Junk e-mail is also called_________?
A. SPAM
B. spoof
C. sniffer script
D. spool
Which statement describe “Hackers”?
A. all have the same motive
B. BREAK INTO OTHER PEOPLE’S COMPUTERS
C. may legally break into computers as long as they do not do any damage
D. are people who are allergic to computers
What type of computers are client computers (most of the time) in a client-server system?
A. Mainframe
B. Mini-computer
C. MICROCOMPUTER
D. PDA
A computer cannot ‘boot’ if it does not have the__________?
A. Compiler
B. Loader
C. OPERATING SYSTEM
D. Assembler
The amount of vertical space between lines of text in a document is called___________?
A. double-space
B. LINE SPACING
C. single space
D. vertical spacing
Example of non-numeric data is_________?
A. EMPLOYEE ADDRESS
B. Examination score
C. Bank balance
D. All of these
What is embedded system?
A. The programme which arrives by being wrapped in box.
B. The programme which is the permanent part of the computer
C. The computer which is the part of a big computer
D. THE COMPUTER AND SOFTWARE SYSTEM THAT CONTROL THE MACHINE
First page of Website is termed as__________?
A. HOMEPAGE
B. Index
C. JAVA script
D. Bookmark
When a file is saved for the first time?
A. a copy is automatically printed
B. IT MUST BE GIVEN A NAME TO IDENTIFY IT
C. it does not need a name
D. it only needs a name if it is not going to be printed
Where are data and programmes stored when the processor uses them?
A. MAIN MEMORY
B. Secondary memory
C. Disk memory
D. Programme memory
__________represents raw facts, where-as__________is data made meaningful?
A. Information, reporting
B. DATA, INFORMATION
C. Information, bits
D. Records, bytes
Tags:
Ace these Mcqs also: