Menu
Home
Quizzes
Question Papers
TOP 10's
Study Material
English
Interviews
About me
Adsense new 1
Computers Quiz 4
Computers Quiz 4
1)
Junk e- mail is also called ......
A) spam
B) spoof
C) spool
D) None
2)
Hackers ............
A) all have the same motive
B) break into other people’s computers
C) are people who are allergic to computers
D) None of these
3)
All of the following are examples of real security and privacy risks EXCEPT :
A) Hackers
B) Spam
C) Viruses
D) Identity theft
4)
____________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A) Data
B) Point-of-sale (POS)
C) Sales
D) Query
5)
Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as :
A) robotics
B) computer forensics
C) simulation
D) forecasting
6)
____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A) Artificial intelligence
B) Microelectrodes
C) Nanoscience
D) Computer forensics
7)
____________ is the science that attempts to produce machines that display the same type of intelligence that humans.
A) Nanoscience
B) Nanotechnology
C) Simulation
D) Artificial intelligence (AI)
8)
____________ is data that has been organized or presented in a meaningful fashion.
A) Information
B) Storage
C) Software
D) A process
9)
The name for the way that computers manipulate data into information is called :
A) programming
B) processing
C) storing
D) organizing
10)
Computers use the ____________ language to process data.
A) binary
B) processing
C) kilobyte
D) representational
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment