Q.1 ……… is the process of dividing the disk into tracks and sectors.
- Tracking
- Formatting
- Crashing
- Allotting
Q.2 The difference between people with access to computers and the Internet and those without this access is known as the :
- Digital divide
- Internet divide
- Web divide
- E-illiteracy
Q.3 Computers manipulate data in many ways, and this manipulation is called……
- Upgrading
- Processing
- Batching
- Utilizing
Q.4 The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called:
- Robotics
- Simulation
- Computer forensics
- Animation
Q.5 Where does most data go first with in a computer memory hierarchy ?
- RAM
- ROM
- BIOS
- CACHE
Q.6 The………….data mining technique derives rules from real-world case examples.
- Rule discover
- Signal processing
- Neural nets
- Case-based reasoning
Q.7 …………… is the science that attempts to produce machines that display the same type of intelligence that humans do
- Nanoscience
- Nanotechnology
- Simulation
- Artificial intelligence (Al)
Q.8 Servers are computers that provide resources to other computers connected to a :
- Networked
- Mainframe
- Supercomputer
- Client
Q.9 When creating a computer program, the ……… designs the structure of the program
- End user
- System Analyst
- Programmer
- All of the above
Q.10 A computer program that converts an entire program into machine language at one time is called a/ an
- Interpreter
- Simulator
- Characters
- Compiler