Computer Awareness Quiz Set 16

In this page, Aspirants can get the information about the Questions And Answers for Computer Awareness in the form of Quiz. We had given with an explanation for each and every Question.

Computer Awareness Quiz Set 16

1. The unauthorized activities of malicious software is called __________
 
 
 
 

2. Which of the following is a computer language for informing the DBMS regarding the data structure?
 
 
 
 

3. Which of the following must be unique within a database?
 
 
 
 

4. Which of the following is used to replace font on all slides?
 
 
 
 

5. In MS-Word, “Ctrl + W” is used to ____
 
 
 
 

6. _______ describes a network in which a company’s data and applications are stored at offsite data centres that are accessed over the Internet?
 
 
 
 

7. Each tuple is divided into fields called ______
 
 
 
 

8. A device driver acts like a ______ between the device & OS
 
 
 
 

9. Which type of computers uses the 8-bit code called EBCDIC?
 
 
 
 

10. In Operating Systems, resource management can be done through ______
 
 
 
 

11. Which of the following device enables the microprocessor to read data from the external devices?
 
 
 
 

12. Logical memory can be divided into fixed-sized blocks called ________.
 
 
 
 

13. Which of the following uses storage protocol rather than networking protocol?
 
 
 
 

14. Which of the following is a technique to avoid starvation in a scheduling system?
 
 
 
 

15. Swap space is a space on a hard disk used as the ________ extension of a computer’s real memory (RAM).
 
 
 
 

16. Which of the following device is used to avoid loading during read operation?
 
 
 
 

17. Which of the following generally occurs in a Priority based scheduling System?
 
 
 
 

18. Physical memory can be divided into fixed-sized blocks called ________.
 
 
 
 

19. Which of the following error will be handled by the operating system?
 
 
 
 

20. _________ is a collection of data 8 bytes (or 64 bits) long, maintained by the operating system.
 
 
 
 

21. In computer processing, the processor fetches instruction from _____
 
 
 
 

22. Which of the following is generated by CPU during a program execution.?
 
 
 
 

23. Which of the following contains the address of an instruction to be fetched?
 
 
 
 

24. Which of the following contains the instruction most recently fetched?
 
 
 
 

25. Which of the following stores copies of the data from frequently used main memory locations?
 
 
 
 

26. Software may trigger an interrupt by executing a special operation called a _______
 
 
 
 

27. EULA stands for _______
 
 
 
 

28. CPU can access _____ memory directly.
 
 
 
 


 

LEAVE A REPLY

Please enter your comment!
Please enter your name here