Sunday 15 May 2011

Computer General Knowledge : [ PART – 3 ]

1. All of the following are examples of real security and privacy risks EXCEPT:

Answer: spam.

2. Between PCs and Macs, the ____________ is the platform of choice for graphic design

and animation.

Answer: Mac

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

Answer: Point-of-sale (POS)

4. The type of operating system software you use depends on your computer’s

____________.

Answer: platform

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an

example of a law enforcement specialty called:

Answer: computer forensics.

6. ____________are the fastest and most expensive computers.

Answer: Supercomputers

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.

Answer: RFID

8. Input devices are used to provide the steps and tasks the computer needs to process

data, and these steps and tasks are called ____________.

Answer: instructions

9. Technology no longer protected by copyright, available to everyone, is considered to be:

Answer: proprietary.

10. The binary language consists of two digits: ____________ and ____________.

Answer: 0 and 1

11. ____________ is the science that attempts to produce machines that display the same type of

intelligence that humans do.

Answer: Artificial intelligence (AI)

12. The devices you use to enter data into a computer system are known as ____________

devices.

Answer: input

13. The name for the way that computers manipulate data into information is called:

Answer: processing.

14. ____________ is the set of computer instructions or programs that enables the

hardware to perform different tasks.

Answer: Software

15. After a picture has been taken with a digital camera and processed appropriately, the actual

print of the picture is considered:

Answer: output.

16. ____________ are computers that excel at executing many different computer programs

at the same time.

Answer: Mainframes

17. Computers process data into information by working exclusively with:

Answer: numbers.

18. ____________ is the science that attempts to create machines that will emulate the

human thought process.

Answer: Artificial intelligence (AI)

19. The term bit is short for:

Answer: binary digit.

20. A process known as ____________ tracks trends and allows retailers to respond to

consumer buying patterns.

Answer: data mining

21. A ____________ is approximately one billion bytes.

Answer: gigabyte

22. You would use ____________ software to create spreadsheets, type documents, and edit

photos.

Answer: application

23. ____________ is any part of the computer that you can physically touch.

Answer: Hardware

24. ____________ is the term given to the act of stealing someone’s identity and ruining

their credit rating.

Answer: Identity theft

25. All of the following are examples of input devices EXCEPT a:

A. scanner.

B. mouse.

C. keyboard.

D. printer.

Answer: D

26. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and

respond to procedures just like humans.

Answer: simulators

27. All of the following are examples of storage devices EXCEPT:

A. hard disk drives.

B. printers.

C. floppy disk drives.

D. CD drives.

Answer: B

28. Word processing, spreadsheet, and photo-editing are examples of:

Answer: application software.

True and False

29. Currently, the performance of tasks by robots is based on preprogrammed algorithms.

Answer: True

30. The most common type of memory that the computer uses to process data is ROM.

Answer: False (RAM)

31. With a wireless network, it is easier to relocate devices.

Answer: True

32. A Web browser is a special device that is installed in your computer that allows it to

communicate with other devices on a network.

Answer: False (network adapter)

33. Clicking on an icon with the mouse is a form of giving an instruction to the computer.

Answer: True

34. Trend-spotting programs, developed for business, have been used to predict criminal

activity.

Answer: True

35. Data can be a number, a word, a picture, or a sound.

Answer: True

36. Currently, the performance of tasks by robots is based on preprogrammed algorithms.

Answer: True

Question :

37. The ______________ tells the computer how to use its components.

Answer: operating system

38. What is the largest unit of storage ?

Answer: TB ( Tera byte = 1000 GB )

39. Changing an existing document is called _________ the document.

Answer: modifying

40. The _________ key will launch the start button.

Answer: Windows

41. To move to the beginning of a line of text, press the __________ key .

Answer: home

42. _________ is the process of finding errors in software code.

Answer: Debugging

43. A word in a web page that, when clicked, opens another document is called ______

Answer: hyperlink

44. 7.Which of the following is the storage area whit in the computer itself which Holds data only Temporarily as the computer processes instructions?

Answer : Read Only Memory

45. A _________ contains specific rules and words that express the logical steps of an algorithm.

Answer : Syntax

46. _______ is a set of Keywords, s symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.

Answer : A Programming Language

47. The general term 'peripheral equipment' is used for ________

Answer : any device that is attached to a computer system

48. If a memory chip is volatile, it will_________

Answer : Lose its Contents if current is turned off

49. Codes consisting or Bars or lines of varying widths or lengths that are computer-readable are known as_______

Answer : A bar code

50. Every Component of your computer is either__________

Answer : Input Devices and Output Devices.

No comments:

Post a Comment