Computer Fundamentals – Set 11 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Computer Fundamentals – Set 11 Dear ! This is Computer Fundamentals – Set 11 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) Which one of the following is NOT a computer language C++ COBOL BASIC MS-Excel 2 / 50 2) To prevent the loss of data during power failure, use an : UPS Surge protector Firewall Encryption program 3 / 50 3) The scrambling of code is known as: Scrambling a firewall Encryption Password proofing 4 / 50 4) Data becomes ……………… when it is presented in a formal that people can understand and use Information Processed Presentation Graphs 5 / 50 5) The first electronic computer was developed by Simur Cray J.N. Attansoff Bill Gates Wonton Serf 6 / 50 6) Select the Odd one Assembler Operating system Compiler Interpreter 7 / 50 7) What is the other name for programmed chip ? LSIC PROM ROM RAM 8 / 50 8) ……….is the science that attempts to produce machine that display the same type of intelligence that humans do Artificial intelligence (AI) Simulation Nanoscience Nanotechnology 9 / 50 9) To move a copy file from one computer to another over a communication channel is called ? File modification File transfer File copying File encryption 10 / 50 10) Which of the following is not one of the four major data processing functions of a computer ? Processing data or information Storing the data or information gathering data analyzing the data or information 11 / 50 11) Which of the following are the functions of a operating system All of the these Manages disks and files Allocation resources Monitors activities 12 / 50 12) Which of the following is not one of the four major data processing functions of computer ? Processing data into information gathering data analyzing the data or information Storing the data or information 13 / 50 13) ……..provides process and memory management services that allow two or more tasks , jobs, program to run simultaneously Multiprocessing Multicomputing Multithreading Multitasking 14 / 50 14) ……….. computer is small general purpose microcomputer , but larger than portable computer Desktop Laptop Digital Hybrid 15 / 50 15) The term …………. designated equipment that might be added to a computer system to enhance its functionality. Disk pack digital device System add-on Peripheral device 16 / 50 16) The ………… is the amount of data that a storage device can move from the storage medium to the per second data digitizing rate data migration rate data transfer rate data access rate 17 / 50 17) ………… Store data or information temporarily and pass it on as directed by the control unit. Memory Register Number Address 18 / 50 18) ………. computer are of large size Super Mainframe Mini Micro 19 / 50 19) The task of performing operations like arithmetic and logical operations is called…… Sorting Processing Storing Editing 20 / 50 20) A ……….. is a microprocessor- based computing device. Mainframe Server Personal computer Workstation 21 / 50 21) RAM is also called as Permanent memory Read / write memory Primary memory Long memory 22 / 50 22) ………… computer operates essentially by counting. Hybrid computer Digital computer Analog computer Portable computer 23 / 50 23) A ………. is an additional set of commands that the computer displays after you make a selection from the main menu dialog box Menu selection Submenu All of the there 24 / 50 24) The primary function of the ……… is to set up the hardware and load and start an operating system Memory BIOS System program CPU 25 / 50 25) What is the other name for programmed chip ? RAM LSIC ROM PROM 26 / 50 26) Switching device of fifth generation computer is ………. IC Vacuum tubes Transistors ULSI 27 / 50 27) Select the odd one Assembler Interpreter Operating system Compiler 28 / 50 28) …….Is the key to close a selected drop-down list; cancel a command and close a dialog box F10 TAB ESC SHIFT 29 / 50 29) The CPU and memory are located on the motherboard Output device expansion board Storage device 30 / 50 30) Which of the following are examples of real security and privacy risks EXCEPT Spam Viruses hackers identify theft 31 / 50 31) …….is computer software designed to operate the computer hardware and to provide platform for running application software Application software System software Operating system Software 32 / 50 32) ………. computer is a medium sized computer Super Mini Mainframe Micro 33 / 50 33) What kind of memory is both static and non- volatile? BIOS RAm CACHE ROM 34 / 50 34) Trackball is a …….. Input device Output device Programming language Software 35 / 50 35) You use a(n)……,such as a keyboard or mouse to input information Storage device Processing device Input device Output device 36 / 50 36) RAM is an example of d. Both (a) and (b) a. Secondary memory b. Primary memory c. Main memory 37 / 50 37) When creating a computer program, the ……… designs the structure of the program End user All of the these System Analyst Programmer 38 / 50 38) COBOL is an acronym for ……. Common Business Organized Language Computer Business Oriented Language Common Business Oriented Language Common Business Operated Language 39 / 50 39) ALU and Control unit jointly known as ROM RAM PC CPU 40 / 50 40) All of the following are examples of storage device ExCEPT Printer hard disk drives floppy disk drives CD drives 41 / 50 41) RAM can be treated as the ……… for the computer’s processor Planning room Waiting room Operating room Factory 42 / 50 42) ………..refers to electronic trespassing or criminal hacking. Cracking Spoofing Jacking Smarming 43 / 50 43) Snowbol is an/a …….. Operating system HLL Search engine Software 44 / 50 44) Magnetic disk is an example of d. Both (a) and (b) a. Secondary memory b. Primary memory c. Main memory 45 / 50 45) A logical bomb that was created to erupt on Michelangelo’s birthday is an example of a : Virus Time rotated bomb sequence Trojan horse Time bomb 46 / 50 46) Cathode Ray Tube is a form of …… Mouse Keyboard Monitor Mother board 47 / 50 47) …….Is the key we use to run the selected command. ENTER SHIFT CTRL TAB 48 / 50 48) All of the following are examples of real security and privacy risks EXCEPT Viruses identify theft hackers Span 49 / 50 49) A device, which is not connected to cpu, is called as …….. Off-line device Land-line device On-line device Device 50 / 50 50) …………is the ability of a device to “jump” directly to the request data Quick access Sequential access All of these Random access Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback