Computer Fundamentals – Set 12 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 123456789101112131415161718192021222324252627282930 Computer Fundamentals – Set 12 Dear ! This is Computer Fundamentals – Set 12 Quiz and it contains 30 questions. Keep Learning! 1 / 30 1) Hardware and software designed to guard against unauthorized access to computer network is known as Hacker proofs program Hacker resistant server Firewall All of the above 2 / 30 2) ……… Is defined as any crime completed through the use of computer technology Computer cracking Hacking Computer crime Computer forensics 3 / 30 3) Which printer is very commonly used for desktop publishing? Laser Printer Dot matrix printer Inkjet printer Inkjet printer 4 / 30 4) Which of the following controls the process of interaction between the user and the operating system Screen saver Platform User interface Language translator 5 / 30 5) The amount of vertical space between lines of text in a document is called Vertical space line spacing single space double-space 6 / 30 6) What type of resource is most likely to be a shared common resource in a computer Network ? Speakers Keyboards Floppy disk drives Printers 7 / 30 7) First electronic computer was developed by Simur Cray Bill Gates Winton Serf J.V. Attansoff 8 / 30 8) ……… Is used to prevent the loss of data during power failures. UPS Firewall Encryption program Surge Protector 9 / 30 9) Which of the following statements is true ? b. Microcomputer works faster than Minicomputer a. Minicomputer works faster than Microcomputer d. The speeds of both these computers cannot be compared with the speed of advanced c. Speed of both the computers is same 10 / 30 10) When a file is saved for the first time a copy is automatically printed It only needs a name if it is not going to be printed It does not need a name It must be given a name to identify it 11 / 30 11) When a logic bomb is activated by a time-related event, it is known as a: Time-related bomb sequence Item bomb Inkjet bomb Time bomb 12 / 30 12) In latest generation of computer, the instruction are executed None of the above Both sequentially and parallel Sequential only Parallel only 13 / 30 13) What is the most common tool used to restrict access to computer system? Password Access control software User login Computer keys 14 / 30 14) Coded entries which are used to gain access to a computer system are called Password Security commands Entry codes Code words 15 / 30 15) ……. is a combination of hardware and software that facilitates the sharing of information between computing devices. Peripheral expansion board Network Digital device 16 / 30 16) Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate DAN LAN CAN WAN 17 / 30 17) First page of website is termed as JAVA script Index Homepage Bookmark 18 / 30 18) ……… represents raw facts, where as …….. is data made meaningful. Records, bytes Information, reporting Information, bit Data, Information 19 / 30 19) ………..Is the appearance of typed characters ? Point Size Colour Format 20 / 30 20) —— is the measurement of things such is fingerprints& retinal scans used for security access. Smart weapon Biometrics Bio measurement Computer Security 21 / 30 21) What characteristic of read-only memory ROM makes it useful ? ROM provides very large amount of inexpensive data storage. ROM information can be easily updated Data in ROM is non- volatile, that is, it remains there even without electrical power. ROM chips are easily swapped between different brands of computers. 22 / 30 22) Example of non-numeric data is Employee address Examination score Bank balance All of these 23 / 30 23) what is the name of an application program that gathers user information and sends it to someone through the internet? A virus Spybot Logic bomb Security patch 24 / 30 24) What do you call the programs that are used to find out possible faults and their causes ? Operating system extensions Cookies diagnostic software Boot diskettes 25 / 30 25) You organize files by storing them in folders indexes archives lists 26 / 30 26) An area of a computer that temporarily holds data waiting to be processed is ….. Storage CPU Memory File 27 / 30 27) The instructions that tell a computer how to carry out the processing tasks are referred to as computer….. Memory modules Programs Processors Input devices 28 / 30 28) The first computers were programmed using Source code Object code machine language assembly language 29 / 30 29) What is embedded system? The program which is the permanent part of the computer The program which arrives by being wrapped in box The computer and software system that control the machine The computer which is the part of a big computer 30 / 30 30) Where are data and programme stored when the processor uses them Programme memory Secondary memory Disk memory Main memory Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback