Computer Fundamentals – Set 1 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Computer Fundamentals – Set 1 Dear ! This is Computer Fundamentals – Set 1 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) ………… refers to sending large number of mail to the victim , which may be an individual or a company or even mail servers there by ultimately resulting into crashing Virus None of these Logic bomb Email bombing 2 / 50 2) This is based on individuals who know how to use these technologies and those who do not . Usage Quality Access Usage None of these 3 / 50 3) The two basic types of record access methods are : Sequential and random Online and real time Sequential and indexed Direct and immediate 4 / 50 4) Artificial Intelligence is associated with which generation ? Sixth generation Second generation Fifth generation First generation 5 / 50 5) Computer built before the first generation of computers were : Electrical None of these Electro-mechanical Mechanical 6 / 50 6) ……are programs that attach themselves to a computer or a file and then circulate themselves to other files and other computer on a network. Virus web jacking Logic bomb None of these 7 / 50 7) This is a person who gains unauthorized access to a computer network for profit , criminal mischief or personal pleasure . programmer Hacker None of these Cracker 8 / 50 8) Which of the following is the largest manufacture of hard disk drives ? Microsoft Seagate IMB 3M 9 / 50 9) The least significant bit of the binary number , which is equivalent to any odd decimal number is : 3 1 1 or 0 10 / 50 10) When a key is pressed on the keyboard , which standard is used for converting the keystroke into the corresponding bits ? EBCDIC ANSI ASCII ISO 11 / 50 11) A number system that has eight different symbols to present any quantity is known as Octal Binary Hexadecimal Decimal 12 / 50 12) When was the transistors invented ? 1938 1958 1968 1948 13 / 50 13) This refers to the gap between people who possess regular access to information technology and those who do not have this access Digital divider Computer divide None of these Discrimination 14 / 50 14) which of the following is a programming language ? MS-Excel Pascal Lotus Netscape 15 / 50 15) This kind of track involves altering raw data just before a computer processes it and then changing it back after the processing is completed . Data diddling Virus attack None of these Salami attacks 16 / 50 16) ……….is the process of coding and scrambling of messages to prevent unauthorized access to or understanding of data being transmitted . Encryption Firewalls Antivirus program None of these 17 / 50 17) ……………… is the universal character encoding standard , used for representation of text for computer processing . SAP JAVA UNICODE None of these 18 / 50 18) Which is a benefit of a firewall they make it harder for a hacker to locate specific computer on a network they filter out unwanted wireless signals they open unused logical ports to increase throughput they repeatedly change the IP address of the router 19 / 50 19) Which of the following is not the classification of computers based on application ? Electronic computer Digital computer Hybrid computer Analog computer 20 / 50 20) One computer that is not considered a portable computer is All of these Tablet PC A laptop computer Minicomputer 21 / 50 21) …………. software is a matter of liberty not price. Proprietary None of these Free Application 22 / 50 22) How many pins on a VGA ? 25 9 32 15 23 / 50 23) Who stated Free Software foundation ? GNU None of these Richard M Stallman Linus Torvald 24 / 50 24) Which of the following is not electro-mechanical computer ? ABC mark I ENIAC Z3 25 / 50 25) Which of the following is optical input device ? Light pen Mouse Joystick Keyboard 26 / 50 26) Flash drives have replaced floppy disks as the preferred method of portable storage because : they hold much more data than floppy disks All of the above Data is not magnetic so less subject to errors they have quicker access time than a floppy drive 27 / 50 27) Micro computer are so called because of microprocessor used in them , what does microprocessor consist ? CU&ALU CU,ALU & RU CU CU,ALU & MU 28 / 50 28) ………refers to the compulsive internet use which interferes with daily life , work and relationships. Drug addiction Alcohol addiction None of these Cyber addiction 29 / 50 29) Networking such as LAN,MAN started form Fourth generation Third generation First generation Second generation 30 / 50 30) Which of the following is not an output device ? Projector Touch Screen Printer Flat screen 31 / 50 31) Viruses that travel from computer to computer on their (independent of host) are called Worms Macro viruses Logic bombs Stealth viruses 32 / 50 32) The actual execution of instructions happens in ALU CPU None of these Memory 33 / 50 33) Which of the following registers is used to keep track of address of the memory location where the next instruction is located ? memory data register Instruction register Program counter Memory address register 34 / 50 34) Which of the following memories has the shortest access times ? RAM Magnetic bubble memory Magnetic core memory Cache memory 35 / 50 35) ………… refers to a code of safe and responsible behavior for the internet community Cybercrime Cyber Ethics Social issues None of these 36 / 50 36) Floppy disks are available in Both of these None of these Single side single density Single side double density 37 / 50 37) who invented Analytical engine ? George Bool Blaise pascal Dr. Herman Hollerith Charles Babbage 38 / 50 38) This type of digital divided is based on difference between individuals with access and those without access None of these Usage quality Access Usage 39 / 50 39) Which of the following class of computer cannot support multiple users simultaneously ? All of these Micro computer Mainframe computer Mini computer 40 / 50 40) Which of the following is not harmful for your computer Virus Malware Spyware Cookies 41 / 50 41) How was the generation of computer classified ? by the device used in memory and processor by the speed of computer by the accuracy of computer by the model of computer 42 / 50 42) ……….are event dependent programs . Trojan bombs Salami bomb Logic bombs None of these 43 / 50 43) ……….. refers to unlawful acts wherein the computer is either a tool or target or both None of these Cybercrime Cyber ethics Cyber law 44 / 50 44) Which of the following is not type of software System software Entertainment software Utility software Application software 45 / 50 45) Most important advantage in case an IC is its Easy replacement in case of circuit failure Extremely high reliability Reduce cost Lower power consumption 46 / 50 46) The language that the computer can understand and executed is called System program Machine language Application software All of these 47 / 50 47) This refers to environmentally sustaining computing or IT. Electronic computing None of these Green computing Cloud computing 48 / 50 48) Daisy wheel printer is a type of Matrix printer laser printer Impact printer Manual printer 49 / 50 49) Which characteristic of computer distinguishes it from electronic calculators ? Storage Versatlility Automatic Accuracy 50 / 50 50) Which of the following is considered first computer in the world ? Z3 ABC None of these Mark I Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback