(a) Mainframe
(b) Supercomputer
(c) Microcomputer
(d) PDA
(e) None of these
Q2. Which of the following is the foray introduced by Microsoft into the gaming console market?
(a) X-box
(b) Set-up
(c) Multi play
(d) I-phone
(e) None of these
Q3. Which of the following statements is correct about EPROM?
(a) It is a type of ROM from which the stored data cannot be erased
(b) In this memory, data can be erased by electronic emission
(c) It is a type of RAM
(d) Ultraviolet rays are used to erase the data stored in the memory
(e) None of these
Q4. Which among the following is the process of fetching or finding data, relationships, and anomalies from a big collection of data or various databases?
(a) Fetching
(b) Warehousing
(c) Mining
(d) Finding
(e) Indexing
Q5. Computers were based on transistors in the _______ generation.
(a) First
(b) Second
(c) Third
(d) Fourth
(e) Fifth
Q6. Which of the following statements is true for Solid State Drives (SSDs)?
(a) They do not contain spinning platters
(b) They use vacuum tubes for storing data
(c) They require latency time at the time of transferring data
(d) All of the above
(e) None of these
Q7. Specialised program(s) designed to allow particular input or output device(s) to communicate with the rest of the computer system is called _______.
(a) Computer
(b) Device drivers
(c) Interpreters
(d) Operating system
(e) ROM
Q8. The Internet is a system of ______.
(a) Bugs
(b) Interconnected networks
(c) System software
(d) Operating systems
(e) I/O Devices
Q9. Setting fonts for the text in your document is an example of:
(a) Formatting
(b) Formulas
(c) Tracking changes
(d) Tools
(e) None of the above
Q10. What is Window Explorer?
(a) Personal Computer
(b) Network
(c) Drive
(d) File Manager
(e) Web browser
Q11. What does JAR stand for?
(a) JQuerry Application Rapid-development
(b) Java Application Resolution
(c) Java Archive
(d) JQuerry Application Resolution
(e) None of the above
Q12. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Q13. In first generation of computers, they used which among the following?
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above
Q14. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall
Q15. Which of the following terms is related to Internet connectivity?
(a) IP
(b) TCP
(c) Gopher
(d) Both (a) and (b)
(e) All of the above