Q. 1. All of the following are examples of real security and privacy risks EXCEPT :
(1) Hackers
(2) Spam
(3) Viruses
(4) Identity theft
(5) None of these
Ans - 2
Q.2. A process known as --------------- is used by large retailers to study trends.
(1) Data mining
(2) Data selection
(3) POS
(4) Data conversion
(5) None of these
Ans - 1
Q.3.Which of the following is NOT one of the four major data processing functions of a computer ?
(1) Gathering data
(2) processing data into information
(3) Analyzing the data or information
(4) Storing the data or information
(5) None of these
Ans - 3
Q.4. Is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(1) Nanoscience
(2) Microelectrodes
(3) Computer forensics
(4) Artificial intelligence
(5) None of these
Ans - 1
Q.5. ---------------- is data that has been organized or presented in a meaningful fashion.
(1) A process
(2) Software
(3) Storage
(4) Information
(5) None of these
Ans - 4
Q.6.Computer gather data, which means that they allow users to -------------- data.
(1) Present
(2) Input
(3) Output
(4) Store
(5) None of these
Ans - 2
Q. 7.After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered :
(1) Data
(2) Output
(3) Input
(4) The process
(5) None of these
Ans - 2
Q. 8. Computers use the ----------- language to process data.
(1) Processing
(2) Kilobyte
(3) Binary
(4) Representational
(5) None of these
Ans - 3
Q.9. Computers process data into information by working exculsively with :
(1) Multimedia
(2) Words
(3) Characters
(4) Numbers
(5) None of these
Ans - 4
Q.10. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of .
(1) Eight bytes
(2) Eight kilobytes
(3) Eight character
(4) Eight bits
(5) None of these
Ans - 4
(1) Hackers
(2) Spam
(3) Viruses
(4) Identity theft
(5) None of these
Ans - 2
Q.2. A process known as --------------- is used by large retailers to study trends.
(1) Data mining
(2) Data selection
(3) POS
(4) Data conversion
(5) None of these
Ans - 1
Q.3.Which of the following is NOT one of the four major data processing functions of a computer ?
(1) Gathering data
(2) processing data into information
(3) Analyzing the data or information
(4) Storing the data or information
(5) None of these
Ans - 3
Q.4. Is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(1) Nanoscience
(2) Microelectrodes
(3) Computer forensics
(4) Artificial intelligence
(5) None of these
Ans - 1
Q.5. ---------------- is data that has been organized or presented in a meaningful fashion.
(1) A process
(2) Software
(3) Storage
(4) Information
(5) None of these
Ans - 4
Q.6.Computer gather data, which means that they allow users to -------------- data.
(1) Present
(2) Input
(3) Output
(4) Store
(5) None of these
Ans - 2
Q. 7.After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered :
(1) Data
(2) Output
(3) Input
(4) The process
(5) None of these
Ans - 2
Q. 8. Computers use the ----------- language to process data.
(1) Processing
(2) Kilobyte
(3) Binary
(4) Representational
(5) None of these
Ans - 3
Q.9. Computers process data into information by working exculsively with :
(1) Multimedia
(2) Words
(3) Characters
(4) Numbers
(5) None of these
Ans - 4
Q.10. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of .
(1) Eight bytes
(2) Eight kilobytes
(3) Eight character
(4) Eight bits
(5) None of these
Ans - 4
0 comments:
Post a Comment