1. What is the full form of SDRM?
(1) Shift Dynamic random access memory
(2) Synchronous Dynamic random access memory
(3) System Dynamic random access memory
(4) Serial Dynamic random access memory
(5) None of these
2. The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called?
(1) Response time
(2) Access Time
(3) Quick time
(4) Processing time
(5) None of these
3. Which of the following transforms input data into output data?
(1) Peripherals
(2) RAM
(3) ROM
(4) CPU
(5) None of these
4. In computer file systems which among the following is top or first in hierarchy?
(1) root directory
(2) parent directory
(3) home directory
(4) working directory
(5) None of these
5. Which among the following is not a security/ private risk?
(1) Spam
(2) Hacking
(3) Virus
(4) Phishing
(5) None of these
6. When using characters in Windows, what code does a window use?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTRN
7. To avoid the wastage of memory, the instruction length should be
(1) Multiple of character size only
(2)Of word size only
(3)Of file size only
(4) Of word size which is multiple of character size
(5) None of these
8. A file which has not been alerted, compressed, or manipulated in any way by the computer is called?
(1) temp file
(2) raw file
(3) permanent file
(4) distort file
(5) None of these
9. The word bandwidth is also used to mean ____?
(1) width of the data cable
(2) amount of data transferred
(3) number of the computers on a particular network
(4) Both 1 & 2
(5) None of these
10. Which of the following used in programming the first computers?
(1) Object code
(2) Source code
(3) Machine language
(4) Assembly language
(5) None of these
Answers
1-2
2-2
3. 4
4. 1
5. 1
6. 2
7. 4
8. 2
9. 2
10. 3
(1) Shift Dynamic random access memory
(2) Synchronous Dynamic random access memory
(3) System Dynamic random access memory
(4) Serial Dynamic random access memory
(5) None of these
2. The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called?
(1) Response time
(2) Access Time
(3) Quick time
(4) Processing time
(5) None of these
3. Which of the following transforms input data into output data?
(1) Peripherals
(2) RAM
(3) ROM
(4) CPU
(5) None of these
4. In computer file systems which among the following is top or first in hierarchy?
(1) root directory
(2) parent directory
(3) home directory
(4) working directory
(5) None of these
5. Which among the following is not a security/ private risk?
(1) Spam
(2) Hacking
(3) Virus
(4) Phishing
(5) None of these
6. When using characters in Windows, what code does a window use?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTRN
7. To avoid the wastage of memory, the instruction length should be
(1) Multiple of character size only
(2)Of word size only
(3)Of file size only
(4) Of word size which is multiple of character size
(5) None of these
8. A file which has not been alerted, compressed, or manipulated in any way by the computer is called?
(1) temp file
(2) raw file
(3) permanent file
(4) distort file
(5) None of these
9. The word bandwidth is also used to mean ____?
(1) width of the data cable
(2) amount of data transferred
(3) number of the computers on a particular network
(4) Both 1 & 2
(5) None of these
10. Which of the following used in programming the first computers?
(1) Object code
(2) Source code
(3) Machine language
(4) Assembly language
(5) None of these
Answers
1-2
2-2
3. 4
4. 1
5. 1
6. 2
7. 4
8. 2
9. 2
10. 3
1. What is the full form of SDRM?
(1) Shift Dynamic random access memory
(2) Synchronous Dynamic random access memory
(3) System Dynamic random access memory
(4) Serial Dynamic random access memory
(5) None of these
2. The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called?
(1) Response time
(2) Access Time
(3) Quick time
(4) Processing time
(5) None of these
3. Which of the following transforms input data into output data?
(1) Peripherals
(2) RAM
(3) ROM
(4) CPU
(5) None of these
4. In computer file systems which among the following is top or first in hierarchy?
(1) root directory
(2) parent directory
(3) home directory
(4) working directory
(5) None of these
5. Which among the following is not a security/ private risk?
(1) Spam
(2) Hacking
(3) Virus
(4) Phishing
(5) None of these
6. When using characters in Windows, what code does a window use?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTRN
7. To avoid the wastage of memory, the instruction length should be
(1) Multiple of character size only
(2)Of word size only
(3)Of file size only
(4) Of word size which is multiple of character size
(5) None of these
8. A file which has not been alerted, compressed, or manipulated in any way by the computer is called?
(1) temp file
(2) raw file
(3) permanent file
(4) distort file
(5) None of these
9. The word bandwidth is also used to mean ____?
(1) width of the data cable
(2) amount of data transferred
(3) number of the computers on a particular network
(4) Both 1 & 2
(5) None of these
10. Which of the following used in programming the first computers?
(1) Object code
(2) Source code
(3) Machine language
(4) Assembly language
(5) None of these
Answers
1-2
2-2
3. 4
4. 1
5. 1
6. 2
7. 4
8. 2
9. 2
10. 3
(1) Shift Dynamic random access memory
(2) Synchronous Dynamic random access memory
(3) System Dynamic random access memory
(4) Serial Dynamic random access memory
(5) None of these
2. The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called?
(1) Response time
(2) Access Time
(3) Quick time
(4) Processing time
(5) None of these
3. Which of the following transforms input data into output data?
(1) Peripherals
(2) RAM
(3) ROM
(4) CPU
(5) None of these
4. In computer file systems which among the following is top or first in hierarchy?
(1) root directory
(2) parent directory
(3) home directory
(4) working directory
(5) None of these
5. Which among the following is not a security/ private risk?
(1) Spam
(2) Hacking
(3) Virus
(4) Phishing
(5) None of these
6. When using characters in Windows, what code does a window use?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTRN
7. To avoid the wastage of memory, the instruction length should be
(1) Multiple of character size only
(2)Of word size only
(3)Of file size only
(4) Of word size which is multiple of character size
(5) None of these
8. A file which has not been alerted, compressed, or manipulated in any way by the computer is called?
(1) temp file
(2) raw file
(3) permanent file
(4) distort file
(5) None of these
9. The word bandwidth is also used to mean ____?
(1) width of the data cable
(2) amount of data transferred
(3) number of the computers on a particular network
(4) Both 1 & 2
(5) None of these
10. Which of the following used in programming the first computers?
(1) Object code
(2) Source code
(3) Machine language
(4) Assembly language
(5) None of these
Answers
1-2
2-2
3. 4
4. 1
5. 1
6. 2
7. 4
8. 2
9. 2
10. 3
No comments:
Post a Comment