31. A program used to detect overall system malfunction is___________________? A. Utilities B. System diagnostics C. System analysis D. System software ✅ The correct answer is option B.
32. A device that provides emergency power to your computer, conditions the voltage, and protects against powers surges is called a __________________? A. PSU = Power supply unit B. USP = Universal surge protector C. UPPS = Universal power protection and supply D. UPS = Uninterruptible power supply ✅ The correct answer is option D.
33. Processing involves____________________? A. displaying output in a useful manner B. inputting data into a computer system C. providing relevant answers D. transforming input into output ✅ The correct answer is option D.
34. The physical layer translates logical communication requests from the ___________ into hardware specific operations? A. data link layer B. network layer C. trasnport layer D. application layer ✅ The correct answer is option A.
35. The computer industry uses prefixes of Greek origin to measure large amounts of data. Which term describes 1024 bytes ? A. Kilobyte B. Megabyte C. Gigabyte D. Terabyte ✅ The correct answer is option A.
36. One nibble is equal to________________? A. 4 bits B. 8 bits C. 6 bits D. 16 bits ✅ The correct answer is option A.
37. Which is an electronic device that can store temporarily a single bit of data ? A. Latch B. Accumulator C. Buffer D. Accumulator ✅ The correct answer is option A.
38. Which of the following is NOT an Input device ? A. Keyboard B. Monitor C. Joystick D. Microphone ✅ The correct answer is option B.
39. Digital photos and scanned images are typically stored as___________________ graphics with extensions such as .bmp, .png, .jpg, .tif, or .gif ? A. vector B. bitmap C. either vector or bitmap D. neither vector nor bitmap ✅ The correct answer is option B.
40. Control in design of an information system is used to________________? A. ensure that the system processes data as it was designed to and that the results are reliable B. protect data from accidental or intentional loss C. inspect the system and check that it is built as per specifications D. ensure privacy of data processed by it ✅ The correct answer is option A.