REVISION MULTIPLE CHOICE QUESTIONS CLASS IX
Transmission of computerised data from one location to another is called
- data transfer
- data flow
- data communication
- data management
Answer
data communication
Reason — Transmission of computerised data from one location to another is called data communication.
When a group of computers is connected together in a small area without the help of some cables, it is called
- Remote Communication Network (RCN)
- Local Area Network (LAN)
- Wide Area Network (WAN)
- Value Added Network (VAN)
Answer
Local Area Network (LAN)
Reason — When a group of computers is connected together in a small area without the help of some cables, it is called Local Area Network (LAN).
Full form of LAN is
- Legal All Network
- Legal Area Network
- Local Area Network
- Lost Area Network
Answer
Local Area Network
Reason — Full form of LAN is Local Area Network.
Interactive combination of text, graphics, images, audio, video etc. is known as :
- Data
- Information
- Multimedia
- Internet
Answer
Multimedia
Reason — Interactive combination of text, graphics, images, audio, video etc. is known as multimedia.
Internet may be termed as an example of
- LAN
- MAN
- WAN
- All the above
Answer
WAN
Reason — Internet may be termed as an example of Wide Area Network (WAN).
A Local Area Network (LAN) is a :
- network within a building or site
- network across a city, country or even the world
- network that contains servers across the world
- a network with 2000 or more computers.
Answer
network within a building or site
Reason — A Local Area Network (LAN) is a network within a building or site.
A Wide Area Network (WAN) is a :
- network within a building or site
- network across a city, country or even the world
- network that contains no server
- network with fewer than two computers.
Answer
network across a city, country or even the world
Reason — A Wide Area Network (WAN) is a network across a city, country or even the world.
Networks are useful because :
- no-one can copy your files
- you only need one printer per network
- the computers use less electricity
- each user of the network can access files more easily.
Answer
you only need one printer per network
Reason — Networks are useful because resources such as a printer, can be shared within a network.
Storing and accessing data and programs over the internet is generally known as
- Modern computing
- Internet computing
- Wireless computing
- Cloud computing
Answer
Cloud computing
Reason — Storing and accessing data and programs over the internet is generally known as Cloud computing.
The communication media used for wireless network is collectively called
- Cables media
- Satellite media
- Guided media
- Unguided media
Answer
Unguided media
Reason — The communication media used for wireless network is collectively called unguided media.
CYBER SAFETY
What name is given to a malicious program that comes in disguise of a useful program ?
- Trojan Horse
- Invisible Man
- Stowaway
- Uninvited guest
Answer
Trojan Horse
Reason — A trojan horse is a program that appears harmless, such as a text editor or a utility program, but actually performs malicious functions such as deleting or damaging files.
Which of these is classed as personal information ?
- Date of birth
- Online nickname
- Gender
- Largest peak in your continent
Answer
Date of birth, Online nickname, Gender
Reason — 'Date of birth', 'Online nickname' and 'Gender' is personal information. 'Largest peak in your continent' is a public information.
What software can you use to avoid getting viruses ?
- Disk Cleanup software
- Firewall
- Anti-virus software
- Safety software
Answer
Anti-virus software
Reason — Anti-virus software protects the computer from viruses.
What is a computer virus ?
- a program written to cause harm to a computer
- a hardware fault which causes data to be damaged
- a fault with the CPU which means that data is lost or damaged
- Weather affecting the performance of your computer
Answer
a program written to cause harm to a computer
Reason — Computer viruses are malicious codes/programs that cause damage to data and files on a system.
What is the most common way people's computers get infected by a virus ?
- receive a fax
- install new hardware
- download email attachments
- Run/open an infected disk
Answer
Run/open an infected disk
Reason — The most common way computers get infected by a virus is by running or opening an infected disk or file.
What purpose does anti-virus software serve ?
- it deletes every file it suspects is infected
- it stops people gaining unauthorised access to your computer via the internet
- it inspects computer files and email attachments for viruses and removes or quarantines any that it finds
- it changes the code of malicious software.
Answer
it inspects computer files and email attachments for viruses and removes or quarantines any that it finds
Reason — An anti-virus software inspects computer files and email attachments for viruses and removes or quarantines any that it finds.
Which of the following is NOT an example of Cybercrime ?
- Stealing computer hardware
- Cyber Bullying
- Cyber Stalking
- Stealing someone's online identity
Answer
Stealing computer hardware
Reason — Stealing computer hardware does not involve the use of electronic communication or information systems. Thus, it is not a cyber crime.
What does a firewall do ?
- prevents unauthorised access to your computer via the Internet
- stops you installing software that may harm your computer
- records everything you do on your computer
- runs checks every time to prevent virus attacks
Answer
prevents unauthorised access to your computer via the Internet
Reason — Firewall is a program that monitors all communications and traps all illicit packets. Thus, it prevents unauthorised access to your computer via the Internet.
POWERPOINT
Professional looking visual aids are prepared with the help of a software called ............... .
- DBMS
- MultiMedia software
- Graphics software
- Presentation Graphics software
Answer
Presentation Graphics software
Reason — Professional looking visual aids are prepared with the help of a software called Presentation Graphics software.
Which of the following is a presentation graphics software ?
- Linux
- Writer
- Calc
- Impress
Answer
Impress
Reason — Impress is a presentation graphics software.
An electronic page in a presentation is called ............... .
- page
- e-page
- slide
- e-slide
Answer
slide
Reason — An electronic page in a presentation is called slide.
Which of the following view is not one of Impress views ?
- Slide sorter view
- Slide view
- Slide show view
- Sorter view
Answer
Sorter view
Reason — Sorter view is not one of Impress views.
A set of pre-designed formats of text or color scheme is called ............... .
- Slide
- Presentation scheme
- Template
- Schema
Answer
Template
Reason — A set of pre-designed formats of text or color scheme is called template.
Rehearse Timings command is present on ............... menu.
- Slide Show
- Format
- Tools
- Window
Answer
Slide Show
Reason — Rehearse Timings command is present on Slide Show menu.
Slide Show command is present on ............... menu.
- Edit
- Tools
- Format
- Slide Show
Answer
Slide Show
Reason — Slide Show command is present on Slide Show menu.
In ............... view, you can see all the slides of your presentation simultaneously.
- Outline
- Note
- Slide Sorter
- Slide show
Answer
Slide Sorter
Reason — In Slide Sorter view, you can see all the slides of your presentation simultaneously.
In ............... view, you can see one slide at a time and do any editing work in it.
- Slide show
- Slide Sorter
- Outline
- Normal
Answer
Normal
Reason — In Normal view, you can see one slide at a time and do any editing work in it.
The command Custom Animation is present on ............... menu.
- Slide Show
- Format
- Tool
- Edit
Answer
Slide Show
Reason — The command Custom Animation is present on Slide Show menu.
Comments
Post a Comment