1.
All of the following are examples of real security and privacy risks EXCEPT:
Answer: Option 'A'
2.
In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
Answer: Option 'B'
Eight bits
3.
All of the following are examples of input devices EXCEPT a:
Answer: Option 'D'
printer
4.
Word processing, spreadsheet, and photo-editing are examples of:
Answer: Option 'D'
application software
5.
The difference between people with access to computers and the Internet and those without this access is known as the:
Answer: Option 'A'
digital divide
6.
________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
Answer: Option 'C'
The operating system
7.
Servers are computers that provide resources to other computers connected to a:
Answer: Option 'B'
network
8.
A ____________ is approximately one billion bytes.
Answer: Option 'B'
gigabyte
Basic Computer Knowledge Quiz
9.
__________ is data that has been organized or presented in a meaningful way.
Answer: Option 'C'
Information
10.
Computers use the ____________ language to process data.
Answer: Option 'B'
binary
11.
Transmission control protocol is:
Answer: Option 'D'
all of the mentioned
12.
Department(dept_id, emp_id, dept_name)
Here the cdept_id,emp_id and dept_name are __________ and Department is a _________.
Answer: Option 'B'
Attributes, Relation
13.
The subset of the super key is a candidate key under what condition?
Answer: Option 'A'
No proper subset is a super key
14.
In cryptography, what is cipher?
Answer: Option 'A'
algorithm for performing encryption and decryption
15.
Here is an infix expression: 3 + 13*(60*376-12). The maximum number of symbols that will appear on the stack AT ONE TIME during the conversion of infix to postfix notation of this expression is?
Answer: Option 'D'
4
16.
Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database?
Answer: Option 'A'
DML
17.
Which one of the following is a transport layer protocol?
Answer: Option 'A'
stream control transmission protocol
18.
Pokémon Go app, an immensely popular game which allowed people to wander around their hometowns and score points by interacting with characters, within the confines of a game, then going to real-life places to make progress in virtual environments. Which of the following is related technology?
Answer: Option 'C'
Augmented reality is a technology that superimposes a computer-generated image on a user's view of the real world.
19.
Which type of system can learn and adjust to new circumstances by themselves?
Answer: Option 'D'
Neural networks can learn and adjust to new circumstances by themselves.
20.
In 2014, Apple decided to invent a programming language. What is the name of that programming language?
Answer: Option 'D'
Swift is a general-purpose, multi-paradigm, compiled programming language developed by Apple Inc.