Twitter Facebook LinkedIn RSS Feed Email

Tuesday 24 June 2014

PROBLEMS ON AVERAGE

Q. 1. All of the following are examples of real security and privacy risks EXCEPT :
(1) Hackers
(2) Spam
(3) Viruses
(4) Identity theft
(5) None of these
Ans - 2

Q.2. A process known as --------------- is used by large retailers to study trends.
(1) Data mining
(2) Data selection
(3) POS
(4) Data conversion
(5) None of these
Ans - 1

Q.3.Which of the following is NOT one of the four major data processing functions of a computer ?
(1) Gathering data
(2) processing data into information
(3) Analyzing the data or information
(4) Storing the data or information
(5) None of these
Ans - 3

Q.4. Is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(1) Nanoscience
(2) Microelectrodes
(3) Computer forensics
(4)   Artificial intelligence
(5)   None of these
Ans - 1

Q.5. ---------------- is data that has been organized or presented in a meaningful fashion.
(1) A process
(2) Software
(3) Storage
(4) Information
(5) None of these
Ans - 4

Q.6.Computer gather data, which means that they allow users to -------------- data.
(1) Present
(2)  Input
(3) Output
(4) Store
(5) None of these
Ans - 2

Q. 7.After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered :
(1) Data
(2) Output
(3) Input
(4) The process
(5) None of these
Ans - 2

Q. 8. Computers use the ----------- language to process data.
(1) Processing
(2) Kilobyte
(3) Binary
(4)  Representational
(5) None of these
Ans - 3

Q.9. Computers process data into information by working exculsively with :
(1) Multimedia
(2) Words
(3) Characters
(4) Numbers
(5) None of these
Ans - 4

Q.10. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of .
(1) Eight bytes
(2) Eight kilobytes
(3) Eight character
(4) Eight bits
(5) None of these
Ans - 4

0 comments:

Post a Comment