Computer Awareness Questions Practice Question and Answer
8 4 Q:
6177ef0e9909565b23544d4a 4 Q:
60a21966f98a5977251404bc 4 Q:
6138942e3ee2bf25f5187111 4 Q:
609391366481f36316ea3e92 5 Q:
61b8b28ea9d1da035de4f2e8 5 Q:
61b8ba5cb700dd1b9f6d0353 5 Q:
61b8bb8ca9d1da035de50355 5 Q:
60a25ee2f98a59772514d2b1
Q: A translator for the assembly language to machine language is
1054 16177ef0e9909565b23544d4a
6177ef0e9909565b23544d4a- 1Assemblertrue
- 2Compilerfalse
- 3Linkerfalse
- 4Interpreterfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Assembler "
Q: abcd@yahoo.com is an example of ____
1053 060a21966f98a5977251404bc
60a21966f98a5977251404bc- 1Websitefalse
- 2Serverfalse
- 3Domain namefalse
- 4E-mail idtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "E-mail id "
Q: What is the capacity of computer?
1053 06138942e3ee2bf25f5187111
6138942e3ee2bf25f5187111- 1Lowfalse
- 2highfalse
- 3limitedtrue
- 4Unlimitedfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "limited"
Q: In the context of computing, a byte is equal to bits.
1051 0609391366481f36316ea3e92
609391366481f36316ea3e92- 14false
- 224false
- 38true
- 416false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "8"
Q: All of the following are examples of real security and privacy risk except _____.
1049 061b8b28ea9d1da035de4f2e8
61b8b28ea9d1da035de4f2e8- 1Hackersfalse
- 2Spamfalse
- 3Virusfalse
- 4Identity Theftfalse
- 5None of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 5. "None of these"
Q: What is the primary difference between virus and worm?
1049 061b8ba5cb700dd1b9f6d0353
61b8ba5cb700dd1b9f6d0353- 1A worm has the ability to self-propagate from the infected computer of the user to other computers.false
- 2The worm is usually written by a cracker - script bunnies do not have the skill of worm program developmenttrue
- 3Viruses are very harmful for the computers it infects; Worm is not such a serious problem.false
- 4Antivirus is effective for fighting software, not for fighting wormsfalse
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "The worm is usually written by a cracker - script bunnies do not have the skill of worm program development"
Q: If you want to share broadband internet connection, you have to install _________ on the network.
1046 061b8bb8ca9d1da035de50355
61b8bb8ca9d1da035de50355- 1Routerfalse
- 2Modemtrue
- 3Nodefalse
- 4Cablefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Modem"
Q: A memory device in which a location is identified by its content rather than by name is known as _____?
1042 060a25ee2f98a59772514d2b1
60a25ee2f98a59772514d2b1- 1Associative storagetrue
- 2Punched cardfalse
- 3Bufferfalse
- 4Magnetic tapefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Associative storage "
en42445popular

