Question Bank – Topic1 - Introduction
Multiple Choice Question
1. Which of these is NOT one of the five parts of an information system?
a. data
b. procedures
c. people
d. None of the Above
2. A computer is an electronic device that manipulates
a. procedures
b. data
c. operations
d. transactions
3. A computer has the following working model
a. Input-Processing-Output
b. Processing-Input-Output
c. Input-Output-Processing
d. Output-Processing-input
4. We need Information for
a. Supporting Decision Making
b. Planning
c. Monitoring & Controlling
d. All the Above
5. Which of these would be most appropriate for managing and storing
patient records in a large hospital?
a. peer-to-peer network
b. mainframe
c. personal computer
d. supercomputer
6. What that makes computer so powerful?
a. High speed of computation
b. Very large storage capacity
c. Generality & Connectivity
d. All the Above
7. Information Technology (IT) is a merging of two technologies
a. Computing technology and Industrial technology
b. Computing technology and Communications technology
c. Communications technology and Industrial technology
d. None of the Above
8. The rules or guidelines for people to follow when using software,
hardware, and data are
a. Transactions
b. Operations
c. Procedures
d. None of the Above
9. Which of these IS NOT a basic component of computer hardware?
a. CPU
b. Main memory
c. Secondary Storage
d. None of the Above
10. CPU is composed of the two units
a. Arithmetic Logical Unit (ALU) and Control Unit (CU)
b. ROM and RAM
c. Main Memory and Secondary Storage
d. None of the Above
11. The unit of a CPU that performs computation is
a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above
12. The unit of a CPU that decodes and executes instructions is
a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above
13. CPU performs Arithmetic and Logical operations using
a. Decimal Number System
b. Binary Number System
c. Hexadecimal Number System
d. None of the Above
14. A Microprocessor is
a. A CPU on only one electronic chip
b. A CPU on more than one electronic chip
c. A Cache memory
d. None of the Above
15. The main memory of a Computer is composed of
a. Words
b. Registers
c. Bits
d. None of the Above
16. A byte is
a. 8 bits
b. 9 bits
c. 16 bits
d. None of the Above
17. The smallest addressable unit of main memory is
a. Word
b. Bit
c. Byte
d. None of the Above
18. The RAM is used to store
a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above
19. The ROM is used to store
a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above
20. The Secondary Storage is used to store
a. Files, data and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above
21. The system that allows multiple computers to connect together to share
resources is called
a. Computer Network
b. Connected System
c. Shared Computers
d. None of the Above
22. The Internet is
a. A Local Area Network
b. A large Infrastructure of connected networks
c. A Wide Area Network
d. None of the Above
23. The Internet uses the following suite of protocols
a. HTTP
b. SMTP
c. TCP/IP
d. None of the Above
24. The Internet of Things (IoT) technology allows
a. All types of devices to communicate
b. Sharing data and resources
c. only computers to communicate
d. None of the Above
25. The two major types of computer software are
a. System Software and Communications Software
b. System Software and Applications Software
c. Applications Software and Communications Software
d. None of the Above
26. System Software are
a. Programs to manage and control computer resource
b. Programs End-users use
c. Applications Software
d. None of the Above
27. Applications Software are
a. Programs to manage and control computer resource
b. Programs End-users use
c. Communications Software
d. None of the Above
28. The main components of System Software are
a. Development and programming software
b. Applications and Communications programs
c. Operating System and Utilities programs
d. None of the Above
29. Embedded Operating Systems are used by
a. Super Computers
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above
30. Standalone Operating Systems are used by
a. Computer Networks
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above
31. Antivirus Programs are
a. Utilities programs
b. Applications programs
c. Development programs
d. None of the Above
32. Windows and Linux are examples of
a. Utilities programs
b. an Operating System
c. Programming language
d. None of the Above
33. The pathway on a circuit board through which data moves is.
a. router
b. chipset
c. bus
d. motherboard
True/False Question
1. Computer games are a type of application software.
a. True
b. False
2. A mouse is a type of output device.
a. True
b. False
3. The information processing cycle consists of three phases: input, output,
and storage.
a. True
b. False
4. The pathway on a circuit board through which data moves is a Bus.
a. True
b. False
5. Wi-Fi is a synonym for Bluetooth.
a. True
b. False
6. The Internet is based on Ethernet protocol suite.
a. True
b. False
7. A Client/server network contains at least one server.
a. True
b. False
8. A desktop is a personal computer with input and output devices separate
from the system unit.
a. True
b. False
9. A Laptop is touchscreen computer with no separate keyboard and mouse
a. True
b. False
10. A Tablet is a portable PC that folds for transport, containing a built-in
keyboard and built-in display screen.
a. True
b. False
11. A Server is a computer dedicated to serving the network to which it is
connected.
a. True
b. False
12. A mainframe is a large, powerful, cabinet-sized computer designed to
process large amounts of input and output
a. True
b. False
13. A supercomputer is a powerful, room-sized computer for scientific
research
a. True
b. False
14. Embedded Operating Systems are used by Desktop and Laptop Computers
a. True
b. False
15. The router is the pathway on a circuit board through which data moves.
a. True
b. false
Question Bank – Topic2 – Computer Hardware
Multiple Choice Question
1. The large circuit board inside a desktop computer that controls the
operations of all other components is
a. Control unit
b. Motherboard
c. Device driver
d. None of the Above
2. The microprocessor clock organizes and synchronizes all internal
operations, and determines its speed which is measured as
a. Bits per second (Bps)
b. Instructions per second
c. GHz
d. None of the Above
3. A computer has the following working model
a. Input-Processing-Output
b. Processing-Input-Output
c. Input-Output-Processing
d. Output-Processing-input
4. The unit that tells the computer system how to carry out a program’s
instruction is
a. Control Unit
b. Arithmetic Logical Unit
c. System Unit
d. None of the Above
5. Which of these would be most appropriate for managing and storing
patient records in a large hospital?
a. peer-to-peer network
b. mainframe
c. personal computer
d. supercomputer
6. What that makes computer so powerful?
a. High speed of computation
b. Very large storage capacity
c. Generality & Connectivity
d. All the Above
7. Information Technology (IT) is a merging of two technologies
a. Computing technology and Industrial technology
b. Computing technology and Communications technology
c. Communications technology and Industrial technology
d. None of the Above
8. ALU contains the following storage units that store data to be processed.
a. Bytes
b. Registers
c. Words
d. None of the Above
9. Which of these IS NOT a basic component of computer hardware?
a. CPU
b. Main memory
c. Secondary Storage
d. None of the Above
10. CPU is composed of the two units
a. Arithmetic Logical Unit (ALU) and Control Unit (CU)
b. ROM and RAM
c. Main Memory and Secondary Storage
d. None of the Above
11. The unit of a CPU that performs computation is
a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above
12. The unit of a CPU that decodes and executes instructions is
a. Control Unit (CU)
b. Random Access Memory
c. Arithmetic Logical Unit
d. None of the Above
13. CPU performs Arithmetic and Logical operations using
a. Decimal Number System
b. Binary Number System
c. Hexadecimal Number System
d. None of the Above
14. A Microprocessor is
a. A CPU on only one electronic chip
b. A CPU on more than one electronic chip
c. A Cache memory
d. None of the Above
15. The main memory of a Computer is composed of
a. Words
b. Registers
c. Bits
d. None of the Above
16. A byte is
a. 8 bits
b. 9 bits
c. 16 bits
d. None of the Above
17. The smallest addressable unit of main memory is
a. Word
b. Bit
c. Byte
d. None of the Above
18. The RAM is used to store
a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above
19. The ROM is used to store
a. Files and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above
20. The Secondary Storage is used to store
a. Files, data and documents
b. Programs and data currently processed
c. Only programs currently executed
d. None of the Above
21. The RAM is
a. a temporary storage
b. a permanent storage
c. a semi-permanent storage
d. None of the Above
22. The ROM is
a. a temporary storage
b. a permanent storage
c. a semi-permanent storage
d. None of the Above
23. The Hard Drive is
a. a temporary storage
b. a permanent/semi-permanent storage
c. a volatile storage
d. None of the Above
24. The temporary, high-speed holding area between the main memory and CPU is
a. A Random Access Memory (RAM)
b. A Read Only Memory (ROM)
c. A Cache memory
d. None of the Above
25. The memory that contains special instructions used to start up the
computer is
a. A Random Access Memory (RAM)
b. A Read Only Memory (ROM)
c. A Cache memory
d. None of the Above
26. The storage type that holds data and programs even after electric power
to the computer system has been turned off, is
a. Random Access Memory (RAM)
b. Read Only Memory (ROM)
c. Secondary storage
d. None of the Above
27. The storage type that doesn’t have moving parts, is
a. Solid-State-Disk (SSD)
b. Hard Disk (HD)
c. Optical Disk
d. None of the Above
28. The storage type that uses laser technology to store data and programs, is
a. Solid-State-Disk (SSD)
b. Hard Disk (HD)
c. Optical Disk
d. None of the Above
29. A Bus width is measured as a number of
a. Bytes
b. Words
c. Bits
d. None of the Above
30. The widely used communication device, is
a. Router
b. Modem
c. Switch
d. None of the Above
31. The general-purpose port for connecting external devices to a PC, is
a. HDMI
b. Ethernet port
c. Universal Serial Bus (USB)
d. None of the Above
32. The device that converts a document into a form the system unit can process, is
a. Scanner
b. Printer
c. Plotter
d. None of the Above
33. The input device that reads and interprets bar codes such as UPC
(Universal Product Code) symbols, is
a. Quick Response Reade
b. Magnetic Card Reader
c. Bar Code Reader
d. None of the Above
34 The input device that reads and deciphers the information on the
magnetic strip on a credit card or other ID card.
a. Quick Response Reade
b. Magnetic Card Reader
c. Bar Code Reader
d. None of the Above
35. The electronic chip that communicates wirelessly with a device to authenticate
a user, is
a. Radio Frequency Identification chip
b. Electronic Circuit chip
c. Electronic Decoder chip
d. None of the Above
36. The following input device scans something about a human body that is
used to identify that person.
a. Fingerprint reader
b. Voice recognition
c. Facial recognition
d. All the Above
37. The output device that creates 3D shapes with a thin layer of material
repeatedly until created, is
a. 3D Scanner
b. 3D Printer
c. 3D Monitor
d. None of the Above
38. The pathway on a circuit board through which data moves is.
a. router
b. chipset
c. bus
d. motherboard
39. The common wireless technology used to connect to speakers and
headsets, is
a. WiFi
b. Bluetooth
c. Infrared
d. None of the Above
True/False Question
1. The motherboard is large circuit board inside a desktop computer that
controls the operations of all other components.
a. True
b. False
2. The microprocessor clock organizes and synchronizes all internal
operations, and determines its speed which is measured as Bit per second
(Bps)
a. True
b. False
3. A computer has the working model: Processing-Input-Output
a. True
b. False
4. The Control Unit tells the computer system how to carry out a program’s
instruction.
a. True
b. False
5. A Personal Computer would be most appropriate for managing and
storing patient records in a large hospital.
a. True
b. False
6. Information Technology (IT) is a merging of Computing technology and
Industrial technology.
a. True
b. False
7. ALU contains registers that store data to be processed.
a. True
b. False
8. CPU is composed of Arithmetic Logical Unit (ALU) and Control Unit (CU)
a. True
b. False
9. The Control Unit (CU) is the unit of CPU that performs computation.
a. True
b. False
10. The Control Unit (CU) is the unit of CPU that decodes and executes
instructions.
a. True
b. False
11. CPU performs Arithmetic and Logical operations using Decimal Number
System.
a. True
b. False
12. A Microprocessor is a CPU on only one electronic chip.
a. True
b. False
13. The main memory of a Computer is basically composed of bits.
a. True
b. False
14. A byte is 9 bits.
a. True
b. False
15. The smallest addressable unit of main memory is bit.
a. True
b. false
16. The RAM is used to store programs and data currently processed.
a. True
b. False
17. The ROM is used to store programs and data currently processed.
a. True
b. False
18. The Secondary Storage is used to store files, data and documents.
a. True
b. False
19. The RAM is a temporary storage.
a. True
b. False
20. The ROM is a temporary storage.
a. True
b. False
21. The Hard Disk is a permanent/semi-permanent storage.
a. True
b. False
22. The Hard Disk is a volatile storage.
a. True
b. False
23. The main memory is a volatile storage.
a. True
b. False
24. A Cache memory is a temporary, high-speed holding area between the main
memory and CPU.
a. True
b. False
25. ROM contains special instructions used to start up the computer.
a. True
b. False
26. The Secondary storage holds data and programs even after electric
power to the computer system has been turned off.
a. True
b. false
27. Solid-State-Disk (SSD) doesn’t have moving parts.
a. True
b. False
28. Hard Disk (HD) uses laser technology to store data and programs.
a. True
b. False
29. A Bus width is measured as a number of bits.
a. True
b. False
30. Modem is a widely used communication device.
a. True
b. False
31. The Universal Serial Bus (USB) is a general-purpose port for connecting
external devices to a PC.
a. True
b. False
32. Scanner is an input device that converts a document into a form the system unit
can process, is
a. True
b. False
33. Bar Code Reader is an input device that reads and interprets bar codes
such as UPC (Universal Product Code) symbols.
a. True
b. False
34 Magnetic Card Reader is an input device that reads and deciphers the
information on the magnetic strip on a credit card or other ID card.
a. True
b. False
35. Radio Frequency Identification chip is an electronic chip that communicates
wirelessly with a device to authenticate a user.
a. True
b. False
36. Fingerprint reader is an input device scans facial features of a person in
order to authenticate such person.
a. True
b. False
37. 3D Printer is an input device that creates 3D shapes with a thin layer of
material repeatedly until created.
a. True
b. False
38. A bus is a pathway on a circuit board through which data moves.
a. True
b. False
39. Blurtooth is a common wireless technology used to connect to speakers
and headsets.
a. True
b. False
40. ROM is a volatile storage.
a. True
b. False
41. A mouse is a type of output device.
a. True
b. False
42. Wi-Fi is a synonym for Bluetooth.
a. True
b. False
43. A desktop is a personal computer with input and output devices separate
from the system unit.
a. True
b. False
44. A Laptop is touchscreen computer with no separate keyboard and mouse
a. True
b. False
45. A Tablet is a portable PC that folds for transport, containing a built-in
keyboard and built-in display screen.
a. True
b. False
46. A Server is a computer dedicated to serving the network to which it is
connected.
a. True
b. False
47. A mainframe is a large, powerful, cabinet-sized computer designed to
process large amounts of input and output.
a. True
b. False
48. A supercomputer is a powerful, room-sized computer for scientific research.
a. True
b. False
Question Bank – Topic4 – Computer Networks & Internet
Multiple Choice Question
1. Which of these is NOT a Computer Network?
a. Local Area Network
b. Wide Area Network
c. Internet
d. None of the Above
2. The system that exchanges data between two parties, is called
a. Data Communication System
b. Data Exchange System
c. Data Transmission System
d. None of the Above
3. The system that interconnects a variety of devices and provides a means
for information exchange among those devices, is
a. Data Communications System
b. Communications Network
c. Data Transmission System
d. None of the Above
4. The Computer Network that has small scope, typically a single building or
a cluster of buildings, is
a. Wide Area Network
b. Metropolitan network
c. Local Area Network
d. None of the Above
5. The Computer Network that covers a large geographical area, such as city
or country, is
a. Wide Area Network
b. Metropolitan network
c. Local Area Network
d. None of the Above
6. Local Area Network (LAN) uses
a. Circuit-switching technique
b. Packet-switching technique
c. Broadcasting technique
d. None of the Above
7. Standard Telephone Network uses
a. Circuit-switching technique
b. Packet-switching technique
c. Broadcasting technique
d. None of the Above
8. Wide Area Network uses
a. Circuit-switching technique
b. Packet-switching technique
c. Broadcasting technique
d. None of the Above
9. A WAN, typically consists of a number of interconnected
a. Routers
b. Switching Nodes
c. Bridges
d. None of the Above
10. The network in which each node connects to exactly two other nodes,
forming a single continuous pathway for signals, is
a. Bus Network
b. Star Network
c. Ring Network
d. None of the Above
11. The network in which each device connected directly to a central
network switch, is
a. Bus Network
b. Star Network
c. Ring Network
d. None of the Above
12. The network in which each device connected to a central node either directly
or through subordinate nodes, is
a. Tree Network
b. Star Network
c. Bus Network
d. None of the Above
13. The network that does not use a specific physical layout, but requires
that each node have more than one connection to other nodes, is
a. Tree Network
b. Star Network
c. Mesh Network
d. None of the Above
14. In Peer-to-Peer (P2P) network,
a. All nodes have equal authority
b. One node is a server and others are clients
c. Several servers and several clients
d. None of the Above
15. In Client/Server network,
a. All nodes have equal authority
b. One or more servers serving several clients
c. Only one server serving one client
d. None of the Above
16. The speed at which a communication device transfers data, is
a. Data rate
b. Communication rate
c. Transfer rate
d. None of the Above
17. The Transfer rate of a communication device is measured as
a. GHz
b. bits per second (bps)
c. Bytes per second
d. None of the Above
18. The current dominant standard for local area networking devices, is
a. Ethernet
b. Bluetooth
c. Infrared
d. None of the Above
19. The inexpensive short-range networking technology used for
computer-to-device connections such as computer-to-printer or phone-to-
headset, is
a. Ethernet
b. Bluetooth
c. Infrared
d. None of the Above
20. The communications device that provides a central gathering point for
all the computers in a LAN to connect, is
a. Router
b. Bridge
c. Switch/hub
d. None of the Above
21. The Internet is based on a protocol stack (a set of protocols) called
a. HyperText Transfer Protocol (HTTP)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Simple messaging Transfer Protocol (SMTP)
d. None of the Above
22. The Internet is based on a protocol stack (a set of protocols) called
a. HyperText Transfer Protocol (HTTP)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Simple messaging Transfer Protocol (SMTP)
d. None of the Above
23. Which of these is a valid IP address in IPv4?
a. 186-69-10-1
b. 186.69.10.1
c. 186,69,10,1
d. None of the Above
24. The system that allows multiple computers to connect together to
share resources is called
a. Computer Network
b. Connected System
c. Shared Computers
d. None of the Above
25. The Internet is
a. A Local Area Network
b. A large Infrastructure of connected networks
c. A Wide Area Network
d. None of the Above
26. The Internet uses the following suite of protocols
a. HTTP
b. SMTP
c. TCP/IP
d. None of the Above
27. The Internet of Things (IoT) technology allows
a. All types of devices to communicate
b. Sharing data and resources
c. only computers to communicate
d. None of the Above
28. The special network that only staff within the company network can
access, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above
29. The special network set up by a business for its customers, staff, and
business partners to access from outside the office network, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above
30. The special network set up by a business for its customers, staff, and
business partners to access from outside the office network, is called
a. Extranet
b. Intranet
c. Internet
d. None of the Above
True/False Question
1. The internal data rates of LANs are typically much smaller than those of
WANs.
a. True
b. False
2. The Transfer Control Protocol TCP is an End-to-End protocol allowing the
data transfer between two points (computers) on the Internet.
a. True
b. False
3. The Internet Protocol is an internetworking protocol. The IP provides a
connectionless, or data gram, service between end systems.
a. True
b. False
4. The Internet is structured as a mesh of routers and servers connected to
one another at multiple points.
a. True
b. False
5. In packet-switching networks, data are transmitted in short packets. A
typical upper bound on packet length is 1000 bytes.
a. True
b. False
6. Wi-Fi is a synonym for Bluetooth.
a. True
b. False
7. The Internet is based on Ethernet protocol suite.
a. True
b. False
8. A Client/server network contains at least one server.
a. True
b. False
9. A Server is a computer dedicated to serving the network to which it is
connected.
a. True
b. False
10. IP addresses are written and displayed in human-readable notations,
such as 172.16.254.1 in IPv4.
a. True
b. False
Question Bank – Topic3 – Computer Software
Multiple Choice Question
1. Which of these is NOT part of system software?
a. Operating System
b. Payroll application
c. Utilities
d. Device drivers
2. The component of system software that manages computer resources, is
a. Operating System
b. Payroll application
c. Utilities
d. Device drivers
3. The component of system software that provides user interface, is
a. Utilities
b. Payroll application
c. Operating System
d. Device drivers
4. The component of system software that monitors system performance, is
a. Utilities
b. Payroll application
c. Database Management System
d. None of the Above
5. The component of system software that support system security, is
a. Operating System
b. Payroll application
c. Database Management System
d. None of the Above
6. The component of system software that starts up the computer, is
a. Utilities
b. Payroll application
c. Operating System
d. None of the Above
7. The component of system software that schedules tasks, is
a. Utilities
b. Payroll application
c. Operating System
d. None of the Above
8. The component of system software that coordinates memory, processing,
storage, printers and monitors, is
a. Utilities
b. Payroll application
c. Operating System
d. None of the Above
9. The component of system software that schedules multitasking, is
a. Utilities
b. Payroll application
c. Operating System
d. None of the Above
10. Most operating systems store data and programs in a system of
a. Documents
b. Files and folders
c. Database
d. None of the Above
11. Most operating systems store data and programs in a system of
a. Documents
b. Files and folders
c. Database
d. None of the Above
12. Which of these is NOT a category of an Operating System?
a. Embedded Operating System
b. Standalone Operating System
c. Network Operating System
d. None of the Above
13. A Video game system runs with
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above
14. A Smart Phone runs with
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above
15. A Desktop Computer runs with
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above
16. A laptop Computer runs with
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above
17. A Tablet runs with
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above
18. The type of Operating System that coordinates the communications
between connected computers, is
a. An embedded operating system
b. A standalone operating system
c. A network operating system
d. None of the Above
19. Android and iPhone OS are
a. Embedded operating systems
b. Standalone operating systems
c. Network operating systems
d. None of the Above
20. Which of these IS NOT a utility software?
a. Troubleshooting or diagnostic programs
b. Anti-virus programs
c. File compression programs
d. None of the Above
21. Which of these IS NOT Windows utility software?
a. File history
b. Disk cleanup
c. Disk defragmenter
d. None of the Above
22. The Windows utility software that identifies and eliminates
nonessential files, is
a. File history
b. Disk cleanup
c. Disk defragmenter
d. None of the Above
23. The Windows utility software that rearranges files and unused disk
space to optimize operations, is
a. File history
b. Disk cleanup
c. Disk defragmenter
d. None of the Above
24. The programming language a computer can execute and based on a
set of binary instructions, is
a. High-level programming Language
b. Machine Language
c. Assembly Language
d. None of the Above
25. The programming language whose instructions are in the form of
mnemonic codes and variable names, is
a. High-level programming Language
b. Machine Language
c. Assembly Language
d. None of the Above
26. The programming language which resembles human language, is
a. High-level programming Language
b. Machine Language
c. Assembly Language
d. None of the Above
27. The software that translates a High-level program to machine
language instructions, is
a. Assembler
b. Compiler
c. Utility
d. None of the Above
28. The software that translates an assembly program to machine
language instructions, is
a. Assembler
b. Compiler
c. Utility
d. None of the Above
29. A program written in a High-level programming language, is
a. An object program
b. A Machine program
c. A Source program
d. None of the Above
30. The software that enables end-user to perform a useful task on
computer, is
a. An application software
b. A system software
c. An utility software
d. None of the Above
31. The software that enables end-user to perform a useful task on
computer, is
a. An application software
b. A system software
c. An utility software
d. None of the Above
32. Which of these software would be most appropriate for managing and
storing patient records in a large hospital?
a. Presentation Software
b. Database Management System
c. Spreadsheet Software
d. None of the Above
33. Applications Software are
a. Programs to manage and control computer resource
b. Programs End-users use
c. Communications Software
d. None of the Above
34. The main components of System Software are
a. Development and programming software
b. Applications and Communications programs
c. Operating System and Utilities programs
d. None of the Above
35. Embedded Operating Systems are used by
a. Super Computers
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above
36. Standalone Operating Systems are used by
a. Computer Networks
b. Smart phones and tablets
c. Desktop and Laptop Computers
d. None of the Above
37. Antivirus Programs are
a. Utilities programs
b. Applications programs
c. Development programs
d. None of the Above
38. Windows and Linux are examples of
a. Utilities programs
b. an Operating System
c. Programming language
d. None of the Above
True/False Question
1. Operating System is NOT part of system software
a. True
b. False
2. The Operating System is the basic component of system software that
manages computer resources
a. True
b. False
3. The Operating System is the basic component of system software that
provides user interface.
a. True
b. False
4. The Operating System is the basic component of system software that
monitors system performance.
a. True
b. False
5. The Operating System is the basic component of system software that
supports system security.
a. True
b. False
6. The Operating System is the basic component of system software that
starts up the computer.
a. True
b. False
7. The Operating System is the basic component of system software that
schedules tasks.
a. True
b. False
8. Applications software id the basic component of system software that
coordinates memory, processing, storage, printers and monitors.
a. True
b. False
9. Utilities is the basic component of system software that schedules
multitasking.
a. True
b. False
10. Most operating systems store data and programs in a system of files
and folders
a. True
b. False
11. The basic categories of an Operating System are Embedded, Standalone
and Network.
a. True
b. False
12. A Video game system runs with a standalone operating system.
a. True
b. False
13. A Smart Phone runs with an embedded operating system.
a. True
b. False
14. A Desktop Computer runs with an embedded operating system.
a. True
b. False
15. A laptop Computer runs with an embedded operating system.
a. True
b. False
16. A Tablet runs with an embedded operating system.
a. True
b. False
17. The type of Operating System that coordinates the communications
between connected computers is an embedded operating system.
a. True
b. False
18. Android and iPhone OS are embedded operating systems.
a. True
b. False
19. Disk defragmenter is the Windows utility software that identifies and
eliminates nonessential files.
a. True
b. False
20. Disk cleanup is the Windows utility software that rearranges files and
unused disk space to optimize operations.
a. True
b. False
21. Machine language is the programming language a computer can execute
and based on a set of binary instructions.
a. True
b. False
22. Assembly language is a programming language whose instructions are
in the form of mnemonic codes and variable names.
a. True
b. False
23. High-level programming Language is a programming language which
resembles human language.
a. True
b. False
24. Assembler is the software that translates a High-level program to
machine language instructions.
a. True
b. Falsse
25. Compiler is the software that translates an assembly program to
machine language instructions.
a. True
b. False
26. A program written in a High-level programming language is an Object
program.
a. True
b. False
27. Applications software enables end-user to perform a useful task on
computer.
a. True
b. False
28. Database Management System would be most appropriate for managing
and storing patient records in a large hospital?
a. true
b. False
29. Applications Software are programs to manage and control computer
resource.
b. True
c. False
30. Operating System and Utilities programs are the main components of
System Software.
a. True
b. false
31. Embedded Operating Systems are used by Desktop and Laptop
computers.
a. True
b. False
32. Standalone Operating Systems are used by Smart phones and tablets.
a. True
b. False
33. Antivirus Programs are Utilities programs
a. true
b. False
34. Computer games are a type of application software.
a. True
b. False
35. Embedded Operating Systems are used by Desktop and Laptop
Computers
a. True
b. False
Question Bank – Topic5 – Emerging Internet Applications
Multiple Choice Question
1. Which of these is NOT an Internet application?
a. World Wide Web (WWW)
b. Electronic Mail
c. Online Communications
d. None of the Above
2. The World Wide Web is based on
a. HyperText Transfer Protocol (HTTP)
b. Transmission Control/Internet Protocol (TCP/IP)
c. Simple Messaging Transfer Protocol (SMTP)
d. None of the Above
3. A Web page on WWW is formatted using
a. High-level programming language
b. Extensible Markup Language (XML)
c. HyperText Markup Language (HTML)
d. None of the Above
4. The set of characters that we enter into our web browser’s address bar to
navigate to a specific web page is called
a. IP Address
b. Uniform Resource Locator (URL)
c. Page Address
d. None of the Above
5. Which of these is a valid Uniform Resource Locator (URL)?
a. http://www.bbc.co.uk/news/story24871.htm
b. smtp://www.bbc.co.uk/news/story24871.htm
c. ftp://www.bbc.co.uk/news/story24871.htm
d. None of the Above
6. The application that builds an index of sites on the Internet. Users can
then search that database using keywords or phrases to find sites that
contain the information they need.
a. File Download
b. World Wide Web (WWW)
c. Search Engine
d. None of the Above
7. Which of these IS NOT an Online Communications application on the
Internet?
a. Instant Messaging
b. Social Networking
c. Voice over IP (VoIP)
d. None of the Above
8. The Internet application in which the message is sent immediately rather
than waiting for the recipient to log on to the service to retrieve his
messages, is called
a. Voice over IP (VoIP)
b. Electronic Mail (Email)
c. Instant Messaging (IM)
d. None of the Above
9. WhatsApp is an Internet application of type
a. Instant Messaging (IM)
b. Newsgroups
c. Forums
d. None of the Above
10. The web page where an individual or group publishes stories, essays,
or articles that are generically referred to as posts.
a. Wiki
b. Blog
c. Social Network
d. None of the Above
11. The online database of information that any user can copy or amend
using a web interface, is
a. A Wiki
b. A Blog
c. A Newsgroup
d. None of the Above
12. Skype, which is an Internet application used to make phone calls and
sometimes video calls over a broadband, Wi-Fi, or cellular mobile web
connection. Skype uses the online communications technique of
a. Social Networking
b. Instant Messaging (IM)
c. VoIP
d. None of the Above
True/False Question
1. Electronic Mail (Email) is an instant messaging application on the
Internet.
a. True
b. False
2. Electronic Mail (Email) is a store-and-forward and not an instant
messaging application on the Internet.
a. True
b. False
3. A hashtag, or simply, a tag is a topic or a subject assigned to a social
networking post (Example: #Egypt)
a. True
b. False
4. The Uniform Resource Locator (URL) is a set of characters that we enter
into our web browser’s address bar to navigate to a specific web page.
a. True
b. False
5. A Search Engine is an application that builds an index of sites on the
Internet. Users can then search that database using keywords or phrases
to find sites that contain the information they need.
a. True
b. False
6. Electronic Mail (Email) is an Internet application in which the message is
sent immediately rather than waiting for the recipient to log on to the
service to retrieve his messages.
a. True
b. False
7. Instant messaging is an Internet application in which the message is sent
immediately rather than waiting for the recipient to log on to the service
to retrieve his messages.
a. True
b. False
8. A Wiki is an online database of information that any user can copy or
amend using a web interface.
a. True
b. False
9. Skype is an instant messaging Internet application used to make phone
calls and sometimes video calls over a broadband, Wi-Fi, or cellular
mobile web connection.
a. True
b. False
10. Wiki is a web page where an individual or group publishes stories,
essays, or articles that are generically referred to as posts.
a. True
b. False
Question Bank – Topic 6 – Cybersecurity
Multiple Choice Question
1. Which of these is NOT a computer security concern?
a. Having your PC stolen
b. Losing data
c. Buying pirated software
d. None of the Above
2. Which of these is NOT a common Internet threat?
a. Spoofing
b. Sniffing
c. Phishing
d. None of the Above
3. The capability to capture copies of data packets as they travel across the
network and decode their content, is called
a. Spoofing
b. Sniffing
c. Phishing
d. None of the Above
4. The Internet attack in which making repeated requests of a computer or
network device, thereby overloading it and causing legitimate requests to be
ignored, is called
a. Spoofing
b. Sniffing
c. Phishing
d. None of the Above
5. Which of these is NOT a malware program
a. Anti-virus program
b. Worm
c. Trojan
d. None of the Above
6. Which of these is the malware program hides on a hard drive, CD, or e-mail
and causes unexpected side effects such as destroying or corrupting data.
a. virus
b. Worm
c. Trojan
d. None of the Above
7. Which of these is the malware program that copies itself repeatedly into a
computer’s memory or disk drive.
a. virus
b. Worm
c. Trojan
d. None of the Above
8. Which of these is the malware program that pretend to be a useful program
such as a free game or screensaver.
a. virus
b. Worm
c. Trojan
d. None of the Above
9. The encoding of data by a special algorithm that renders the data unreadable
by any program without the decryption key, is
a. Compression
b. Encryption
c. Decompression
d. None of the Above
10. Which of these is the technology that creates a secure, tamper-resistant
data tunnel between two points on the Internet.
a. VPN (Virtual Private Network)
b. Encryption
c. Compression
d. None of the Above
True/False Question
1. All computer users should not be aware of the possible security risks and
know some safeguards to prevent against security problems since these
problems can cost you time and money, as well as be an inconvenience.
a. True
b. False
2. The internet is open-access and is used by some people who are not
trustworthy, who take advantage of the lack of built-in safeguards.
a. True
b. False
3. Hackers are those criminals who gain unauthorized access to computers
or networks to make illegal operations (not good/black hat)).
a. True
b. False
4. Crackers are malicious hackers who break into computers for malicious
purposes.
a. True
b. False
5. In Spoofing Internet attack, attackers try to trick unsuspecting users into
giving away personal information such as login details or credit card
information.
a. True
b. False
6. In Phishing Internet attack, attackers try to trick unsuspecting users into
giving away personal information such as login details or credit card
information.
a. True
b. False
7. In spoofing Internet attack, the attacker’s computer assumes a false
Internet address in order to gain access to a network.
a. True
b. False
8. In sniffing Internet attack, the attacker’s computer assumes a false
Internet address in order to gain access to a network.
a. True
b. False
9. In sniffing Internet attack, attacker’s computer tries to capture copies of
data packets as they travel across the network and decode their content.
a. True
b. False
10. In spoofing Internet attack, attacker’s computer tries to capture copies of
data packets as they travel across the network and decode their content.
a. True
b. False
11. Password cracking is the act of attempting to identify a user’s username in
order to gain access to a system or program.
a. True
b. False
12. Denial of Service (DoS) is the Internet attack in which making repeated
requests of a computer or network device, thereby overloading it and causing
legitimate requests to be ignored.
a. True
b. False
13. Spoofing is the Internet attack in which making repeated requests of a
computer or network device, thereby overloading it and causing legitimate
requests to be ignored.
a. True
b. False
14. Sniffing is the Internet attack in which making repeated requests of a
computer or network device, thereby overloading it and causing legitimate
requests to be ignored.
a. True
b. False
15. Phishing is the Internet attack in which making repeated requests of a
computer or network device, thereby overloading it and causing legitimate
requests to be ignored.
a. True
b. False
16. Worm is a malware program.
a. True
b. False
17. Trojan is a malware program.
a. True
b. False
18. Virus is a malware program.
a. True
b. False
19. Anti-virus is a malware program.
a. True
b. False
20. Virus is a malware program that hides on a hard drive, CD, or e-mail that
causes unexpected side effects such as destroying or corrupting data.
a. True
b. False
11. Trojan is a malware program that hides on a hard drive, CD, or e-mail and
causes unexpected side effects such as destroying or corrupting data.
a. True
b. False
12. Worm is a malware program hides on a hard drive, CD, or e-mail and causes
unexpected side effects such as destroying or corrupting data.
a. True
b. False
Worm is a malware program that copies itself repeatedly into a computer’s
memory or disk drive.
a. True
b. false
13. Virus is a malware program that copies itself repeatedly into a computer’s
memory or disk drive.
a. True
b. false
14. Trojan is a malware program that copies itself repeatedly into a computer’s
memory or disk drive.
a. True
b. false
15. Trojan is a malware program that pretend to be a useful program such as a
free game or screensaver.
a. True
b. False
16. Virus is a malware program that pretend to be a useful program such as a
free game or screensaver.
a. True
b. False
17. Worm is a malware program that pretend to be a useful program such as a
free game or screensaver.
a. True
b. False
18. Encryption is the encoding of the data by a special algorithm that renders
the data unreadable by any program without the decryption key.
a. True
b. False
19. Virtual Private Network (VPN) is the technology that creates a secure,
tamper-resistant data tunnel between two points on the Internet.
a. True
b. False
Question Bank – Topic 7 – Data Representation & Number Systems
Multiple Choice Question
1. The number system that we are familiar with, that we use every day, is
a. Octal Number System
b. Binary Number System
c. Decimal Number System
d. None of the Above
2. The number system that every computer uses to represent, store and
process data, is
a. Octal Number System
b. Binary Number System
c. Decimal Number System
d. None of the Above
3. The base of the decimal number system is
a. 8
b. 10
c. 2
d. None of the Above
4. The base of the binary number system is
a. 8
b. 10
c. 2
d. None of the Above
5. The binary number system uses only the digits
a. 0 and 1
b. 0, 1 and 3
c. 0, 1, 2, …, 8, and 9
d. None of the Above
6. The decimal number system uses the digits
a. 0 and 1
b. 0, 1 and 3
c. 0, 1, 2, …, 8, and 9
d. None of the Above
7. All data in a computer is represented in
a. decimal
b. binary
c. hexadecimal
d. None of the Above
8. The decimal value of the binary number 1110 is
a. 12
b. 14
c. 10
d. None of the Above
9. The decimal value of the binary number 1111 is
a. 12
b. 14
c. 10
d. None of the Above
10. The decimal value of the binary number 1001 is
a. 11
b. 9
c. 10
d. None of the Above
11. The decimal value of the binary number 10000 is
a. 12
b. 14
c. 16
d. None of the Above
12. The binary representation of the decimal number 15 is
a. 1111
b. 1110
c. 10000
d. None of the Above
13. The binary representation of the decimal number 9 is
a. 1101
b. 1110
c. 1000
d. None of the Above
14. The binary representation of the decimal number 16 is
a. 11010
b. 11100
c. 10000
d. None of the Above
15. The addition of the two binary numbers 101 and 101 is
a. 1010
b. 202
c. 1011
d. None of the Above
16. The addition of the two binary numbers 111 and 111 is
a. 1010
b. 222
c. 1011
d. None of the Above
17. The addition of the two binary numbers 1111 and 1111 is
a. 11110
b. 2222
c. 11111
d. None of the Above
18. The largest integer decimal that can be stored in 4 bits is
a. 8
b. 16
c. 15
d. None of the Above
19. The largest integer decimal that can be stored in 8 bits is
a. 128
b. 256
c. 64
d. None of the Above
20. The largest integer decimal that can be represented in 4 bits sign-and-
magnitude is
a. +8
b. +7
c. +6
d. None of the Above
21. The smallest integer decimal that can be represented in 4 bits sign-
and-magnitude is
a. -8
b. -7
c. -6
d. None of the Above
22. The 2’s complement representation of +4 in 4 bits is
a. 0100
b. 1100
c. 100
d. None of the Above
23. The 2’s complement representation of -4 in 4 bits is
a. 0100
b. 1100
c. 100
d. None of the Above
True/False Question
1. The Octal number system is the system we are familiar with, and we use
every day.
a. True
b. False
2. The decimal number system is the system we are familiar with, and we
use every day.
a. True
b. False
3. The octal number system is the system every computer uses to
represent, store and process data.
a. True
b. False
4. The binary number system is the system every computer uses to
represent, store and process data.
a. True
b. False
5. The decimal number system is the system every computer uses to
represent, store and process data.
a. True
b. False
6. The binary number system uses only the digits 0, 1 and 2.
a. True
b. False
7. The binary number system uses only the digits 0 and 1.
a. True
b. False
8. The decimal number system uses the digits 0, 1, 2, …, 8, and 9.
a. True
b. False
9. The base of the decimal number system is 10.
a. True
b. False
10. The base of the decimal number system is 8.
a. True
b. False
11. The base of the binary number system is 10.
a. True
b. False
a. The base of the binary number system is 2.
b. True
c. False
12. All data in a computer is represented in binary.
a. True
b. False
13. All data in a computer is represented in octal.
a. True
b. False
14. All data in a computer is represented in decimal.
a. True
b. False
15. All data in a computer is represented in hexadecimal.
a. True
b. False
16. The decimal value of the binary number 1110 is 13.
a. True
b. False
24. The addition of the two binary numbers 101 and 101 is 1000.
a. True
b. False
25. The addition of the two binary numbers 101 and 101 is 1010.
a. True
b. False
26. The addition of the two binary numbers 111 and 111 is 1110.
a. True
b. False
27. The addition of the two binary numbers 1111 and 1111 is 21111.
a. True
b. False
28. The largest unsigned integer that can be represented in 3 bits is 9.
a. True
b. False
29. The largest unsigned integer that can be represented in 4 bits is 15.
a. True
b. False
30. The largest signed integer that can be represented in 4 bits sign-and-
magnitude is +7.
a. True
b. False
Question Bank – Topic 8 – Problem Solving Concepts
True/False Question
1. An algorithmic problem is any problem whose solution can be expressed
as a list of executable instructions.
a. True
b. False
2. Taking the sum of a finite list of numbers is an algorithmic problem.
a. True
b. False
3. Taking the sum of all positive integers is an algorithmic problem.
a. True
b. False
4. Sorting a finite list of names is an algorithmic problem.
a. True
b. False
5. An algorithm is a sequence of infinite executable instructions that lead to
a solution.
a. True
b. False
6. An algorithm is a sequence of precise executable instructions that lead to
a solution.
a. True
b. False
7. An algorithm should include the minimal number of instructions leading to
the solution.
a. True
b. False
8. The Software Engineering methodology involves the development phases
of Analysis, Design, Implementation, Testing and Documentation.
a. True
b. False
9. A variable in a computer program is an identifier (name) that will be
carrying a value.
a. True
b. False
10. A variable in a computer program will be carrying only one value at a
time but could not be changed throughout the execution of the program.
a. True
b. False
11. A constant in a computer program is an identifier that will be given a
data type and a fixed value that is not subject change throughout the
execution of the program.
a. True
b. False