Loading...




Category: CIT202

0

CIT202

1 / 50

 In Electronic cash payment

2 / 50

Problem of penetration of e-business in Nigeria is due to the following except ________

3 / 50

 Embedded computers only run programs stored in ________

4 / 50

Micro computers include

5 / 50

 e-business requires accessibility the following except

6 / 50

Supercomputers are more suited to _______

7 / 50

 If you need to change the typeface of a document in Microsoft office, which menu will you choose?


8 / 50

Portable data entry terminals are _________ devices that are used to record or capture data away from the mainframe computer


9 / 50

 The computer power has been on the increase while size has been on the _______________

10 / 50

Handheld devices used to capture data away from the mainframe that they are linked to include:

11 / 50

_____ computers are the most common type of computers in existence today,


12 / 50

_________ Bar is at the top of the window and it displays the name of the application.

13 / 50

Mini computers were typified by the number of word sizes

14 / 50

 _________case is used to covert from upper case to lower case and vice versa.


15 / 50

 The reason why organizations are switching from traditional to e-business transaction is due to _______

16 / 50

Embedded computers are found today in devices such as ________

17 / 50

 The example of E-service which enhances original service is _______

18 / 50

Data are organized in rows and _______ in a spreadsheet.

19 / 50

 Mainframes are often colloquially referred to as __________

20 / 50

 Handheld devices used to capture data away from the mainframe that they are linked to include:

21 / 50

The earliest version of the mainframe refer to computers compatible with _________

22 / 50

A ______ is a collection of information stored in a way that makes it easy to retrieve, modify and search.


23 / 50

The smallest of these computer systems is ___________

24 / 50

Electronic Data Interchange is necessary in _________

25 / 50

A digital certificate

26 / 50

 A hashing function for digital signature 

27 / 50

 Supercomputers are typically tailored for ______

28 / 50

Typically, an ATM is used for ________

29 / 50

A ___________ is a table consisting of rows and columns.

30 / 50

________ is a software that locates web pages based on matching keywords

31 / 50

In a typical 32-bit computer, ________ number system is usually followed


32 / 50

Embedded computers only run programs stored in _________

33 / 50

 A _____ is used to translate information transferred through telephone lines or cable.

34 / 50

Microsoft PowerPoint is a _________________ program.

35 / 50

In B2B e-Commerce, the following are correct except _______

36 / 50

 Two e-business models that currently exist are _______

37 / 50

The term "____" computer was coined at the time when most computers were cabinet sized like Mainframe Computers


38 / 50

A Personal Digital Assistant (PDA) is a handheld computer, also known as ______ computers

39 / 50

 At the centre of the personal computer (PC) innovation is the _________

40 / 50

Special effects used to introduce slides in a presentation are called ______

41 / 50

The ________ tool is used to select any kind of object on the page.

42 / 50

Security in e-Commerce involves the following except _____

43 / 50

The horizontal bar at the bottom of the screen is called______ bar

44 / 50

Computers dedicated to the task of storing and retrieving large amounts of data are called _________

45 / 50

The first minicomputers generally only perform these number of tasks per time

46 / 50

Cut option is present in ____________  menu


47 / 50

 For carrying out C2C e-Commerce the following infrastructure is essential

48 / 50

 The classes of computer include the following EXCEPT

49 / 50

Micro computers have RAM of _________

50 / 50

A digital computer did not score over an analog computer in terms of _________


Rate this quiz