330. What are the two types of monitors? A. CRT and DVD B. CRT and LCD C. DVD and VCD D. LCD and DVD ✅ The correct answer is option B.
332. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): A. Hacker-proof program B. Firewall C. Hacker-resistant server D. Encryption safe wall ✅ The correct answer is option B.
334. Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is A. Local area network B. Modem C. Base band networking D. Broad band networking ✅ The correct answer is option D.
336. Output hardware is often categorized according to whether it: A. is expensive B. requires a large amount of electricity to work C. produces hardcopy or softcopy D. can fit on a desktop ✅ The correct answer is option C.
338. An impact printer creates characters by using? A. An inked ribbon and print head B. Electrically charged ink C. An ink pen D. All of the above ✅ The correct answer is option A.
340. Which of the following is NOT a type of broad band internet connection? A. Cable B. DSL C. Dial-up D. Satellite ✅ The correct answer is option C.
342. The unit of a computer system that executes program, communicates with and often controls the operation of other subsystems of the computer is known as A. CPU B. Control Unit C. I/O unit D. Peripheral unit ✅ The correct answer is option A.
345. The 0 and 1 in the binary numbering system are called binary digits or _____ A. bytes B. kilobytes C. decimal bytes D. bits ✅ The correct answer is option D.
309. The computer program language which is widely used in computer science and engineering and also in business is A. COBOL B. FORTRAN C. PASCAL D. LISP ✅ The correct answer is option C.
312. Use of icons and windows are characteristic of a ………. interface. A. command-driven B. windows-oriented C. graphical-user D. menu-driven ✅ The correct answer is option C.