Computer

y[20:14, 7/19/2015] Sneha: Computet Quiz

1).To insert a copy of the clipboard contents,_____ whatever was last cut or copied at the insertion point.
a) paste
b) stick in
c) fit in
d) push in
e) None of these

2).The command used to remove text or graphics from a documents. (The information is then stored on a clipboard so you can paste it):
a) chop
b) cut
c) clip
d) cart away
e) None of these

3).A group of 8 bits is known as a _________.
a) byte
b) kilobyte
c) binary digit
d) megabit
e) None of these

4).The hardware device commonly referred to as the
“brain” of the computer is ___________.
a) RAM chip
b) Data input
c) CPU
d) Secondary storage
e) None of these

5).A computer cannot “boot” if it does not have
the______.
a) Compiler
b) Loader
c) Operating System
d) Assemble
e) None of these

6).A computer that takes what has been typed into the computer and can be seen on the screen and sends it to the printer for output on paper is called ___________.
a) print
b) return
c) jump
d) attention
e) None of these

7).The most common storage device for the personal computer is __________.
a) Floppy disk
b) USB thumb drive
c) Zip disk
d) Hard disk drive
e) Pen drive

8).Which device uses a hand-held operating system?
a) A PDA
b) A personal computer
c) A laptop
d) A mainframe
e) None of these

9).To print an individual item in a file immediately use
__________.
a) SHIFT+P
b) CTRL+P
c) ALT+P
d) ESC+P
e) None of these

10).The ability to find an individual item in a file
immediately is called ___________.
a) File allocation table
b) directory
c) sequential access
d) direct access
e) None of these
[20:31, 7/19/2015] Sneha: Computer quiz answer key

1. Paste
2. Cut
3. Byte
4. CPU
5. Operating system
6. Print
7. Hard disk drive
8. PDA
9. Ctrl+p
10. Direct access

[13:41, 7/26/2015] R.K.��������: COMPUTER QUIZ
1. Artifact based authentication method includes___

(1) Machine readable badges

(2) Electronic smart cards

(3) Both 1 and 2

(4) Vault cards

(5) None of thesesabdhani

Ans. (3) Artifact based authentication method includes Machine readable badges and Electronic smart cards.

2. What is the memory from 1K-640K called?

(1) Extended memory

(2) Normal memory

(3) Low memory

(4) Conventional memory

(5) None of these

Ans. (4) The memory from 1K-640K called Conventional memory.

3. Which of the following is a variation of frequency division multiplexing (FDM)?

(1) Time Division Multiplexing (TDM)

(2) Pulse Code Multiplexing (PCM)

(3) Wave length Division Multiplexing (WDM)

(4) All the above

(5) None of these

Ans. (3) Wave length Division Multiplexing (WDM)sabdhani coaching

4. Race condition occur in which flip-flop?

(1) RS flip-flop

(2) JK flip-flop

(3) D flip-flop

(4) T flip-flop

(5) None of these

Ans. (1) Race condition occur in RS flip-flop.

5. Denial of Service (DoS) is _______.

(1) a firewall technique for blocking access to certain logical ports.

(2) an act of bombarding a server with high volumes of false requests.

(3) the malicious destruction of data by accessing the host's FAT table.

(4) a policy of withholding service from users who abuse the Internet.

(5) None of these sabdhani

Ans. (2) Denial of Service (DoS) is an act of bombarding a server with high volumes of false requests.

6. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.

(1) Routing

(2) Network address translation (NAT)

(3) Signature referencing

(4) Packet filtering

(5) IP filtering

Ans. (2) Network address translation is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.

7. Dynamic addressing makes it more difficult for hackers to find likely victims because _______.

(1) the ISP assigns counterfeit IP addresses.

(2) the IP address is protected by a firewall.

(3) the ISP hides the IP addresses for computers on their network.

(4) the IP address changes each time a user logs on to their ISP.

(5) None of these

Ans. (4) IP address changes each time a user logs on to their ISP.

8. A macro virus is a virus that _______.

(1) does not rely on a host file.

(2) is attached to a document file.

(3) loads into memory when the computer first starts.

(4) provides access to macros on the computer.

(5) None of these

Ans. (2) A macro virus is a virus that is attached to a document file.

9. ____________ computing is an efficient way of linking many computers together, when they are not otherwise in use, to utilize their capacity to perform complex calculations.

(1) Remote

(2) Grid

(3) Functional

(4) Automated

(5) Manual

Ans. (2) Grid computing is an efficient way of linking many computers together, when they are not otherwise in use, to utilize their capacity to perform complex calculations.

10. Which of the following features would be more likely to be found in tablet computers than in other mobile computing devices?

(1) Wireless ports

(2) Internet access

(3) Disk storage

(4) Handwriting recognition

(5) USB port

Ans. (4) Handwriting recognition found in tablet computers than in other mobile computing devices.

������������
[13:41, 7/26/2015] R.K.��������: ==================================
1 Bit = Binary Digit
4 bits = 1 Nibble
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte

No comments:

Post a Comment