Global MCQ Practice

🌐 Total MCQ
🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books

Computer Fundamentals Quiz 28 (25 MCQs)

Quiz Instructions:

Select an option to see the correct answer instantly.

1. When considering backup media, which of the following holds the MOST data?
2. Places illegal destructive instructions in the middle of a legitimate program such as a computer game.
3. Your family is driving from Cabanatuan to Bicol. It is your first time to go there. What site should you go to to know the directions you needed to navigate your way?
4. Where can you find on campus job opportunities?
5. Which is an example of nonvolatile memory?
6. The primary hard disk drive in windows is called disk
7. Computer programsA set of electronic instructions, also called _____ programs, that tells a computer what to do.
8. A trojan would typically _____
9. Which type of processor handles more RAM?
10. You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you. Which one of the following terms describes this activity?
11. This sits on top of the CPU and contains a fan to keep the CPU cool. What part is this?
12. The find command is located under which group?
13. What are the input devices?
14. Resolving errors in a program is known as _____
15. Which of the following memory are Volatile?
16. Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
17. In Microsoft Excel what is the rectangle box called?
18. A machine used by computers to print out documents on paper in order to have a physical copy of text documents, diagrams or photos.
19. Match the statement with the term below:A combination of text with sound, video, animation, and graphics.
20. How does the computer produces the data?"
21. Main circuit board of a microcomputer where Computer components are attached.
22. While reading a novel, you realize that the author has copied material from another author. What type of violation is this?
23. Scans files for different kinds of malware (viruses, Trojans, keyloggers, spyware etc.) and eliminate it.Runs in the background.
24. These are computer related morals, principals, and values.
25. The best font to choose when typing a formal business document is _____
🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books