Fundamentals Of Computers Set 6
On This Page
This set of Fundamentals of Computers Multiple Choice Questions & Answers (MCQs) focuses on Fundamentals Of Computers Set 6
Q1 | ............ Store data or information temporarily and pass it on as directed by the controlunit
- address
- register
- number
- memory
Q2 | Select the Odd one
- operating system
- interpreter
- compiler
- assembler
Q3 | A ............ is an additional set of commands that the computer displays after you make aselection from the main menu
- dialog box
- submenu
- menu selection
- all of the above
Q4 | COBOL is an acronym for.............
- common business oriented language
- computer business oriented language
- common business operated language
- common business organized language
Q5 | All of the following are examples of real security and privacy risks EXCEPT
- hackers
- spam
- viruses
- identity theft
Q6 | Which of the following is NOT one of the four major data processing functions of acomputer?
- gathering data
- processing data into information
- analyzing the data or information
- storing the data or information
Q7 | All of the following are examples of storage devices EXCEPT :
- hard disk drives
- printers
- floppy disk drives
- cd drives
Q8 | The CPU and memory are located on the :
- expansion board
- motherboard
- storage device
- output device
Q9 | ............... is the science that attempts to produce machines that display the same type ofintelligence that humans do
- nanoscience
- nanotechnology
- simulation
- artificial intelligence (al)
Q10 | Servers are computers that provide resources to other computers connected to a :
- networked
- mainframe
- supercomputer
- client
Q11 | When creating a computer program, the ......... designs the structure of the program
- end user
- system analyst
- programmer
- all of the above
Q12 | A computer program that converts an entire program into machine language at one timeis called a/ an
- interpreter
- simulator
- characters
- compiler
Q13 | Computers process data into information by working exclusively with :
- multimedia
- word
- numbers
- characters
Q14 | The difference between people with access to computers and the Internet and thosewithout this access is known as the :
- digital divide
- internet divide
- web divide
- e-illiteracy
Q15 | Computers manipulate data in many ways, and this manipulation is called......
- upgrading
- processing
- batching
- utilizing
Q16 | The ability to recover and read deleted or damaged files from a criminal's computer isan example of a law enforcement speciality called:
- robotics
- simulation
- computer forensics
- animation
Q17 | Where does most data go first with in a computer memory hierarchy ?
- ram
- rom
- bios
- cache
Q18 | The………….data mining technique derives rules from real-world case examples.
- rule discover
- signal processing
- neural nets
- case-based reasoning
Q19 | …………….are used to identify a user who returns to a Website
- cookies
- plug-ins
- scripts
- asps
Q20 | Codes consisting of lines of varying widths or lengths that are computer-readable areknown as-
- an ascii code
- a magnetic tape
- an ocr scanner
- a bar code
Q21 | Why is it unethical to share copyrighted files with your friends?
- it is not unethical, because it is legal.
- it is unethical because the files are being given for free.
- sharing copyrighted files without permission breaks copyright laws.
- it is not unethical because the files are being given for free.
Q22 | Reusable optical storage will typically have the acronym-
- cd
- dvd
- rom
- rw
Q23 | The most common type of storage devices are-
- steel
- optical
- magnetic
- flash
Q24 | A device that connects to a network without the use of cables is said to be-
- distributed
- free
- centralized
- none of these
Q25 | A person who used his or her expertise to gain access to other people's computers to getinformation illegally or do damage is a-
- hacker
- spammer
- instant messenger
- programmer