Main memory of a computer is also known as
A)
Primary memory
done
clear
B)
Peripheral memory
done
clear
C)
Secondary memory
done
clear
D)
Tertiary memory
done
clear
E)
Auxiliary memory
done
clear
View Answer play_arrow
To what temporary area can you store text and other data, and later paste them to another location?
A)
ROM
done
clear
B)
Floppy
done
clear
C)
Clipboard
done
clear
D)
CD-ROM
done
clear
E)
The hard disk
done
clear
View Answer play_arrow
The name a user assigns to a document is called ______
A)
Process
done
clear
B)
Data
done
clear
C)
Record
done
clear
D)
File name
done
clear
E)
Program
done
clear
View Answer play_arrow
The CPU clock speed is normally expressed in ______
A)
Megahertz
done
clear
B)
500 MHz
done
clear
C)
Bits per clock tick
done
clear
D)
Bytes per second
done
clear
E)
Ticks per second
done
clear
View Answer play_arrow
A computer checks the _______of user names and password for a match before granting access to the computer,
A)
Network
done
clear
B)
Backup file
done
clear
C)
System software
done
clear
D)
Data base
done
clear
E)
Website
done
clear
View Answer play_arrow
The science that attempts to produce machines that display the same type of intelligence that humans do is ______
A)
Nano technology
done
clear
B)
Simulation
done
clear
C)
Artificial intelligence
done
clear
D)
Application software
done
clear
E)
Nano science
done
clear
View Answer play_arrow
Computers use the number system to store data and perform calculations
A)
Decimal
done
clear
B)
tertiary
done
clear
C)
octal
done
clear
D)
hexadecimal
done
clear
E)
binary
done
clear
View Answer play_arrow
The term _____ designates equipments that might be added to a computer system to enhance its functionality.
A)
Disk pack
done
clear
B)
Digital device
done
clear
C)
Network device
done
clear
D)
Peripheral device
done
clear
E)
System add-on
done
clear
View Answer play_arrow
What is the NOT a good practice for password policy?
A)
Fixing minimum age of password
done
clear
B)
Giving one time password for every transaction
done
clear
C)
Restriction on password reuse and history
done
clear
D)
Password encryption
done
clear
E)
Allowing change of password only every 2 years.
done
clear
View Answer play_arrow
It is necessary to install a(n) ______ on a network if we want to share a broadband internet connection.
A)
Router
done
clear
B)
node
done
clear
C)
UPS
done
clear
D)
server
done
clear
E)
cable
done
clear
View Answer play_arrow
The program which are as permanent as hardware and stored in ROM is known as
A)
Hardware
done
clear
B)
ROM ware
done
clear
C)
Software
done
clear
D)
Firmware
done
clear
E)
RAM ware
done
clear
View Answer play_arrow
RAM in computer memory stands for _______
A)
Random origin memory
done
clear
B)
Randomly Added Memory
done
clear
C)
Random Access Memory
done
clear
D)
Random only Memory
done
clear
E)
Read only memory
done
clear
View Answer play_arrow
What is the process of copying software programs from secondary storage media to the hard disk called?
A)
Download
done
clear
B)
Configuration
done
clear
C)
Upload
done
clear
D)
Installation
done
clear
E)
Storage
done
clear
View Answer play_arrow
Which of the following TCP/IP protocols is used for transferring file from one machine to another?
A)
Telnet
done
clear
B)
RFC
done
clear
C)
SMTP
done
clear
D)
FTP
done
clear
E)
SMMP
done
clear
View Answer play_arrow
An integrated circuit is ______
A)
Complicated wires connected
done
clear
B)
Hard disks
done
clear
C)
An integrating device
done
clear
D)
A communication device
done
clear
E)
Fabricated on tiny silicon chips
done
clear
View Answer play_arrow
VIRUS stands for
A)
Various Indexed Information under Siege
done
clear
B)
Vital Information Resource under Siege
done
clear
C)
Virus Information Reasons Siege
done
clear
D)
Vital Information Reason under Siege
done
clear
E)
Vital Information resource Under System
done
clear
View Answer play_arrow
Unauthorized access into other system is known as _______
A)
Retrieving
done
clear
B)
Decryption
done
clear
C)
Hacking
done
clear
D)
Sharing
done
clear
E)
Encryption
done
clear
View Answer play_arrow
The code for Web Page is written using _____
A)
A fifth generation language
done
clear
B)
Win zip
done
clear
C)
Hypertext Mark-up Language
done
clear
D)
Peripherals
done
clear
E)
URL
done
clear
View Answer play_arrow
What is the function of recycle bin?
A)
Store deleted files
done
clear
B)
Store document files
done
clear
C)
Store classified files
done
clear
D)
Store temporary files
done
clear
E)
Store corrupted files
done
clear
View Answer play_arrow
Which of the following is not input device?
A)
Mouse Pad
done
clear
B)
Touch pad
done
clear
C)
Keyboard
done
clear
D)
Optical scanner
done
clear
E)
Touch screen
done
clear
View Answer play_arrow
A Web Page uses which of the following extensions?
A)
.mdb
done
clear
B)
.exe
done
clear
C)
.htm
done
clear
D)
.hip
done
clear
E)
.xls
done
clear
View Answer play_arrow
SQL in database management stands for ______
A)
Single Query Language
done
clear
B)
Sequential Query Language
done
clear
C)
Structured Query language
done
clear
D)
Structured Question Language
done
clear
E)
Sequential Question Language
done
clear
View Answer play_arrow
Which process checks to ensure the components of the computer and operating systems are connected properly?
A)
Editing
done
clear
B)
Saving
done
clear
C)
Booting
done
clear
D)
Coding
done
clear
E)
Processing
done
clear
View Answer play_arrow
Which of the following you will use to move selected text from one place to another?
A)
Cut and Paste
done
clear
B)
Move and save
done
clear
C)
Copy and Paste
done
clear
D)
Move and Paste
done
clear
E)
Delete and Paste
done
clear
View Answer play_arrow
Most application software today came with an interface called a(n) _______
A)
Bar code Reader
done
clear
B)
Voice instruction system
done
clear
C)
Character user interface
done
clear
D)
Graphical user Interface
done
clear
E)
Icon user interface
done
clear
View Answer play_arrow
What is the best way to protect a computer from viruses?
A)
Always operate the computer at room temperature
done
clear
B)
Take the help of computer vendor
done
clear
C)
Never connect computer to internet
done
clear
D)
Install a firewall
done
clear
E)
Install up-to-date anti-virus software
done
clear
View Answer play_arrow
SMTP stands for _____
A)
Simple Mail Tracking Protocol
done
clear
B)
Simple Mail Transport Protocol
done
clear
C)
Sample Mail tracking protocol
done
clear
D)
Sample Mail Transfer Protocol
done
clear
E)
Simple Mail Transfer Protocol
done
clear
View Answer play_arrow
A company regularly updates a user reference guide. What feature should be included in the reference guide to eliminate confusion regarding which is the current document?
A)
Copyright information
done
clear
B)
Data Printed
done
clear
C)
Rename the Document
done
clear
D)
Version Number
done
clear
E)
Authors name
done
clear
View Answer play_arrow
Information travels between components on the motherboard through ___
A)
CMOS
done
clear
B)
buses
done
clear
C)
Peripherals
done
clear
D)
Flash memory
done
clear
E)
Bays
done
clear
View Answer play_arrow
Shortcut notation for group of four Binary Digits is called _____ number.
A)
Octal
done
clear
B)
Hexadecimal
done
clear
C)
Unicode
done
clear
D)
Decimal
done
clear
E)
Binary
done
clear
View Answer play_arrow
OLAP in data processing stands for _____
A)
Offline Aggregate processing
done
clear
B)
Online Aggregate Processing
done
clear
C)
Online Analysis processing
done
clear
D)
Online Analytical Processing
done
clear
E)
Online Account Process
done
clear
View Answer play_arrow
In a network ADSL is the abbreviation of ____
A)
Asymmetric Dual System Line
done
clear
B)
Asymmetric Digital Sub scriber Line
done
clear
C)
Asymmetric Digital System Line
done
clear
D)
Active Digital System Line
done
clear
E)
Asymmetric Dual Subscriber line
done
clear
View Answer play_arrow
Which of the following is correct sequence of smallest to largest unit of storage size?
A)
Kilobyte, megabyte petabyte, terabyte, gigabyte
done
clear
B)
Kilobyte, megabyte gigabyte, petabyte, terabyte
done
clear
C)
Terabyte, gigabyte, kilobyte megabyte, petabyte
done
clear
D)
Kilobyte, megabyte gigabyte, terabyte, petabyte
done
clear
E)
Megabyte, terabyte, gigabyte, kilobyte, petabyte
done
clear
View Answer play_arrow
What is the meaning of ?Hi-bernate" in Windows XP dows 7?
A)
Shutdown the computer terminating all running application
done
clear
B)
Restart the computer hibernate mode
done
clear
C)
Shut down the computer without closing the running applications
done
clear
D)
Shut down the computer without saving new
done
clear
E)
Restart the computer safe mode
done
clear
View Answer play_arrow
How can you cannot restore a file that has been deleted from a floppy disk.
A)
Open windows explorer select the required file and double click on it.
done
clear
B)
You cannot restore a file that has been deleted from a floppy disk.
done
clear
C)
Open the recycle bin. Select the required file and select menu option File \[>\]Undelete
done
clear
D)
Open the windows explorer and right click on file and restore
done
clear
E)
Open the recycle bin, right click on the file and select menu option file \[>\] Restore
done
clear
View Answer play_arrow
What is the term for unsolicited e-mail?
A)
News group
done
clear
B)
use net
done
clear
C)
spam
done
clear
D)
backbone
done
clear
E)
flaming
done
clear
View Answer play_arrow
The two basic types of record access methods in data base are ________
A)
Direct and Indexed
done
clear
B)
Online and real time
done
clear
C)
Sequential and indexed
done
clear
D)
Direct and immediate
done
clear
E)
Sequential and Random
done
clear
View Answer play_arrow
Which of the following is the largest unit of storage?
A)
MB
done
clear
B)
Byte
done
clear
C)
GB
done
clear
D)
TB
done
clear
E)
KB
done
clear
View Answer play_arrow
The most important of powerful computer in atypical network is _________
A)
Desktop
done
clear
B)
Dumb terminal
done
clear
C)
Network station
done
clear
D)
Network client
done
clear
E)
Network server
done
clear
View Answer play_arrow
The first computers were programmed using _________
A)
Object code
done
clear
B)
Assembly language
done
clear
C)
Source code
done
clear
D)
Spaghetti code
done
clear
E)
Machine language
done
clear
View Answer play_arrow