Quiz-summary
0 of 50 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
Information
Computer Mcqs Test 5
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 50 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Computer Mcqs Test 5 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Answered
- Review
-
Question 1 of 50
1. Question
When creating a computer program, the____________designs the structure of the program?
Correct
Incorrect
-
Question 2 of 50
2. Question
Computers process data into information by working exclusively with____________?
Correct
Incorrect
-
Question 3 of 50
3. Question
Computers manipulate data in many ways, and this manipulation is called___________?
Correct
Incorrect
-
Question 4 of 50
4. Question
The ability to recover and read deleted or damaged files from a criminalโs computer is an example of a law enforcement speciality called___________?
Correct
Incorrect
-
Question 5 of 50
5. Question
Where does most data go first with in a computer memory hierarchy ?
Correct
Incorrect
-
Question 6 of 50
6. Question
The_____________data mining technique derives rules from real-world case examples?
Correct
Incorrect
-
Question 7 of 50
7. Question
_____________are used to identify a user who returns to a Website?
Correct
Incorrect
-
Question 8 of 50
8. Question
Codes consisting of lines of varying widths or lengths that are computer-readable are known as__________?
Correct
Incorrect
-
Question 9 of 50
9. Question
Why is it unethical to share copyrighted files with your friends?
Correct
Incorrect
-
Question 10 of 50
10. Question
Reusable optical storage will typically have the acronym________?
Correct
Incorrect
-
Question 11 of 50
11. Question
The most common type of storage devices are_________?
Correct
Incorrect
-
Question 12 of 50
12. Question
A device that connects to a network without the use of cables is said to be___________?
Correct
Incorrect
-
Question 13 of 50
13. Question
A person who used his or her expertise to gain access to other peopleโs computers to get information illegally or do damage is a____________?
Correct
Incorrect
-
Question 14 of 50
14. Question
To access properties of an object, the mouse technique to use is_____________?
Correct
Incorrect
-
Question 15 of 50
15. Question
A DVD is an example of a (n)___________?
Correct
Incorrect
-
Question 16 of 50
16. Question
The process of transferring files from a computer on the Internet to your computer is called_____________?
Correct
Incorrect
-
Question 17 of 50
17. Question
___________is the process of dividing the disk into tracks and sectors?
Correct
Incorrect
-
Question 18 of 50
18. Question
ASCII is a coding system that provides_____________?
Correct
Incorrect
-
Question 19 of 50
19. Question
Which part of the computer is directly involved in executing the instructions of the computer program?
Correct
Incorrect
-
Question 20 of 50
20. Question
When a computer is switched on, the booting process performs___________?
Correct
Incorrect
-
Question 21 of 50
21. Question
A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?
Correct
Incorrect
-
Question 22 of 50
22. Question
Which of the following is not a binary number?
Correct
Incorrect
-
Question 23 of 50
23. Question
Which of the following does not store data permanently?
Correct
Incorrect
-
Question 24 of 50
24. Question
Which of the following is the smallest storage?
Correct
Incorrect
-
Question 25 of 50
25. Question
Which of the following contains permanent data and gets updated during the processing of transactions?
Correct
Incorrect
-
Question 26 of 50
26. Question
A modem is connected to_____________?
Correct
Incorrect
-
Question 27 of 50
27. Question
Large transaction processing systems in automated organisations use___________?
Correct
Incorrect
-
Question 28 of 50
28. Question
Which of the following is not a storage medium?
Correct
Incorrect
-
Question 29 of 50
29. Question
The computer abbreviation KB usually means____________?
Correct
Incorrect
-
Question 30 of 50
30. Question
The typical computer criminal is a(n)____________?
Correct
Incorrect
-
Question 31 of 50
31. Question
The common name for the crime of stealing passwords is____________?
Correct
Incorrect
-
Question 32 of 50
32. Question
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Correct
Incorrect
-
Question 33 of 50
33. Question
Malicious software is known as____________?
Correct
Incorrect
-
Question 34 of 50
34. Question
A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Correct
Incorrect
-
Question 35 of 50
35. Question
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
Correct
Incorrect
-
Question 36 of 50
36. Question
In 1999, the Melissa virus was a widely publicised:____________?
Correct
Incorrect
-
Question 37 of 50
37. Question
What type of virus uses computer hosts to reproduce itself?
Correct
Incorrect
-
Question 38 of 50
38. Question
The thing that eventually terminates a worm virus is a lack of:
Correct
Incorrect
-
Question 39 of 50
39. Question
When a logic bomb is activated by a time-related event, it is known as a____________?
Correct
Incorrect
-
Question 40 of 50
40. Question
What is the name of an application program that gathers user information and sends it to someone through the Internet?
Correct
Incorrect
-
Question 41 of 50
41. Question
____________is the measurement of things such as fingerprints and retinal scans used for security access?
Correct
Incorrect
-
Question 42 of 50
42. Question
What is the most common tool used to restrict access to a computer system?
Correct
Incorrect
-
Question 43 of 50
43. Question
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
Correct
Incorrect
-
Question 44 of 50
44. Question
The scrambling of code is known as___________?
Correct
Incorrect
-
Question 45 of 50
45. Question
To prevent the loss of data during power failures, use a(n)_____________?
Correct
Incorrect
-
Question 46 of 50
46. Question
__________is defined as any crime completed through the use of computer technology?
Correct
Incorrect
-
Question 47 of 50
47. Question
___________refers to electronic trespassing or criminal hacking?
Correct
Incorrect
-
Question 48 of 50
48. Question
The first electronic computer was developed by____________?
Correct
Incorrect
-
Question 49 of 50
49. Question
_____________computers operates essentially by counting?
Correct
Incorrect
-
Question 50 of 50
50. Question
____________computer is small general purpose micro computer, but larger than portable computer?
Correct
Incorrect