Sail E0 Webinar

Computer Aptitude

COMPUTER KNOWLEDGE MIXED MCQs

Total Questions : 480 | Page 39 of 48 pages
Question 381. A term relating to sending data to a satellite is __________
  1.    downling
  2.    modulate
  3.    demodulate
  4.    uplink
  5.    interrelate
 Discuss Question
Answer: Option D. -> uplink


Uplink is a term relating to sending data to a satellite. An uplink is the portion of a communications link used for the transmission of signals from an Earth terminal to a satellite on to an airborne platform.


Question 382. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called ______
  1.    hypermedia
  2.    hypertext
  3.    HTML
  4.    URL
  5.    FTP
 Discuss Question
Answer: Option B. -> hypertext


Hypertext is text displayed on a computer or other electronic device with references (hyper links) to other text that the reader can immediately access usually by a mouse click or keypress sequence. A part from running text, hypertext may contain tables, images and other presentation devices. Hypertext is the underlying concept defining the structure of the World Wide Web


Question 383. The issues that deal with the collection and use of data about individuals is ____________
  1.    access
  2.    publicity
  3.    accuracy
  4.    property
  5.    privacy
 Discuss Question
Answer: Option E. -> privacy


Privacy is the right to be left alone when you want to be to have control over your own personal information, and not to be observed without your consent.


Question 384. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _______ security is concerned with protecting software from unauthorized tampering or damage.
  1.    data
  2.    cyber
  3.    internet
  4.    metaphysical
  5.    publicity
 Discuss Question
Answer: Option A. -> data


data


Question 385. The software that allows users to surf the internet is called a/an ____
  1.    Search engine
  2.    Internet Service Provider(ISP)
  3.    Multimedia application
  4.    Browser
  5.    Internet Surfing Provider
 Discuss Question
Answer: Option D. -> Browser


A Browser is the software that allows users to surf the net.


Question 386. Unauthorized copying of software to be used for personal gain instead of for personal backups is called ________
  1.    program thievery
  2.    data snatching
  3.    software piracy
  4.    program looting
  5.    data looting
 Discuss Question
Answer: Option C. -> software piracy


The software piracy refers to several practices which involve the unauthorized copying of computer software. Copyright is fringement of this kind is extremely common.


Question 387. Hackers ________
  1.    all have the same motive
  2.    are people who maintain computers
  3.    may legally break into computers as long as they do not do any damage
  4.    are people who are allergic to computers
  5.    break into other people's computers
 Discuss Question
Answer: Option E. -> break into other people's computers


Hackers are very  knowledgeable computer users who use their knowledge to invade other people's computers.


Question 388. What usually used for displaying information at public places ?
  1.    Monitors
  2.    Overhead Projections
  3.    Monitors and Overhead Projections
  4.    Touch Screen Kiosks
  5.    Loud Speakers
 Discuss Question
Answer: Option B. -> Overhead Projections


An overhead projector is a variant of side projector this is used to display images to an audience


Question 389. Junk e-mail is also called ________
  1.    Spam
  2.    spoof
  3.    cookie crumbs
  4.    sniffer script
  5.    spill
 Discuss Question
Answer: Option A. -> Spam


Spam


Question 390. What is MP3?
  1.    A mouse
  2.    A printer
  3.    A sound format
  4.    A scanner
  5.    A Mobile phone
 Discuss Question
Answer: Option C. -> A sound format


A sound format


Latest Videos

Latest Test Papers