1.
Who
coined the term computer virus?
a)
Frederick
Cohen
b)
William Gibson
c)
John
Von Neumann
d)
Charles Babbage
Answer: a)
Frederick Cohen is an American Computer Scientist and best
known as inventor of computer virus defense techniques.
2.
Operating
system is a type of
a)
Application
software
b)
Utility
software
c)
System
software
d)
None
of these
Answer: (c)
System software is a type of computer program that is
designed to run a computer’s hardware and application program. An Operating system acts as an interface between used and hardware
3.
What
is the expansion of the term ASCII
a)
American
security code for information Interchange
b)
American
scientific code for information Interchange
c)
American
Standard Code for Interchange information
d)
American
Standard Code for Information Interchange
Answer: (d)
ASCII is a character encoding scheme use in computer. ASCII
uses 7 bit or 8 bit to represent character.
4.
Attempt
to acquire sensitive information such as passwords and credit card details by
masquerading as a trustworthy entity.
a)
Phishing
b)
Spoofing
c)
Hacking
d)
None
of these
Answer: (a)
Phishing is a cybercrime carried out by email spoofing.
5. Process of ‘knowledge discovery in
databases' is
a) Data tuning
b) Data Diddling
c) Data Fragmentation
d) Data Mining
Answer: (d)
Data mining is the extraction of patterns and knowledge from
large amount of data.
6.
Finding
and removal of errors in a computer program is
a)
Compilation
b)
Debugging
c)
Spamming
d)
Running
Answer: (b)
Debugging is the process
of finding and resolving defects that prevent correct operation of a computer
software error in a computer program is also called as Bug or Glitch.
7.
The
activity of creating sectors and trackers on a hard disk is called.
a)
Tracking
b)
De
fragmentation
c)
Formatting
d)
Plattering
Answer: (c)
Formatting is the process of preparing a data storage device
to store data.
8.
Protocol
use to transfer files between computer
a)
FTP
b)
SMTP
c)
WAP
d)
DHCP
Answer: (a)
FTP (file transfer protocol).
9.
The
term ‘Move to chest’ related with
a)
Operating system
b)
MS
Office
c)
DTP
d)
Anti
Virus
Answer: (d)
Anti Virus is a computer program used to detect and remove
malware ( Malicious Software ) including VIRUS , Trojan Horse and Worms.
10.
Which
company developed the first Micro processor?
a)
Intel
b)
Microsoft
c)
AMD
d)
Apple
Answer: (a)
Intel developed the first
Micro processer named Intel 4004 in 1971. Intel 4004 was a 4-bit
Microprocessor. Microprocessor is the alternate name used for CPU.
SET-2
1.
Who
coined the term ‘cyber space’?
a)
Tim
Berners lee
b)
William
Gibson
c)
Ray
Tomlinson
d)
Dennis
Ritchie
Answer: (b)
Answer: (b)
Cyberspace is the virtual space created by interconnected
computer and computer networks on the internet. William Gibson coined this term
in his novel ‘ Neuromancer ‘ published in 1984.
2.
Which
is the latest version of Android ?
a)
Jelly
bean
b)
Ice-cream
sandwich
c)
Kitkat
d)
Marshmallow
Answer: (d)
Marshmallow
( Android 6.0 ) is the latest version unveiled in May 2015.
3.
What
is the full form of EBCDIC?
a)
Extended
Binary Coded Decimal Interchange Code
b)
Expanded
Binary Coded Decimal Interchange Code
c)
Enlarged
Binary Coded Decimal Interchange Code
d)
Enclosed
Binary Coded Decimal Interchange Code
Answer: (a)
EBCDIC is a character representation standard for alphabetic
and numeric characters. It is developed by IBM.
4.
Changing
data before or during entry in to computer system is called
a)
Phishing
b)
Spoofing
c)
Data
mining
d)
Data
diddling
Answer: (d)
Data Diddling also called
false Data entry is the un authorized changing of data eg: forging or counterfeiting documents.
5.
Which
of the following application can be used to store Data efficiently in a
computer system?
a)
Dream
weaver
b)
Page
maker
c)
MS
out look
d)
Oracle
Answer: (d) oracle
6.
Errors
in a program revealed at the time of
compilation is
a)
Logic
errors
b)
Runtime errors
c)
Syntax
errors
d)
None
of these
Answer: (c)
Syntax errors are in a due
to violation of rules prescribed in a computer language.
7.
Which
technology is used in compact disc?
a)
Electrical
b)
Mechanical
c)
Electro
magnetic
d)
Laser
Answer: (d)
LASER (Light Amplification
by Stimulated Emission of Radiation). Usually red colored laser beams are used.
8.
Which
protocol is called the back bone of Internet
a)
FTP
b)
SMTP
c)
TCP
d)
DHCP
Answer: (c)
TCP (transmission control protocol)
9.
A
security system that controls incoming
and outgoing network traffic based on a set of rule is
a)
Anti
Virus
b)
Firewall
c)
Router
d)
Burglar
Alarm
Answer: (b)
Firewall is a network security system implemented as either
hardware or software.
10.
Which
of the following institution is credited with the development of WWW?
a)
CERN
b)
IIBM
c)
Bell
Labs
d)
Microsoft
Answer: (a)
CERN is the European Organization for Nuclear research that
operates the largest particle physics laboratory .WWW is invented by Tim
Berners Lee. The computer ‘Next Cube ‘ used by Tim Berners Lee at CERN became
the first Web Server.
For the complete set of 1000 Questions & Answers with explanation Please make a call to 9947911861
No comments:
Post a Comment