Cathode Ray Tube is a form of__________?

A. Keyboard
B. Mouse
C. Monitor
D. Mother board
Correct answer is: C. Monitor

____________is the measurement of things such as fingerprints and retinal scans used for security access?

A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
Correct answer is: A. Biometrics

The common name for the crime of stealing passwords is____________?

A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.
Correct answer is: C. Spoofing.

A computer system that is old and perhaps not satisfactory is referred to as          ?

A. Ancient system
B. Historical system
C. Age old system
D. Legacy system
Correct answer is: D. Legacy system

The most common type of storage devices are                    ?

A. magnetic
B. Flash
C. optical
D. Both A & B
Correct answer is: D. Both A & B

When creating a computer program, the                           designs the structure of the program?

A. End user
B. System Analyst
C. Programmer
D. All of the above
Correct answer is: B. System Analyst

                        Store data or information temporarily and pass it on as directed by the control unit?

A. Address
B. Register
C. Number
D. Memory
Correct answer is: B. Register

What is the other name for programmed chip?

A. A. RAM
B. ROM
C. LSIC
D. PROM
Correct answer is: B. ROM

The term                        designates equipment that might be added to a computer system to enhance its functionality.

A. digital device
B. system add- on
C. disk pack
D. peripheral device
Correct answer is: D. peripheral device

1 Byte =                        ?

A. 8 bits
B. 4 bits
C. 2 bits
D. 9 bits
Correct answer is: A. 8 bits

Scroll to Top