Which of the following is most oriented to scientific programming?
All Android phones and iPhones have access to a SQL (pronounced ‘sequel’) database called_______
_____is the a relatively new programming language designed by Microsoft for a wide range of enterprise applications that run on the .NET Framework.
______is a scripting language, running on the server, which can be used to create web pages written in HTML.
In 2014, Apple decided to invent their own programming language.What is the programming language called?
____is the process of affecting the visibility of a website or a web page in a web search engine's unpaid results—often referred to as "natural", "organic", or "earned" results.
____ cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
Which among the following is an important circuitry in a computer system that directs the operation of the processor?
Which among the following is a recently debated principle that Internet service providers and governments regulating the Internet should treat all data on the Internet the same, not discriminating or charging differentially by user, content, website, platform, application, type of attached equipment, or mode of communication?
A______is a combination of a private cloud combined with the use of public cloud services where one or several touch points exist between the environments.
Which among the following is not an Object Oriented Programming Language?
_____general purpose programming language, though it is best known for its use in web programming, and _____ serves as a framework for the Ruby Language.
Python is a general purpose programming language . Python is simple and incredibly readable since closely resembles the English language.
Who developed Python?
_____is the the scripting language of the World Wide Web and is built right into all major web browsers including Internet Explorer, FireFox and Safari.
Answer: Option 'C'
What is DROPBOX?
Since viruses are only a form of software, they primarily infect
Answer: Option 'D'
In 1982, a program called "Elk Cloner" was the first personal computer virus to appear "in the wild"—that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.
Which of the following is used to measure the speed of the processor?
Which of the following is used to find a saved document in the computer’s memory and bring it up on the screen to view?
The command that is used to format a drive through command prompt is
Unix operating system was developed by
Which key is used to search any data in a computer?
.bmp extension is used by
Answer: Option 'D'
The BMP file format, also known as bitmap image file or device independent bitmap (DIB) file format or simply a bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows and OS/2 operating systems
Which of the following is a non-volatile memory chip used for storage and for transferring data between a personal computer (PC) and digital devices?
Which network of architecture is defined in IEEE 802.3 format?
Answer: Option 'D'
IEEE 802.3 is a working group and a collection of IEEE standards produced by the working group defining the physical layer and data link layer's media access control (MAC) of wired Ethernet. This is generally a local area network technology with some wide area network applications
Which command is given to ‘run’ or ‘switch off’ the computer?
In database, a field is a
What is a flowchart?
These are the features present in IPv4 but not in IPv6.
IPv6 does not use ______ type of address
Which of the following is not correct?
Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.
A ______is an interconnected network of computers infected with malware without the user's knowledge and controlled by cybercriminals. They're typically used to send spam emails, transmit viruses and engage in other acts of cybercrime.
Firewalls are often configured to block
WPA2 is used for security in
An attempt to make a computer resource unavailable to its intended users is called
Common gateway interface is used to
In DOS, which of the following command is used to delete all the files as well as sub-directories of a directory?
What is/are the feature(s) of a Multi-processor?
Answer: Option 'D'
A multiprocessor is a computer system with two or more central processing units (CPUs)-
Benefits of using a multiprocessor include:
Multi-tasking inside an application
High throughput and/or responsiveness
Hardware sharing among CPUs
__________ is not the category of operating system’s task.
What is also known as service program? (this type of program perform(s) specific tasks related to managing computer resources)
“GUI” stands for-
The first electronic digital computer contained _________?
A set of instructions telling the computer what to do is called-
Programs designed specifically to address general purpose applications and special purpose applications are called-
__________ are created using computers and, more generally, the representation and manipulation of image data by a computer with help from specialized software and hardware.
Which of the following could be digital input devices for computers?
Codes consisting of light and dark marks which may be optically read, is known as_______.
An optical input device that interprets pencil marks on paper media is________.