Cargando....
Mantén pulsado para arrastrar. |
|||
Haz clic aquí para cerrar |
Pregunta 1 Informe
Destruction of files for malicious reasons such as access by fraudulent people is classified as being
Detalles de la respuesta
Destruction of files for malicious reasons, such as access by fraudulent people, is classified as "unauthorized access". This means that someone who is not authorized to access the files has gained access to them, and has intentionally damaged or deleted the files. This type of access is illegal and is a violation of the owner's rights to the information stored in the files.
Pregunta 2 Informe
Running other software on idle computer without the knowledge of the organisation is called theft of ___________
Detalles de la respuesta
Running other software on an idle computer without the knowledge of the organization is called theft of computer time. This means that the person is using the resources (e.g. processing power, memory, storage) of the computer without permission, which can slow down the performance of the computer and potentially interfere with the work of others. This unauthorized use of resources can be seen as equivalent to theft, since the person is taking something (in this case, computer time) without permission.
Pregunta 3 Informe
A light sensitive device that converts drawing, printed text or other images into digital form is
Detalles de la respuesta
The device that converts drawing, printed text or other images into digital form is called a scanner. A scanner works by using a light-sensitive sensor that captures the image of the document or picture being scanned. The image is then converted into a digital format, which can be saved to a computer or other digital storage device. Scanners are commonly used for a variety of purposes, such as scanning important documents, digitizing old family photos, and creating digital copies of artwork or other visual media. They are particularly useful for situations where a physical copy of a document or image is not practical or convenient, such as when sharing information over long distances or storing large amounts of data. Overall, a scanner is a valuable tool for anyone who needs to convert physical documents or images into digital form for easy access and storage.
Pregunta 4 Informe
The arrow displayed on the screen of a computer is called
Detalles de la respuesta
The arrow displayed on the screen of a computer is called a "Cursor". The cursor is a graphical representation of the position where text or data can be inserted or edited on the computer screen. It is typically displayed as a blinking vertical line, a block or a underline depending on the type of application or software being used. The cursor can be moved around the screen using the computer mouse, touchpad, or keyboard keys. When the cursor is moved, the text or data following it also moves accordingly. The term "pointer" can also refer to the arrow displayed on the screen, but it is a more general term that can refer to any graphical element used to indicate a position or selection on the screen. The term "indicator" is less commonly used and generally refers to a specific type of visual cue used to provide information to the user.
Pregunta 5 Informe
An Operating System is a type of?
Detalles de la respuesta
An Operating System (OS) is a type of system software. It is a program that manages the hardware and software resources of a computer, and provides a platform for other software applications to run on. The OS controls the input/output operations, manages memory and storage resources, and schedules tasks to be executed by the computer's processor. Examples of common operating systems include Windows, macOS, Linux, and Android.
Pregunta 6 Informe
Which is not a network for distribution of information?
Detalles de la respuesta
Microsoft Word is not a network for the distribution of information. Microsoft Word is a word processing software that is used to create, edit, and format documents. It is not a network because it does not distribute information, it is used to create and store information on a single device or in a cloud storage service. On the other hand, cloud storage, several computers to one printer, and e-mail are all examples of networks that distribute information.
Pregunta 7 Informe
Files that maintain the hierarchical structure of the file system.
Detalles de la respuesta
The correct answer is "Directories." Directories are special files that organize the hierarchical structure of the file system by grouping related files together into named collections. They act like folders, allowing users to easily locate and access the files they need. Each directory can contain other directories (sub-directories) and files. For example, in a Windows system, the "C:\Users" directory contains a sub-directory for each user account on the computer, and each user account directory contains sub-directories for documents, pictures, music, etc. In short, directories allow us to maintain a structured and organized file system.
Pregunta 8 Informe
Which of the following is an example of output device
Detalles de la respuesta
The example of an output device is a speaker. An output device is any device that receives information or data from a computer or electronic device and presents or displays it to the user in a perceivable format. In the case of a speaker, it receives sound data from a computer or electronic device and produces audible sound waves that can be heard by the user. Speakers are commonly used to play music, watch videos or movies, and listen to audio from video games. On the other hand, a keyboard and mouse are examples of input devices because they allow the user to input data or commands into a computer or electronic device. Similarly, a microphone is also an input device as it converts sound waves into electrical signals that can be processed by a computer or electronic device.
Pregunta 9 Informe
The combination of the arithmetic and logic units, as well as the ______________ unit makes up the central processing unit.
Detalles de la respuesta
The combination of the arithmetic and logic units, as well as the control unit makes up the central processing unit (CPU). A CPU is the "brain" of a computer. It is responsible for executing instructions and performing calculations. The arithmetic and logic units (ALU) are the parts of the CPU that perform mathematical operations, such as addition, subtraction, multiplication, and division, as well as logical operations, such as AND, OR, and NOT. The control unit is responsible for controlling the flow of data and instructions within the CPU and between the CPU and other parts of the computer, such as memory and input/output devices. It fetches instructions from memory, decodes them to determine what operation to perform, and then directs the ALU to perform the operation. In summary, the combination of the ALU and control unit makes up the CPU, which is responsible for processing data and instructions and performing calculations in a computer.
Pregunta 10 Informe
The function of an assembler is to _________
Detalles de la respuesta
The function of an assembler is to convert assembly language to machine language. Assembly language is a low-level programming language that is used to program computers and microprocessors. It consists of a series of instructions and operations that are written in human-readable text, and the assembler converts these instructions into machine code that the computer can understand and execute. The machine code is a series of binary digits (0s and 1s) that represent the instructions and operations in a form that the computer can process. In this way, the assembler acts as a bridge between the human-readable assembly language and the machine-readable machine code, allowing programmers to write code in a form that is easier for them to understand and debug, while still allowing the computer to execute the code efficiently.
Pregunta 11 Informe
Total types of data that can be read by document reader are
Detalles de la respuesta
Document readers are devices or software programs that can analyze and interpret written or printed text on a document. These devices can read different types of data from documents such as marks, handwritten and printed characters, and printed lines. Marks can include things like checkmarks or ticks that people might use to indicate a selection on a form or questionnaire. Handwritten characters are any letters, numbers or symbols that are written by hand, whereas printed characters are those that are produced by a printer. Printed lines refer to the lines of text that are printed on a page. Therefore, the correct answer is "all of the above" as document readers can read all of these types of data from documents.
Pregunta 12 Informe
Why is the base 10 system unique?
Detalles de la respuesta
The base 10 system, also known as the decimal system, is unique because it is the most widely used number system in the world and has been adopted by nearly all cultures and civilizations. The reason for this widespread usage is that it is based on the number of human fingers, with 10 being the number of digits on two hands. This made it a convenient and intuitive system for early humans to count and perform mathematical operations with. Additionally, the base 10 system allows for easy representation of numbers using only 10 symbols (0 to 9), making it simple to write, communicate, and perform mathematical operations with larger numbers.
Pregunta 14 Informe
The Domain name of a website is also its__________
Detalles de la respuesta
The domain name of a website is also its IP address. Every device that connects to the internet, including websites, is assigned a unique Internet Protocol (IP) address, which is a numerical label. However, remembering a long string of numbers is difficult, so domain names were created to serve as more memorable and recognizable names for websites. When you type a domain name into your web browser's address bar, your browser sends a request to a Domain Name System (DNS) server, which translates the domain name into its corresponding IP address. The IP address is then used to locate the website's server on the internet and retrieve the website's content, which is then displayed in your browser. So, while the domain name is what we typically use to identify a website, it ultimately maps to its underlying IP address, which is used to connect to the website's server and retrieve its content.
Pregunta 15 Informe
The Caps key on a keyboard is used to___________
Detalles de la respuesta
The Caps key on a keyboard is used to switch between upper and lower case letters. When you press the Caps key, it changes the letter case of the letters you type from lowercase to uppercase or vice versa. This means that if you type with the Caps key on, all the letters you type will appear in uppercase. Similarly, if you type with the Caps key off, all the letters you type will appear in lowercase. This feature is particularly useful when you want to emphasize certain words or phrases, such as in titles or headings. It can also be used to make your text easier to read by adding some variety to the letter case. For example, when typing a password or other sensitive information, you may want to use a combination of upper and lower case letters to make it more secure. In summary, the Caps key is used to switch between uppercase and lowercase letters in order to make text easier to read, emphasize words, or add security to sensitive information.
Pregunta 16 Informe
Which number base system is used by low level languages
Detalles de la respuesta
Low level languages, such as Assembly, C, and C++, use binary as the number base system. In a binary system, numbers are represented using only two digits: 0 and 1. This is in contrast to decimal, which uses 10 digits (0-9), or hexadecimal, which uses 16 digits (0-9 and A-F). Binary is used in low level languages because computers use binary internally to store and process data. At the lowest level, computer hardware operates using two states, on and off, which can be represented by binary digits. This makes binary a natural choice for low level programming languages that interact directly with the computer's hardware.
Pregunta 17 Informe
Which among the following generation computers had expensive operation cost?
Detalles de la respuesta
The second generation of computers had expensive operation costs compared to other generations. The second generation of computers, which emerged in the late 1950s and early 1960s, were characterized by the use of transistors instead of vacuum tubes that were used in the first generation. While transistors were smaller, more reliable, and more energy-efficient than vacuum tubes, they were still relatively expensive to produce and required a significant amount of power to operate. In addition, the second generation of computers required air conditioning systems to keep them cool, which added to their overall operating costs. The high cost of production, maintenance, and operation made these computers expensive and limited their accessibility to only large organizations, such as government agencies, research institutions, and corporations, which had the resources to invest in them. In contrast, the third and fourth generations of computers, which emerged in the 1960s and 1970s, respectively, were characterized by the use of integrated circuits and microprocessors, which greatly reduced the cost of production and operation, making computers more accessible and affordable to individuals and small businesses.
Pregunta 18 Informe
Computer software can be classified into how many parts?
Detalles de la respuesta
Computer software can be classified into two main parts: system software and application software. 1. System software: This type of software includes the programs that control the hardware components of a computer system and provide a platform for running other software applications. Examples of system software include operating systems, device drivers, utility programs, and firmware. 2. Application software: This type of software is designed to perform specific tasks or functions for the user. Application software can be further classified into two subcategories: general-purpose applications and specialized applications. Examples of general-purpose applications include word processors, spreadsheets, and web browsers, while examples of specialized applications include graphics software, database software, and video editing software. In summary, computer software can be classified into two main parts: system software and application software. The system software controls the hardware and provides a platform for running other software applications, while application software is designed to perform specific tasks or functions for the user.
Pregunta 19 Informe
The explorer bar is divided into _________ categories.
Detalles de la respuesta
The explorer bar is divided into several categories. The exact number of categories can vary depending on the software and version you are using. The categories typically include items such as "File & Folders", "Search", "History", and "Favorites". The explorer bar provides a user-friendly interface for navigating and accessing different areas of your computer or device, and the categories help to organize and categorize the different types of information and resources that are available. The explorer bar is a common feature in many operating systems, including Microsoft Windows, and is used for accessing and managing files, folders, and other resources on your computer.
Pregunta 20 Informe
To determine if a computer has the ability to think, a test was conducted named as
Detalles de la respuesta
The test used to determine if a computer has the ability to think is called the Turing test. The Turing test was proposed by the mathematician and computer scientist Alan Turing as a way to determine if a machine can exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. The test involves a human evaluator who engages in a natural language conversation with a machine and a human, without knowing which is which, and tries to determine which is the machine based on their responses. If the evaluator is unable to reliably distinguish the machine from the human, the machine is said to have passed the Turing test and demonstrated human-like intelligence.
Pregunta 21 Informe
Which of the following is a computer not used for?
Detalles de la respuesta
A computer can be used for entertainment, information, and social media, so the answer is "none of the above". Computers are versatile machines that can perform a wide variety of tasks, including playing games, streaming videos, accessing news and other information, and connecting with others on social media platforms. While some computers may be designed or optimized for certain types of tasks, such as gaming or video editing, all computers are capable of handling entertainment, information, and social media to some extent. Therefore, the answer to this question is that there is no option that describes something a computer cannot be used for among the given choices.
Pregunta 22 Informe
The joystick typically have a button on _________ used to select the option pointed by the cursor.
Detalles de la respuesta
The joystick typically has a button on top, used to select the option pointed by the cursor. A joystick is an input device that allows a user to control the movement of a cursor on a screen or to interact with a virtual environment or game. The joystick typically has a stick or lever that can be moved in different directions to control the movement of the cursor. The button on the top of the joystick is used to select the option that the cursor is pointing to on the screen. This button is commonly referred to as the "trigger" button, and it allows the user to perform actions such as selecting a menu option, firing a weapon in a game, or interacting with objects in a virtual environment. Overall, the joystick and its trigger button provide a simple and intuitive way for users to interact with software and games, making them a popular input device for a wide range of applications.
Pregunta 23 Informe
When does the output of a NAND gate =1?
Detalles de la respuesta
The output of a NAND gate is equal to 1 only when one input is 0. The NAND gate is called a "NOT-AND" gate because it outputs the opposite of what an AND gate would output for the same inputs. In other words, if an AND gate would output 1 for a certain set of inputs, a NAND gate would output 0, and vice versa.
Pregunta 24 Informe
Which type of network is usually contained inside one office building?
Detalles de la respuesta
The type of network that is usually contained inside one office building is called a Local Area Network or LAN. A LAN is a computer network that connects devices within a relatively small area, such as a single building, office, or campus. It is designed to allow computers and other devices to communicate with each other and share resources, such as printers, files, and internet access. LANs are typically owned and operated by a single organization, such as a business or government agency, and are often built using Ethernet cables or Wi-Fi technology. LANs are used to facilitate communication and data sharing between employees within an office building or other confined area, and are often more secure than other types of networks because they are not connected to the internet. In summary, a LAN is the type of network that you would most commonly find inside one office building.
Pregunta 25 Informe
Computer files can be characterised by all but,
Detalles de la respuesta
Computer files can be characterized by their title, accessibility, ability to be modified, and where they are stored. The title of a file is simply its name, which can be used to help identify and organize it among other files. Accessibility refers to whether or not a file can be accessed or viewed by the user. Depending on the permissions set by the owner of the file, it may be accessible to everyone, only to specific users, or not accessible at all. The ability to be modified refers to whether or not the file can be edited or changed in some way. For example, a text file can be modified by adding, deleting, or changing the text within it. Where the file is stored refers to the location on a computer or network where the file is saved. This could be on the computer's hard drive, a USB drive, a cloud storage service, or a network server. Therefore, all four of these characteristics are applicable to computer files and are important to consider when working with them.
Pregunta 26 Informe
Which of the following is not a type of logic gate
Detalles de la respuesta
The option that is not a type of logic gate is "DOR" because it is not a commonly used logic gate in digital electronics. Logic gates are the building blocks of digital circuits, and they perform basic logical operations on input signals to generate output signals. The three most commonly used types of logic gates are XOR, OR, and AND. XOR (exclusive OR) gate generates a high output only when the inputs are different, and a low output when they are the same. It is commonly used in digital communication systems and encryption algorithms. OR gate generates a high output if any of its inputs are high, and a low output if all of its inputs are low. It is used to combine multiple input signals in digital circuits. AND gate generates a high output only when all of its inputs are high, and a low output if any of its inputs are low. It is used to implement logical conjunction (AND) in digital circuits. In summary, DOR is not a type of logic gate because it is not commonly used in digital electronics. The commonly used types of logic gates are XOR, OR, and AND.
Pregunta 27 Informe
How many types of booting are there?
Detalles de la respuesta
There are essentially two types of booting: 1. Cold booting: This is the process of starting a computer from a powered-off state. This is typically done by pressing the power button on the computer. A cold boot starts the computer's hardware and boot loader, which then loads the operating system into memory. 2. Warm booting: This is the process of restarting a computer that is already powered on. This is typically done by pressing the reset button or by using the operating system's restart feature. A warm boot reloads the operating system from memory, bypassing the boot loader and hardware initialization. It's important to note that these are the two most basic and widely used types of booting, but there could be other variations or advanced booting procedures used in certain scenarios.
Pregunta 28 Informe
In general, a file is basically a collection of all related______.
Detalles de la respuesta
In general, a file is basically a collection of all related "records". A record is a collection of related data items that are grouped together and treated as a single unit. For example, in a student record file, each record may contain data related to a single student, such as their name, ID number, and grades. Each record may consist of several "fields", which are individual pieces of data that are related to the record. For example, in a student record, a field might be the student's name, another field might be their date of birth, and another field might be their address. So, in summary, a file is a collection of related records, and each record contains multiple fields that are related to the record.
Pregunta 29 Informe
Which of the listed is not a type of computer application?
Detalles de la respuesta
"Joy stick" is not a type of computer application. A computer application, also known as an application or app, is a program that runs on a computer and provides a specific set of functions for the user to perform. Examples of computer applications include Microsoft Word for word processing, Firefox for web browsing, and VLC media player for playing audio and video files. A joy stick, on the other hand, is a device used to control movement in computer games or simulations. It typically consists of a stick that can be moved in different directions to control the movement of an object on the screen. Joy sticks are not considered applications because they do not provide specific functions like a word processor or media player, but rather serve as input devices for other applications.
Pregunta 30 Informe
The process of feeding instructions into the computer system is called
Detalles de la respuesta
The process of feeding instructions into a computer system is called "inputting." It involves providing data, commands, or other types of information to a computer system so that it can process and execute the instructions. When you input data or commands into a computer system, you typically use an input device such as a keyboard, mouse, or microphone to provide the information. The computer then processes the input data using its internal logic and algorithms, and generates an output based on the instructions it received. For example, when you type a document using a keyboard and input the data into a word processing software, the computer processes the text and generates an output in the form of a document that you can save, print, or share. In summary, inputting is the process of providing information or instructions to a computer system, which is then processed and executed by the computer to generate an output.
Pregunta 31 Informe
What is the permanent memory built into your computer called?
Detalles de la respuesta
The permanent memory built into a computer is called ROM (Read-Only Memory). It is called "read-only" because, unlike RAM (Random Access Memory), which can be written to and rewritten, the information stored in ROM cannot be changed by the computer or the user. ROM is a type of memory that is built into the computer's hardware and contains the basic instructions that the computer needs to boot up and run its basic functions. These instructions are often referred to as the "firmware" of the computer, and include the BIOS (Basic Input/Output System) that controls the startup process, as well as other low-level software that interacts directly with the computer's hardware. CD-ROM, on the other hand, is a type of storage medium that can be used to store data or programs, but it is not built into the computer itself. CDs and DVDs can be used to store data, programs, or other types of media, but they are not considered a type of permanent memory built into the computer.
Pregunta 32 Informe
What does CO stand for in COBOL?
Detalles de la respuesta
In COBOL, CO stands for "Common Business Oriented Language". COBOL is a programming language that was designed specifically for business applications, such as finance, accounting, and payroll. COBOL was first developed in the late 1950s, and it quickly became popular in the business world because it was easy to use and understand, and it could handle large amounts of data. The "common" part of the acronym refers to the fact that COBOL was intended to be a language that could be used by a wide range of businesses, regardless of their specific industry or application. The "business-oriented" part of the acronym emphasizes the language's focus on business data and processing.
Pregunta 33 Informe
What is the primary purpose of Microsoft Excel?
Detalles de la respuesta
Microsoft Excel is primarily used to solve problems involving numbers. It is a spreadsheet program that allows you to organize, analyze and perform calculations on data. You can use Excel to create tables, charts and graphs to visually represent your data and make it easier to understand. It is commonly used for tasks such as budgeting, tracking expenses, and managing project timelines. The program also has many built-in functions that can help you perform complex calculations and analysis with ease. So, the main purpose of Microsoft Excel is to help you work with numbers and make sense of data.
Pregunta 34 Informe
Which of these is not a job of the operating system
Detalles de la respuesta
The job of the operating system that is not listed among the options is "Handling HTTP requests for Web pages." The operating system is the most important software that runs on a computer, providing an interface between the user and the computer hardware. It performs various functions to ensure that the computer system operates smoothly and efficiently. One of the key jobs of the operating system is to manage the computer's resources, such as allocating memory to programs that are running on the computer. The operating system is responsible for managing the computer's memory, ensuring that each program has enough memory to run efficiently, and preventing one program from using another program's memory. Another important job of the operating system is to provide security by preventing unauthorised access to files and data on the computer. It controls access to the computer's resources and ensures that only authorised users have access to the files and data that belong to them. However, handling HTTP requests for web pages is not a job of the operating system. Instead, this task is handled by web servers that run on top of the operating system. Web servers receive requests from clients, such as web browsers, and serve web pages to them over the internet. In summary, while the operating system performs many important tasks, such as managing resources and providing security, handling HTTP requests for web pages is not one of its jobs.
Pregunta 35 Informe
What tells the computer how to use its components?
Detalles de la respuesta
The operating system (OS) tells the computer how to use its components. An operating system is a software program that manages the computer hardware and software resources and provides common services for computer programs. The operating system acts as an intermediary between the computer's hardware and the programs or applications that run on the computer. It is responsible for controlling and allocating memory, prioritizing system requests, ensuring security, and managing input/output operations. In short, the operating system acts as the foundation for the computer to function and allows different applications and programs to communicate with the hardware and work together.
Pregunta 36 Informe
What does LAN stand for?
Detalles de la respuesta
LAN stands for "Local Area Network". A Local Area Network (LAN) is a computer network that connects devices in a relatively small area, such as a single building or a group of adjacent buildings. A LAN is used for sharing resources, such as printers, files, and internet connections, among the connected devices. Typically, a LAN is set up using Ethernet cables or Wi-Fi connections, and it may include a router, switch or hub to manage the flow of data between the connected devices. A LAN can be used in a variety of settings, including homes, schools, and businesses, where it can provide a more efficient way of sharing resources and communicating between devices. In summary, LAN stands for "Local Area Network", which is a computer network that connects devices in a small area, such as a building or group of buildings, and is used for sharing resources among the connected devices.
Pregunta 37 Informe
Which doesn't belong to the group?
Detalles de la respuesta
Out of the given options, "Memory unit" doesn't belong to the group. Flash drive, floppy disk, and compact disk are all examples of storage devices that store digital data. In contrast, "Memory unit" is a broad term that can refer to any device or component that stores data temporarily or permanently. While flash drives, floppy disks, and compact disks are all types of memory units in the sense that they store data, the term "memory unit" is more general and encompasses other types of storage, such as hard drives, solid-state drives, and RAM (Random Access Memory). Therefore, "Memory unit" is the odd one out in this group, as it is not a specific type of storage device like the other options.
Pregunta 38 Informe
Which key deletes text?
Detalles de la respuesta
The key that deletes text is the backspace key. When you type, the characters you enter are added to the right of the cursor, which shows you where the next character will be inserted. If you want to delete a character, you can move the cursor to the left of that character using the arrow keys, and then press the backspace key. This will remove the character to the left of the cursor. You can also use the backspace key to delete a selection of text. To do this, you first need to highlight the text you want to delete by clicking and dragging the cursor over it. Once the text is highlighted, you can press the backspace key to delete it. In summary, the backspace key is used to delete characters to the left of the cursor or to delete a selected portion of text.
Pregunta 39 Informe
Programming language COBOL works best for use in
Detalles de la respuesta
COBOL, which stands for COmmon Business Oriented Language, is a programming language that is specifically designed for commercial applications. It was developed in the 1950s for business data processing, and it remains a popular choice for applications related to finance, banking, insurance, and other industries that handle large amounts of data. COBOL is known for its straightforward syntax and ability to process large amounts of data efficiently, making it a good choice for commercial applications that need to manage and manipulate financial records, inventory, and other types of business data.
Pregunta 40 Informe
Which of the following is not a stage of system development cycle?
Detalles de la respuesta
The stage of system development cycle that is not commonly considered is "Observation". The typical stages of the system development cycle are planning, analysis, design, implementation, and testing. During the planning stage, the requirements and objectives of the system are identified. In the analysis stage, the requirements are studied in detail, and the feasibility of the system is determined. The design stage involves creating a blueprint for the system, including its architecture, interfaces, and data structures. During implementation, the system is built and the design is turned into a working system. Testing involves checking the system's performance and identifying any errors or bugs that need to be fixed. Observation is not usually considered a distinct stage in the system development cycle, but it can be seen as a part of testing or implementation. Observation involves monitoring the system after it has been implemented to ensure that it is working as intended and to identify any issues that need to be addressed.
¿Te gustaría proceder con esta acción?