1. The..........is the amount of data that a storage device can move from the storage medium to the Computer per second.
(1) data migration rate
(2) data digitizing rate
(3) data transfer rate
(4) data access rate
(5) None of these
2. Computers manipulate data in many ways, and this manipulation is called.............
(1) upgrading
(2) processing
(3) batching
(4) utilizing
(5) None of these
3. RAM can be thought of as the............for the computer's processor.
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these
4. A name or number used to identify a storage location devices ?
(1) A byte
(2) A record
(3) An address
(4) All of these
(5) None of these
5. The difference between memory and storage is that memory is..........and storage is............
(1) Temporary, permanent
(2) Slow, fast
(3) Permanent, temporary
(4) All of these
(5) None of these
6. The term.........designates equipment that might be added to a computer system to enhance its functionality.
(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these
7. Firewalls are used to protect against..........
(1) Unauthorized Attacks
(2) Virus Attacks
(3) Data Driven Attacks
(4) Fire Attacks
(5) All of these
8. When using characters in Windows, what code does Windows use ?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTERN
9. The.............directory is mandatory for every disk.
(1) Root
(2) Base
(3) Sub
(4) Case
(5) None of these
10. ..........converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(1) Modem
(2) Router
(3) Gateway
(4) Bridge
(5) All of these
11. The term, 'Hypertext' means
(1) Non-sequential writing
(2) Hypermedia
(3) Text with heavy formatting
(4) Blinking text
(5) None of these
12. After a picture has been taken with a digital camera processed appropriately, actual print of the picture considered :
(1) data
(2) output
(3) input
(4) the process
(5) None of these
13. Making illegal copies copyrighted software called............
(1) software piracy
(2) browsing
(3) collaboration
(4) electronic distribution
(5) None of these
14. The action of moving a page up or down on the screen is called..........
(1) scrolling
(2) linking
(3) lurking
(4) framing
(5) None of these
(1) data migration rate
(2) data digitizing rate
(3) data transfer rate
(4) data access rate
(5) None of these
2. Computers manipulate data in many ways, and this manipulation is called.............
(1) upgrading
(2) processing
(3) batching
(4) utilizing
(5) None of these
3. RAM can be thought of as the............for the computer's processor.
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these
4. A name or number used to identify a storage location devices ?
(1) A byte
(2) A record
(3) An address
(4) All of these
(5) None of these
5. The difference between memory and storage is that memory is..........and storage is............
(1) Temporary, permanent
(2) Slow, fast
(3) Permanent, temporary
(4) All of these
(5) None of these
6. The term.........designates equipment that might be added to a computer system to enhance its functionality.
(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these
7. Firewalls are used to protect against..........
(1) Unauthorized Attacks
(2) Virus Attacks
(3) Data Driven Attacks
(4) Fire Attacks
(5) All of these
8. When using characters in Windows, what code does Windows use ?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTERN
9. The.............directory is mandatory for every disk.
(1) Root
(2) Base
(3) Sub
(4) Case
(5) None of these
10. ..........converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(1) Modem
(2) Router
(3) Gateway
(4) Bridge
(5) All of these
11. The term, 'Hypertext' means
(1) Non-sequential writing
(2) Hypermedia
(3) Text with heavy formatting
(4) Blinking text
(5) None of these
12. After a picture has been taken with a digital camera processed appropriately, actual print of the picture considered :
(1) data
(2) output
(3) input
(4) the process
(5) None of these
13. Making illegal copies copyrighted software called............
(1) software piracy
(2) browsing
(3) collaboration
(4) electronic distribution
(5) None of these
14. The action of moving a page up or down on the screen is called..........
(1) scrolling
(2) linking
(3) lurking
(4) framing
(5) None of these
ans :1
No comments:
Post a Comment