1. Computers manipulate data in many ways, and this manipulation is called.........

(a) upgrading 
(b) processing 
(c) batching 
(d) utilizing



2. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

(a) robotics 
(b) simulation 
(c) computer forensics 
(d) animation



3. Where does most data go first with in a computer memory hierarchy ?

(a) RAM 
(b) ROM 
(c) BIOS 
(d) CACHE


4. The………….data mining technique derives rules from real-world case examples.

(a) Rule discover 
(b) Signal processing
(c) Neural nets 
(d) Case-based reasoning



5. …………….are used to identify a user who returns to a Website

(a) Cookies 
(b) Plug-ins
(c) Scripts 
(d) ASPs


6. Codes consisting of lines of varying widths or lengths that are computer-readable are known as

(a) an ASCII code 
(b) a magnetic tape
(c) an OCR scanner 
(d) a bar code



7. Why is it unethical to share copyrighted files with your friends?

(a) It is not unethical, because it is legal.
(b) It is unethical because the files are being given for free.
(c) Sharing copyrighted files without permission breaks copyright laws.
(d) It is not unethical because the files are being given for free.



8. Reusable optical storage will typically have the acronym

(a) CD 
(b) DVD 
(c) ROM 
(d) RW


9. The most common type of storage devices are

(a) Steel 
(b) optical 
(c) magnetic 
(d) flash



10. A device that connects to a network without the use of cables is said to be

(a) Distributed 
(b) free 
(c) centralized 
(d) none of these




More MCQs on Fundamentals of Computers