1.
In MICR, C stands for?
a) Code
b) Colour
c) Computer
d)
Character
e) None of the
above
2.
Which of the following scrambles a message by applying a secret code?
a)
Encryption
b) Audits
c) UPS
d) Firewalls
e) None of the
above
3.
The uniform resource locator (URL) is case sensitive in the ____.
a) Protocol
b) Authority
c)
Directory
d) Type
e) None of the
above
4.
A peer-to-peer LAN is an appropriate network architecture for____.
a) The Internet
b)
Home network
c) Network
requiring a server with shared resources.
d) wide area
network
e) None of the
above
5.
Cell phones use ____________ to access the Internet.
a) MMS technology
b) a notation
system
c) Micro
browser software
d) HTML language
e) None of the
above
6.
Which of the following is NOT a basic function of the operating system?
a) Manage memory
b)
Provide the word processing system
c) Start the
computer
d) Provide the
user interface
e) None of the
above
7.
ASCII is a(n)________.
a) Numbering
system for representing numbers with decimals.
b) Character
representation standard common in older mainframe computers.
c)
Encoding standard used to represent letters and characters.
d) Symbolic
programming language that directly represents machine instructions.
e) None of the
above
8.
In CSMA/CD, the computer sends a fixed unit of data called a(n)_______.
a) Node
b)
Packet
c) Override
d) Token
e) None of the
above
9.
A global network made up of thousands of privately owned computers and networks
is called the?
a) World Wide Web
b)
Internet
c) Specialized
search engine
d) Internet 2
e) None of the
above
10.
Similar to a hub in an Ethernet network, a ____________ helps relay data
between wireless network nodes.
a) Wireless port
b)
Wireless access point
c) wireless
adapter
d) wireless
transceiver
e) None of the
above
No comments:
Post a Comment