Computer-Science-Basics
Question 1 |
Which of the following is an example of IEEE 802.3?
LAN | |
MAN
| |
WAN
| |
PAN |
Question 2 |
Which of the following technologies is used in the second generation of computers?
Vacuum tubes | |
Transistors | |
Integrated circuits | |
VLSI
|
Question 3 |
Which of the following is the correct sequence of increasing access time of storage/memory devices?
A. Magnetic tape
B. RAM
C. Cache memory
D. Hard disk
E. Registers
A. Magnetic tape
B. RAM
C. Cache memory
D. Hard disk
E. Registers
A, B, C, D, E
| |
B, E, C, A, D
| |
E, C, B, D, A | |
C, E, B, A, D |
Question 4 |
With reference to cyber-attacks, which of the following statements are correct?
A. Malware is a malicious software designed to cause damage to a single computer, server, or computer network.
B. Types of malware include computer viruses, worms, Trojan horses, ransomware, and spyware.
C. Pegasus is a malicious software classified as ransomware.
D. India is not a signatory to the Budapest Convention on cybercrime.
Choose the most appropriate answer from the options given below :
A. Malware is a malicious software designed to cause damage to a single computer, server, or computer network.
B. Types of malware include computer viruses, worms, Trojan horses, ransomware, and spyware.
C. Pegasus is a malicious software classified as ransomware.
D. India is not a signatory to the Budapest Convention on cybercrime.
Choose the most appropriate answer from the options given below :
A, B and C only
| |
B, C and D only | |
A, B, C and D
| |
A, B and D only
|
Question 5 |
Match List – I with List – II
Choose the correct answer from the options given below
| List I (Operating System) | List II (Task) |
| A. UNIX | I. Assist users in system maintenance tasks |
| B. MS-DOS | II. Mobile device |
| C. Android OS | III. Single-user operating system |
| D. Utility Programs | IV. Multi-user operating system |
Choose the correct answer from the options given below
A-III, B-IV, C-I, D-II
| |
A-I, B-II, C-IV, D-III
| |
A-IV, B-III, C-II, D-I | |
A-III, B-I, C-II, D-IV
|
Question 6 |
Which of the following is an independent malicious program that propagates itself across a
network by exploiting security flaws in widely-used services?
Computer Worm | |
Computer Virus | |
Trojan Horse | |
Logic Bomb |
Question 7 |
Match the LIST-I with LIST-II
Choose the correct answer from the options given below:
| LIST-I(Question) | LIST-II(Answer) | ||
| A | The speed of a CPU is measured in ____ | I | Inches |
| B | Storage capacity of data is measured in ___ | II | Hertz |
| C | Network bandwidth is measured in ____ | III | bits per second |
| D | Size of a computer monitor is measured in ___ diagonally from corner to the opposite corner. | IV | Bytes |
Choose the correct answer from the options given below:
A-I, B-III, C-IV, D-II | |
A-III, B-II, C-I, D-lV | |
A-IV, B-I, C-II, D-III | |
A-II, B-lV, C-III, D-l |
Question 8 |
Match List-I with List-II
List-I List-II
(Internet Term) (Description)
A)Blogs (I) Allows users to create and edit web pages using a browser
B)Podcasts (II) A type of bookmarking where a user “marks” a webpage or photo using text to describe its contents
C)Tagging (III) A series of digital media files
D)Wikis (IV) Personal internet journals,br> Choose the correct answer from the options given below:
List-I List-II
(Internet Term) (Description)
A)Blogs (I) Allows users to create and edit web pages using a browser
B)Podcasts (II) A type of bookmarking where a user “marks” a webpage or photo using text to describe its contents
C)Tagging (III) A series of digital media files
D)Wikis (IV) Personal internet journals,br> Choose the correct answer from the options given below:
(A)-(I), (B)-(II) , (C)-(III),(D)-(IV)
| |
(A)-(III), (B)-(IV) , (C)-(II),(D)-(I) | |
(A)-(IV), (B)-(III) , (C)-(II),(D)-(I) | |
(A)-(II), (B)-(III) , (C)-(IV),(D)-(I) |
Question 9 |
Identify the correct order of the following major technological changes A-D in the development of computers based on the first to fourth generation of the computers :
A)Transistors
B)Microprocessor
C)Vacuum tubes
D)Integrated circuits
choose the correct answer from the options given below :
A)Transistors
B)Microprocessor
C)Vacuum tubes
D)Integrated circuits
choose the correct answer from the options given below :
(A),(C),(D),(B)
| |
(B),(A),(C),(D) | |
(D),(A),(C),(B) | |
(C),(A),(D),(B) |
There are 9 questions to complete.
