Directions: In the questions given below, four options have been given. Click on the option which you think is the RIGHT ANSWER to the question.

Score 0


1. A computer virus normally attaches itself to another computer programme known as a

2. One byte consists of -

3. The amount of time required by a storage device to retrieve data and programmes is its

4. ENIAC was

5. Which of these describes attempts by individuals to obtain confidential information from a computer user by falsifying their identity?

6. The first computer made available for commercial use was -

7. A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage can be called a

8. A 32-bit word computer can access _____ bytes at a time.

9. The process of transferring files from the Internet to your computer is called -

10. The ____ shows all the web sites any pages that you have visited one a period of time.

11. The language which provides basic building blocks for web pages is known as -

12. In the URL, http//:www.leadthecompetition.in, the portion labelled http is the ____

13. Which of the following is a read only memory storage device?


14. A repair for a known software bug usually available at no charge on the internet is called a

15. Which of the following connects the computer to a telephone line?

16. What is an e-mail attachment?

17. If a file has a '.bak' extension it refers usually to -

18. The window which shows icons for things like the mouse, sound, and display is called

19. What kind of file has an extension '.mpg'?

20. Which of the following is not real security and privacy risks?

21. Which of the following defines the ability to recover and read deleted or damaged files from a criminal’s computer?

22. The difference between people with internet access and those without it is known as the -

23. The smallest unit in a digital system is a

24. Which of the following is a web browser?

25. Junk e-mail is also called ____