Computer Awareness for Upcoming Exams Set 117

  1. Relational, equality, component selection, class member conditional and comma are _____ operator?
    A) assignment
    B) shift
    C) binary
    D) unary
    View Answer
    Option C

  2. Which of the following provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data?
    A) DBMS
    B) Database
    C) Tables
    D) Centralization of data
    View Answer
    Option A
    Explanation:
    A database management system (DBMS) is system software for creating and managing databases. The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data.

  3. “Myspace” is a name of _____?
    A) Application Development Company
    B) News Agency
    C) Social Media Platform
    D) Search Engine
    View Answer
    Option C
    Explanation:

  4. What are the small application program called that ensures form completion and providing of animation on a web page?
    A) Applets
    B) Flash
    C) cookies
    D) Bookmarks
    View Answer
    Option A
    Explanation:
    A small application program that is used to perform one or more small functions is known as an Applet. In web technology, an Applets is launched from a web page and then it is executed using a virtual machine to perform small functional on a web page like animations.

  5. Which was the world’s first electronic digital programmable computer?
    A) Z2
    B) Z3
    C) Colossus
    D) Enigma
    View Answer
    Option C
    Explanation:
    Colossus was the world’s first electronic digital programmable computer which used a large number of valves.

  6. Zip, Gzip, RAR, StuffIt, and 7z are examples of _____?
    A) File Modifier
    B) Decryption
    C) Encryption
    D) File Compression
    View Answer
    Option D
    Explanation:
    File compression is used to reduce the file size of one or more files.

  7. Distributed data processing configuration where all activities passes through a centrally located computer is?
    A) spider network
    B) hierarchical network
    C) data control network
    D) ring network
    View Answer
    Option A

  8. What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?
    A) Malware
    B) Key-logger
    C) Spyware
    D) Backdoors
    View Answer
    Option A
    Explanation:
    Malware is short for malicious software. Malware is a broad term that encompasses computer viruses, worms, Trojan horses, spyware, adware, and others. Malware is designed to interfere with normal computer operation, usually giving hackers a chance to gain access to your computer and collect sensitive personal information.

  9. A ___________ condition occurs when a software program depends on the timing of one or more processes to function correctly?
    A) dead
    B) fear
    C) race
    D) load
    View Answer
    Option C
    Explanation:

  10. If a piece of code can be implemented as a macro or as an inline function, which of the following factors favour implementation as an inline function?
    A) Source code size
    B) Interacting with other components in the correct way
    C) Flexibility to manipulate as a pointer
    D) Both B and C
    View Answer
    Option D

Related posts