1. Computers manipulate data in many ways, and this manipulation is called.........
(a) upgrading
(b) processing
(c) batching
(d) utilizing
(b) processing
(c) batching
(d) utilizing
2. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
(a) robotics
(b) simulation
(c) computer forensics
(d) animation
(b) simulation
(c) computer forensics
(d) animation
3. Where does most data go first with in a computer memory hierarchy ?
(a) RAM
(b) ROM
(c) BIOS
(d) CACHE
(b) ROM
(c) BIOS
(d) CACHE
4. The………….data mining technique derives rules from real-world case examples.
(a) Rule discover
(b) Signal processing
(b) Signal processing
(c) Neural nets
(d) Case-based reasoning
(d) Case-based reasoning
5. …………….are used to identify a user who returns to a Website
(a) Cookies
(b) Plug-ins
(b) Plug-ins
(c) Scripts
(d) ASPs
(d) ASPs
6. Codes consisting of lines of varying widths or lengths that are computer-readable are known as
(a) an ASCII code
(b) a magnetic tape
(b) a magnetic tape
(c) an OCR scanner
(d) a bar code
(d) a bar code
7. Why is it unethical to share copyrighted files with your friends?
(a) It is not unethical, because it is legal.
(b) It is unethical because the files are being given for free.
(c) Sharing copyrighted files without permission breaks copyright laws.
(d) It is not unethical because the files are being given for free.
8. Reusable optical storage will typically have the acronym
(a) CD
(b) DVD
(c) ROM
(d) RW
(a) CD
(b) DVD
(c) ROM
(d) RW
9. The most common type of storage devices are
(a) Steel
(b) optical
(c) magnetic
(d) flash
(a) Steel
(b) optical
(c) magnetic
(d) flash
10. A device that connects to a network without the use of cables is said to be
(a) Distributed
(b) free
(c) centralized
(d) none of these
(a) Distributed
(b) free
(c) centralized
(d) none of these
More MCQs on Fundamentals of Computers
0 Comments
Post a Comment