21.
Robot ________ is the homemade, artificially intelligent, multilingual, social and educational humanoid robot, made-up of waste materials, developed by Dinesh Kunwar Patel, a Kendriya Vidyalaya, Computer Science teacher from Mumbai.
Answer: Option 'A'
Shalu Robot shalu is the homemade, artificially intelligent, multilingual, social and educational humanoid robot, made-up of waste materials, developed by Dinesh Kunwar Patel, a Kendriya Vidyalaya, Computer Science teacher from Mumbai.
22.
The process of a computer receiving information from a server on the internet is known as ____________.
Answer: Option 'B'
Download Downloading is the process of a computer receiving information from a server.
23.
A word in a web page that, when clicked, opens another document.
Answer: Option 'C'
hyperlink hyperlink is a word in a web page that, when clicked, opens another document.
24.
The altering of data so that it is not usable unless the changes are undone is __________.
Answer: Option 'B'
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
25.
ARPANET stands for __________.
Answer: Option 'D'
Advanced Research Projects Agency Network
26.
Which of the following is a folder that retains copies of messages have started but are not yet send to the recipient?
Answer: Option 'D'
Drafts A draft is simply an email message you haven’t yet sent.
27.
The basic input/output system (BIOS) is stored in:
Answer: Option 'A'
ROM System BIOS, ROM BIOS or PC BIOS is a type of firmware used to perform hardware initialization during the booting process. BIOS is stored on the ROM chip because it is Non-volatile which means that it doesn’t go away when the power is turned off. In other words, it is effectively permanent (at least until it is reprogrammed).
28.
Which shortcut key is used to create a new folder in MS Windows?
Answer: Option 'B'
Ctrl+Shift+N Ctrl+Shift+N is also the shortcut key to open new incognito mode in chrome web browser.
29.
To allow someone else to schedule your meetings and appointments, ______ feature of Outlook is used.
Answer: Option 'A'
Delegate Access Delegate Access is a more advanced feature than just sharing your Outlook folders. If you want to grant additional permissions, such as allowing a delegate the ability to create e-mail messages or respond to meeting requests on your behalf, you must use Delegate Access.
30.
Every computer connected to an internet must have a distinct____
Answer: Option 'A'
IP address IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a computer or device on a network.
31.
Codes consisting of varying widths and spacing of parallel lines, which may be optically read, is known as _____.
Answer: Option 'C'
Bar code A barcode is a machine-readable representation of data relating to the object to which it is attached.
32.
Which of the following is a collection of programs that controls how your computer system runs and processes information?
Answer: Option 'A'
operating system
33.
What type of technology captures spoken words and forms them into sentences that a computer can understand and react to?
Answer: Option 'B'
Automatic speech recognition Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
34.
What term refers to your ability to connect to the internet and your company from a wireless device?
Answer: Option 'B'
Mobile computing Mobile computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.
35.
Which among the following is a language directly understood by CPU?
Answer: Option 'A'
CPU doesn’t understand the C++ language (or any high- level programming language). All the High- level language statements must be translated into machine code before they can be executed.
36.
__________ is also known as inkless printer.
Answer: Option 'A'
Thermal printer Thermal printers are inkless.
37.
A handheld device that allows you to control your computer without typing instructions from a keyboard is known as_______.
Answer: Option 'B'
Mouse A mouse is a handheld device that allows you to control your computer without typing the instructions from the keyboard. By using a mouse, you can select icons, open programs, and select, commands, present in a program by moving the pointer.
38.
Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
Answer: Option 'A'
Antivirus Software Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
39.
Copying a process from memory to disk to allow space for other processes is called __________.
Answer: Option 'D'
Swapping Swapping concept comes in terms of process scheduling. Scheduler removes process from CPU for duration and reduces the degree of multiprogramming. And after some time these process can again be reintroduced into main memory.
40.
Which of the following is the activity of purchasing items and products from different websites on the internet and using online modes, such as credit cards and debit cards, to make the payments?
Answer: Option 'C'
Online shopping The activity of purchasing items from different websites on the internet is known as online shopping.