Computer Quiz – 62

1. A self-replicating program similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled Shockwave Rider is
a) Bug
b) Vice
c) Lice
d) Worm
e) None of these

Click here to View Answer
Answer d) Worm

2. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
a) Spam
b) Trash
c) Calibri
d) Courier
e) None of these

Click here to View Answer
Answer a) Spam

3. A ________ is not a form of biometrics
a) fingerprint
b) password
c) retina scan
d) breath scan
e) None of these

Click here to View Answer
Answer b) password

4.Which type of memory is in Pen drive?
a) Flash memory
b) Cache memory
c) EEPROM
d) RAM
e) None of these

Click here to View Answer
Answer a) Flash memory

5. Switch and bridge networking devices work on OSI ________.
a) Application Layer
b) Physical Layer
c) Network Layer
d) Data link Layer
e) None of these

Click here to View Answer
Answer d) Data link Layer

6.Which hole is used to mark the location of the first sector in a soft-sectored disk?
a) Address
b) Location
c) Label
d) Primary
e) Index

Click here to View Answer
Answer e) Index

7. The process of a computer receiving information from a server on the Internet is known as
a) pulling
b) downloading
c) pushing
d) uploading
e) transferring

Click here to View Answer
Answer b) downloading

8.Which of the following methods will not enter data into a cell?
a) Pressing an arrow key
b) Pressing the Esc key
c) Pressing the tab key
d) Clicking the enter button to the formula bar
e) None of these

Click here to View Answer
Answer b) Pressing the Esc key

9. A simple automated program that scans the web for specific data and inserts into a designated database.
a) Web mining
b) Web database integration
c) Web crawler
d) Web scanning
e) Web searching

Click here to View Answer
Answer c) Web crawler

10. In web searching a symbol or keyword that instructs the search software to make sure that any retrieved records contain a certain word, is called
b) Data operator
b) Increment operator
c) Decrement operator
d) Inclusion operator
e) Search operator

Click here to View Answer
Answer d) Inclusion operator

11. A database that spreads information across different tables while maintaining links between them is referred to as
a) Relational database
b) Rotational database
c) Database connection
d) Tabular database
e) None of these

Click here to View Answer
Answer a) Relational database

12. All the deleted files go to
a) Recycle Bin
b) Task Bar
c) Tool Bar
d) My Computer
e) None of these

Click here to View Answer
Answer a) Recycle Bin

13.When you are selecting a mouse for a particular computer system, what is the most important consideration?
a) The type of drivers that come with the mouse
b) The length of the mouse cord
c) The type of connector the mouse is equipped with
d) The number of buttons the mouse has
e) None of these

Click here to View Answer
Answer c) The type of connector the mouse is equipped with

14.The computers which are made by taking the features of analog and digital computers are called ________computers.
a) mixed
b) micro
c) hybrid
d) advance
e) None of these

Click here to View Answer
Answer c) hybrid

15.A computer understands capital letter by which of the following values?
a) A to Z 50 to 100
b) A to Z 65 to 98
c) A to K 65 to 90
d) A to Z 97 to 122
e) A to Z 65 to 90

Click here to View Answer
Answer e) A to Z 65 to 90

Check out our latest videos on youtube