Computer
Father of Computer Science is?
A.
Allen Turing
B.
Charles Babbage
C.
Simur Cray
D.
Augusta Daming
Which resource is most likely to be a shared common resource in a computer network?
A.
Printers
B.
Speakers
C.
Floppy disk drives
D.
Keyboards
Capacity of 3.5 Inch floppy disk?
A.
1.40 MB
B.
1.44 GB
C.
1.40 GB
D.
1.44 MB
When a file is saved for the first time?
A.
A copy is automatically printed
B.
It must be given a name to identify it
C.
It does not need a name
D.
It only needs a name if it is not going to be printed
A fault in a computer program which prevents it from working correctly is?
A.
Boot
B.
Bug
C.
Biff
D.
Strap
Unwanted Repetitious Messages, Such as Unsolicited Bulk E-Mail is?
A.
Spam
B.
Trash
C.
Calibri
D.
Courier
Speed to laser printer is measured in?
A.
Lines Per Minute
B.
Dots Per Inch
C.
Pages Per Minute
D.
Words Per Minute
Computers that are the Artificial Intelligence belongs to?
A.
1st generation
B.
3rd generation
C.
4th generation
D.
5th generation
Digitizer also referred as?
A.
Digital audio player
B.
Digital audio editor
C.
Input Device
D.
Output Device
Which of the following is a non-impact printer?
A.
Dot-matrix
B.
Daisy-wheel
C.
Line printer
D.
Laser
Computer Monitor is also known as?
A.
DVU
B.
UVD
C.
VDU
D.
CCTV
Name of the screen that recognizes touch input is?
A.
Reclog screen
B.
Point screen
C.
Touch screen
D.
Android screen
A computer derives its basic strength from?
A.
Accuracy
B.
Memory
C.
Speed
D.
All of these
Which is a fast main memory and slow peripheral memory handled by system software?
A.
Dynamic memory
B.
ROM
C.
RAM
D.
Virtual memory
What is the main folder on a storage device called?
A.
Device driver
B.
Root directory
C.
Interface
D.
Platform
Which term is not used to describe the memory component of a computer?
A.
ROM
B.
RAM
C.
SAM
D.
PROM
The latest expensive OCR units can be read?
A.
Handwriting
B.
Marks
C.
Machine printed numbers
D.
Hand printed numbers
An internet like network within a company. The best fit will be?
A.
Intranet technology resources
B.
Applications of intranets
C.
Intranets
D.
Extranets
Backup and recovery procedures are primarily implemented to?
A.
To provide data redundancy
B.
Handle the contingency when a file gets corrupted
C.
To show different versions of data and programs
D.
All of these
A program used to detect overall system malfunction is?
A.
System Diagnostics
B.
Utilities
C.
System analysis
D.
System software
Analog computer works on the supply of?
A.
Physical strength
B.
Natural strength
C.
Magnetic strength
D.
Continuous electrical pulses
Cache memory acts between?
A.
CPU and hard disk
B.
RAM and ROM
C.
CPU and RAM
D.
All of these
Programs stored in ROM are called as?
A.
Fireware
B.
Firmwire
C.
Farmware
D.
Firmware
How much can be stored in a CD?
A.
300 MB
B.
400 MB
C.
670 MB
D.
700 MB
The main memory of computer is also called as?
A.
Hard-disk
B.
Primary storage
C.
Secondary storage
D.
Internal memory