Computer Knowledge Paper 1 2012 Questions and Answers Part 1

Get top class preparation for CTET/Paper-1 right from your home: get questions, notes, tests, video lectures and more- for all subjects of CTET/Paper-1.

1. All of the following are examples of real security and privacy risks EXCEPT:

A. hackers.

B. spam.

C. viruses.

D. identity theft.

Ans: B

2. A process known as ________ is used by large retailers to study trends.

A. data mining

B. data selection


D. data conversion

Ans: A

3. ________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

A. Data

B. Point-of-sale (POS)

C. Sales

D. Query

Ans: B

4. A (n) ________ system is a small, wireless handheld computer that scans an item՚s tag and pulls up the current price (and any special offers) as you shop.



C. inventory

D. data mining

Ans: A

5. The ability to recover and read deleted or damaged files from a criminal՚s computer is an example of a law enforcement specialty called:

A. robotics.

B. simulation.

C. computer forensics.

D. animation.

Ans: C

6. Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data

B. processing data into information

C. analyzing the data or information

D. storing the data or information

Ans: C

7. ________ tags, when placed on an animal, can be used to record and track in a database all of the animal՚s movements.





Ans: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

A. robotics.

B. computer forensics.

C. simulation.

D. forecasting.

Ans: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:

A. proprietary.

B. open.

C. experimental.

D. in the public domain.

Ans: A

10. ________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

A. Nanoscience

B. Microelectrodes

C. Computer forensics

D. Artificial intelligence

Ans: A

11. ________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

A. Nanoscience

B. Nanotechnology

C. Simulation

D. Artificial intelligence (AI)

Ans: D

12. ________ is data that has been organized or presented in a meaningful fashion.

A. A process

B. Software

C. Storage

D. Information

Ans: D

13. The name for the way that computers manipulate data into information is called:

A. programming.

B. processing.

C. storing.

D. organizing.

Ans: B