Computer Fundamentals – Set 1

0%

Report a question

You cannot submit an empty report. Please add some details.

Computer Fundamentals – Set 1

Dear ! This is Computer Fundamentals – Set 1 Quiz and it contains 50 questions.


Keep Learning!

1 / 50

1) ………… refers to sending large number of mail to the victim , which may be an individual or a company or even mail servers there by ultimately resulting into crashing

2 / 50

2) This is based on individuals who know how to use these technologies and those who do not .

3 / 50

3) The two basic types of record access methods are :

4 / 50

4) Artificial Intelligence is associated with which generation ?

5 / 50

5) Computer built before the first generation of computers were :

6 / 50

6) ……are programs that attach themselves to a computer or a file and then circulate themselves to other files and other computer on a network.

7 / 50

7) This is a person who gains unauthorized access to a computer network for profit , criminal mischief or personal pleasure .

8 / 50

8) Which of the following is the largest manufacture of hard disk drives ?

9 / 50

9) The least significant bit of the binary number , which is equivalent to any odd decimal number is :

10 / 50

10) When a key is pressed on the keyboard , which standard is used for converting the keystroke into the corresponding bits ?

11 / 50

11) A number system that has eight different symbols to present any quantity is known as

12 / 50

12) When was the transistors invented ?

13 / 50

13) This refers to the gap between people who possess regular access to information technology and those who do not have this access

14 / 50

14) which of the following is a programming language ?

15 / 50

15) This kind of track involves altering raw data just before a computer processes it and then changing it back after the processing is completed .

16 / 50

16) ……….is the process of coding and scrambling of messages to prevent unauthorized access to or understanding of data being transmitted .

17 / 50

17) ……………… is the universal character encoding standard , used for representation of text for computer processing .

18 / 50

18) Which is a benefit of a firewall

19 / 50

19) Which of the following is not the classification of computers based on application ?

20 / 50

20) One computer that is not considered a portable computer is

21 / 50

21) …………. software is a matter of liberty not price.

22 / 50

22) How many pins on a VGA ?

23 / 50

23) Who stated  Free Software foundation ?

24 / 50

24) Which of the following is not electro-mechanical computer ?

25 / 50

25) Which of the following is optical input device ?

26 / 50

26) Flash drives have replaced floppy disks as the preferred method of portable storage because :

27 / 50

27) Micro computer are so called because of microprocessor used in them , what does microprocessor consist ?

28 / 50

28) ………refers to the compulsive internet use which interferes with daily life , work and relationships.

29 / 50

29) Networking such as LAN,MAN started form

30 / 50

30) Which of the following is not an output device ?

31 / 50

31) Viruses that travel from computer to computer on their (independent of host) are called

32 / 50

32) The actual execution of instructions happens in

33 / 50

33) Which of the following registers is used to keep track of address of the memory location where the next instruction is located ?

34 / 50

34) Which of the following memories has the shortest access times ?

35 / 50

35) ………… refers to a code of safe and responsible  behavior for the internet community

36 / 50

36) Floppy disks are available in

37 / 50

37) who invented Analytical engine ?

38 / 50

38) This type of digital divided is based on difference between individuals with access and those without access

39 / 50

39) Which of the following class of computer cannot support multiple users simultaneously ?

40 / 50

40) Which of the following is not harmful for your computer

41 / 50

41) How was the generation of computer classified ?

42 / 50

42) ……….are event dependent programs .

43 / 50

43) ……….. refers to unlawful acts wherein the computer is either a tool or target or both

44 / 50

44) Which of the  following is not type of software

45 / 50

45) Most important advantage in case an IC is its

46 / 50

46) The language that the computer can understand and executed is called

47 / 50

47) This refers to environmentally  sustaining computing or IT.

48 / 50

48) Daisy wheel printer is a type of

49 / 50

49) Which characteristic of computer distinguishes it from electronic calculators ?

50 / 50

50) Which of the following is considered first computer in the world ?

Your score is

The average score is 0%

🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥
LinkedIn Facebook
0%

Exit

We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌

🌟 Thank you for your support! Your feedback means the world to us. 🙏💖

You cannot copy content of this page