📡51. A program that performs a useful task while simultaneously allowing destructive acts is ?Trojan Horse
📡52. The geometric arrangement of devices on the network is called………..? Topology
📡53. The basic goal of computer process is to convert data into _? Information
📡54. Where are the CPU and memory located? Motherboard
📡55. Who is known as the founder of IBM Company? Thomas J. Watson
📡56. An image on a computer screen is made up of__? Pixels
📡57. Full form of MAN ? Metropolitan Area Network
📡58. Which command in DOS can be used to recover accidentally deleted files? UNDELETE
📡59. A computer program that converts an entire program into machine language atone time is called__? Characters
📡60. In which year, the Microsoft company was founded? 1975
📡61. What is the personal computer operating system that organizes and uses a graphic desktop environment? Windows
📡62. What are Light pen and joystick ? Input Devices
📡63. What is a half byte also called as? Nibble
📡64. SMPS stands for__? Switched mode Power Supply
📡65. What do we use to change the appearance and positioning of text document in MSWord? Formatting
📡66. A ____ is approximately a million bytes? Megabyte
📡67. Daisy wheel, Drum, chain etc are the__? Printers
📡68. XML stands for ? Extensible Markup Language
📡69. What kind of scheme is the HTTP protocol? Request/Response
📡70. Magnetic disk is an example of? Secondary Memory
📡71. What is the meaning of OSI, in terms of computers ? Open system Interconnection
📡72. Which type of storage device is a BIOS ? Primary
📡73. What is the extension type of the excel 2007 files? .xlsx
📡74. Collecting personal information and effectively posing as another individual is known as the crime of__? Identity theft
📡75. The amount of vertical space between lines of text in a document is called__? Line Spacing
📡76. A computer cannot ‘boot’ if it does not have the__? Operating system
📡77. What is the other name for programmed chip? LSIC
📡78. A normal CD- ROM usually can store up to _data? 680 MB
📡79. What does DMA stand for? Direct Memory Access
📡80. Full form of LAN ? Local Area Network
📡81. ASCII stands for__? American Standard Code for Information Interchange
📡82. Second Generation computers were developed during__? 1956-65
📡83. When did arch rivals IBM and Apple Computers Inc. decide to join hands? 1991
📡84. What kind of memory is both static and non -volatile? ROM
📡85. An error in software or hardware is called a bug. What is the alternative computer jargon for it? Glitch
📡86. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as__? Spam
📡87. The common name for the crime of stealing passwords is__? Spoofing
📡88. BIOS stands for ? Basic Input Output System
📡89. Who is regarded as Father of “C‘ programming language? Dennis Ritchie
📡90. RAM can be treated as the ……… for the computer’s processor. Waiting Room
📡91. Computers manipulate data in many ways, and this manipulation is called? Processing
📡92. Joshy, Perfumes are examples of ? Viruses
📡93. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called? Computer Forensics
📡94. Where does most data go first with in a computer memory hierarchy? RAM
📡95. Help Menu is available at which button? Start
📡96. Which file contains permanent data and gets updated during the processing of transactions? Master File
📡97. A DVD is an example of an__? Optical Disc
📡98. Which is most common tool used to restrict access to computer system? Passwords
📡99. The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred as__? RISC
📡100. What is the name of an application program that gathers user information and sends it to someone through the Internet? Spybot
Comments
Post a Comment