Author name: Umar Draz

educationist

Computers manipulate data in many ways, and this manipulation is called                        ?

A. upgrading
B. processing
C. batching
D. utilizing
Correct answer is: B. processing

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a                           ?

A. Hacker
B. spammer
C. instant messenger
D. programmer
Correct answer is: A. Hacker

Which of the following does not store data permanently?

A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Correct answer is: B. RAM

Malicious software is known as                           ?

A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware
Correct answer is: B. Malware.

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)                        ?

A. Hacker- proof program
B. Firewall
C. Hacker- resistant server
D. Encryption safe wall
Correct answer is: B. Firewall

                           computer are of large size?

A. Micro
B. Mainframe
C. Super
D. Mini
Correct answer is: B. Mainframe

NOS stands for                               ?

A. Node operating
B. Non-open software
C. Network Operating
D. Non- operating
Correct answer is: C. Network Operating

A(n)                                 appearing on a web page opens another document when clicked.

A. anchor
B. URL
C. hyperlink
D. reference
Correct answer is: C. hyperlink

A set of rules for telling the computer what operations to perform is called a                               ?

A. procedural language
B. structures
C. natural language
D. programming language
Correct answer is: D. programming language

Memory unit is one part of                           ?

A. Input device
B. Control unit
C. Output device
D. Central Processing
Correct answer is: D. Central Processing

Join Our WhatsApp Channel! ×
Scroll to Top