1. Which command divides the surface of the blank disk into sectors and assigns a unique address to each one?
2. Shortcut key for creating a new folder is
3. Which tool in Control Panel is used to adjust your computer settings to control the computer with voice commands?
4. The <tag> is used to create a numbered list in HTML.
5. The _____ element holds two or more frame elements.
6. Which of the following input devices interprets pencil marks on paper media?
7. The term GIGO is related to which characteristic of computers?
8. Dot matrix printer is an example of _____.
9. ______ is a translator which translates the program written in high-level language into machine-level language.
10. The cache memory works between _____.
11. Which of the following is a valid statement?
12. The delay that occurs during the playback of a stream is called:
13. Which of the following cables can transmit data at high speed?
14. Which of the following is considered as unsolicited commercial email?
15. Firewalls are to protect against:
16. The purpose of the macros feature in a word processing application is:
17. The space left between the margin and the start of a paragraph is called:
18. In which view are headers and footers visible?
19. The ability to combine names and addresses with a standard document is called:
20. Which of the following tabs is used to add document citations?
21. Which of the following shortcut keys is used to check spelling?
22. A4 sized paper is:
23. In Excel, cells are labeled as:
24. The basic unit of a worksheet into which you enter data is called a:
25. Which of the following is NOT the correct method of editing the cell content?
26. The formula in the cell B5 is =A4+C3. This is copied to cell D8. What will be the formula in D8?
27. Which tab contains the tool "Freeze panes"?
28. Absolute reference of third row of E column in excel is;
29. Which of the following feature displays only the data in column(s) according to specified criteria?
30. The PowerPoint view that displays only text (title and bullet) is
31. A ____ is an area reserved for a specific piece of data.
32. A field that uniquely identifies each record in a table is
33. Which is NOT a valid data type in MS access?
34. Record of the table is also called;
35. ____ Runs on a computer hardware and serve as platform for other software to run on.
Part-B: Subjective Questions
1. What are the common computer security threats and protection measures?
Computer security threats refer to any potential danger to computer systems, networks, or data. Some common computer security threats include: Viruses and malware: These are software programs designed to harm or exploit computer systems.
- Phishing attacks: These are attempts to trick users into revealing sensitive information such as passwords or credit card numbers.
- Hacking: This involves unauthorized access to computer systems or networks.
- Spyware: This is software that secretly monitors and collects user data.
- Ransomware: This is malware that demands payment in exchange for restoring access to encrypted data.
- Install anti-virus software and keep it up-to-date.
- Use strong passwords and keep them confidential.
- Avoid suspicious emails and attachments.
- Use a firewall to block unauthorized access to the network.
- Regularly back up important data.
- Use encryption to protect sensitive data.
- Keep the operating system and software up-to-date with the latest security patches.
2. Explain the importance of relationships in a relational database system. Describe the types of relationships commonly used in database design, and provide examples of how they are implemented in MS Access.
In a relational database system, relationships are crucial for linking data between different tables. A relationship is a connection between two or more tables based on a common field. There are three main types of relationships:
- One-to-One (1:1) relationship: This type of relationship exists when one record in a table is related to only one record in another table.
- One-to-Many (1:M) relationship: This type of relationship exists when one record in a table is related to multiple records in another table.
- Many-to-Many (M:M) relationship: This type of relationship exists when multiple records in one table are related to multiple records in another table.
3. What is an operating system? List its major functions.
An operating system (OS) is a software that manages computer hardware resources and provides a platform for running application software. The major functions of an operating system include:
- Process management: The OS manages the creation, execution, and termination of processes (programs) running on the computer.
- Memory management: The OS manages the allocation and deallocation of memory for running programs.
- File system management: The OS provides a file system that allows programs to read and write files to storage devices such as hard drives.
- Input/Output (I/O) management: The OS manages input/output operations between devices such as keyboards, displays, and printers.
- Security: The OS provides mechanisms for controlling access to computer resources such as user authentication and access control.
- Networking: The OS manages communication between the computer and other devices on a network.
- Interrupt handling: The OS handles interrupts generated by hardware devices such as keyboards and disk drives.