Question Booklet Alpha Code : B / Solved Paper
1. Who is considered to be the first programmer?
(A) Ada Lovelace
(B) Alan Turing
(C) Charles Babbage
(D) Von Neumann
2. An attempt to make a computer resource unavailable to its intended users is called :
(A)Malware Attack
(B) Worms Attack
(C) Denial-of-service attack
(D) Adware attack
3. A computer program that is used to convert an assembly language to machine language is:
(A) Compiler
(B) Interpreter
(C) Assembler
(D) Comparator
4. Codes consisting of light and dark marks of various thickness which may be optically read is known as :
(A) Operand
(B) Bar code
(C) Decoder
(D) Opcode
5.The inventor of world wide web :
(A) Tim Berners Lee
(B) Marc Andreessen
(C) James H Clark
(D) Robert Cailliau
6.Name the Act that governs the internet usage in India :
(A) The IT Gazette of India Act 2004
(B) The Information Technology Act , 2000
(C) The Internet Usage Act , 2002
(D) The Right to Information Act , 2005
7. An attempt to criminally and fraudulently acquire sensitive information, such as usernames , passwords and credit card details by masquerading as a trustworthy entity in an electronic communication is termed as :
(A) Spooling
(B) Tracking
(C) Bugging
(D) Phishing
8. A device that modulates signals to encode digital information and demodulates signals to decode the transmitted information:
(A) Modem
(B) Decoder
(C) Encoder
(D) Modulator
9. The brain of any computer system is :
(A) Memory
(B) Peripheral Unit
(C) CPU
(D) Control Unit
10. '.mpg' extension refers usually to what kind of file ?
(A) Text / Document file
(B) Image file
(C) Animation / movie file
(D) All the above
More Questions >>
1. Who is considered to be the first programmer?
(A) Ada Lovelace
(B) Alan Turing
(C) Charles Babbage
(D) Von Neumann
2. An attempt to make a computer resource unavailable to its intended users is called :
(A)Malware Attack
(B) Worms Attack
(C) Denial-of-service attack
(D) Adware attack
3. A computer program that is used to convert an assembly language to machine language is:
(A) Compiler
(B) Interpreter
(C) Assembler
(D) Comparator
4. Codes consisting of light and dark marks of various thickness which may be optically read is known as :
(A) Operand
(B) Bar code
(C) Decoder
(D) Opcode
5.The inventor of world wide web :
(A) Tim Berners Lee
(B) Marc Andreessen
(C) James H Clark
(D) Robert Cailliau
6.Name the Act that governs the internet usage in India :
(A) The IT Gazette of India Act 2004
(B) The Information Technology Act , 2000
(C) The Internet Usage Act , 2002
(D) The Right to Information Act , 2005
7. An attempt to criminally and fraudulently acquire sensitive information, such as usernames , passwords and credit card details by masquerading as a trustworthy entity in an electronic communication is termed as :
(A) Spooling
(B) Tracking
(C) Bugging
(D) Phishing
8. A device that modulates signals to encode digital information and demodulates signals to decode the transmitted information:
(A) Modem
(B) Decoder
(C) Encoder
(D) Modulator
9. The brain of any computer system is :
(A) Memory
(B) Peripheral Unit
(C) CPU
(D) Control Unit
10. '.mpg' extension refers usually to what kind of file ?
(A) Text / Document file
(B) Image file
(C) Animation / movie file
(D) All the above
More Questions >>
No comments:
Post a Comment