Errors that occur in a program when the rules of the programming languages are NOT obeyed are called a) syntax errors b) logical errors c) run-time errors d) execution errors 55) Which of the following is an example of a conditional construct? a) For – Next b) For – endfor c) If – then– else d) While – endwhile

ลีดเดอร์บอร์ด

สไตล์ภาพ

ตัวเลือก

สลับแม่แบบ

คืนค่าการบันทึกอัตโนมัติ: ใช่ไหม