Question 1 Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Question 2 Scanner is which type of device ?
(a) Input
(b) Output
(c) Storage
(d) A & B both
Question 3 A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(A) system virus
(B) Trojan horse virus
(C) file virus
(D) macro virus
(E) None of these
Question 4 A series of instructions that tells a computer what to do and how to do it is called a___
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
Question 5 One byte is equal to how many bits?
(a)10
(b)7
(c)4
(d)8
Question 6 Every computer connected to an intranet or extranet must have a distinct_____
(A) firewall
(B) proxy server
(C) IP address
(D) domain name
(E) None of these
Question 7 The rectangular area of the screen that displays a program, data, and/or information is a __
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Question 8 Firewalls are used to protect against___.
(A) Unauthorized Attacks
(B) Virus Attacks
(C) Data Driven Attacks
(D) Fire Attacks
(E) All of these
Question 9 MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
(E) None of these
Question 10 Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C)authentication.
(D) logging in.
(E) None of these
Click Here: SEE MORE COMPUTER QUESTIONS
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
SHOW/HIDE ANSWER
Ans : Supercomputers
Question 2 Scanner is which type of device ?
(a) Input
(b) Output
(c) Storage
(d) A & B both
SHOW/HIDE ANSWER
Ans : (a) Input
Question 3 A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(A) system virus
(B) Trojan horse virus
(C) file virus
(D) macro virus
(E) None of these
SHOW/HIDE ANSWER
Ans :(E) None of these
Question 4 A series of instructions that tells a computer what to do and how to do it is called a___
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
SHOW/HIDE ANSWER
Ans :(E) None of these
Question 5 One byte is equal to how many bits?
(a)10
(b)7
(c)4
(d)8
SHOW/HIDE ANSWER
Ans :(d)8
Question 6 Every computer connected to an intranet or extranet must have a distinct_____
(A) firewall
(B) proxy server
(C) IP address
(D) domain name
(E) None of these
SHOW/HIDE ANSWER
Ans :(C) IP address
Question 7 The rectangular area of the screen that displays a program, data, and/or information is a __
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
SHOW/HIDE ANSWER
Ans :(D) window
Question 8 Firewalls are used to protect against___.
(A) Unauthorized Attacks
(B) Virus Attacks
(C) Data Driven Attacks
(D) Fire Attacks
(E) All of these
SHOW/HIDE ANSWER
Ans :(A) Unauthorized Attacks
Question 9 MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
(E) None of these
SHOW/HIDE ANSWER
Ans :(C) command-driven
Question 10 Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C)authentication.
(D) logging in.
(E) None of these
SHOW/HIDE ANSWER
Ans :(C)authentication
Click Here: SEE MORE COMPUTER QUESTIONS
0 comments:
Post a Comment