1. |
Who is the father of Computer science? |
Charles Babbage |
2. |
In a computer, most processing takes place in _______? |
CPU |
3. |
In which type of computer, data are represented as discrete signals? |
Digital Computer |
4. |
Scientific Name of Computer? |
Sillico sapiens |
5. |
What is the name of the display feature that highlights are of the screen which requires operator attention? |
Reverse Video |
6. |
Computers, combine both measuring and counting, are called _______? |
Hybrid Computer |
7. |
What is FORTRAN? |
Formula Translation |
8. |
What translates and executes program at run time line by line? |
Interpreter |
9. |
What converts an entire program into machine language? |
Compiler |
10. |
Who is the father of personal computer? |
Edward Robert |
11. |
EEPROM stands for _______? |
Electronic Erasable Programmable Read Only Memory |
12. |
Who developed the first electronic computer? |
J.V. Atansoff |
13. |
Which programming languages are classified as low level languages? |
Assembly Language |
14. |
The first web browser is _______? |
Mosaic |
15. |
First page of Website is termed as _______? |
Homepage |
16. |
IBM stands for _______? |
International Business Machines |
17. |
Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate _______? |
WAN ( wide area network ) |
18. |
To move a copy of file from one computer to another over a communication channel is called? |
File Transfer |
19. |
Large transaction processing systems in automated organisations use _______? |
Batch Processing |
20. |
MICR stands for _______? |
Magnetic Ink Character Recognition |
21. |
Name of 1st electronic computer? |
ENIAC |
22. |
No. of different characters in ASCII coding system? |
1024 |
23. |
MSIC stands for _______? |
Medium Scale Integrated Circuits |
24. |
The scrambling of code is known as _______? |
Encryption |
25. |
The first computers were programmed using _______? |
Machine Language |
26. |
A fault in a computer program which prevents it from working correctly is known as _______? |
Bug |
27. |
Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols? |
Shift |
28. |
When a computer is switched on, the booting process performs _______? |
Power on self test |
29. |
What is the software frequently utilized by end users called (like Word, PowerPoint)? |
Application Software |
30. |
Unit of measurement of the output quality of a printer? |
Dot per sq. inch |
31. |
Switching device of fifth generation computer is _______? |
VLSI |
32. |
The unit KIPS is used to measure the speed of _______? |
Processor |
33. |
DOS stands for _______? |
Disk Operating System |
34. |
What is a joy stick primarily in computers used for? |
Computer Gaming |
35. |
In 1999, the Melissa virus was a widely publicized _______? |
E-mail virus |
36. |
Which of the following commands is given to reboot the computer? |
Ctrl+Alt+Del |
37. |
What is correcting errors in a program called? |
Debugging |
38. |
BCD is _______? |
Binary Coded Decimal |
39. |
What type of virus uses computer hosts to reproduce itself? |
Worm |
40. |
SMTP, FTP and DNS are applications of the _______ layer? |
Application |
41. |
Which command is used to select the whole document? |
Ctrl+A |
42. |
COBOL is an acronym for _______? |
Common Business Oriented Language |
43. |
The ability of an OS to run more than one application at a time is called? |
Multitasking |
44. |
What is the functional key to display save-as box? |
F12 |
45. |
Full form of NOS? |
Network Operating system |
46. |
Something which has easily understood instructions is said to be _______? |
Analog Data |
47. |
A modem is connected to a _______? |
Telephone Line |
48. |
Refresh Rate of monitor is measured in? |
Hertz |
49. |
What was the chief component of first generation computer? |
Vacuum tube & Valves |
50. |
Name the Father of Computer Mouse? |
Douglas Engelbart |
51. |
A program that performs a useful task while simultaneously allowing destructive acts is _______? |
Trojan Horse |
52. |
The geometric arrangement of devices on the network is called _______? |
Topology |
53. |
The basic goal of computer process is to convert data into _______? |
Information |
54. |
Where are the CPU and memory located? |
Motherboard |
55. |
Who is known as the founder of IBM Company? |
Thomas J. Watson |
56. |
An image on a computer screen is made up of _______? |
Pixels |
57. |
Full form of MAN? |
Metropolitan Area Network |
58. |
Which command in DOS can be used to recover accidentally deleted files? |
UNDELETE |
59. |
A computer program that converts an entire program into machine language atone time is called _______? |
Characters |
60. |
In which year, the Microsoft company was founded? |
1975 |
61. |
What is the personal computer operating system that organizes and uses a graphic desktop environment? |
Windows |
62. |
What are Light pen and joystick? |
Input Devices |
63. |
What is a half byte also called as? |
Nibble |
64. |
SMPS stands for _______? |
Switched mode Power Supply |
65. |
What do we use to change the appearance and positioning of text document in MSWord? |
Formatting |
66. |
A _______ is approximately a million bytes? |
Megabyte |
67. |
Daisy wheel, Drum, chain etc are the _______? |
Printers |
68. |
XML stands for _______? |
Extensible Markup Language |
69. |
What kind of scheme is the HTTP protocol? |
Request/Response |
70. |
Magnetic disk is an example of _______? |
Secondary Memory |
71. |
What is the meaning of OSI, in terms of computers ? |
Open system Interconnection |
72. |
Which type of storage device is a BIOS ? |
Primary |
73. |
What is the extension type of the excel 2007 files? |
.xlsx |
74. |
Collecting personal information and effectively posing as another individual is known as the crime of _______? |
Identity theft |
75. |
The amount of vertical space between lines of text in a document is called _______? |
Line Spacing |
76. |
A computer cannot ‘boot’ if it does not have the _______? |
Operating system |
77. |
What is the other name for programmed chip? |
LSIC |
78. |
A normal CD- ROM usually can store up to _______ data? |
680 MB |
79. |
What does DMA stand for? |
Direct Memory Access |
80. |
Full form of LAN? |
Local Area Network |
81. |
ASCII stands for _______? |
American Standard Code for Information Interchange |
82. |
Second Generation computers were developed during _______? |
1956-65 |
83. |
When did arch rivals IBM and Apple Computers Inc. decide to join hands? |
1991 |
84. |
What kind of memory is both static and non-volatile? |
ROM |
85. |
An error in software or hardware is called a bug. What is the alternative computer jargon for it? |
Glitch |
86. |
Unwanted repetitious messages, such as unsolicited bulk e-mail is known as _______? |
Spam |
87. |
The common name for the crime of stealing passwords is _______? |
Spoofing |
88. |
BIOS stands for _______? |
Basic Input Output System |
89. |
Who is regarded as Father of “C” programming language? |
Dennis Ritchie |
90. |
RAM can be treated as the _______ for the computer’s processor. |
Waiting Room |
91. |
Computers manipulate data in many ways, and this manipulation is called _______? |
Processing |
92. |
Joshy, Perfumes are examples of _______? |
Viruses |
93. |
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called _______? |
Computer Forensics |
94. |
Where does most data go first with in a computer memory hierarchy? |
RAM |
95. |
Help Menu is available at which button? |
Start |
96. |
Which file contains permanent data and gets updated during the processing of transactions? |
Master File |
97. |
A DVD is an example of an _______? |
Optical Disc |
98. |
Which is most common tool used to restrict access to computer system? |
Passwords |
99. |
The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred as _______? |
RISC |
100. |
What is the name of an application program that gathers user information and sends it to someone through the Internet? |
Spybot |