GSS131 Introduction to Computer PDF

Summary

This is a sample past paper quiz in introduction to computer science covering various topics like computer types, hardware, software, communication and more. The questions are multiple choice.

Full Transcript

## GSS131 (INTRODUCTION TO COMPUTER) 1. Fourth Generation Computers used - (a) Supercomputer - (b) Microprocessors - (c) Minicomputers - (d) Uniprocessors 2. Which of the following is not an example of a search engine for browsing? - (a) Google - (b) Yahoo - (c) ASK - (d) E-mail 3...

## GSS131 (INTRODUCTION TO COMPUTER) 1. Fourth Generation Computers used - (a) Supercomputer - (b) Microprocessors - (c) Minicomputers - (d) Uniprocessors 2. Which of the following is not an example of a search engine for browsing? - (a) Google - (b) Yahoo - (c) ASK - (d) E-mail 3. The TCP/IP was developed by - (a) Nigerian Defense Academy - (b) US Department of Defense (DoD) - (c) Ghana Military Defense - (d) None of the above. 4. Which of the following is not a level of programming language? - (a) Low Level Language (LLL) - (b) Machine Level Language (MLL) - (c) High Level Language (HLL) - (d) System Level Language (SLL) 5. ___ is the transfer of data/information from one point to the other using computer and other computing devices. - (a) Data bus - (b) Data communication - (c) Data analysis - (d) Data mining 6. What is the full meaning of ROM-BIOS? - (a) Read Only Memory-Basic Interface/Output System - (b) Read Only Memory-Basic Input/Output System 7. ___ refer to the set of rules and standard procedures used by __ on the internet to communicate - (a) Internet data bundle - (b) Internet protocol - (c) Internet topology - (d) All of the above 8. One of the following is not a characteristic of computers - (a) High speed - (b) Accuracy - (c) Reliability - (d) Redundancy 9. A computer system is broadly categorized into ___ and ___ ? - (a) Hardware and Software - (b) File and Records - (c) Diskette and flash drives - (d) None of the above 10. Application programs that are usually developed either in-house (by an organization's programmers) or by consultants hired by the organization is known as ____ ? - (a) Application documentation - (b) Tailor-made (Customized) Software - (c) Application packages or CoTs - (d) All of the above 11. The communication system in which it possible to communicate in both direction is known as - (a) Simplex - (b) Half duplex - (c) Full duplex - (d) None of the above 12. The reliability of computers makes them to be deployed in sensitive areas like - (a) Intensive-Care Units of hospitals - (b) Watching sensitive videos - (c) Connecting to your TV set - (d) None of the options 13. Another name for a HUB is - (a) Bridge - (b) Router - (c) Concentrator - (d) Modem 14. The early internet was used only by the following: - (a) Scientists, Liberians, computer experts and engineers - (b) Mathematicians, military, computer scientist, artist - (c) All of the above - (d) None of the above 15. In IT Security, what is the full meaning of C.I.A.? - (a) Cyber Investigative Attack - (b) Cyber Intelligence Attack - (c) Confidential Incident Attack - (d) Confidentiality Integrity Availability 16. Network topologies are subdivided into two categories based on the capabilities of the network's hardware and the characteristics of the various modes of data transmission. These two categories are ___ and ___ - (a) Wired and Wireless - (b) Physical and Logical - (c) Physical and Wired - (d) Logical and Wireless 17. Which of the following is not example of a utility program? - (a) Sorting - (b) Editing - (c) File copying - (d) Compiler 18. - (b) Translator - (c) Processor - (d) All of the above 19. Computer devices that transform information from machine readable form to human readable form is known as ___ ? - (a) Input devices - (b) Output devices - (c) Storage devices - (d) None of the above 20. A computer is said to be a programmable device because - (a) It is an electronic device - (b) It can produce output - (c) It can be assigned instructions - (d) It can receive some inputs 21. Which of the following is not an advantage of computers in Nigeria? - (a) High speed - (b) Accuracy - (c) Dependence on electric power - (d) Storage and retrieval 22. A sensitized screen that enables a person to use a simple device such as a pencil, or even a finger to point to Menu choices displayed on the screen of the computer is known as ___ ? - (a) Light pen - (b) Touch screen - (c) Joystick - (d) Touch pad 23. Programs that are designed to solve the problems of users is known as ___ ? - (a) Logic - (b) Circuit - (c) Application software - (d) None of the above 24. ___ communication system involves one sender and multiple recipient - (a) Point-to-point - (b) Point-to-multipoint - (c) All of the above - (d) None of the above 25. The speed at which your computer receives information is known as - (a) The standard processing rate - (b) The standard download speed - (c) The standard data speed - (d) None of the above 26. Which of the following is not a reason why firewall sometimes fail to protect the network from external intrusion attack. - (a) Because it can only protect against known attacks - (b) Because configuring firewalls properly is very easy - (c) Because firewalls may contain software bugs or vulnerabilities - (d) Because hacks in HTTP can sip through 27. Which of the following is not a virus - (a) Worm - (b) Logic Bomb - (c) Trojan Horse - (d) Win-Zip 28. The internet host to host mail transport protocol that operates over TCP protocol port is called? - (a) SMTP - Simple Mail Transfer Protocol - (b) FTP - File Transfer Protocol - (c) POP - Post Office Protocol - (d) Telnet Protocol 29. ___ are hardware devices used to achieve network connectivity and communication. - (a) Network Devices - (b) Peripherals - (c) Cables - (d) Wires 30. Which of the following is not example of a translator? - (a) Debugging programs - (b) Assembler - (c) Compiler - (d) Interpreter 31. A step-by-step set of instructions directing the computer to perform a task is known as ___ ? - (a) Software - (b) Program - (c) Algorithm - (d) Flowchart 32. The computer memory system is categorized into ___ and ___ ? - (a) Primary and Secondary memory - (b) Input and Output storage - (c) Files and record storage - (d) None of the above 33. For a computer processing operation to be useful - (a) It must be produced fast - (b) Output must be in human-understandable form - (c) Output must be large - (d) Output should be electronic 34. An intruder is someone or an agent who is attempting to break into or misused the system or computer resources. The two existing categories of intruders are: - (a) Spammers and Hackers - (b) Insiders and Spies - (c) Insiders and Hackers - (d) Insiders and Outsider 35. Some recent use of the internet includes: - (a) Remote help, freedom of speech, registration and reservations - (b) Search tools, correspondence, new business opportunities - (c) All of the above - (d) None of the above 36. In a ___ topology, the signals travel around the loop in one direction and pass through each computer, which can act as a repeater to boost the signal and send it onto the next computer. - (a) Bus - (b) Mesh - (c) Ring - (d) Star 37. ___ Virus are often transmitted by floppy disk left in the disk drive. - (a) Boot sector - (b) Trojan horse - (c) Script - (d) Logic bomb 38. World Wide Web (WWW) is a network of electronic documents called ___ that are accessible through the Internet. - (a) Web links - (b) Web Pages - (c) Web sites - (d) Web browser 39. ___ is the connection of two or more computers for the purpose of sharing both hardware and software scarce resources - (a) Network - (b) Program - (c) Data - (d) Algorithm 40. An operating system that allows many users to take advantage of various resources of the computer simultaneously is known as ___ ? - (a) Single user, multitasking Operating System - (b) Real-time Operating System - (c) Single user, single tasking Operating System - (d) Multi-users Operating System 41. A communication system in which the caller and the called can communicate simultaneously is known as ___ - (a) Full duplex - (b) Simplex - (c) Half duplex - (d) All of the above 42. ___ are attached to computers primarily to provide alphanumeric outputs to users - (a) Keyboard - (b) Printers - (c) Scanners - (d) Joystick 43. The Computer used most in offices are - (a) Mainframe computer - (b) Microcomputer - (c) Supercomputer - (d) Minicomputer 44. Which of the following is not a hardware component of a computer system? - (a) Central Processing Unit (CPU) - (b) Main Memory - (c) Input/Output devices - (d) System files 45. Which of the following is not an example of application software? - (a) Programs that make up payroll - (b) Programs that play games - (c) Programs that design electronic components - (d) Operating System 46. The communication system which involves two end-point is known as ___ ? - (a) Point-to-multipoint communication - (b) Point-to-point communication - (c) All of the above - (d) None of the above 47. Two most popular component of the internet are: - (a) Internet connectivity/Browsers - (b) Internet Explorer/Facebook - (c) Facebook/e-mail - (d) World Wide Web/E-mail 48. The following are important security functions except - (a) Logging/documentation - (b) Intrusion Detection System/firewalls - (c) Backup/information system design - (d) Information classification/incident handiing 49. Boot sector virus infects - (a) System files - (b) Master Boot Records - (c) Application Software - (d) Document files 50. Computing devices of the fifth generation are based on - (a) Human Intelligence - (b) Artificial Intelligence - (c) Modern Intelligence - (d) Programming 51. The mouse is used in conjunction with a ___ ? - (a) Printer - (b) Floppy disk - (c) Visual Display Unit/Monitor - (d) Keyboard 52. The ENIAC stands for - (a) Electronic Numerical Integrator And Counting - (b) Electronic Numerical Integrator And Computer - (c) Electrical Numerical Integrator And Computer - (d) Electronic Numerical Interphase And Computer 53. Which of the following is not a programming language - (a) BASIC - (b) FORTRAN - (c) Python - (d) Processor 54. The two categories of Application software are ___ and ___ - (a) Compiler and Interpreter - (b) Tailor-Made-Software and Commercial-off-Shelf (COTS) - (c) Flowchart and algorithm - (d) Preprocessor and processor 55. Which of the following is the main power of a computer network? - (a) Speed - (b) Ability to share information efficiently - (c) Security - (d) None of the above 56. The most suitable example of the internet is: - (a) Local Area Network (LAN) - (b) Wide Area Network (WAN) - (c) Personal Area Network (PAN) - (d) Metropolitan Area Network (MAN) 57. Why should computers connected to the internet without protection pose a big threat to the owners? - (a) Because of hackers - (b) Because it does not have Antivirus software installed - (c) Because it might be infected with malicious programs - (d) Because the internet is not protected 58. ___ of MIT was the first to propose a global network of computers in 1962. - (a) Leonard Kleinrock - (b) Lawrence Robert - (c) J. C. R. Licklider - (d) Edward brown 59. The versatility characteristic of computers is that - (a) A computer plays a single role - (b) A computer can be used for multiple purposes - (c) A computer can be used for programming - (d) None of the options 60. The Analytical Engine had the following components - (a) Monitor, calculating unit and valves - (b) Barrel, store and monitor - (c) Store, pump and barrel - (d) Store, calculation unit, the barrel 61. A close internet within an organization is called - (a) Internet - (b) Intranet - (c) All of the above - (d) None of the above 62. ___ is a type of pointing device used for data input - (a) Keyboard - (b) Mouse - (c) All of the above - (d) None of the above 63. The cursor is to the keyboard as ___ is to the mouse of a computer system. - (a) Point Arrow - (b) Cursor - (c) Monitor - (d) Printer 64. What is the full meaning of ISDN? - (a) Internet Services Data Network - (b) Internet Services Digital Network - (c) All of the above - (d) None of the above 65. Which of the following is not an Antivirus? - (a) AVG - (b) Norton Antivirus - (c) Kaspersky - (d) I love you 66. In a ___ communication system, communication is only possible in one direction - (a) Simplex - (b) Half duplex - (c) Full duplex - (d) All of the above 67. Which of the following is not a network scarce resources? - (a) Printer - (b) Internet connection - (c) Network scanner - (d) Protocol 68. Computers of the first generation used - (a) Integrated circuits - (b) Wires - (c) Transistors - (d) Vacuum tubes 69. Which of the following input device is mostly used in a command based operating environment? - (a) Keyboard - (b) Mouse - (c) All of the above - (d) None of the above 70. Limitations of analog computers include - (a) Long setup and inaccurate results - (b) Size and long Setup - (c) Speed and long Setup - (d) Cost 71. Program that help people to use the computer is known as ___ ? - (a) System Software - (b) Compiler - (c) Microsoft word - (d) All of the above 72. Which of the following communication system uses point-to-multipoint communication? - a. Telephone communication - b.Computer communication - c. Microphone in voice conferencing - d.All of the above 73. Which of the following is not a disadvantage of computers? - (a) Redundancy - (b) Cost - (c) Computer literacy - (d) Ease of document editing 74. Which of the following input device is mostly used in graphic base operating environment? - (a) Mouse - (b) Keyboard - (c) All of the above - (d) None of the above 75. A memory device that has the ability of losing its contents when the system is turned off is said to be a ___ ? - (a) Permanent memory - (b) Volatile memory - (c) Secondary memory - (d) None of the above 76. Which of the following is an example of a simple, single function computing device that does not use an operating system? - (a) Desktops - (b) Laptops - (c) Palmtops - (d) Microwave ovens with digital keypads 77. Which of the following system resources can be shared in a network - (a) Data - (b) Software - (c) Hardware - (d) All of the above 78. Which of the following is not example of a network topology? - (a) Bus - (b) Star - (c) Ring - (d) Protocol 79. A network device that reads the destination address on the sent packets and forwards the packets to the appropriate destination is called a - (a) Router - (b) Modem - (c) Hub - (d) Network Interface Card 80. Which of the following device(s) can help you access to the internet? - (a) TV Sets - (b) Mobile - (c) Laptops - (d) All of the above 81. A ___ is a network device used to connect one computer with a telephone line so that one can access information from other computers. - (a) LAN Card - (b) Bridge - (c) Modem - (d) Repeater 82. Which of the following is the entry level connection to the internet using Dail-Up? - (a) Telephone line and a modem - (b) Circuitries and a processor - (c) All of the above - (d) None of the above 83. The speed at which you put your data to the internet is known as - (a) Download speed - (b) Upload speed - (c) All of the above - (d) None of the above 84. ___ is achieved by sending data on a radio frequency - (a) Wired internet - (b) Wireless internet - (c) All of the above - (d) None of the above 85. Virus is a - (a) Utility Program - (b) Destructive program - (c) System Program - (d) None of the above 86. The antenna picks up radio waves from wireless internet access points and send to your server terminal through a - (a) Internet Service Provider - (b) Wireless Network Card - (c) All of the above - (d) None of the above 87. A malicious program that attaches itself to other programs in the computer with the intention of deleting or destroying data in a host computer is called - (a) Virus - (b) Worm - (c) Spam - (d) Phishing 88. A network of networks is known as - (a) Network - (b) Internet - (c) All of the above - (d) None of the above 89. A self-contained program that has the capability to transport itself from one computer (resources) to another in a network is called - (a) Bot net - (b) Virus - (c) Worm - (d) Antivirus 90. Which is the most expensive computer in the world - (a) Mainframe computer - (b) Microcomputer - (c) Supercomputer - (d) Minicomputer 91. Which of the following is an Antivirus program? - (a) Windows - (b) Norton Antivirus (NAV) - (c) Photoshop - (d) All of the above 92. A ___ is a network device that acts as an interface between the computer and the network cable - (a) Hub - (b) Modem - (c) Bridge - (d) Network Interface Card 93. An operating system that is designed such that one user can effectively do one thing at a time is known as ___ ? - (a) Real-time Operating System - (b) Single user, single tasking Operating System - (c) Single user multitasking Operating System - (d) Multi-users Operating System 94. Which of the following computer device has a dual function? - (a) Keyboard - (b) Printer - (c) Visual Display Unit (VDU) - (d) Flash drives 95. ___ is a type of communication system in which there is a central location from which information is sent to many recipients - (a) Broadcast communication - (b) Client-Server computer communications - (c) All of the above - (d) None of the above 96. The Third Generation of Computers was in the year - (a) 1965-1970 - (b) 1957-1964 - (c) 1971-1981 - (d) 1946-1956 97. Printers are categorized into different classes according to ___ ? - (a) Their sizes - (b) Mode of operation - (c) Speed - (d) The method used in printing output 98. An operating system that allows a user to simultaneously run multiple application (programs) on the computer is known as ___ ? - (a) Single user, multitasking Operating System - (b) Real-time Operating System - (c) Single user, single tasking Operating System - (d) Multi-users Operating System 99. A computer system can be described in terms of ___ and ___ - (a) Monoware and Multiware - (b) Hardware and software - (c) Peopleware and Engineeringware - (d) None of the options 100. The Central Processing Unit (CPU) is made up of ___ and ___ - (a) Input and Output devices - (b) Control Unit and Arithmetic/Logic Unit - (c) None of the Above - (d) All of the Above 101. The various program that perform the tasks for which the computer was purchased is known as ___ ? - (a) System software - (b) Application software - (c) Operating system - (d) All of the above 102. Which of the following input device is used by WAEC, JAMB and UNICAL post UTME? - (a) Optical Mark Reader (OMR) - (b) Barcode Scanners - (c) Optical Character Reader (OCR) - (d) All of the above 103. What is the full meaning of TCP/IP? - (a) Timeline Control Protocol/Internet Protocol - (b) Transmission Control Protocol/Internet Protocol - (c) All of the above - (d) None of the above 104. The Operating System that are used to control machinery, scientific instruments and industrial systems are known as ___? - (a) Single user, single tasking Operating system - (b) Real-time Operating System - (c) Single user, multitasking Operating System - (d) Multi-users, Operating System 105. Which of the following is examples of a point-to-point communication system? - (a) Telephone voice communication - (b) Computer communication - (c) All of the above - (d) none of the above 106. A computer and groups of computers that exist in a domain which share certain thing in common from others in the network is known as - (a) A network database - (b) Network resources - (c) Workstation - (d) Server 107. What is the full meaning of DARPA? - (a) Defense Advance Research Project Agency - (b) Defence Advance Research Project Agency - (c) Defense Advance Research Projects Agency - (d) Defense Access Research Projects Agency 108. An attack which prevent computer resources from being available to the intended users is called - (a) Flooding Web Server attack - (b) Prevention of Service attack - (c) Denial of Service Attack - (d) Flooding of Service attack 109. Internet connection is always initiated by dialing an - (a) Internet cable - (b) Internet Service provider (ISP) - (c) Internet Channels - (d) All of the above 110. ___ is defined as an estimated probability that a THREAT WILL BE ACTIVATED - (a) Threat - (b) Risk - (c) Vulnerability - (d) Attack. 111. The WWW consist of? - (a) Files - (b) Links - (c) Resources - (d) All of the above 112. A common name for main memory is - (a) Read Only Memory (ROM) - (b) Random Access Memory (RAM) - (c) All of the above - (d) None of the above 113. Which of the following is not a function or advantage of Operating System? - (a) Facilitating efficiency and reliability - (b) Controlling the hardware - (c) Serves as interface between the user and computer hardware - (d) Translation of source program code. 114. A device that enables the computer to output high-quality line graphics is known as ___ ? - (a) Microforms - (b) Graph plotters - (c) Printer - (d) Keyboard 115. You can connect to the internet through the following except - (a) Cable - (b) Satellite - (c) Terrestrial fixed and mobile wireless - (d) Digitizers 116. A storage area which holds programs and data temporarily during processing is known as ___ ? - (a) Secondary memory - (b) Main memory - (c) All of the above - (d) None of the above 117. Which of the following is not an input device of a computer system? - (a) Keyboard - (b) Mouse - (c) Joystick - (d) Printer 118. The Slide Rule was invented by - (a) Charles Babbage - (b) William Oughtred - (c) Gottfried W. Leibnitze - (d) Joseph-Marie Jacquard 119. A hybrid computer has a device that converts analog signals into digital codes, called - (a) Digitizer - (b) Converter - (c) Modem - (d) Translator 120. ___ converts data/information from forms that are convenient for humans to the Binary codes that a computer requires, and Vice Versa. - (a) Program - (b) Input and Output devices - (c) Primary and secondary memory - (d) All of the above 121. Which is the following is not the merit of application packages? - (a) They save programming effort and expenses on the part of the user - (b) Software development cost are effectively shared among the purchasers, thus making them cheap - (c) The user enjoy a high level of confidence, because the program is well tried and tested - (d) The purchaser does not have direct control of the package. 122. Which of the following internet system is prone to rain fade (Degradation) - (a) TV set internet - (b) Laptops internet - (c) Mobile phone internet - (d) Satellite internet 123 Which of the following is a demerit of application packages? - (a) Application packages are tailored towards general needs and may not be able to meet the specific needs of a user/client - (b) The user of application packages results in relatively quick implementation of a computer based project. - (c) The user enjoys a high level of confidence, since the program is well-tried and tested - (d) All of the above 124. System devices used for entering data and instructions code (programs) into the computer is known as ___ ? - (a) Output - (b) Input - (c) Logic gates - (d) Files 125. Computers can help in crime detection and control if - (a) Computers are made faster - (b) Everyone has a computer - (c) Records of citizens are stored in database - (d) None of the options 126. Which of the following internet system is an option for people in rural areas? - (a) TV set internets - (b) Laptops internet - (c) Mobile phone internet - (d) Satellite internet 127. Which of the following shows the use of computers in Education - (a) Computer-aided instruction - (b) e-Learning - (c) Educational management - (d) All of the options 128. Which of the following is not a recommended step taken to protect data and information stored on a computer system. - (a) Isolation of Information from some users - (b) Keeping a backup copy of every file in their system to make their job easy - (c) Users should only change and modify information they are authorized to modify - (d) Users should only be able to read or view data needed for their job. 129. Establishing as internet connection over a wireless network through an antenna is known as - (a) Internet protocols - (b) Radio (wireless) connection - (c) Satellite connection - (d) Telephone connection 130. The condition where information and other resources stored in a system are only made available to authorized users, entities or processes is known as - (a) Confidentiality - (b) Reliability - (c) Availability - (d) Accessibility 131. The ___ topology is used to enable network devices to transmit and receive data across the transmission media without interfering with each other. - (a) Physical - (b) Logical - (c) Wired - (d) Wireless 132. A ___ connection is an arrangement in which outgoing and incoming data are sent from, and arrive at a computer. - (a) Satellite internet - (b) Mobile phone internet - (c) Laptops internet - (d) TV sets internet 133. Which of the following is/are the goal of computer network system - (a) Sharing data (or information) - (b) Sharing hardware/software resources - (c) Centralizing administration and support - (d) All of the above 134. Which of the following is not a family of Operating System? - (a) Microsoft Windows family - (b) Macintosh - (c) Unix - (d) Microprocessor 135. In general, the use of Operating Systems depends on ___ and ___ ? - (a) Size and function of a computer system - (b) Hardware and Software of the computer - (c) Type of computer and type of applications that will be run on the computer - (d) All of the above 136. In which area of transportation are computers used? - (a) Airways reservation - (b) Railway reservation - (c) Traffic control - (d) All of the options 137. Programs that are developed to solve a variety of similar problems without any specific user/client in mind is known as ___ ? - (a) Tailor-made (customized) software - (b) Application packages or CoTs Software - (c) All of the above - (d) None of the above 138. The Stored Program Concept was proposed by - (a) William Oughtred - (b) Charles Babbage - (c) John von Neumann - (d) Bill Gates 139. Whenever programs and data are entered into the computer from an input device, they are held in ___ until processing is completed. - (a) Hard disk - (b) Main memory - (c) Secondary memory - (d) All of the above 140. Which of the following input device is used in modern bank cheques? - (a) Joystick - (b) Punched card - (c) Magnetic Ink Character Recognizer (MICR) - (d) Optical Mark Reader (OMR) 141. A master control program that takes over the operations of the computer to the extent of being able to allow a number of programs to run on the compute without human involvement is known as ___ ? - (a) Logic Control - (b) Operating System - (c) Compiler - (d) Assembler 142. Which of the following is/are types of computer network - (a) Local Area Network - (b) Wide Area Network - (c) Metropolitan Area Network - (d) All of the above 143. What is the means for Virus transmission? - (a) Monitor - (b) Flash Drive - (c) Cable - (d) Mouse 144. ___ refers to a layout of a computer network? - (a) Network protocol - (b) Network topology - (c) Network administrator - (d) All of the above 145. In which year was E-mail adopted for ARPANET by RAY TOMLINSON? - (a) 1964 - (b) 1974 - (c) 1962 - (d) 1972 146. On the net we can find computers while on the web we can find? - (a) Videos - (b) Sound - (c) Information - (d) All of the above 147. The layout of the actual path that data follows within the physic topology is known as ___ ? - a. Physical topology - b. Logical topology - c. All of the above - d. None of the above 148. http and https, how do they differ? - a. https is secured - b. https is standard - c. All of the above - d. None of the above 149. ___ led

Use Quizgecko on...
Browser
Browser