Computer Fundamentals – Set 11 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Computer Fundamentals – Set 11 Dear ! This is Computer Fundamentals – Set 11 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) The CPU and memory are located on the Storage device Output device motherboard expansion board 2 / 50 2) To move a copy file from one computer to another over a communication channel is called ? File transfer File encryption File modification File copying 3 / 50 3) RAM is also called as Permanent memory Long memory Read / write memory Primary memory 4 / 50 4) A ………. is an additional set of commands that the computer displays after you make a selection from the main menu Submenu dialog box Menu selection All of the there 5 / 50 5) ……….. computer is small general purpose microcomputer , but larger than portable computer Digital Hybrid Desktop Laptop 6 / 50 6) The primary function of the ……… is to set up the hardware and load and start an operating system System program Memory CPU BIOS 7 / 50 7) Trackball is a …….. Input device Output device Programming language Software 8 / 50 8) ………. computer is a medium sized computer Mini Micro Super Mainframe 9 / 50 9) Which of the following is not one of the four major data processing functions of a computer ? Processing data or information analyzing the data or information gathering data Storing the data or information 10 / 50 10) A ……….. is a microprocessor- based computing device. Personal computer Mainframe Server Workstation 11 / 50 11) Which one of the following is NOT a computer language COBOL MS-Excel BASIC C++ 12 / 50 12) …….Is the key to close a selected drop-down list; cancel a command and close a dialog box ESC F10 SHIFT TAB 13 / 50 13) What is the other name for programmed chip ? PROM ROM LSIC RAM 14 / 50 14) All of the following are examples of storage device ExCEPT hard disk drives floppy disk drives CD drives Printer 15 / 50 15) …….is computer software designed to operate the computer hardware and to provide platform for running application software Operating system Application software System software Software 16 / 50 16) ……….is the science that attempts to produce machine that display the same type of intelligence that humans do Nanoscience Artificial intelligence (AI) Nanotechnology Simulation 17 / 50 17) ………… computer operates essentially by counting. Portable computer Analog computer Hybrid computer Digital computer 18 / 50 18) The task of performing operations like arithmetic and logical operations is called…… Storing Editing Sorting Processing 19 / 50 19) COBOL is an acronym for ……. Computer Business Oriented Language Common Business Operated Language Common Business Organized Language Common Business Oriented Language 20 / 50 20) Cathode Ray Tube is a form of …… Monitor Mouse Keyboard Mother board 21 / 50 21) ………. computer are of large size Super Micro Mini Mainframe 22 / 50 22) A device, which is not connected to cpu, is called as …….. Land-line device Off-line device On-line device Device 23 / 50 23) A logical bomb that was created to erupt on Michelangelo’s birthday is an example of a : Virus Trojan horse Time rotated bomb sequence Time bomb 24 / 50 24) ALU and Control unit jointly known as PC ROM RAM CPU 25 / 50 25) Which of the following are the functions of a operating system Manages disks and files Monitors activities Allocation resources All of the these 26 / 50 26) ………..refers to electronic trespassing or criminal hacking. Spoofing Cracking Jacking Smarming 27 / 50 27) Select the Odd one Compiler Interpreter Assembler Operating system 28 / 50 28) The ………… is the amount of data that a storage device can move from the storage medium to the per second data digitizing rate data migration rate data transfer rate data access rate 29 / 50 29) You use a(n)……,such as a keyboard or mouse to input information Processing device Output device Storage device Input device 30 / 50 30) What kind of memory is both static and non- volatile? BIOS RAm CACHE ROM 31 / 50 31) The term …………. designated equipment that might be added to a computer system to enhance its functionality. digital device Peripheral device Disk pack System add-on 32 / 50 32) The scrambling of code is known as: Encryption Password proofing a firewall Scrambling 33 / 50 33) …………is the ability of a device to “jump” directly to the request data Random access Sequential access All of these Quick access 34 / 50 34) ……..provides process and memory management services that allow two or more tasks , jobs, program to run simultaneously Multithreading Multiprocessing Multitasking Multicomputing 35 / 50 35) …….Is the key we use to run the selected command. CTRL ENTER SHIFT TAB 36 / 50 36) What is the other name for programmed chip ? RAM ROM PROM LSIC 37 / 50 37) Data becomes ……………… when it is presented in a formal that people can understand and use Information Processed Presentation Graphs 38 / 50 38) ………… Store data or information temporarily and pass it on as directed by the control unit. Address Memory Number Register 39 / 50 39) Which of the following is not one of the four major data processing functions of computer ? Storing the data or information gathering data Processing data into information analyzing the data or information 40 / 50 40) When creating a computer program, the ……… designs the structure of the program System Analyst End user Programmer All of the these 41 / 50 41) Switching device of fifth generation computer is ………. Vacuum tubes IC ULSI Transistors 42 / 50 42) The first electronic computer was developed by Wonton Serf Bill Gates J.N. Attansoff Simur Cray 43 / 50 43) Select the odd one Compiler Assembler Operating system Interpreter 44 / 50 44) RAM is an example of b. Primary memory d. Both (a) and (b) c. Main memory a. Secondary memory 45 / 50 45) Which of the following are examples of real security and privacy risks EXCEPT Viruses Spam identify theft hackers 46 / 50 46) Magnetic disk is an example of b. Primary memory d. Both (a) and (b) a. Secondary memory c. Main memory 47 / 50 47) All of the following are examples of real security and privacy risks EXCEPT Span hackers Viruses identify theft 48 / 50 48) RAM can be treated as the ……… for the computer’s processor Factory Waiting room Operating room Planning room 49 / 50 49) Snowbol is an/a …….. Operating system Search engine Software HLL 50 / 50 50) To prevent the loss of data during power failure, use an : Surge protector Encryption program Firewall UPS Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback