Q.1 ……… is the process of dividing the disk into tracks and sectors.
Q.2 The difference between people with access to computers and the Internet and those without this access is known as the :
- Digital divide
- Internet divide
- Web divide
Q.3 Computers manipulate data in many ways, and this manipulation is called……
Q.4 The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called:
- Computer forensics
Q.5 Where does most data go first with in a computer memory hierarchy ?
Q.6 The………….data mining technique derives rules from real-world case examples.
- Rule discover
- Signal processing
- Neural nets
- Case-based reasoning
Q.7 …………… is the science that attempts to produce machines that display the same type of intelligence that humans do
- Artificial intelligence (Al)
Q.8 Servers are computers that provide resources to other computers connected to a :
Q.9 When creating a computer program, the ……… designs the structure of the program
- End user
- System Analyst
- All of the above
Q.10 A computer program that converts an entire program into machine language at one time is called a/ an