Computer Awareness Quiz Set 18

Contenders can practice the Given Questions And Answers for Computer Awareness which are provided in the form of Quiz below. So these will be helpful for further competitive examinations and candidates can get a high score by practicing these Questions.

Computer Awareness Quiz Set 18

1. Which of the following is a cache memory that is used to speed up the process of storing and accessing data from the host hard disk?
 
 
 
 

2. SAN, Google Docs, and Network drive are all examples of _________ Storage
 
 
 
 

3. Unauthorized access to restricted systems or resources is referred as __________
 
 
 
 

4. _______ is a method in which multiple communication devices are connected to one another efficiently.
 
 
 
 
 

5. __________ distributed as freeware, but it requires the user to view advertisements to use the software.
 
 
 
 

6. Which of the following involves sending several thousand identical messages to an electronic mailbox in order to overflow it?
 
 
 
 

7. RAID stands for________
 
 
 
 

8. The original ASCII code used___bits of each byte, reserving that last bit for error checking?
 
 
 
 
 

9. Which is used to display one or more web pages within another normal web page?
 
 
 
 

10. World Wide Web uses which of the following protocol?
 
 
 
 

11. __________is a feature supported by many word processors that enables you to surround a picture or diagram with text.
 
 
 
 

12. It is the process in which control information is added to a data packet as it moves through the layers of a communication module is termed as ______
 
 
 
 

13. The comparison of processing speed of different computer systems is termed as ______
 
 
 
 

14. Which describes physical storage structure of the database?
 
 
 
 

15. ________ is a mode in which a computer is turned off but saves its state to resume when it is turned on again
 
 
 
 
 

16. Which is used to change the text in Microsoft Word from uppercase to lowercase or a capital letter at the beginning of every word?
 
 
 
 

17. Which of the following is used to assign numerical value to each characters?
 
 
 
 

18. ______ is a small application that performs one specific task that runs within the scope of a dedicated widget engine or a larger program.
 
 
 
 

19. Which is designed to reorganize noncontiguous files into contiguous files and optimize their placement on the hard drive?
 
 
 
 

20. ______ is self-replicating malware that spreads through instant messaging networks.
 
 
 
 

21. A collection of conceptual tools for describing data, relationships, semantics & constraints is referred as ______
 
 
 
 

22. _______ is a high-performance video RAM that is dual ported.
 
 
 
 

23. A digital multimedia file available on the Internet to be downloaded is termed as ________
 
 
 
 

24. The do’s and don’ts of online communication is termed as ______
 
 
 
 

25. An example for Microblogging website is ______
 
 
 
 

26. Which of the following is a group of computers that are controlled from a single source and run related software programs and scripts?
 
 
 
 

27. The process of extracting large amount of information from a website is known as _______
 
 
 
 
 

28. An example for fourth generation language(4GL) is ______
 
 
 
 

29. The most frequently used instructions of a computer program are likely to be fetched from ______
 
 
 
 


 

LEAVE A REPLY

Please enter your comment!
Please enter your name here