1.
Generally to copy data from a remote computer/internet to a local computer is called __________.
Answer: Option 'C'
Generally to copy data from a remote computer/internet to a local computer is called downloading.
2.
Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
Answer: Option 'A'
hacker is someone who seeks and exploits weaknesses in a computer system.
3.
Which of the following is the activity of purchasing items and products from different websites on the internet and using online modes, such as credit cards and debit cards, to make the payments?
Answer: Option 'B'
The activity of purchasing items from different websites on the internet is known as online shopping.
4.
The process of a computer receiving information from a server on the internet is known as _______.
Answer: Option 'B'
Downloading is the process of a computer receiving information from a server.
5.
Which of the following component is a part of RAM?
Answer: Option 'A'
Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.
6.
Who developed the basic architecture of Computers?
Answer: Option 'D'
The von Neumann architecture, also known as the von Neumann model is computer architecture by John Von Neumann.
7.
The primary purpose of a computer is to process _____________ and convert it into information.
Answer: Option 'B'
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
8.
In number system, LSD stands for ___________.
Answer: Option 'D'
In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.
9.
Which of the following threads is used in an operating system?
Answer: Option 'D'
There are only two types of threads present in an operating system. One is user-level thread and the other is kernel-level thread. User-level threads are the threads which are controlled and managed by the user of the computer system. Kernel-level threads are the threads which are controlled and created by the operating system. These threads are at the kernel level of the computer system. Kernel is the one who creates the threads.
10.
The SubSeven is an example of :
Answer: Option 'D'
SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
11.
The conversion of the binary number 10100111011 into its decimal form is __________.
Answer: Option 'A'
133910
12.
The software that is used to create text based documents is referred as :
Answer: Option 'D'
Word processors are used to create text-based documents.
13.
Which of the following is a term related with scanner?
Answer: Option 'D'
Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.
14.
Inheritance is the ability of an object to pass on its characteristics to its _______.
Answer: Option 'A'
A superclass passes its characteristics to it's subclass in concept of inheritance in programming languages.
15.
What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?
Answer: Option 'C'
Headers and footers are pieces of text, or graphics, that appear at the top and bottom of a page. If a company wants to include its company name and logo at the bottom of every page of a brochure then it will use the Footer.