Quiznetik

Fundamentals of Computers | Set 2

1. ........... is the key to close a selected drop -down list; cancel a command and close a dialog box.

Correct : C. esc

2. .......... is the key we use to run the selected command.

Correct : C. enter

3. ............. Is the functional key to display save-as box.

Correct : D. f12

4. Data becomes ................ when it is presented in a format that people can understand and use

Correct : C. information

5. The term ............. designates equipment that might be added to a computer system to enhance its functionality.

Correct : D. peripheral device

6. A ............ is a microprocessor -based computing device.

Correct : A. personal computer

7. RAM can be treated as the ......... for the computer's processor

Correct : C. waiting room

8. Which of the following are the functions of a operating system

Correct : D. all of the above

9. To move a copy of file from one computer to another over a communication channel is called?

Correct : A. file transfer

10. The primary function of the ............ is to set up the hardware and load and start an operating system

Correct : B. bios

11. What kind of memory is both static and non -volatile?

Correct : B. rom

12. .......... is computer software designed to operate the computer hardware and to provide platform for running application software

Correct : B. system software

13. The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second

Correct : C. data transfer rate

14. A device, which is not connected to CPU, is called as .......

Correct : C. off-line device

15. What is the other name for programmed chip?

Correct : C. lsic

16. On-line real time systems become popular in ........... generation

Correct : C. third generation

17. You use a(n) ....., such as a keyboard or mouse, to input information

Correct : B. input device

18. ............. is the ability of a device to "jump" directly to the requested data

Correct : B. random access

19. ............. provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously

Correct : A. multitasking

20. The task of performing operations like arithmetic and logical operations is called......

Correct : A. processing

21. ALU and Control Unit jointly known as

Correct : C. cpu

22. RAM is an example of

Correct : B. primary memory

23. Magnetic disk is an example of

Correct : A. secondary memory

24. Which one of the following is NOT a computer language

Correct : A. ms-excel

25. RAM is also called as

Correct : A. read / write memory

26. ............ Store data or information temporarily and pass it on as directed by the control unit

Correct : B. register

27. Select the Odd one

Correct : A. operating system

28. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu

Correct : A. dialog box

29. COBOL is an acronym for.............

Correct : A. common business oriented language

30. All of the following are examples of real security and privacy risks EXCEPT

Correct : B. spam

31. Which of the following is NOT one of the four major data processing functions of a computer?

Correct : C. analyzing the data or information

32. All of the following are examples of storage devices EXCEPT :

Correct : B. printers

33. The CPU and memory are located on the :

Correct : B. motherboard

34. ............... is the science that attempts to produce machines that display the same type of intelligence that humans do

Correct : D. artificial intelligence (al)

35. Servers are computers that provide resources to other computers connected to a :

Correct : B. mainframe

36. When creating a computer program, the ......... designs the structure of the program

Correct : B. system analyst

37. A computer program that converts an entire program into machine language at one time is called a/ an

Correct : D. compiler

38. Computers process data into information by working exclusively with :

Correct : C. numbers

39. The difference between people with access to computers and the Internet and those without this access is known as the :

Correct : A. digital divide

40. Computers manipulate data in many ways, and this manipulation is called......

Correct : B. processing

41. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

Correct : C. computer forensics

42. Where does most data go first with in a computer memory hierarchy ?

Correct : A. ram

43. The………….data mining technique derives rules from real-world case examples.

Correct : C. neural nets

44. …………….are used to identify a user who returns to a Website

Correct : A. cookies

45. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

Correct : D. a bar code

46. Why is it unethical to share copyrighted files with your friends?

Correct : C. sharing copyrighted files without permission breaks copyright laws.

47. Reusable optical storage will typically have the acronym-

Correct : D. rw

48. The most common type of storage devices are-

Correct : B. optical

49. A device that connects to a network without the use of cables is said to be-

Correct : D. none of these

50. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

Correct : A. hacker

51. To access properties of an object, the mouse technique to use is-

Correct : C. right-clicking

52. A DVD is an example of a (n)-

Correct : B. optical disc

53. . The process of transferring files from a computer on the Internet to your computer is called

Correct : A. downloading

54. . .......... is the process of dividing the disk into tracks and sectors.

Correct : B. formatting

55. . Help Menu is available at which button?

Correct : B. start

56. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as

Correct : B. risc

57. Which is not a basic function of a computer?

Correct : D. copy text

58. ASCII is a coding system that provides

Correct : C. 1024 different characters

59. Which part of the computer is directly involved in executing the instructions of the computer program?

Correct : D. the processor

60. When a computer is switched on, the booting process performs

Correct : B. power-on self-test

61. A computer system that is old and perhaps not satisfactory is referred to as a(n)

Correct : D. legacy system

62. Which of the following is not a binary number?

Correct : C. 202

63. Which of the following does not store data permanently?

Correct : B. ram

64. Which of the following is the smallest storage?

Correct : D. none of these

65. Which of the following contains permanent data and gets updated during the processing of transactions?

Correct : D. master file

66. Which of the following helps to protect floppy disks from data getting accidentally erased?

Correct : B. write-protect notch

67. A modem is connected to

Correct : A. a telephone line

68. Large transaction processing systems in automated organisations use

Correct : B. batch processing

69. In a computer, most processing takes place in

Correct : D. cpu

70. . Which of the following is not a storage medium?

Correct : D. scanner

71. The computer abbreviation KB usually means

Correct : C. kilo byte

72. The typical computer criminal is a(n):

Correct : B. trusted employee with no criminal record.

73. The common name for the crime of stealing passwords is:

Correct : C. spoofing.

74. Collecting personal information and effectively posing as another individual is known as the crime of:

Correct : B. identity theft.

75. Malicious software is known as:

Correct : B. malware.

76. A program that performs a useful task while simultaneously allowing destructive acts is

Correct : B. trojan horse.

77. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

Correct : B. virus.

78. In 1999, the Melissa virus was a widely publicised:

Correct : A. e-mail virus.

79. What type of virus uses computer hosts to reproduce itself?

Correct : B. worm

80. The thing that eventually terminates a worm virus is a lack of:

Correct : A. memory or disk space.

81. When a logic bomb is activated by a time-related event, it is known as a:

Correct : C. time bomb.

82. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

Correct : C. time bomb.

83. What is the name of an application program that gathers user information and sends it to someone through the Internet?

Correct : B. spybot

84. ------ is the measurement of things such as fingerprints and retinal scans used for security access.

Correct : A. biometrics

85. What is the most common tool used to restrict access to a computer system?

Correct : B. passwords

86. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

Correct : B. firewall.

87. The scrambling of code is known as:

Correct : A. encryption.

88. To prevent the loss of data during power failures, use a(n):

Correct : D. ups.

89. ------Is defined as any crime completed through the use of computer technology.

Correct : B. computer crime

90. ------ refers to electronic trespassing or criminal hacking.

Correct : A. cracking

91. The first electronic computer was developed by

Correct : A. j.v. attansoff

92. Snowbol is an/a---------

Correct : B. hll

93. Switching device of fifth generation computer is--------

Correct : D. vlsi

94. ---------- computers operates essentially by counting

Correct : D. digital computer

95. ---------- computer is small general purpose micro computer, but larger than portable computer

Correct : C. desktop

96. Cathode Ray Tube is a form of.......

Correct : C. monitor

97. Trackball is a...........

Correct : A. input device

98. ............. computer is a medium sized computer

Correct : D. mini

99. ........... computer are of large size

Correct : B. mainframe

100. Note book, laptop,palm,hand-held computers are coming under the category of......... computer

Correct : C. portable computer