Computer Fundamentals – Set 12 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 123456789101112131415161718192021222324252627282930 Computer Fundamentals – Set 12 Dear ! This is Computer Fundamentals – Set 12 Quiz and it contains 30 questions. Keep Learning! 1 / 30 1) What is embedded system? The computer and software system that control the machine The computer which is the part of a big computer The program which arrives by being wrapped in box The program which is the permanent part of the computer 2 / 30 2) ……… Is used to prevent the loss of data during power failures. Surge Protector UPS Encryption program Firewall 3 / 30 3) Which printer is very commonly used for desktop publishing? Dot matrix printer Inkjet printer Inkjet printer Laser Printer 4 / 30 4) ……… Is defined as any crime completed through the use of computer technology Computer cracking Computer crime Computer forensics Hacking 5 / 30 5) Example of non-numeric data is Examination score Bank balance Employee address All of these 6 / 30 6) —— is the measurement of things such is fingerprints& retinal scans used for security access. Bio measurement Computer Security Biometrics Smart weapon 7 / 30 7) What is the most common tool used to restrict access to computer system? Computer keys User login Password Access control software 8 / 30 8) In latest generation of computer, the instruction are executed None of the above Both sequentially and parallel Parallel only Sequential only 9 / 30 9) Coded entries which are used to gain access to a computer system are called Code words Password Security commands Entry codes 10 / 30 10) Which of the following controls the process of interaction between the user and the operating system Screen saver User interface Platform Language translator 11 / 30 11) What characteristic of read-only memory ROM makes it useful ? ROM information can be easily updated Data in ROM is non- volatile, that is, it remains there even without electrical power. ROM chips are easily swapped between different brands of computers. ROM provides very large amount of inexpensive data storage. 12 / 30 12) When a logic bomb is activated by a time-related event, it is known as a: Time bomb Inkjet bomb Item bomb Time-related bomb sequence 13 / 30 13) Where are data and programme stored when the processor uses them Programme memory Main memory Secondary memory Disk memory 14 / 30 14) The first computers were programmed using machine language Object code assembly language Source code 15 / 30 15) What do you call the programs that are used to find out possible faults and their causes ? Cookies Operating system extensions Boot diskettes diagnostic software 16 / 30 16) ……… represents raw facts, where as …….. is data made meaningful. Data, Information Information, reporting Records, bytes Information, bit 17 / 30 17) ……. is a combination of hardware and software that facilitates the sharing of information between computing devices. Network Digital device expansion board Peripheral 18 / 30 18) Which of the following statements is true ? c. Speed of both the computers is same a. Minicomputer works faster than Microcomputer d. The speeds of both these computers cannot be compared with the speed of advanced b. Microcomputer works faster than Minicomputer 19 / 30 19) An area of a computer that temporarily holds data waiting to be processed is ….. File CPU Memory Storage 20 / 30 20) The amount of vertical space between lines of text in a document is called single space Vertical space double-space line spacing 21 / 30 21) Hardware and software designed to guard against unauthorized access to computer network is known as Hacker proofs program Firewall Hacker resistant server All of the above 22 / 30 22) What type of resource is most likely to be a shared common resource in a computer Network ? Floppy disk drives Speakers Keyboards Printers 23 / 30 23) what is the name of an application program that gathers user information and sends it to someone through the internet? Logic bomb Security patch A virus Spybot 24 / 30 24) Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate LAN CAN WAN DAN 25 / 30 25) You organize files by storing them in indexes lists folders archives 26 / 30 26) First page of website is termed as JAVA script Bookmark Index Homepage 27 / 30 27) First electronic computer was developed by Simur Cray Winton Serf Bill Gates J.V. Attansoff 28 / 30 28) The instructions that tell a computer how to carry out the processing tasks are referred to as computer….. Input devices Processors Memory modules Programs 29 / 30 29) When a file is saved for the first time It does not need a name It only needs a name if it is not going to be printed a copy is automatically printed It must be given a name to identify it 30 / 30 30) ………..Is the appearance of typed characters ? Size Point Colour Format Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback