Global MCQ Practice

🌐 Total MCQ
🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books

Computer Fundamentals Quiz 21 (25 MCQs)

Quiz Instructions:

Select an option to see the correct answer instantly.

1. Something you have to have to survive.
2. Spyware is best defined as software that _____
3. A person who uses his expertise to gain access to other people's computers to get information illegally or to cause damage is a
4. What kind of computer has a separate keyboard, mouse, CPU, and monitor?
5. What does the term Peripheral mean?
6. Which of the following programming language types was created first?
7. What is true about a hard drive?
8. Exporting is when:
9. Evaluate the following Java expression, if x=3, y=5, and z=10:++z + y-y + z + x++
10. What is sleep mode on your computer?
11. Windows, OS X, and Linux are examples of
12. Abbreviated "MB", this unit is 1024 KB (kilobytes) and is often used to measure the size of large files.
13. Which component is responsible for holding data, instructions and information in the computer when processing is taking place?
14. How would you classify these file extensions:.jpg, .gif, .png, .tiff, .bmp.
15. The finite number of bytes in any standard integer type limits the number of different values that the type can hold. The range of values for a signed standard integer type depends on the encoding scheme for negative values. Encoding schemes for negative values include:two's complement _____ one's complement _____ sign magnitude _____
16. Which of the following is not a web server?
17. Which of the following is a task that the operating system is NOT responsible for?
18. Suppose you want to find pages that contain the word German but not the word Shepherd. Which search would achieve this?
19. The art of cracking into a computer to steal information is called?
20. An attachment can be
21. People who accept tasks from computer users processes it and then return user there complete tasks are considered as
22. . Input, processing, output and storage are collectively referred to as:
23. A printer is an _____ device
24. An Internet security protocol that ensures secure data communication by encrypting the information transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site is not misused.
25. Consists of four steps; input step, process step, output step, and store step.
🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books