Q. | ENIAC was |
| 1 | an electronic computer |
| 2 | an engine |
| 3 | a memory device |
| 4 | an electronic calculator |
| | Ans: 1 |
|
Q. | The operating system called UNIX is typically used for - |
| 1 | Desktop computers |
| 2 | Laptop computers |
| 3 | Supercomputers |
| 4 | All of these |
| | Ans: 4 |
|
Q. | There are several primary categories of procedures. Which of the following is not a primary category of procedures? |
| 1 | Testing |
| 2 | Backup and recovery |
| 3 | Firewall development |
| 4 | Design |
| | Ans: 3 |
|
Q. | All of the logic and mathematical calculations done by the computer happen in/on the - |
| 1 | Central processing unit |
| 2 | Mother board |
| 3 | Memory |
| 4 | Central control unit |
| | Ans: 1 |
|
Q. | The connection between your computer at home and your local ISP is called - |
| 1 | The last mile |
| 2 | The home Stretch |
| 3 | The home page |
| 4 | The backbone |
| | Ans: 3 |
|
Q. | When speaking of computer input and output, input refers to - |
| 1 | any data processing that occurs from new data input into the computer |
| 2 | data or information that has been entered into the computer |
| 3 | the transmission of data that has been input into the computer |
| 4 | Both (C) and (D) above. |
| | Ans: 4 |
|
Q. | Computer software can be defined as-- |
| 1 | the computer and its associated equipment |
| 2 | the instructions that tell the computer what to do |
| 3 | computer components that act to accomplish a goal |
| 4 | an interface between the computer and the network |
| | Ans: 2 |
|
Q. | The main memory of a computer can also be called - |
| 1 | Primary storage |
| 2 | Internal memory |
| 3 | Primary memory |
| 4 | All of these |
| | Ans: 3 |
|
Q. | Which of the following is not a type of computer software which can be thought? |
| 1 | Off-the-shelf |
| 2 | Tailor-made |
| 3 | Custom-developed |
| 4 | Off-the-shelf with alterations |
| | Ans: 4 |
|
Q. | .....are attempts by individuals to obtain confidential information from you by falsifying their identity. |
| 1 | Phishing trips |
| 2 | Computer viruses |
| 3 | Spyware scams |
| 4 | Phishing Scams |
| | Ans: 4 |
|
No comments:
Post a Comment