computer are of large size
1.Micro
2.Mainframe
3.Super
4.Mini
Posted Date:-2021-02-21 07:30:13
computer is a medium sized computer
1.Micro
2.Mainframe
3.Super
4.Mini
Posted Date:-2021-02-21 07:30:13
is the process of dividing the disk into tracks and sectors
1.Tracking
2.Formatting
3.Crashing
4.Allotting
Posted Date:-2021-02-21 07:30:13
Note book, laptop,palm,hand-held computers are coming under the category of computer
1.Digital computer
2.Mainframe computer
3.Portable computer
4.Hybrid computer
Posted Date:-2021-02-21 07:30:13
printer is a non-impact printer and is quite in working
1.Inkjet
2.Laser
3.Thermal
4.Dot matrix
Posted Date:-2021-02-21 07:30:13
--- refers to electronic trespassing or criminal hacking.
1.Cracking
2.Jacking
3.Spoofing
4.Smarming
Posted Date:-2021-02-21 07:30:13
---- computer is small general purpose micro computer, but larger than portable computer
1.Hybrid
2.Digital
3.Desktop
4.Laptop
Posted Date:-2021-02-21 07:30:13
----- is the measurement of things such as fingerprints and retinal scans used for security access.
1.Biometrics
2.Bio measurement
3.Computer security
4.Smart weapon machinery
Posted Date:-2021-02-21 07:30:13
------ computers operates essentially by counting
1.Portable computer
2.Hybrid computer
3.Analog computer
4.Digital computer
Posted Date:-2021-02-21 07:30:13
--Is defined as any crime completed through the use of computer technology.
1.Computer forensics
2.Computer crime
3.Hacking
4.Cracking
Posted Date:-2021-02-21 07:30:13
A computer system that is old and perhaps not satisfactory is referred to as a(n)
1.Ancient system
2.Historical system
3.Age old system
4.Legacy system
Posted Date:-2021-02-21 07:30:13
A device that connects to a network without the use of cables is said to be
1.Distributed
2.free
3.centralized
4.none of these
Posted Date:-2021-02-21 07:30:13
A DVD is an example of a (n)
1.hard disk
2.optical disc
3.output device
4.solid-state storage device
Posted Date:-2021-02-21 07:30:13
A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
1.Time-related bomb sequence
2.Virus
3.Time bomb
4.Trojan horse
Posted Date:-2021-02-21 07:30:13
A modem is connected to
1.a telephone line
2.a keyboard
3.a printer
4.a monitor
Posted Date:-2021-02-21 07:30:13
A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a
1.Hacker
2.spammer
3.instant messenger
4.programmer
Posted Date:-2021-02-21 07:30:13
A program that performs a useful task while simultaneously allowing destructive acts is a:
1.Worm
2.Trojan horse
3.Virus
4.Macro virus
Posted Date:-2021-02-21 07:30:13
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
1.Trojan horse
2.Virus
3.Time bomb
4.Time-related bomb sequence
Posted Date:-2021-02-21 07:30:13
ASCII is a coding system that provides
1.256 different characters
2.512 different characters
3.1024 different characters
4.128 different characters
Posted Date:-2021-02-21 07:30:13
Cathode Ray Tube is a form of.......
1.Keyboard
2.Mouse
3.Monitor
4.Mother board
Posted Date:-2021-02-21 07:30:13
Collecting personal information and effectively posing as another individual is known as the crime of
1.Spooling
2.Identity theft
3.Spoofing
4.Hacking
Posted Date:-2021-02-21 07:30:13
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
1.Hacker-proof program
2.Firewall
3.Hacker-resistant server
4.Encryption safe wall
Posted Date:-2021-02-21 07:30:13
Help Menu is available at which button?
1.End
2.Start
3.Turnoff
4.Restart
Posted Date:-2021-02-21 07:30:13
Reusable optical storage will typically have the acronym
1.CD
2.DVD
3.ROM
4.RW
Posted Date:-2021-02-21 07:30:13
In 1999, the Melissa virus was a widely publicised
1.E-mail virus
2.Macro virus
3.Trojan horse
4.Time bomb
Posted Date:-2021-02-21 07:30:13
In a computer, most processing takes place in
1.Memory
2.RAM
3.motherboard
4.CPU
Posted Date:-2021-02-21 07:30:13
Large transaction processing systems in automated organisations use
1.Online processing
2.Batch Processing
3.Once-a-day Processing
4.End-of-day processing
Posted Date:-2021-02-21 07:30:13
Light pen and joystick are...........
1.Algorithm
2.Input devices
3.Output devices
4.Portals
Posted Date:-2021-02-21 07:30:13
Malicious software is known as:
1.Badware
2.Malware
3.Maliciousware
4.Illegalware
Posted Date:-2021-02-21 07:30:13
printer is the cheapest in terms of price and operating cost
1.Inkjet
2.Laser
3.Thermal
4.Dot matrix
Posted Date:-2021-02-21 07:30:13
Snowbol is an/a--------
1.Operating system
2.HLL
3.Software
4.Search engine
Posted Date:-2021-02-21 07:30:13
Switching device of fifth generation computer is------
1.Vacuum tubes
2.Transistors
3.IC
4.VLSI
Posted Date:-2021-02-21 07:30:13
The common name for the crime of stealing passwords is:
1.Jacking
2.Identity theft
3.Spoofing
4.Hacking
Posted Date:-2021-02-21 07:30:13
The computer abbreviation KB usually means
1.Key Block
2.Kernel Boot
3.Kilo Byte
4.Kit Bit
Posted Date:-2021-02-21 07:30:13
The first electronic computer was developed by
1.J.V. Attansoff
2.Bill Gates
3.Simur Cray
4.Winton Serf
Posted Date:-2021-02-21 07:30:13
The most common type of storage devices are
1.Steel
2.optical
3.magnetic
4.flash
Posted Date:-2021-02-21 07:30:13
The process of transferring files from a computer on the Internet to your computer is called
1.Downloading
2.uploading
3.FTP
4.JPEG
Posted Date:-2021-02-21 07:30:13
The scrambling of code is known as:
1.Encryption
2.a firewall
3.Scrambling
4.Password proofing
Posted Date:-2021-02-21 07:30:13
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
1.CISC
2.RISC
3.CD-ROM
4.Wi-Fi
Posted Date:-2021-02-21 07:30:13
The thing that eventually terminates a worm virus is a lack of
1.Memory or disk space
2.Time
3.CD drives space
4.CD-RW
Posted Date:-2021-02-21 07:30:13
The typical computer criminal is a(n):
1.Young hacker
2.Trusted employee with no criminal record.
3.Trusted employee with a long, but unknown criminal record.
4.Overseas young cracker
Posted Date:-2021-02-21 07:30:13
To access properties of an object, the mouse technique to use is
1.Dragging
2.dropping
3.right-clicking
4.shift-clicking
Posted Date:-2021-02-21 07:30:13
To prevent the loss of data during power failures, use a(n):
1.Encryption program
2.Surge protector
3.Firewall
4.UPS
Posted Date:-2021-02-21 07:30:13
Touch Screen is............
1.Input device
2.Output device
3.Both a & b above
4.None of these
Posted Date:-2021-02-21 07:30:13
Trackball is a.........
1.Input device
2.Output device
3.Programming language
4.Software
Posted Date:-2021-02-21 07:30:13
What is the most common tool used to restrict access to a computer system?
1.User logins
2.Passwords
3.Computer keys
4.Access-control software
Posted Date:-2021-02-21 07:30:13
What is the name of an application program that gathers user information and sends it to someone through the Internet?
1.A virus
2.Spybot
3.Logic bomb
4.Security patch
Posted Date:-2021-02-21 07:30:13
What type of virus uses computer hosts to reproduce itself?
1.Time bomb
2.Worm
3.Melissa virus
4.Macro virus
Posted Date:-2021-02-21 07:30:13
When a computer is switched on, the booting process performs
1.Integrity Test
2.Power-On Self-Test
3.Correct Functioning Test
4.Reliability Test
Posted Date:-2021-02-21 07:30:13
When a logic bomb is activated by a time-related event, it is known as a:
1.Time-related bomb sequence
2.Virus
3.Time bomb
4.Trojan horse
Posted Date:-2021-02-21 07:30:13
Which is not a basic function of a computer?
1.Store data
2.Store data
3.Process data
4.Copy text
Posted Date:-2021-02-21 07:30:13
Which of the following contains permanent data and gets updated during the processing of transactions?
1.Operating System File
2.Transaction file
3.Software File
4.Master file
Posted Date:-2021-02-21 07:30:13
Which of the following does not store data permanently?
1.ROM
2.RAM
3.Floppy Disk
4.Hard Disk
Posted Date:-2021-02-21 07:30:13
Which of the following helps to protect floppy disks from data getting accidentally erased?
1.Access notch
2.Write-protect notch
3.Entry notch
4.Input notch
Posted Date:-2021-02-21 07:30:13
Which of the following is not a binary number?
1.1
2.101
3.202
4.110
Posted Date:-2021-02-21 07:30:13
Which of the following is not a storage medium?
1.Hard disk
2.Flash drive
3.DVD
4.scanner
Posted Date:-2021-02-21 07:30:13
Which of the following is the smallest storage?
1.Megabyte
2.Gigabyte
3.Terabyte
4.None of these
Posted Date:-2021-02-21 07:30:13
Which part of the computer is directly involved in executing the instructions of the computer program?
1.The scanner
2.The main storage
3.The secondary storage
4.The processor
Posted Date:-2021-02-21 07:30:13