Author name: Umar Draz

educationist

To move a copy of file from one computer to another over a communication channel is called?

A. File transfer
B. File encryption
C. File modification
D. File copying
Correct answer is: A. File transfer

                                      provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously?

A. Multitasking
B. Multithreading
C. Multiprocessin g
D. Multicomputin g
Correct answer is: A. Multitasking

All of the following are examples of real security and privacy risks EXCEPT                           ?

A. hackers
B. Spam
C. Viruses
D. identity theft
Correct answer is: B. Spam

Where does most data go first with in a computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE
Correct answer is: A. RAM

A DVD is an example of a (n)                        ?

A. hard disk
B. optical disc
C. output device
D. solid-state storage device
Correct answer is: B. optical disc

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file
Correct answer is: D. Master file

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a                             ?

A. Trojan horse.
B. Virus.
C. Time bomb.
D. Time- related bomb sequence.
Correct answer is: B. Virus.

To prevent the loss of data during power failures, use a(n)                             ?

A. Encryption
B. Surge
C. Firewall
D. UPS
Correct answer is: D. UPS

Touch Screen is                        ?

A. Input device
B. Output
C. Both A & B
D. None of
Correct answer is: C. Both A & B

Computers, combine both measuring and counting, are called                                   ?

A. Analog
B. Digital
C. Hybrid
D. All of these
Correct answer is: C. Hybrid

Scroll to Top