Monday, 14 December 2020

General Computer Test - 160

 

1. To prevent the loss of data during power failures, use a(n):

A. encryption program.

B. surge protector.

C. firewall.

D. UPS.

Answer: D

2. A(n) can shield electronic equipment from power spikes.

A. encryption program

B. surge protector

C. firewall

D. UPS

Answer: B

3. All of these are suggestions for safe computing EXCEPT:

A. don‘t borrow disks from other people.

B. open all e-mail messages but open them slowly.

C. download shareware and freeware with caution.

D. disinfect your system.

Answer: B

4. Freeware encrypts data.

A. encryption

B. firewall software

C. PGP

D. private and public keys

Answer: C

5.is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

Answer: B

6. Most computer systems rely solely on for authentication.

A. logins

B. passwords

C. encryption

D. lock and key

Answer: B

7. Creating strong computer security to prevent computer crime usually simultaneously helps protect :

A. privacy rights.

B. personal ethics.

C. the number of cookies downloaded to your personal computer.

D. personal space.

Answer: A

8. Over was spent by businesses and government to repair problems in regard to Y2K.

A. 20 million dollars

B. 100 million dollars

C. 1 billion dollars

D. 100 billion dollars

Answer: D

9. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision-making?

A. Autonomous system

B. Missile defense auto-system

C. Smart weapon

D. Independent system

Answer: D

10. Security procedures can:

A. will eliminate all computer security risk.

B. reduce but not eliminate risks.

C. are prohibitively expensive.

D. are inaccessible for the average home user.

Answer: B

11. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line

1) Compiler

2) Interpreter

3) Linker

4) Loader

5) None

Ans:-2

12. _ _ _ _ _ _ _ _ is an OOP principle

1) Structured programming

2) Procedural programming

3) Inheritance

4) Linking

5) None

Ans:-3

13. COBOL is widely used in _ _ _ _ _ _ _ applications

1) Commercial

2) Scientific

3) Space

4) Mathematical

5) None

Ans:-1

14. RAM stands for

1) Random origin money

2) Random only memory

3) Read only memory

4) Random access memory

5) None

Ans:-4

15. 1 Byte = ?

1) 8 bits

2) 4 bits

3) 2 bits

4) 9 bits

5) None

Ans:-1

16. SMPS stands for

1) Switched mode power supply

2) Start mode power supply

3) Store mode power supply

4) Single mode power supply

5) None

Ans:-1

17. The device used to carry digital data on analog lines is called as

1) Modem

2) Multiplexer

3) Modulator

4) Demodulator

5) None

Ans:-1

18. VDU is also called

1) Screen

2) Monitor

3) Both 1 & 2

4) printer

5) None

Ans:-3

19. BIOS stands for

1) Basic Input Output system

2) Binary Input output system

3) Basic Input Off system

4) all the above

5) None

Ans:-1

20. Father of ‘C’ programming language

1) Dennis Ritchie

2) Prof Jhon Kemeny

3) Thomas Kurtz

4) Bill Gates

5) None

Ans:-1

21. The 16 bit Microprocessor means that it has

1) 16 address lines

2) 16 Buses

3) 16 Data lines

4) 16 routes

5) None

Ans:-3

22. Data going into the computer is called

1) Output

2) algorithm

3) Input

4) Calculations

5) flow chart

Ans:-3

23. Which of the following refers to a small, single-site network?

1) LAN

2) DSL

3) RAM

4) USB

5) CPU

Ans:-1

24. Microsoft Office is

1) Shareware

2)Public domain software

3) Open-source software

4) A vertical market application

5) An application suite

Ans:-5

25. How many options does a BINARY choice offer

1) None

2) One

3) Two

4) it depends on the amount of memory on the computer

5) It depends on the speed of the computer‘s processor

Ans:-3

No comments:

Post a Comment