Computer Fundamentals – Set 1

0%

Report a question

You cannot submit an empty report. Please add some details.

Computer Fundamentals – Set 1

Dear ! This is Computer Fundamentals – Set 1 Quiz and it contains 50 questions.


Keep Learning!

1 / 50

1) The two basic types of record access methods are :

2 / 50

2) Which of the following is not the classification of computers based on application ?

3 / 50

3) This refers to environmentally  sustaining computing or IT.

4 / 50

4) which of the following is a programming language ?

5 / 50

5) Which of the following memories has the shortest access times ?

6 / 50

6) How many pins on a VGA ?

7 / 50

7) Artificial Intelligence is associated with which generation ?

8 / 50

8) Floppy disks are available in

9 / 50

9) Which is a benefit of a firewall

10 / 50

10) …………. software is a matter of liberty not price.

11 / 50

11) ……….are event dependent programs .

12 / 50

12) Which of the following is considered first computer in the world ?

13 / 50

13) Which of the following is optical input device ?

14 / 50

14) ………… refers to sending large number of mail to the victim , which may be an individual or a company or even mail servers there by ultimately resulting into crashing

15 / 50

15) Which of the following registers is used to keep track of address of the memory location where the next instruction is located ?

16 / 50

16) ……………… is the universal character encoding standard , used for representation of text for computer processing .

17 / 50

17) Which of the following is not electro-mechanical computer ?

18 / 50

18) A number system that has eight different symbols to present any quantity is known as

19 / 50

19) Which characteristic of computer distinguishes it from electronic calculators ?

20 / 50

20) The actual execution of instructions happens in

21 / 50

21) This refers to the gap between people who possess regular access to information technology and those who do not have this access

22 / 50

22) How was the generation of computer classified ?

23 / 50

23) Networking such as LAN,MAN started form

24 / 50

24) This is based on individuals who know how to use these technologies and those who do not .

25 / 50

25) The least significant bit of the binary number , which is equivalent to any odd decimal number is :

26 / 50

26) Flash drives have replaced floppy disks as the preferred method of portable storage because :

27 / 50

27) Which of the following is the largest manufacture of hard disk drives ?

28 / 50

28) Which of the following is not harmful for your computer

29 / 50

29) One computer that is not considered a portable computer is

30 / 50

30) Micro computer are so called because of microprocessor used in them , what does microprocessor consist ?

31 / 50

31) This kind of track involves altering raw data just before a computer processes it and then changing it back after the processing is completed .

32 / 50

32) ……….is the process of coding and scrambling of messages to prevent unauthorized access to or understanding of data being transmitted .

33 / 50

33) who invented Analytical engine ?

34 / 50

34) Viruses that travel from computer to computer on their (independent of host) are called

35 / 50

35) Which of the following class of computer cannot support multiple users simultaneously ?

36 / 50

36) Which of the  following is not type of software

37 / 50

37) Most important advantage in case an IC is its

38 / 50

38) This type of digital divided is based on difference between individuals with access and those without access

39 / 50

39) When a key is pressed on the keyboard , which standard is used for converting the keystroke into the corresponding bits ?

40 / 50

40) ………refers to the compulsive internet use which interferes with daily life , work and relationships.

41 / 50

41) ……are programs that attach themselves to a computer or a file and then circulate themselves to other files and other computer on a network.

42 / 50

42) The language that the computer can understand and executed is called

43 / 50

43) Who stated  Free Software foundation ?

44 / 50

44) ………… refers to a code of safe and responsible  behavior for the internet community

45 / 50

45) Daisy wheel printer is a type of

46 / 50

46) ……….. refers to unlawful acts wherein the computer is either a tool or target or both

47 / 50

47) Computer built before the first generation of computers were :

48 / 50

48) When was the transistors invented ?

49 / 50

49) This is a person who gains unauthorized access to a computer network for profit , criminal mischief or personal pleasure .

50 / 50

50) Which of the following is not an output device ?

Your score is

The average score is 0%

🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥
LinkedIn Facebook
0%

Exit

We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌

🌟 Thank you for your support! Your feedback means the world to us. 🙏💖

You cannot copy content of this page