Computer Fundamentals – Set 1 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Computer Fundamentals – Set 1 Dear ! This is Computer Fundamentals – Set 1 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) The two basic types of record access methods are : Online and real time Direct and immediate Sequential and random Sequential and indexed 2 / 50 2) Which of the following is not the classification of computers based on application ? Analog computer Digital computer Electronic computer Hybrid computer 3 / 50 3) This refers to environmentally sustaining computing or IT. None of these Green computing Electronic computing Cloud computing 4 / 50 4) which of the following is a programming language ? Pascal Lotus Netscape MS-Excel 5 / 50 5) Which of the following memories has the shortest access times ? Magnetic core memory Cache memory Magnetic bubble memory RAM 6 / 50 6) How many pins on a VGA ? 25 9 32 15 7 / 50 7) Artificial Intelligence is associated with which generation ? Second generation Sixth generation First generation Fifth generation 8 / 50 8) Floppy disks are available in Both of these Single side double density Single side single density None of these 9 / 50 9) Which is a benefit of a firewall they open unused logical ports to increase throughput they filter out unwanted wireless signals they make it harder for a hacker to locate specific computer on a network they repeatedly change the IP address of the router 10 / 50 10) …………. software is a matter of liberty not price. Proprietary Application Free None of these 11 / 50 11) ……….are event dependent programs . None of these Logic bombs Trojan bombs Salami bomb 12 / 50 12) Which of the following is considered first computer in the world ? ABC Z3 None of these Mark I 13 / 50 13) Which of the following is optical input device ? Keyboard Light pen Mouse Joystick 14 / 50 14) ………… refers to sending large number of mail to the victim , which may be an individual or a company or even mail servers there by ultimately resulting into crashing Email bombing None of these Virus Logic bomb 15 / 50 15) Which of the following registers is used to keep track of address of the memory location where the next instruction is located ? memory data register Program counter Instruction register Memory address register 16 / 50 16) ……………… is the universal character encoding standard , used for representation of text for computer processing . UNICODE JAVA None of these SAP 17 / 50 17) Which of the following is not electro-mechanical computer ? ABC mark I Z3 ENIAC 18 / 50 18) A number system that has eight different symbols to present any quantity is known as Decimal Octal Binary Hexadecimal 19 / 50 19) Which characteristic of computer distinguishes it from electronic calculators ? Storage Accuracy Automatic Versatlility 20 / 50 20) The actual execution of instructions happens in Memory CPU ALU None of these 21 / 50 21) This refers to the gap between people who possess regular access to information technology and those who do not have this access Digital divider None of these Computer divide Discrimination 22 / 50 22) How was the generation of computer classified ? by the model of computer by the accuracy of computer by the device used in memory and processor by the speed of computer 23 / 50 23) Networking such as LAN,MAN started form Third generation Fourth generation First generation Second generation 24 / 50 24) This is based on individuals who know how to use these technologies and those who do not . Access Usage Usage Quality None of these 25 / 50 25) The least significant bit of the binary number , which is equivalent to any odd decimal number is : 3 1 1 or 0 26 / 50 26) Flash drives have replaced floppy disks as the preferred method of portable storage because : they have quicker access time than a floppy drive Data is not magnetic so less subject to errors All of the above they hold much more data than floppy disks 27 / 50 27) Which of the following is the largest manufacture of hard disk drives ? Microsoft 3M IMB Seagate 28 / 50 28) Which of the following is not harmful for your computer Malware Spyware Virus Cookies 29 / 50 29) One computer that is not considered a portable computer is A laptop computer Minicomputer Tablet PC All of these 30 / 50 30) Micro computer are so called because of microprocessor used in them , what does microprocessor consist ? CU CU,ALU & RU CU&ALU CU,ALU & MU 31 / 50 31) This kind of track involves altering raw data just before a computer processes it and then changing it back after the processing is completed . None of these Salami attacks Virus attack Data diddling 32 / 50 32) ……….is the process of coding and scrambling of messages to prevent unauthorized access to or understanding of data being transmitted . Antivirus program None of these Firewalls Encryption 33 / 50 33) who invented Analytical engine ? Dr. Herman Hollerith Charles Babbage George Bool Blaise pascal 34 / 50 34) Viruses that travel from computer to computer on their (independent of host) are called Worms Logic bombs Stealth viruses Macro viruses 35 / 50 35) Which of the following class of computer cannot support multiple users simultaneously ? Micro computer Mainframe computer All of these Mini computer 36 / 50 36) Which of the following is not type of software Entertainment software System software Application software Utility software 37 / 50 37) Most important advantage in case an IC is its Lower power consumption Extremely high reliability Reduce cost Easy replacement in case of circuit failure 38 / 50 38) This type of digital divided is based on difference between individuals with access and those without access Access Usage quality None of these Usage 39 / 50 39) When a key is pressed on the keyboard , which standard is used for converting the keystroke into the corresponding bits ? EBCDIC ISO ANSI ASCII 40 / 50 40) ………refers to the compulsive internet use which interferes with daily life , work and relationships. Alcohol addiction None of these Cyber addiction Drug addiction 41 / 50 41) ……are programs that attach themselves to a computer or a file and then circulate themselves to other files and other computer on a network. web jacking Logic bomb Virus None of these 42 / 50 42) The language that the computer can understand and executed is called Application software System program All of these Machine language 43 / 50 43) Who stated Free Software foundation ? GNU None of these Richard M Stallman Linus Torvald 44 / 50 44) ………… refers to a code of safe and responsible behavior for the internet community None of these Social issues Cyber Ethics Cybercrime 45 / 50 45) Daisy wheel printer is a type of Matrix printer Impact printer laser printer Manual printer 46 / 50 46) ……….. refers to unlawful acts wherein the computer is either a tool or target or both Cyber law None of these Cyber ethics Cybercrime 47 / 50 47) Computer built before the first generation of computers were : None of these Electro-mechanical Mechanical Electrical 48 / 50 48) When was the transistors invented ? 1938 1968 1958 1948 49 / 50 49) This is a person who gains unauthorized access to a computer network for profit , criminal mischief or personal pleasure . Hacker None of these Cracker programmer 50 / 50 50) Which of the following is not an output device ? Printer Flat screen Touch Screen Projector Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback