1.
Which of the following is a term related with scanner?
Answer: Option 'D'
Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.
2.
FORTRAN is a programming language. It is more suitable for _______.
Answer: Option 'C'
FORTRAN is the best and only major programming language for scientific applications. It is designed for performing large and complex scientific numerical computing.
3.
__________ ensures secure transfer of data over an unsecured network, such as the Internet.
Answer: Option 'D'
In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.
4.
A nibble refers to:
Answer: Option 'A'
Nibble= 4 Bits
5.
The SubSeven is an example of :
Answer: Option 'D'
SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
6.
Which of the following component is a part of RAM?
Answer: Option 'A'
Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.
7.
Which of the following threads is used in an operating system?
Answer: Option 'D'
There are only two types of threads present in an operating system. One is user-level thread and the other is kernel-level thread. User-level threads are the threads which are controlled and managed by the user of the computer system. Kernel-level threads are the threads which are controlled and created by the operating system. These threads are at the kernel level of the computer system. Kernel is the one who creates the threads.
8.
Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
Answer: Option 'D'
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
9.
Which of the following conditions is responsible for occurrence of context switching?
Answer: Option 'A'
A context switching comes into the picture when the time period provided for one process is over and a new process is loaded from the ready queue for processing.
10.
Which among the following is the most suitable type of network that phone lines would use?
Answer: Option 'A'
Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.
11.
The software that is used to create text based documents is referred as :
Answer: Option 'D'
Word processors are used to create text-based documents.
12.
What acts as master software that works as a mediator between a computer user and the hardware of a computer?
Answer: Option 'D'
Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.
13.
Which among the following type of computers is also known informally as Number crunchier?
Answer: Option 'B'
Super Computers are also known as number crunchers. A super computer's dominant characteristic is its ability to perform large amounts of numerical computations quickly.
14.
______ is a set of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer.
Answer: Option 'B'
A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behaviour of a machine or to express algorithms.
15.
Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
Answer: Option 'D'
An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.
16.
Which of the following is the activity of purchasing items and products from different websites on the internet and using online modes, such as credit cards and debit cards, to make the payments?
Answer: Option 'B'
The activity of purchasing items from different websites on the internet is known as online shopping.
17.
The process of a computer receiving information from a server on the internet is known as _______.
Answer: Option 'B'
Downloading is the process of a computer receiving information from a server.
18.
What does BASIC stands for?
Answer: Option 'C'
BASIC stands for Beginner’s All-purpose symbolic Instruction code.
19.
______ uses a standard called IEEE802.6.
Answer: Option 'C'
IEEE 802.6 is a standard governed by the ANSI for Metropolitan Area Networks (MAN).
20.
In number system, LSD stands for ___________.
Answer: Option 'D'
In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.