1.The __________ is a special database that holds information about the computer’s user, installed programs and hardware devices.
2.DPI stands for?
3.When the computer has to play a sound, it generates a(n) __________.
4.A string of eight 0s and 1s is called a?
5.Stored program concept was introduced by_______?
6.Data security threats include_________?
7.Which type of virus is generally scripted into common application programs like Excel and Word to infect the other documents and spreads to the other parts when the application is running.?
8. What is the second generation of the Web called?
9. What type of web technology provides news that can automatically download right to your desktop?
10. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
Windows Registry
initialization file
compiled help module
dynamic link library
static link library
2.DPI stands for?
Desktop projection Ink
Dots per Inch
Dot matrix printer ink
Desktop pixel Inch
Digital projection ink
3.When the computer has to play a sound, it generates a(n) __________.
request
command
sequence
interrupt
None of the above
4.A string of eight 0s and 1s is called a?
megabyte
byte
kilobyte
gigabyte
bit
5.Stored program concept was introduced by_______?
Pascal
Hoolerith
Stallman
Neumann
Mauchly
6.Data security threats include_________?
Hardware failure
Privacy invasion
Fraudulent manipulation of data
All of the above
None of the above
7.Which type of virus is generally scripted into common application programs like Excel and Word to infect the other documents and spreads to the other parts when the application is running.?
Macro Viruses
File infector virus
Resident Viruses
Boot virus
Worms
8. What is the second generation of the Web called?
New web
Emerging space
Second life
Web 2.0
None of the above
9. What type of web technology provides news that can automatically download right to your desktop?
Social network
RSS feed
Podcast
Wiki
None of the above
10. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
Haptics
Caves
Biometrics
RFID
All of above
No comments:
Post a Comment