General Knowledge
COMPUTER AWARENESS MCQs
It And Computer, Basic Computer Knowledge
Total Questions : 618
| Page 15 of 62 pages
Answer: Option B. -> Three
Answer: (b)
Electronic mail, most commonly referred to as email, is a method of exchanging digital messages from an author to one or more recipients.
Normally, there could be three types of recipients:
the target recipient;
a carbon copy (Cc) recipients; and
blind carbon copy (Bcc) recipients.
Answer: (b)
Electronic mail, most commonly referred to as email, is a method of exchanging digital messages from an author to one or more recipients.
Normally, there could be three types of recipients:
the target recipient;
a carbon copy (Cc) recipients; and
blind carbon copy (Bcc) recipients.
Answer: Option B. -> Malicious technique of tricking Web usear into revealing confidential information
Answer: (b)
Clickjacking is a malicious technique of tricking a Web user into clicking on something different to what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. It is a browser security issue that is vulnerable across a variety of browsers and platforms.
A clickjacking takes the form of embedded code or a script that can execute without the user’s knowledge, such as clicking on a button that appears to perform another function. The term “clickjacking” was coined by Jeremiah Grossman and Robert Hansen in 2008.
Answer: (b)
Clickjacking is a malicious technique of tricking a Web user into clicking on something different to what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. It is a browser security issue that is vulnerable across a variety of browsers and platforms.
A clickjacking takes the form of embedded code or a script that can execute without the user’s knowledge, such as clicking on a button that appears to perform another function. The term “clickjacking” was coined by Jeremiah Grossman and Robert Hansen in 2008.
Answer: Option C. -> Tim Berners-Lee
Answer: (c)
The World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet.
Using concepts from his earlier hypertext systems like ENQUIRE, British engineer, computer scientist and at that time employee of CERN, Sir Tim Berners-Lee, now Director of the World Wide Web Consortium (W3C), wrote a proposal in March 1989 for what would eventually become the World Wide Web.
Answer: (c)
The World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet.
Using concepts from his earlier hypertext systems like ENQUIRE, British engineer, computer scientist and at that time employee of CERN, Sir Tim Berners-Lee, now Director of the World Wide Web Consortium (W3C), wrote a proposal in March 1989 for what would eventually become the World Wide Web.
Answer: Option C. -> Operating system
Answer: (c)
Booting is a startup sequence that starts the operating system of a computer when it is turned on.
To boot a computer is to load an operating system into the computer’s main memory or random access memory (RAM). Once the operating system is loaded, it is ready for users to run applications.
Answer: (c)
Booting is a startup sequence that starts the operating system of a computer when it is turned on.
To boot a computer is to load an operating system into the computer’s main memory or random access memory (RAM). Once the operating system is loaded, it is ready for users to run applications.
Answer: Option D. -> Accuracy
Answer: (d)
Garbage in, garbage out (GIGO), in the context of information technology, is a slang expression that means regardless of how accurate a program’s logic is, the results will be incorrect if the input is invalid.
A program gives inaccurate results due to inaccurate data provided because a computer will always attempt to process data given to it. So GIGO is related to the accuracy of output which, in turn, is dependent on the accuracy of inputs.
Answer: (d)
Garbage in, garbage out (GIGO), in the context of information technology, is a slang expression that means regardless of how accurate a program’s logic is, the results will be incorrect if the input is invalid.
A program gives inaccurate results due to inaccurate data provided because a computer will always attempt to process data given to it. So GIGO is related to the accuracy of output which, in turn, is dependent on the accuracy of inputs.
Answer: Option C. -> modem
Answer: (c)A modem takes the digital signal from the computer and converts it to "analog". It does this by both creating an analog sine wave and then "MODulating" it. Since the result still represents digital data, it could also be called a digital signal instead of analog.
Answer: (c)A modem takes the digital signal from the computer and converts it to "analog". It does this by both creating an analog sine wave and then "MODulating" it. Since the result still represents digital data, it could also be called a digital signal instead of analog.
Answer: Option C. -> MHz
Answer: (c)Speed of processor chip is measured in megahertz (MHz) and gigahertz (GHz).
Answer: (c)Speed of processor chip is measured in megahertz (MHz) and gigahertz (GHz).
Answer: Option A. -> Cyber Space
Answer: (a)
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite. It is a network of networks linked by a broad array of electronic, wireless and optical networking technologies.
Cyberspace refers to the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems in which online communication takes place.
Answer: (a)
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite. It is a network of networks linked by a broad array of electronic, wireless and optical networking technologies.
Cyberspace refers to the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems in which online communication takes place.
Answer: Option C. -> Content-addressable Memory
Answer: (c)
Content-addressable memory (CAM) is a special type of computer memory used in certain very highspeed searching applications. It is also known as associative memory.
It compares input search data (tag) against a table of stored data and returns the address of matching data (or in the case of associative memory, the matching data).
Answer: (c)
Content-addressable memory (CAM) is a special type of computer memory used in certain very highspeed searching applications. It is also known as associative memory.
It compares input search data (tag) against a table of stored data and returns the address of matching data (or in the case of associative memory, the matching data).
Answer: Option A. -> C++
Answer: (a)
Linux, Windows 98 and Windows 7 are examples of operating systems, the system software that manages computer hardware and software resources and provides common services for computer programs.
C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs.
Answer: (a)
Linux, Windows 98 and Windows 7 are examples of operating systems, the system software that manages computer hardware and software resources and provides common services for computer programs.
C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs.