Learning Mode - Computer

Computer

Copying and pasting some texts from internet without acknowledging the real author is an example of?

A. Plagiarism
B. Illegal use of patent
C. Information piracy
D. Copyright Violation

Free Antivirus Software often?

A. Expire after sometimes
B. Offer only limited service
C. Cannot be updated
D. Cannot be purchased

The professional ethics in computer field is important because?

A. It is necessary by law
B. Violations can cause serious penalties
C. It is useful for financial benefits
D. It creates healthy and positive work environment

Software are mostly protected under?

A. Patents
B. Copyrights
C. Trademarks
D. Logos

The authentication mechanism that only allows the real person to access data or device is?

A. Username and Password
B. PIN
C. Biometric
D. Scan Code

The broad term that encompasses different harmful software is?

A. Virus
B. Malware
C. Adware
D. Spyware

It is a 30 bit IP address. It is temporary _________?

A. TCP address
B. Physical address
C. Logical address
D. IPV4

Which model divides a communication system into seven abstraction layers?

A. ITU's model
B. TCP model
C. IP model
D. ISO's OSI model

If computers and other devices are connected with a single cable, it is called?

A. Star topology
B. Ring topology
C. Bus topology
D. Delta topology

The physical layout in which computers are connected is called?

A. Internet
B. Network
C. LAN
D. Topology

Which computer network can spread across an entire city, college, campus or a small region?

A. Internet
B. WAN
C. MAN
D. LAN

It is a networking device that connects computers and other devices?

A. Switch
B. Router
C. Modem
D. DSL mode

Unwanted signal that mixes lip with the original signal during the transmission of data is called?

A. Attenuation
B. Distortion
C. Noise
D. Fault

It means change in the shape of the signal?

A. Attenuation
B. Distortion
C. Noise
D. Fault

Loss of signal energy is called?

A. Attenuation
B. Distortion
C. Noise
D. Fault

For transmission, FM, AM radios, television and cordless phones use ___________?

A. Microwaves
B. Infrared
C. Ultrasound
D. Radio waves

Radio waves, microwaves and infrared are examples of?

A. Guided media
B. Unguided media
C. Media channel
D. Transmission channel

It is also called Wired or Bounded transmission media ________?

A. Guided media
B. Unguided media
C. Media channel
D. Transmission channel

It is an agreement between two parties or vendors, using communication devices ____________?

A. Protocol
B. Communication
C. Medium
D. Transmission medium

The rules and procedures on which computers exchange data on network are called?

A. Baud rate
B. Data rate
C. Medium
D. Protocol

Signal-to-noise ratio is often expressed in?

A. Hertz
B. Bits/second
C. Baud/second
D. Decibels

It is the aunt her of signals transmitted per second ______?

A. Data rate
B. Transfer rate
C. Baud rate
D. Transmission rate

Signals used by computers are called?

A. Data signals
B. Digital signals
C. Analog signals
D. Electrical signals

The human voice is an example of?

A. Data signals
B. Digital signals
C. Analog signals
D. Electrical signals

Continuously varying signals or waves that change with time period are called?

A. Data signals
B. Digital signals
C. Analog signals
D. Electrical signals