Search This Blog

Wednesday, October 10, 2018

Computer gk

Q.1 What does EPROM stand for? 

(1) Electric Programmable Read Only Memory 

(2) Erasable Programmable Read Only Memory 

(3) Evaluable Philter Random Optic Memory 

(4) Every Person Requires One Mind 

(5) None of these 

Q.2 What is the full form of ADSL ? 

(1) Automatic Digital Subscriber Line 

(2) Asymmetric Direct Subscriber Line 

(3) Asymmetric Digital Subscriber Line 

(4) Automatic Digital Subscribtion Line 

(5) None of these 

Q.3 Malicious software is known as: 

(1) bad ware 

(2) malware 

(3) malicious ware 

(4) illegal ware 

(5) None of these 

Q.4 Compilers and interpreters are themselves——- 

(1) High-level language 

(2) Codes 

(3) Programs 

(4) Mnemonics 

(5) None of these 

Q.5 The output devices makes it possible to ______. 

(1) Input data 

(2) View or print data 

(3) Store data 

(4) Scan data 

(5) None of these 

Q.6 The blinking symbol on the computer screen is called the— 

(1) Mouse 

(2) Logo 

(3) Hand 

(4) Palm 

(5) Cursor 

Q.7 Phishing and pharming are used for what purpose? 

(1) Web development 

(2) Software programming 

(3) Cybercrime 

(4) Recycling 

(5) Develop new software 

Q.8 What does a key logger log? 

(1) Failed authentication attempts 

(2) System logins 

(3) Keystrokes 

(4) Crashes 

(5) Hit 

Q.9 One megabyte equals approximately— 
(1) 1,000 bits 

(2) 1,000 bytes 

(3) 1 million bytes 

(4) 1 million bits 

(5) 2,000 bytes 

Q.10 How are data organized in a spreadsheet? 

(1) Lines and spaces 

(2) Layers and planes 

(3) Height and width 

(4) Rows and columns 

(5) None of these 

Answers- 

Q-1 (2) 

EPROM- Erasable Programmable Read Only Memory 

Q-2 (3) 

ADSL stands for “Asymmetric Digital Subscriber Line.” which is a method of transferring data over copper telephone lines. 

Q-3 (2) 

Malicious software is known as malware. 

Q-4 (3) 

Compilers and interpreters are themselves programs. 

Q-5 (2) 

The output devices makes it possible to view or print data. 

Q-6 (5) 

The blinking symbol on the computer screen is called the cursor. 

Q-7 (3) 

Cybercrime is criminal activity done using computers and the Internet. 

Q-8 (3) 

A keylogger is a program that records the keystrokes on a computer. 

Q-9 (3) 

One megabyte equals to approximately 1 million bytes. 

Q-10 (4) 

Data are organized in rows and column in spreadsheet.                                

     

No comments:

Post a Comment