Computer Fundamentals – Set 12 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 123456789101112131415161718192021222324252627282930 Computer Fundamentals – Set 12 Dear ! This is Computer Fundamentals – Set 12 Quiz and it contains 30 questions. Keep Learning! 1 / 30 1) ……… represents raw facts, where as …….. is data made meaningful. Information, bit Records, bytes Data, Information Information, reporting 2 / 30 2) When a logic bomb is activated by a time-related event, it is known as a: Time-related bomb sequence Inkjet bomb Time bomb Item bomb 3 / 30 3) When a file is saved for the first time It only needs a name if it is not going to be printed a copy is automatically printed It does not need a name It must be given a name to identify it 4 / 30 4) The instructions that tell a computer how to carry out the processing tasks are referred to as computer….. Programs Memory modules Input devices Processors 5 / 30 5) In latest generation of computer, the instruction are executed None of the above Parallel only Sequential only Both sequentially and parallel 6 / 30 6) First page of website is termed as Index JAVA script Bookmark Homepage 7 / 30 7) Where are data and programme stored when the processor uses them Main memory Disk memory Secondary memory Programme memory 8 / 30 8) ………..Is the appearance of typed characters ? Size Format Colour Point 9 / 30 9) Which of the following statements is true ? b. Microcomputer works faster than Minicomputer c. Speed of both the computers is same a. Minicomputer works faster than Microcomputer d. The speeds of both these computers cannot be compared with the speed of advanced 10 / 30 10) Which printer is very commonly used for desktop publishing? Inkjet printer Laser Printer Inkjet printer Dot matrix printer 11 / 30 11) What is embedded system? The program which arrives by being wrapped in box The computer which is the part of a big computer The computer and software system that control the machine The program which is the permanent part of the computer 12 / 30 12) The amount of vertical space between lines of text in a document is called Vertical space line spacing double-space single space 13 / 30 13) First electronic computer was developed by J.V. Attansoff Winton Serf Bill Gates Simur Cray 14 / 30 14) —— is the measurement of things such is fingerprints& retinal scans used for security access. Biometrics Bio measurement Computer Security Smart weapon 15 / 30 15) ……… Is used to prevent the loss of data during power failures. UPS Surge Protector Encryption program Firewall 16 / 30 16) What is the most common tool used to restrict access to computer system? Password User login Computer keys Access control software 17 / 30 17) Which of the following controls the process of interaction between the user and the operating system Screen saver Language translator Platform User interface 18 / 30 18) You organize files by storing them in indexes folders lists archives 19 / 30 19) An area of a computer that temporarily holds data waiting to be processed is ….. Memory CPU File Storage 20 / 30 20) What do you call the programs that are used to find out possible faults and their causes ? diagnostic software Operating system extensions Boot diskettes Cookies 21 / 30 21) Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate LAN WAN DAN CAN 22 / 30 22) Coded entries which are used to gain access to a computer system are called Security commands Code words Password Entry codes 23 / 30 23) The first computers were programmed using machine language Object code Source code assembly language 24 / 30 24) Example of non-numeric data is Examination score Bank balance All of these Employee address 25 / 30 25) Hardware and software designed to guard against unauthorized access to computer network is known as Hacker resistant server All of the above Hacker proofs program Firewall 26 / 30 26) What characteristic of read-only memory ROM makes it useful ? ROM provides very large amount of inexpensive data storage. Data in ROM is non- volatile, that is, it remains there even without electrical power. ROM information can be easily updated ROM chips are easily swapped between different brands of computers. 27 / 30 27) ……… Is defined as any crime completed through the use of computer technology Computer forensics Computer crime Computer cracking Hacking 28 / 30 28) What type of resource is most likely to be a shared common resource in a computer Network ? Keyboards Floppy disk drives Printers Speakers 29 / 30 29) what is the name of an application program that gathers user information and sends it to someone through the internet? A virus Security patch Spybot Logic bomb 30 / 30 30) ……. is a combination of hardware and software that facilitates the sharing of information between computing devices. Peripheral Digital device expansion board Network Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback