1.A user interface we said here is __ABC________
A.a text-based user interface or GUI
B.an interface between a computer and its peripheral device
C.an interaction between an operating system and a user
D.an interaction between an application program and a user
2.___A___provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.
A.The Transport Layer
B. Session Layer
C. Network Layer
E.Application Layer E. Presentation Layer
3.Many viruses do harmful things such as (ABCD ).
A.deleting files
B. slowing your PC down
B.simulating typos D. changing random data on your disk
4.We can classify programming languages under two types:(AB ) languages and ( )languages.
A.high-level
B. low-level
C. advanced-level
D. basic-level
5.With an Internet connection you can get some of the basic services available are: ___ABCD_______
A.E-mail
B. Telnet
C. FTP
D. Usenet news
6. A general purpose computer has four main sections: ( ABCE).
A.the control unit
B. the memory
C. the input and output devices
D. the cpu
E. the arithmetic and logic unit (ALU),
7.Windows 2000 has the key technologies, they are (ABCD ).
A.security
B. active directory
C. flat directory
D. enterprise management
8.The register file is___ACD_______
A.addressed by much shorter addresses
B. physically large
C.physically small
D. one the same chip as the CPU
9. A stack protocol can be used for (A ).
A.removing the latest element ins( )erted
B. removing the earliest element ins( )erted
C. subroutine calls
D. operation of arithmetic expressions
10.The end equipment in a communication system includes (ABCD ).
A.printers
B. computers
C. CRTs
D. keyboards
11.Microsoft Office Professional 2000 include____ABCD______.
A.Excel 2000
B. PowerPoint 2000
C. Word 2000
D. Outlook 2000
12. A general purpose computer has four main sections: ______ABCE______
A.the input and output devices
B. the memory
C. the arithmetic and logic unit (ALU),
D. the cpu
E. the control unit
13.The two most common types of scanners are (BC ) and ( )
A. hand-held scanners
B. flatbed scanners
C. auto scanners
D. handler scanners
14.Some viruses use (CD ) and ( ) techniques to hide their existence.
A.quickly spread
B. replace a part of system software
C. stealth
D. polymorphic
15.The Windows 2000 product line includes____ABCD______.
A.Windows 2000 Datacenter Server
B. Windows 2000 Professional
C. Windows 2000 Server
D. Windows 2000 Advanced Server
16.Similar to viruses, you can also find malicious code in (ABC ).
A.Trojan Horses
B. logic bombs
C. worms
D. Microsoft Word Documents
17.Viruses all have two phases to their e x ecution, the ( ) and the ( BD).
A.crea t e phase
B. attack phase
C. del( )ete phase
D. infection phase
18.Active Directory can help you (ACD ).
A.get off the limits of down level networks
B. deliver complete enterprise security by itself
C. build a complex international network
D. manage every resource with a single logon
19.High-level languages are commonly classified as (ACDE ).
A.object-oriented
B. automatic
C. functional
D. logic languages
E. procedure-oriented
20.(CD )is a type of e x ecutable file .
A.TXT file
B. JPG file
C. EXE file
D. COM file
21.( ABCD) maybe a certain cause that some viruses infect upon.
A.an external event on your PC
B. a day
C. a counter within the virus
D. a time
22.(BC )is a type of e x ecutable file .
A.TXT file
B. EXE file
C. COM file
D. JPG file
23.The web browsers which is normal used, such as(ABCE ).
A.Firefox
B. Internet Explorer
C. Opra
D. ICQ
E. Apple Safari
24.Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that once determined program form and function
A.artificial intelligence
B. distributed computing
C. software engineering
D. parallel computing
E. data mining
25.Microsoft Windows currently supports __AC___and _____file systems
A.NTFS
B. OCFS
C. FAT
D. ext2
E. NILFS
26.Modem is ____ACD______.
A.a modulator/demodulator
B. a data set
C. a demodulator
D. a modulator
27.The equipment _AB_____.
A.transfers the number of bits in serial form
B.manipulates digital information internally in word units
C.transfers the number of bits in parallel
D. manipulates digital information internally in serial form
28.Electronic commerce that is conducted between businesses is referred to as business-to-business or D
A. C2C
B. C2B
C. e-commerce
D. B2B
29.The World Wide Web also subsumes previous Internet information systems such as (AC ).
A.Gopher
B. Ftp
C. FTP
D. Telnet
30.ADO.NET relies on the services of .NET data providers.There are ABCD
A.Connection
B. Data Adapter
C. DataReader
D. Command
31.The development process in the software life cycle involves four phases: analysis, design, implementation, and ___ACDE_____.
A.analysis
B. audit
C. implementation
D. design
E. testing
32.The end equipment in a communication system includes __ABCD____.
A.printers
B. CRTs
C. computers
D. keyboards
33.In electronic commerce ,information search and discovery services include (ABCDE ).
A.search engines
B. information filters
C. software agents
D. directories
E. electronic catalogs
34.GIS work with two fundamentally different types of geographic models.They are the (BD ).
A.geography model
B. vector model
C. mathematic model
D. raster model
E. data model
35.The two most common types of scanners are ____AC___and _____
A.flatbed scanners
B. hand-held scanners
C. auto scanners
D. handler scanners
36.Windows 2000 has the key technologies, they are ( ABCD).
A.active directory
B. flat directory
C. enterprise management
D. security
37.Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes: ABC
A.Firmware which is software programmed resident to electrically programmable memory
devices on board mainboards or other types of integrated hardware carriers.
B.Application software such as word processors which perform productive tasks for users.
C.Middleware which controls and co-ordinates distributed systems.
38.Software engineering is related to the disciplines of ___ADE_____
A.project management
B. natural language
C. netural network
D. systems engineering
E. computer science
39.What make it is difficult to agree on how to count viruses? ABCD
A.some viruses can crea t e different versions when they infect other programs
B.just a trivial change may crea t e a new virus
C.some viruses can use polymorphic technique
D.new virus arise from an existing virus
40. A virus is a program that reproduces its own code by (ABC ).
A.ins_erting into the middle of a file
B. simply placing a pointer
C. adding to the end of a file
D. replacing another program
41.Input devices include: ____ABCD______.
A.the keyboard
B. microphone
C. touch screen
D. the mouse
42.Viruses all have two phases to their e x ecution, the ( ) and the ( AD).
A.attack phase
B. crea t e phase
C. del_ete phase
D. infection phase
43.The equipment (BC ).
A.manipulates digital information internally in serial form
B.manipulates digital information internally in word units
C.transfers the number of bits in serial form
D.transfers the number of bits in parallel
44.Office automation is___CD_______.
A.. the computer
B. communications technology
C. the application of computer
D. used to improve the productivity of people
45.The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are: ABCDE
A.System.Data.SqlClient. Contains the SQL Server .NET Data Provider types.
B.System.Data.Odbc. Contains the ODBC .NET Data Provider types.
C.System.Data. Contains provider-independent types such as the DataSet and DataTable.
D.System.Data.OracleClient. Contains the Oracle .NET Data Provider
E.System.Data.OleDb. Contains the OLE DB .NET Data Provider types.
46.C++ is __ACD________.
A.extended from C
B. a superset of C
C. object-oriented
D. procedure-oriented
47.Some viruses, with no attack phase, often damage the programs or disks they infect because they (AD ).
A.have bugs in them
B. show messages on your screen
C. steal storage
D. contain poor quality code
48.Windows 2000 is ( A).
A.an inventive technology
B. used for building a scalable network
B.the same as Windows NT D. new lease of Windows
49.Some common applications related to electronic commerce are the following:
A.Teleconferencing
B. Online banking
C. Email
D. Instant messaging
E. Enterprise content management
F. Newsgroups
G. Shopping cart software
50. A program is a sequence of ( ) that can be e x ecuted by a computer.It can either be built into the hardware or exist independently in the form of (BC ).
A.hardware
B. software
C. instructions
D. data
51.Electronic payments include ___ABCD______.
A.credit card payments
B. electronic checks
C. digital currencies
D. cash payment
52.The web browsers which is normal used, such as____ABCD_____.
A.Opra
B. Internet Explorer
C. Firefox
D. Apple Safari
E. ICQ
53.Computer programs fall into two major classes: __AC____and ____.
A.application programs
B. application suite
C. operating systems
D. database application
54.Database connection ( B) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.
A.pond
B. pooling
C. link
D. connection
55.The development process in the software life cycle involves four phases: analysis, design, implementation, and (ABCE ).
A.implementation
B. design
C. analysis
D. audit
E. testing
56.Hypermedia include ( ABCDEF)
A.video clips
B. images
C. text
D. flash
E. vidoe
F. sounds
57.An asleep state is_____ABD_____
A.used to lessen wear-and tear on the computer
B. used for saving energy
C. indicated by the indicator light putting out
D. a low power standby mode
58.Electronic payments include (ABCD ).
A.digital currencies
B. electronic checks
C. credit card payments
D. cash payment
59.You want to (BCD ) maybe wake up a virus that has residented in memory.
A.del( )ete a file
B. access a diskette
C. e x ecute a program
D. copy a file
60.Before you turn the power on with a new computer, you should make sure_____ABCD_____
A.the computer system has been set up
B. the computer is already out of the box
B.appropriate software have been installed D. appropriate cables are correctly connected
61.Security is usually enforced through ___ABE________.
A.access control
B. encryption
C. data retrieving
D. data storing
E. auditing
62.Computer programming is the process of ABCD__the source code of computer programs.
A. testing
B. maintaining
C. debugging
D. writing
63.Queues that occur everyday life can be seen ( ABCD).
A.as automobiles waiting for a traffic light
B. as people waiting for service at a bank
C. in certain societies lacking equality
D. in an emergency room of a hospital
64.Static graphics include____AB______.
A.animators
B. photographs
C. movies
D. pictures
66.which is the threat to computer security in the following choices ? ABCD
A. Computer Criminals
B. Human Errors
C. Computer Crime
D. earthquake
65.The attributes of the stack are______A____.
A.queue
B. FIFO
C. built into their circuitry
D. LIFO
66.If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission. BD
A.play music
B. stealing storage
C. del( )ete files
D. pilfer CPU cycles
67.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are _______ABDE___________. A.minicomputers B. mainframes C. note book D. workstation E. microcomputers F. lenovo
68.The Application layer in TCP/IP Model is correspond to (ABD ) in OSI Model
A.Presentation Layer
B. Session Layer
C. Transport Layer
D. Application Layer
E. Network Layer
69. A computer system user generally more cares for___ABD_______
A.speed of computation
B. storage size
C. physical size of the computer
D. efficiency of the computer
71.Cache is____ABC______
A. slow
B. high cost
C. fast
D. relatively small
72.We can say a bus is simply_____ABC_____ .
A. a wire
B. a 16-bit bus
C. a group of wires
D. a 8-bit bus
73.Viruses can delay their attack for (ABCD ).
A.years
B. months
C. weeks
D. days
74.In order to increase our computer’s performance we need to____BCD______
A.buy a L1 cache
B. have a much larger main memory
C. have a L2 cache
D. buy a L2 cache
75.The software that controls the interaction between the input and output hardware is called BIOS,which stands of __A________
A.Basic Input Output System
B. Classic Input Output System
B.Advanced Input Output System D. Junior Input Output System
76.To enhance performance of a computer system we should____ACD______
A.improve the pattern of referencing operand
B. optimize the simple movement of data
C. optimize the basic sequence control mechanism
D. use IF and LOOP instructions as many as possible
77.Their company used international lawyers to prosecute a crime ring involving software __ __A____in Thailand.
A.piracy
B. copying
C. duplication
D. cloning
78.The software that controls the interaction between the input and output hardware is called BIOS,which stands of (B)
A.Advanced Input Output System
B. Basic Input Output System
C. Classic Input Output System
D. Junior Input Output System
79.Some viruses use ( AC) and ( ) techniques to hide their existence.
A.stealth
B. quickly spread
C. polymorphic
D. replace a part of system software
80.Middleware lies in______ACD____
A.the middle of interactions between different application programs
B.the top of the layering vertical stack
C.the top of an operating system
D.the middle of the layering vertical stack
81.Software includes ( ACDE) etc
A.video games
B. all kinds of files
C. programs
D. websites
E. mobile application
82.The major functional components of an office automation system include: ___ABCD__
A.electronic mail
B. personal assistance features
C. information storage and retrieval
D. text processing
83.The Internet carries various information resources and services, such as (ACDEF ) and the inter-linked hypertext documents
A.online chat
B. talking
C. electronic mail
D. file transfer
E. online gaming
F. file sharing
84. A processor is composed of:____ABCD______.
A.an arithmetic
B. a control unit
C. Registers
D. logic unit
85.Functions of the compiler used in RISC are ___ABC_______
A.to optimize register usage
B.to maximize register usage
C.to allocate registers to those variables that will be used the most in a given time period
D.to compile a high level language program
86. A digital computer is generally made up of five dstinct elements: a central processing unit,(ABCD).
A.a bus
B. input devices
C. memeory storage devices
D. output devices
E. crt screen
87.There are AB (CD)_between the DTEs.
A.digital-to-analog converter
B. the modem
C. communications equipment
D. will be replaced by an upd_ated standard
88.What make it is difficult to agree on how to count viruses? ABCD
A.just a trivial change may crea t e a new virus
B.some viruses can use polymorphic technique
C.some viruses can crea t e different versions when they infect other programs
D.new virus arise from an existing virus
89.which aspect have to be considered in the design of a piece of software. ABCDEFG
A.Fault-tolerance
B. Extensibility
C. Modularity
D. Compatibility
E.Marketability
F. Packaging
G. Maintainability
90.Active Directory can help you (ACD ).
A.build a complex international network
B. deliver complete enterprise security by itself
C.manage every resource with a single logon
D. get off the limits of down level networks
91.Early computer solved_____CD_____ problems.
A.control
B. engineering
C. mathematical
D. business applications
92.The tools which Programming software usually provides include: ABCDE
A.debuggers
B. text editors
C. linkers
D. compilers
E. interpreters
93.DTE is ( AB).
A.data terminal equipment
B.the last piece of equipment that belonged to the subscriber in a data link system
C.satellite
D. Digital T-carrier
94.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are ( BDEF).
A.note book
B. microcomputers
C. lenovo
D. minicomputers
E. workstation
F. mainframes
95.which is the type of electronic commerce in the following choice AC
A.B2B
B. C2C
C. B2C
96.The operations of a structured data type might act on (ABCD ).
A.a stack
B. the values of the data type
C. component elements of the data structure
D. a queue
97.Types of media include__ACD________.
A.text
B. animation
C. audio
D. full-motion video
98. A virus is a program that reproduces its own code by (ABC ).
A.simply placing a pointer
B. adding to the end of a file
C. ins( )erting into the middle of a file
D. replacing another program
99.According to the text,the author mentions three of the most commonly used types of printer.They are (BDE ).
A.belt printer
B. dot-matrix printers;
C. array printer
D. laser printer
E. inkjet printers
100.The end equipment in a communication system includes ___ABD_______
A.keyboards
B. DCE
C. CRTs
D. computers
101.Software includes _____ACDE________etc
A.programs
B. all kinds of files
C. video games
D. websites
E. mobile application
102.With .NET, Microsoft is opening up a channel both to ( ) in other programming languages and to non-.NET ( BC). (developers; components)
A.coder
B. developers
C. components
D. architecture
103.Common contemporary operating systems include (ABCD ).
A.Linux
B. Microsoft Windows
C. Solaris
D. Mac OS
104.A mechanism for translating Internet hostnames into IP addresses is___BCD_______
A.equipped into the general-purpose operating system
B.typically inside of operating system kernel
C.as a middleware by author’s definition
D.typically outside of operating system kernel
105.RISC is____ABC______
A.used for many computer manufacturers nowadays
B.guided to be built from studying the execution behavior of high-level language programs
C.abbreviation of reduced instruction set computer
D.abbreviation of complex instruction set computer
106.With .NET, Microsoft is opening up a channel both to _BC_______in other programming languages and to non-.NET ________. (developers; components)
A.coder
B. components
C. developers
D. architecture
107.The tools which Programming software usually provides include: ABCDE
A.compilers
B. interpreters
C. text editors
D. linkers
E. debuggers
108.The following products of software are belong to middleware____BCD______
A.Oracle
B. IBM’s Web Sphere MQ
C. Java 2 Platform
D. J2EE
109.The system manager used by a fast processor can____BCD______
A.connect a network
B. monitor processor’s core temperature
C. monitor processor’s supply voltages
D. reset a system
110.Queues that occur everyday life can be seen (ABCD ).
A.as automobiles waiting for a traffic light
B. as people waiting for service at a bank
C. in an emergency room of a hospital
D. in certain societies lacking equality
111.C++ include the following pillars: ____ABCD______.
A.data hiding
B. polymorphism
C. encapsulation
D. inheritance
112.Windows 2000 is____ACD______
A.new lease of Windows
B. an inventive technology
C. the same as Windows NT
D. used for building a scalable network
113.We use paged virtual memory to___ABCD_______
A.extend the size of memory
B. reduce latency of the disk
C. store large program and data set
D. increase bandwidth of the disk
114.According to the physical size of computers we can classify the __ABCD____ computers into A. supercomputer B. minicomputer C. microcomputer D. mainframe
115.Some common applications related to electronic commerce are the following: ABCDEFG A.Email B. Teleconferencing C. Instant messaging D. Shopping cart software
E.Newsgroups
F. Enterprise content management
G. Online banking
116.One machine cycle in RISC has _B_________
A.two machine instructions
B. one machine instruction
C. four machine instructions
D. three machine instructions
117.The function of computer hardware is typically divided into three main categories.They are
____ADE_____.
A.input
B. motherboard
C. cpu
D. storage
E. output
118.Active Directory supports ( ABCD).
A.granular access control
B. inheritance
C. encapsulation
D. delegation of administrative task
119.The core of SQL is formed by a command language that allows the (ACDE ) and performing management and administrative functions.
A.deletion of data
B. process of data
C. updating of data
D. retrieval of data
E. ins( )ertion of data
120.Some commentators say the outcome of the information revolution is likely to be as profound as the shift in (ABCD )
A.industrial
B. agricultural
C. Service Industry
D. handicraft industry