
1) @ 2) # 3) & 4) * 5) None of these
54. Software applies _______, also called algorithms, to process data.
1) arithmetic 2) procedures 3) objects 4) rules 5) None of these
55. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark 2) exclamation mark 3) underscore 4) period 5) None of these
56. An ad hoc query is a .
1) pre-planned question 2) pre-scheduled question
3) spur-of-the-moment question 4) question that will not return any results 5) None of these
57. A Web _______ consists of one or more Web pages located on a Web server.
l) hub 2) site 3) story 4) template 5) None of these
58. A computer _______ is a set of program instructions that can attach itself to a file, reproduce itself, and
spread to other files.
l) worm 2) virus 3) trojan horse 4) phishing scam 5) None of these
59. The desktop contains small graphics called _______.
1) windows 2) logos 3) icons 4) pictures 5) None of these
60. C, BASIC, COBOL, and Java are examples of _______ languages.
1) low-level 2) computer 3) system programming 4) high-level 5) None of these
61. A(n) _______ camera is a peripheral device used to capture still images in a digital format that can be
easily transferred into a computer and manipulated using graphics software.
1) digital 2) analog 3) classic 4) film 5) None of these
62. _______ makes it possible for shoppers to make purchases using their computers.
l) E-world 2) E-commerce 3) E-spend 4) E-business 5) None of these
63. Networks are monitored by security personnel and supervised by _______ who set(s) up accounts and
passwords for authorized network users.
1) IT managers 2) the government 3) network administrators 4) password administrators
5) None of these
64. Application software is designed to accomplish _______.
1) real-world tasks 2) computer-centric tasks 3) gaming tasks
4) operating-system tasks 5) None of these
65. A telephone number, a birth date, and a customer name are all examples of _______
1) a record 2) data 3) a file 4) a database 5) None of these
66. The human-readable version of a program is called _______.
1) source code 2) program code 3) human code 4) system code 5) None of these
67. A _______ computer (also referred to as a laptop) is a small, lightweight personal computer that
incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
1) notebook 2) journal 3) diary 4) briefcase 5) None of these
68. _______ is the result produced by a computer.
1) Data 2) Memory 3) Output 4) Input 5) None of these
69. Programs such as Internet Explorer that serve as navigable windows into the Web are called
1) Hypertext 2) Networks 3) Internet 4) Web browsers 5) None of these
70. A _______ is a device that not only provides surge protection, but also furnishes your computer with
battery backup power during a power outage.
1) surge strip 2) USB 3) UPS 4) battery strip 5) None of these
71. When you save to _______, your data will remain intact even when the computer is turned off.
1) RAM 2) motherboard 3) secondary storage device
4) primary storage device 5) None of these
72. The motherboard is the
1) circuit board that houses peripheral devices 2) same as the CPU chip
3) the first chip that is accessed when the computer is turned on