Question Bank & Answer Key of Fundamental of Computers Part 10

Glide to success with Doorsteptutor material for Bank-PO : fully solved questions with step-by-step explanation- practice your way to success.

Download PDF of This Page (Size: 93K)

139. Computers process data into information by working exclusively with :

a. multimedia

b. word

c. numbers

d. characters

Answer : C

140. The difference between people with access to computers and the Internet and those without this access is known as the :

a. digital divide

b. Internet divide

c. Web divide

d. E-illiteracy

Answer : A

141. Computers manipulate data in many ways, and this manipulation is called......

a. upgrading

b. processing

c. batching

d. utilizing

Answer : B

142. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

a. robotics

b. simulation

c. computer forensics

d. animation

Answer : C

143. Where does most data go first with in a computer memory hierarchy ?

a. RAM

b. ROM

c. BIOS

d. CACHE

Answer : A

144. The………….data mining technique derives rules from real-world case examples.

a. Rule discover

b. Signal processing

c. Neural nets

d. Case-based reasoning

Answer : C

145. …………….are used to identify a user who returns to a Website

a. Cookies

b. Plug-ins

c. Scripts

d. ASPs

Answer : A

146. Codes consisting of lines of varying widths or lengths that are computer-readable are known as

a. an ASCII code

b. a magnetic tape

c. an OCR scanner

d. a bar code

Answer : D

147. Why is it unethical to share copyrighted files with your friends?

a. It is not unethical, because it is legal.

b. It is unethical because the files are being given for free.

c. Sharing copyrighted files without permission breaks copyright laws.

d. It is not unethical because the files are being given for free.

Answer : C

148. Reusable optical storage will typically have the acronym

a. CD

b. DVD

c. ROM

d. RW

Answer : D

149. The most common type of storage devices are

a. Steel

b. optical

c. magnetic

d. flash

Answer : B

150. A device that connects to a network without the use of cables is said to be

a. Distributed

b. free

c. centralized

d. none of these

Answer : D

151. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a

a. Hacker

b. spammer

c. instant messenger

d. programmer

Answer : A

152. To access properties of an object, the mouse technique to use is

a. Dragging

b. dropping

c. right-clicking

d. shift-clicking

Answer : C

Developed by: