EASY
Earn 100

Which of the following is not a type of Microsoft Access database Object?
(a)
Queries
(b)
Workbooks
(c)
Forms
(d)
Table
(e)
None of these

50% studentsanswered this correctly
Important Questions on Computer and Internet Basics
MEDIUM
The data storage hierarchy consists of_____.

EASY
Which of the following memory is capable of operating at electronics speed?

MEDIUM
The boxes that are displayed to indicate that the text, pictures or objects are placed in it is called _____.

EASY
Documents converted to _____ can be published to the web.

MEDIUM
Single-word reference to viruses, worms etc., is called:

MEDIUM
What are .bas, .doc, and .pmp examples of in computer?

MEDIUM
A repair for a known software bug, usually available at no charge on the internet, is called a(n) _____.

EASY
When you first turn on a computer, the CPU is preset to execute instructions stored in _____ .

EASY
Which of the following is an electronic or paper log used to track computer activities?

EASY
Verification of login name and password is known as:

EASY
Which of the following is not true about RAM?

EASY
Data duplication wastes the space, but also promotes a more serious problem called _____.

EASY
A computer virus normally attaches itself to another computer program known as a_____.

EASY
The clock rate of a processor is measured in_____.

EASY
Which of the following is not an example of application software?

EASY
Which of the following statements is true with respect to ASCII?
1. A programming language
2. ASCII chart is not for decimals
3. American Security Code for Information Interchange
4. A character encoding Scheme

EASY
Which key on a windows keyboard set to fullscreen mode in most browsers?
1. F1
2. F10
3. F11
4. F12

EASY
Which of the following protects the computer from the hackers?

EASY
_____are often delivered to a PC through an email attachment and are often designed to do harm.

EASY
Decreasing the amount of space required to store data and programs is accomplished by_____.

