Computer-Science-Basics

Question 1
Which of the following is an example of IEEE 802.3?
A
LAN
B
MAN
C
WAN
D
PAN
Question 2
Which of the following technologies is used in the second generation of computers?
A
Vacuum tubes
B
Transistors
C
Integrated circuits
D
VLSI
Question 3
Which of the following is the correct sequence of increasing access time of storage/memory devices?
A. Magnetic tape
B. RAM
C. Cache memory
D. Hard disk
E. Registers
A
A, B, C, D, E
B
B, E, C, A, D
C
E, C, B, D, A
D
C, E, B, A, D
Question 4
With reference to cyber-attacks, which of the following statements are correct?
A. Malware is a malicious software designed to cause damage to a single computer, server, or computer network.
B. Types of malware include computer viruses, worms, Trojan horses, ransomware, and spyware.
C. Pegasus is a malicious software classified as ransomware.
D. India is not a signatory to the Budapest Convention on cybercrime.
Choose the most appropriate answer from the options given below :
A
A, B and C only
B
B, C and D only
C
A, B, C and D
D
A, B and D only
Question 5
Match List – I with List – II
List I (Operating System) List II (Task)
A. UNIX I. Assist users in system maintenance tasks
B. MS-DOS II. Mobile device
C. Android OS III. Single-user operating system
D. Utility Programs IV. Multi-user operating system

Choose the correct answer from the options given below
A
A-III, B-IV, C-I, D-II
B
A-I, B-II, C-IV, D-III
C
A-IV, B-III, C-II, D-I
D
A-III, B-I, C-II, D-IV
Question 6
Which of the following is an independent malicious program that propagates itself across a network by exploiting security flaws in widely-used services?
A
Computer Worm
B
Computer Virus
C
Trojan Horse
D
Logic Bomb
Question 7
Match the LIST-I with LIST-II
LIST-I(Question) LIST-II(Answer)
A The speed of a CPU is measured in ____ I Inches
B Storage capacity of data is measured in ___ II Hertz
C Network bandwidth is measured in ____ III bits per second
D Size of a computer monitor is measured in ___ diagonally from corner to the opposite corner. IV Bytes
 
Choose the correct answer from the options given below:
A
A-I, B-III, C-IV, D-II
B
A-III, B-II, C-I, D-lV
C
A-IV, B-I, C-II, D-III
D
A-II, B-lV, C-III, D-l
Question 8
Match List-I with List-II
List-I      List-II
(Internet Term)      (Description)
A)Blogs      (I) Allows users to create and edit web pages using a browser
B)Podcasts      (II) A type of bookmarking where a user “marks” a webpage or photo using text to describe its contents
C)Tagging      (III) A series of digital media files
D)Wikis      (IV) Personal internet journals,br> Choose the correct answer from the options given below:
A
(A)-(I), (B)-(II) , (C)-(III),(D)-(IV)
B
(A)-(III), (B)-(IV) , (C)-(II),(D)-(I)
C
(A)-(IV), (B)-(III) , (C)-(II),(D)-(I)
D
(A)-(II), (B)-(III) , (C)-(IV),(D)-(I)
Question 9
Identify the correct order of the following major technological changes A-D in the development of computers based on the first to fourth generation of the computers :
A)Transistors
B)Microprocessor
C)Vacuum tubes
D)Integrated circuits
choose the correct answer from the options given below :
A
(A),(C),(D),(B)
B
(B),(A),(C),(D)
C
(D),(A),(C),(B)
D
(C),(A),(D),(B)
There are 9 questions to complete.

Access quiz wise question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content

Register Now

If you have registered and made your payment please contact solutionsadda.in@gmail.com to get access