Topicwise Questions - Computers G.K.

1. A computer virus normally attaches itself to another computer programme known as a

  1. Backdoor programme
  2. Target programme
  3. Trojan horse
  4. Host programme

2. One byte consists of

  1. four bits
  2. one bit
  3. ten bit
  4. eight bits

3. The amount of time required by a storage device to retrieve data and programmes is its

  1. Retrieval speed
  2. Capacity
  3. Memory
  4. Access speed

4. ENIAC was

  1. an electronic computer
  2. an engine
  3. a memory device
  4. an electronic calculator

5. Which of these describes attempts by individuals to obtain confidential information from a computer user by falsifying their identity?

  1. Fishing
  2. Computer viruses
  3. Spyware
  4. Phishing

6. The first computer made available for commercial use was

  1. MANIAC
  2. ENIAC
  3. UNIVAC
  4. EDSAC

7. A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage can be called a

  1. Hacker
  2. Spammer
  3. Analyst
  4. Programmer

8. A 32-bit word computer can access _____ bytes at a time.

  1. 4
  2. 8
  3. 16
  4. 32

9. The process of transferring files from the Internet to your computer is called

  1. Downloading
  2. Uploading
  3. File Transfer Protocol
  4. Hypertext Transfer Protocol

10. The ____ shows all the web sites any pages that you have visited one a period of time.

  1. Status bar
  2. Task bar
  3. History list
  4. Tool bar

11. The language which provides basic building blocks for web pages is known as

  1. HTML
  2. C language
  3. Java
  4. Javascript

12. In the URL, http//:www.leadthecompetition.in, the portion labelled http is the ____

  1. Host
  2. Domain name
  3. Protocol
  4. Top-level domain

13. Which of the following is a read only memory storage device?

  1. Floppy Disk
  2. Hard Disk
  3. CDROM
  4. Flash Drive

14. A repair for a known software bug usually available at no charge on the internet is called a

  1. Patch
  2. Version
  3. Tutorial
  4. FAQ

15. Which of the following connects the computer to a telephone line?

  1. Processor
  2. Modem
  3. USB Drive
  4. Multiplexer

16. What is an e-mail attachment?

  1. A receipt sent by the recipient
  2. A separate document from another programme sent along with an e-mail message
  3. A malicious parasite that feeds off of your message and destroys the contents
  4. A list of GC, or BCC, recipients

17. If a file has a '.bak' extension it refers usually to -

  1. Backup file
  2. Audio file
  3. Temporary file
  4. Deleted file

18. The window which shows icons for things like the mouse, sound, and display is called

  1. My Computer
  2. Explorer
  3. Control Panel
  4. Taskbar

19. What kind of file has an extension '.mpg'?

  1. Word Document file
  2. Spreadsheet document
  3. Movie file
  4. Image file

20. Which of the following is not real security and privacy risks?

  1. Hackers
  2. Spam
  3. Viruses
  4. Identity theft

21. Which of the following defines the ability to recover and read deleted or damaged files from a criminal’s computer?

  1. Robotics
  2. Simulation
  3. Computer forensics
  4. Animation

22. The difference between people with internet access and those without it is known as the

  1. Digital divide
  2. Internet divide
  3. Web divide
  4. Broadband divide

23. The smallest unit in a digital system is a

  1. byte
  2. bit
  3. word
  4. character

24. Which of the following is a web browser?

  1. Macromedia Flash
  2. Microsoft Powerpoint
  3. Netscape Navigator
  4. Adobe Dreamweaver

25. Junk e-mail is also called ____

  1. Spam
  2. Spoof
  3. Sniffer script
  4. Spool