Malicious software is known as                           ?

A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware
Correct answer is: B. Malware.

Which of the following does not store data permanently?

A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Correct answer is: B. RAM

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a                           ?

A. Hacker
B. spammer
C. instant messenger
D. programmer
Correct answer is: A. Hacker

Computers manipulate data in many ways, and this manipulation is called                        ?

A. upgrading
B. processing
C. batching
D. utilizing
Correct answer is: B. processing

A                                   is an additional set of commands that the computer displays after you make a selection from the main menu?

A. dialog box
B. submenu
C. menu selection
D. All of the above
Correct answer is: A. dialog box

You use a(n)                        such as a keyboard or mouse, to input information?

A. output device
B. input device
C. storage device
D. processing device
Correct answer is: B. input device

RAM can be treated as the                           for the computer’s processor?

A. factory
B. operating room
C. waiting room
D. planning room
Correct answer is: C. waiting room

BIOS stands for                      ?

A. Basic Input Output system
B. Binary Input output system
C. Basic Input Off system
D. all the above
Correct answer is: A. Basic Input Output system

Unwanted repetitious messages, such as unsolicited bulk e-mail is known as                    ?

A. Spam
B. Trash
C. Calibri
D. Courier
Correct answer is: A. Spam

An error in software or hardware is called a bug. What is the alternative computer jargon for it?

A. Leech
B. Squid
C. Slug
D. Glitch
Correct answer is: D. Glitch

Scroll to Top