Q1. Which action can a user perform using an
output device?
(a) input data
(b) store data
(c) scan data
(d) view or print data
(e) None of these
Ans.
(d)
Sol. Output devices can
be used to view/ print data. Output devices provides processed output by the
system to the user.
Q2. Which among the following statement is
closely related to secondary storage?
(a) It is non-volatile and its content remains after power is
switched off
(b) It does not use magnetic media
(c) It consists of four main types of devices
(d) It does not store information for later retrieval
(e) It's main purpose is to make interconnections of networks
Ans.
(a)
Sol. Secondary storage
is non-volatile.
Q3. Which one of the following statements is
not true for data Buffer?
(a) A data buffer is a region of a physical memory storage used to
temporarily store data
(b) A buffer often adjusts timing by implementing a queue (or
FIFO) algorithm in memory
(c) A majority of buffers are implemented in software, which
typically use the ROM to store temporary data
(d) Buffers are often used in conjunction with I/O to hardware,
such as disk drives, sending or receiving data to or from a network
(e) None of the above
Ans.
(c)
Sol. Majority of buffers
use the faster RAM to store temporary data not the ROM, due to the much faster
access time compared with hard disk drives.
Q4. Which among the following is software
application commonly used to prepare a presentation/slide show?
(a) Adobe
(b) Power Point
(c) Outlook Express
(d) Internet Explorer
(e) Windows Explorer
Ans.
(b)
Sol. PowerPoint is used
to make presentations/slide shows.
Q5. A CD player can access data/information
using which method?
(a) Sequential access
(b) Random access
(c) Multivariate access
(d) All of these
(e) None of these
Ans.
(d)
Sol. All are memory access
mechanism which a CD Player can use.
Q6. Each box in a spreadsheet is called a
________.
(a) Cell
(b) Block
(c) Field
(d) Table
(e) Empty space
Ans.
(a)
Sol. Each box in a
spreadsheet is called a cell.
Q7. ________key is the example of Toggle key
(a) Alt
(b) Shift
(c) Control
(d) Escape
(e) Caps Lock
Ans.
(e)
Sol. A Toggle key is a
key that is operated the same way but with opposite effect on successive
occasions.
Q8. Which among the following is one of the
category of the programs of system software?
(a) Utility Programs
(b) Operating System
(c) Language Translator
(d) All of the above
(e) None of these
Ans.
(d)
Sol. All are types of
system software.
Q9. Why is it unethical to share copyrighted
files with your friends?
(a) It is not unethical, because it is legal.
(b) It is unethical because the files are being given for free.
(c) Sharing copyrighted files without permission breaks copyright
laws.
(d) It is not unethical because the files are being given for
free.
(e) It is not unethical - anyone can access a computer
Ans.
(c)
Sol. It is illegal to
break copyright laws. Copyright infringement is the use of works protected by
copyright law without permission, infringing certain exclusive rights granted
to the copyright holder, such as the right to reproduce, distribute, display or
perform the protected work, or to make derivative works. Copyright infringement
disputes are usually resolved through direct negotiation, a notice and take
down process, or litigation in civil court.
Q10. Some viruses have delayed payload, which
is sometimes called a ____.
(a) time
(b) anti-virus
(c) bomb
(d) action
(e) call
Ans.
(c)
Sol. Some viruses have a
delayed payload, which is sometimes called a bomb. For example, a virus might
display a message on a specific day or wait until it has infected a certain
number of hosts. A time bomb occurs during a particular date or time, and a logic
bomb occurs when the user of a computer takes an action that triggers the
bomb.
Q11. Which computer was the first to use the
magnetic drum for memory?
(a) IBM - 650
(b) IBM - 7090
(c) IBM - 701
(d) IBM - 360
(e) None of these
Ans.
(a)
Sol. IBM - 650 was the
first to use the magnetic drum for memory.
Q12. Network Firewalls are used to protect
against _________.
(a) Unauthorised Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) None of these
Ans.
(a)
Sol. Firewall protects against
Unauthorised Attacks. Network firewalls may be hardware devices, software
programs, or a combination of the two. Network firewalls guard an internal
computer network against malicious access from the outside. Network firewalls
may also be configured to restrict access to the outside from internal users.
Q13. Which is the best definition among the
given options of a software package?
(a) A peripheral for computer system
(b) A set of computer programs used for a certain function
(c) A protection you can buy for a computer
(d) The box, manual and license agreement that accompany
commercial software
(e) None of these
Ans.
(b)
Sol. Software package
can be said as a set of computer programs used for a certain function.
Q14. The process that deals with the technical
and management issues of software development is ______.
(a) Delivery process
(b) Control process
(c) Software process
(d) Testing process
(e) Monitoring process
Ans.
(c)
Sol. Software process
deals with the technical and management issues of software development.
Q15. Which among the following property is of a
disk’s content that is recorded at the time of manufacture and that cannot be
changed or erased by the user?
(a) memory-only
(b) write-only
(c) once-only
(d) run-only
(e) read-only
Ans.
(e)
Sol. Read-Only data
cannot be erased or modified.
No comments:
Post a Comment