Computer Fundamentals – Set 12

0%

Report a question

You cannot submit an empty report. Please add some details.

Computer Fundamentals – Set 12

Dear ! This is Computer Fundamentals – Set 12 Quiz and it contains 30 questions.


Keep Learning!

1 / 30

1) ……… represents raw facts, where as …….. is data made meaningful.

2 / 30

2) When a logic bomb is activated by a time-related event, it is known as a:

3 / 30

3) When a file is saved for the first time

4 / 30

4) The instructions that tell a computer how to carry out the processing tasks are referred to as computer…..

5 / 30

5) In latest generation of computer, the instruction are executed

6 / 30

6) First page of website is termed as

7 / 30

7) Where are data and programme stored when the processor uses them

8 / 30

8) ………..Is the appearance of typed characters ?

9 / 30

9) Which of the following statements is true ?

10 / 30

10) Which printer is very commonly used for desktop publishing?

11 / 30

11) What is embedded system?

12 / 30

12) The amount of vertical space between lines of text in a document is called

13 / 30

13) First electronic computer was developed by

14 / 30

14) —— is the measurement of things such is fingerprints& retinal scans used for security access.

15 / 30

15) ……… Is used to prevent the loss of data during power failures.

16 / 30

16) What is the most common tool used to restrict access to computer system?

17 / 30

17) Which of the following controls the process of interaction between the user and the operating system

18 / 30

18) You organize files by storing them in

19 / 30

19) An area of a computer that temporarily holds data waiting to be processed  is …..

20 / 30

20) What do you call the programs that are used to find out possible faults and their causes ?

21 / 30

21) Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate

22 / 30

22) Coded entries which are used to gain access to a computer system are called

23 / 30

23) The first computers were programmed using

24 / 30

24) Example of non-numeric data is

25 / 30

25) Hardware and software designed to guard against unauthorized access to computer network is known as

26 / 30

26) What characteristic of read-only memory ROM makes it useful ?

27 / 30

27) ……… Is defined as any crime completed through the use of computer technology

28 / 30

28) What type of resource is most likely to be a shared common resource in a computer Network ?

29 / 30

29) what is the name of an application program that gathers user information and sends it to someone through the internet?

30 / 30

30) ……. is a combination of hardware and software that facilitates the sharing of information between computing devices.

Your score is

The average score is 0%

🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥
LinkedIn Facebook
0%

Exit

We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌

🌟 Thank you for your support! Your feedback means the world to us. 🙏💖

You cannot copy content of this page