Question Bank & Answer Key of Fundamental of Computers Part 12

Dr. Manishika Jain- Join online Paper 1 intensive course. Includes tests and expected questions.

163. Which of the following is not a binary number?

a. 001

b. 101

c. 202

d. 110

Answer : C

164. Which of the following does not store data permanently?

a. ROM

b. RAM

c. Floppy Disk

d. Hard Disk

Answer : B

165. Which of the following is the smallest storage?

a. Megabyte

b. Gigabyte

c. Terabyte

d. None of these

Answer : D

166. Which of the following contains permanent data and gets updated during the processing of transactions?

a. Operating System File

b. Transaction file

c. Software File

d. Master file

Answer : D

167. Which of the following helps to protect floppy disks from data getting accidentally erased?

a. Access notch

b. Write-protect notch

c. Entry notch

d. Input notch

Answer : B

168. A modem is connected to

a. a telephone line

b. a keyboard

c. a printer

d. a monitor

Answer : A

169. Large transaction processing systems in automated organisations use

a. Online processing

b. Batch Processing

c. Once-a-day Processing

d. End-of-day processing

Answer : B

170. In a computer, most processing takes place in

a. Memory

b. RAM

c. motherboard

d. CPU

Answer : D

171. . Which of the following is not a storage medium?

a. Hard disk

b. Flash drive

c. DVD

d. scanner

Answer : D

172. The computer abbreviation KB usually means

a. Key Block

b. Kernel Boot

c. Kilo Byte

d. Kit Bit

Answer : C

173. The typical computer criminal is a(n):

a. Young hacker.

b. Trusted employee with no criminal record.

c. Trusted employee with a long, but unknown criminal record.

d. Overseas young cracker.

Answer : B

174. The common name for the crime of stealing passwords is:

a. Jacking.

b. Identity theft.

c. Spoofing.

d. Hacking.

Answer : C

175. Collecting personal information and effectively posing as another individual is known

as the crime of:

a. Spooling.

b. Identity theft.

c. Spoofing.

d. Hacking.

Answer : B

176. Malicious software is known as:

a. Badware.

b. Malware.

c. Maliciousware.

d. Illegalware.

Answer : B