0

Fundamentals of Computers

Description: Basics of computer
Number of Questions: 15
Created by:
Tags: Basics of computer E-Commerce and Banking Computer Basics
Attempted 0/15 Correct 0 Score 0

Which of the following is prepared by the means of a language known as HTML?

  1. WWW

  2. Web page

  3. Computer program

  4. Physical network

  5. Logical network


Correct Option: B
Explanation:

Web page is prepared by means of a language known as HTML.

The systems that simulate intelligence by attempting to reproduce the types of physical connections that occur in animal brains are called as ______________.

  1. expert systems

  2. robotics

  3. neural networks

  4. real-time processing systems

  5. batch processing systems


Correct Option: C
Explanation:

The systems that simulate intelligence by attempting to reproduce the types of physical connections that occur in animal brains is called as neural networks.

Which of the following represents the surface of the plate in the hard disk organized as a number of concentric circles?

  1. Sectors

  2. Tracks

  3. Bits

  4. Bytes

  5. Pixels


Correct Option: B
Explanation:

Sectors is the surface of the plate in the hard disk organized as a number of concentric circles.

Which of the following devices represents a sequence of dark and light lines that represents coded data?

  1. Biometric system

  2. Voice recognition system

  3. Barcode reader

  4. Touch screen

  5. OCR


Correct Option: C
Explanation:

Bar code readers device represents a sequence of dark and light lines which represents coded data..

Which of the following devices consists of a photoelectric cell, which is packed into a slender tube having the dimension of a pen?

  1. Touch screen

  2. Light pen

  3. Scanner

  4. OMR

  5. Joystick


Correct Option: B
Explanation:

This device consists of a photoelectric cell which is packed into a slender tube having the dimension of a pen.

Which of the following insulates a private network from a public network using carefully established controls on the types of request they will route through the private network for processing and fulfillment?

  1. Router

  2. Protocol

  3. Firewall

  4. Packet filtering

  5. Cache


Correct Option: C
Explanation:

This insulates a private network form a public network using carefully established controls on the types of request they will route through to the private network for processing and fulfillment.

What is an expanded form of 'MOUSE'?

  1. Magnetically Operated User Serial Engine

  2. Mechanically Operated User Serial Engine

  3. Magnet of User Search Engine

  4. Mechanically Operated User Machine

  5. None of these


Correct Option: B
Explanation:

This is the correct expanded form of MOUSE

Which of the following is the correct rotational speed of a hard disk?

  1. 2400 rpm

  2. 3600 rpm

  3. 4600 rpm

  4. 7200 rpm

  5. 1600 rpm


Correct Option: D
Explanation:

This is the correct rotational speed of a hard disk. so that data contents of the hard disk can be read.

Which of the following types of ROM, when exposed to high intensity ultraviolet light for about 20 minutes, can erase the stored data?

  1. PROM

  2. Flash memory

  3. EPROM

  4. Hard disk

  5. Magnetic disk


Correct Option: C
Explanation:

This type of ROM when exposed to high intensity ultraviolet light for about 20 minutes can erase the stored data.

The ability of the operating system to have more than one program open at a time is called as _______________.

  1. multitasking

  2. spooling

  3. distributed system

  4. real time system

  5. multiprocessing


Correct Option: A
Explanation:

The ability of the operating system to have more than one program open at a time is called as Multitasking.

In a computer processor, the number of bits processed in a single instruction is called as ______________.

  1. instruction set

  2. bandwidth

  3. clock speed

  4. frequency

  5. amplitude


Correct Option: B
Explanation:

In a computer processor the number of bits processed in a single instruction is called as Bandwidth.

Which of the following techniques, in problem solving methodology, divides the given problem into a number of self contained independent program segments?

  1. Bottom-up design

  2. Top-down design

  3. Modularity

  4. Multiprocessing

  5. Stepwise refinement


Correct Option: C
Explanation:

This technique in problem solving methodology divides the given problem into a number of self contained independent program segments.

_______________ is a set of rules, which user has to follow to instruct the computer about the operations that are to be performed.

  1. Machine dependent language

  2. Programming language

  3. System software

  4. Application software

  5. Assembler


Correct Option: B
Explanation:

Programming language is a set of rules which user has to follow to instruct the computer what operations are to be performed.

_____________ is the process through which an operating system is loaded into the main memory from the secondary storage device.

  1. Thread

  2. Spooling

  3. Booting

  4. Buffer

  5. Utility program


Correct Option: C
Explanation:

Booting is the process through which an operating system is loaded in to the main memory from the secondary storage device.

Which of the following objects is a form of scripting on the server side maintained by credit company for authentication or approval?

  1. Web server

  2. CGI

  3. Gateway

  4. Barcode reader

  5. Joystick


Correct Option: B
Explanation:

CGI refers to Common Gateway Interface is a form of scripting on the server side maintained by credit company for authentication or approval.

- Hide questions