Directions: In the questions given below, four options have been given. Click on the option which you think is the RIGHT ANSWER to the question.
Question |
---|
1. A computer virus normally attaches itself to another computer programme known as a |
2. One byte consists of - |
3. The amount of time required by a storage device to retrieve data and programmes is its |
4. ENIAC was |
5. Which of these describes attempts by individuals to obtain confidential information from a computer user by falsifying their identity? |
6. The first computer made available for commercial use was - |
7. A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage can be called a |
8. A 32-bit word computer can access _____ bytes at a time. |
9. The process of transferring files from the Internet to your computer is called - |
10. The ____ shows all the web sites any pages that you have visited one a period of time. |
11. The language which provides basic building blocks for web pages is known as - |
12. In the URL, http//:www.leadthecompetition.in, the portion labelled http is the ____ |
13. Which of the following is a read only memory storage device? |
Question | |
---|---|
14. A repair for a known software bug usually available at no charge on the internet is called a | |
15. Which of the following connects the computer to a telephone line? | |
16. What is an e-mail attachment? | |
17. If a file has a '.bak' extension it refers usually to - | |
18. The window which shows icons for things like the mouse, sound, and display is called | |
19. What kind of file has an extension '.mpg'? | |
20. Which of the following is not real security and privacy risks? | |
21. Which of the following defines the ability to recover and read deleted or damaged files from a criminal’s computer? | |
22. The difference between people with internet access and those without it is known as the - | |
23. The smallest unit in a digital system is a | |
24. Which of the following is a web browser? | |
25. Junk e-mail is also called ____ | |