[1] Which of the following is a term related with scanner?
A.
Laser
B.
TWAIN
C.
Cartridge
D.
Both (1) and (2)
Ans:
Both (1) and (2)
Explanation :
Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners.
[2] A nibble refers to:
A.
4 bits
B.
A value equal to a kilobyte
C.
A value equal to a megabyte
D.
The smallest unit of digital information
Ans:
4 bits
Explanation :
Nibble= 4 Bits
[3] Which of the following component is a part of RAM?
A.
Magnetic cores
B.
Micro-Processors
C.
Photoelectric cells
D.
Floppy disks
Ans:
Magnetic cores
Explanation :
Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.
[4] The software that is used to create text based documents is referred as :
A.
DBMS
B.
Suits
C.
Spreadsheets
D.
Word processor
Ans:
Word processor
Explanation :
Word processors are used to create text based documents.
[5] What is the number of function keys on a keyboard?
A.
15
B.
12
C.
11
D.
16
Ans:
12
Explanation :
There are 12 function keys from F1 to F12 on a keyboard.
[6]What does DOS stands for?
A.
Digital Operating Session
B.
Disk Operating System
C.
Digital Operating System
D.
Disk Opening System
Ans:
Disk Operating System
Explanation :
DOS stands for Disk Operating System. It is the first operating system developed by Microsoft.
[7] What acts as master software that works as a mediator between a computer user and the hardware of a computer?
A.
Application Program
B.
Motherboard
C.
Antivirus
D.
Operating System
Ans:
Operating System
Explanation :
Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.
[8] Which of the following number systems is considered as a base-10 number system?
A.
Decimal number system
B.
Binary number system
C.
Octal number system
D.
Hexadecimal number system
Ans:
Decimal number system
Explanation :
Decimal number system has unique 10 digits, that is, from 0 to 9, to represent a number and its base (or radix) is 10. The decimal number system is also called a base-10 system as it has 10 digits.
[9] Which of the following device used ‘set of beads’ to represent the unit of data?
A.
ENIAC
B.
EDVAC
C.
Abacus
D.
MARK-I
Ans:
Abacus
Explanation :
The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool with a set of beads for counting.
[10] Antikythera mechanism was mainly used to perform which computation?
A.
Astronomical calculation
B.
Logarithm
C.
Trigonometry
D.
Time calculation
Ans:
Astronomical calculation
Explanation :
The Antikythera mechanism is an ancient analogue computer and orrery used to predict astronomical positions and eclipses for calendrical and astrological purposes, as well as the Olympiads, the cycles of the ancient Olympic Games.
[11] What is the term used for measurement of how fast data moves from one place to another?
A.
data per unit
B.
bits per second
C.
bits per hour
D.
None of the above
Ans:
bits per second
Explanation :
The bit rate is quantified using the bits per second unit.
[12] Which among the following term is related to the collection of links throughout the Internet that creates an interconnected network?
A.
WWW
B.
Web
C.
World Wide Web
D.
All of the above options
Ans:
All of the above options
Explanation :
Except Wide Area Web all other terms are related to the given context.
[13] Which of the following is a binary number?
A.
10101011
B.
5600
C.
2020
D.
21
Ans:
10101011
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners.
[2] A nibble refers to:
A.
4 bits
B.
A value equal to a kilobyte
C.
A value equal to a megabyte
D.
The smallest unit of digital information
Ans:
4 bits
Explanation :
Nibble= 4 Bits
[3] Which of the following component is a part of RAM?
A.
Magnetic cores
B.
Micro-Processors
C.
Photoelectric cells
D.
Floppy disks
Ans:
Magnetic cores
Explanation :
Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.
[4] The software that is used to create text based documents is referred as :
A.
DBMS
B.
Suits
C.
Spreadsheets
D.
Word processor
Ans:
Word processor
Explanation :
Word processors are used to create text based documents.
[5] What is the number of function keys on a keyboard?
A.
15
B.
12
C.
11
D.
16
Ans:
12
Explanation :
There are 12 function keys from F1 to F12 on a keyboard.
[6]What does DOS stands for?
A.
Digital Operating Session
B.
Disk Operating System
C.
Digital Operating System
D.
Disk Opening System
Ans:
Disk Operating System
Explanation :
DOS stands for Disk Operating System. It is the first operating system developed by Microsoft.
[7] What acts as master software that works as a mediator between a computer user and the hardware of a computer?
A.
Application Program
B.
Motherboard
C.
Antivirus
D.
Operating System
Ans:
Operating System
Explanation :
Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.
[8] Which of the following number systems is considered as a base-10 number system?
A.
Decimal number system
B.
Binary number system
C.
Octal number system
D.
Hexadecimal number system
Ans:
Decimal number system
Explanation :
Decimal number system has unique 10 digits, that is, from 0 to 9, to represent a number and its base (or radix) is 10. The decimal number system is also called a base-10 system as it has 10 digits.
[9] Which of the following device used ‘set of beads’ to represent the unit of data?
A.
ENIAC
B.
EDVAC
C.
Abacus
D.
MARK-I
Ans:
Abacus
Explanation :
The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool with a set of beads for counting.
[10] Antikythera mechanism was mainly used to perform which computation?
A.
Astronomical calculation
B.
Logarithm
C.
Trigonometry
D.
Time calculation
Ans:
Astronomical calculation
Explanation :
The Antikythera mechanism is an ancient analogue computer and orrery used to predict astronomical positions and eclipses for calendrical and astrological purposes, as well as the Olympiads, the cycles of the ancient Olympic Games.
[11] What is the term used for measurement of how fast data moves from one place to another?
A.
data per unit
B.
bits per second
C.
bits per hour
D.
None of the above
Ans:
bits per second
Explanation :
The bit rate is quantified using the bits per second unit.
[12] Which among the following term is related to the collection of links throughout the Internet that creates an interconnected network?
A.
WWW
B.
Web
C.
World Wide Web
D.
All of the above options
Ans:
All of the above options
Explanation :
Except Wide Area Web all other terms are related to the given context.
[13] Which of the following is a binary number?
A.
10101011
B.
5600
C.
2020
D.
21
Ans:
10101011
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.
[4] The software that is used to create text based documents is referred as :
A.
DBMS
B.
Suits
C.
Spreadsheets
D.
Word processor
Ans:
Word processor
Explanation :
Word processors are used to create text based documents.
[5] What is the number of function keys on a keyboard?
A.
15
B.
12
C.
11
D.
16
Ans:
12
Explanation :
There are 12 function keys from F1 to F12 on a keyboard.
[6]What does DOS stands for?
A.
Digital Operating Session
B.
Disk Operating System
C.
Digital Operating System
D.
Disk Opening System
Ans:
Disk Operating System
Explanation :
DOS stands for Disk Operating System. It is the first operating system developed by Microsoft.
[7] What acts as master software that works as a mediator between a computer user and the hardware of a computer?
A.
Application Program
B.
Motherboard
C.
Antivirus
D.
Operating System
Ans:
Operating System
Explanation :
Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.
[8] Which of the following number systems is considered as a base-10 number system?
A.
Decimal number system
B.
Binary number system
C.
Octal number system
D.
Hexadecimal number system
Ans:
Decimal number system
Explanation :
Decimal number system has unique 10 digits, that is, from 0 to 9, to represent a number and its base (or radix) is 10. The decimal number system is also called a base-10 system as it has 10 digits.
[9] Which of the following device used ‘set of beads’ to represent the unit of data?
A.
ENIAC
B.
EDVAC
C.
Abacus
D.
MARK-I
Ans:
Abacus
Explanation :
The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool with a set of beads for counting.
[10] Antikythera mechanism was mainly used to perform which computation?
A.
Astronomical calculation
B.
Logarithm
C.
Trigonometry
D.
Time calculation
Ans:
Astronomical calculation
Explanation :
The Antikythera mechanism is an ancient analogue computer and orrery used to predict astronomical positions and eclipses for calendrical and astrological purposes, as well as the Olympiads, the cycles of the ancient Olympic Games.
[11] What is the term used for measurement of how fast data moves from one place to another?
A.
data per unit
B.
bits per second
C.
bits per hour
D.
None of the above
Ans:
bits per second
Explanation :
The bit rate is quantified using the bits per second unit.
[12] Which among the following term is related to the collection of links throughout the Internet that creates an interconnected network?
A.
WWW
B.
Web
C.
World Wide Web
D.
All of the above options
Ans:
All of the above options
Explanation :
Except Wide Area Web all other terms are related to the given context.
[13] Which of the following is a binary number?
A.
10101011
B.
5600
C.
2020
D.
21
Ans:
10101011
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
There are 12 function keys from F1 to F12 on a keyboard.
[6]What does DOS stands for?
A.
Digital Operating Session
B.
Disk Operating System
C.
Digital Operating System
D.
Disk Opening System
Ans:
Disk Operating System
Explanation :
DOS stands for Disk Operating System. It is the first operating system developed by Microsoft.
[7] What acts as master software that works as a mediator between a computer user and the hardware of a computer?
A.
Application Program
B.
Motherboard
C.
Antivirus
D.
Operating System
Ans:
Operating System
Explanation :
Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.
[8] Which of the following number systems is considered as a base-10 number system?
A.
Decimal number system
B.
Binary number system
C.
Octal number system
D.
Hexadecimal number system
Ans:
Decimal number system
Explanation :
Decimal number system has unique 10 digits, that is, from 0 to 9, to represent a number and its base (or radix) is 10. The decimal number system is also called a base-10 system as it has 10 digits.
[9] Which of the following device used ‘set of beads’ to represent the unit of data?
A.
ENIAC
B.
EDVAC
C.
Abacus
D.
MARK-I
Ans:
Abacus
Explanation :
The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool with a set of beads for counting.
[10] Antikythera mechanism was mainly used to perform which computation?
A.
Astronomical calculation
B.
Logarithm
C.
Trigonometry
D.
Time calculation
Ans:
Astronomical calculation
Explanation :
The Antikythera mechanism is an ancient analogue computer and orrery used to predict astronomical positions and eclipses for calendrical and astrological purposes, as well as the Olympiads, the cycles of the ancient Olympic Games.
[11] What is the term used for measurement of how fast data moves from one place to another?
A.
data per unit
B.
bits per second
C.
bits per hour
D.
None of the above
Ans:
bits per second
Explanation :
The bit rate is quantified using the bits per second unit.
[12] Which among the following term is related to the collection of links throughout the Internet that creates an interconnected network?
A.
WWW
B.
Web
C.
World Wide Web
D.
All of the above options
Ans:
All of the above options
Explanation :
Except Wide Area Web all other terms are related to the given context.
[13] Which of the following is a binary number?
A.
10101011
B.
5600
C.
2020
D.
21
Ans:
10101011
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.
[8] Which of the following number systems is considered as a base-10 number system?
A.
Decimal number system
B.
Binary number system
C.
Octal number system
D.
Hexadecimal number system
Ans:
Decimal number system
Explanation :
Decimal number system has unique 10 digits, that is, from 0 to 9, to represent a number and its base (or radix) is 10. The decimal number system is also called a base-10 system as it has 10 digits.
[9] Which of the following device used ‘set of beads’ to represent the unit of data?
A.
ENIAC
B.
EDVAC
C.
Abacus
D.
MARK-I
Ans:
Abacus
Explanation :
The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool with a set of beads for counting.
[10] Antikythera mechanism was mainly used to perform which computation?
A.
Astronomical calculation
B.
Logarithm
C.
Trigonometry
D.
Time calculation
Ans:
Astronomical calculation
Explanation :
The Antikythera mechanism is an ancient analogue computer and orrery used to predict astronomical positions and eclipses for calendrical and astrological purposes, as well as the Olympiads, the cycles of the ancient Olympic Games.
[11] What is the term used for measurement of how fast data moves from one place to another?
A.
data per unit
B.
bits per second
C.
bits per hour
D.
None of the above
Ans:
bits per second
Explanation :
The bit rate is quantified using the bits per second unit.
[12] Which among the following term is related to the collection of links throughout the Internet that creates an interconnected network?
A.
WWW
B.
Web
C.
World Wide Web
D.
All of the above options
Ans:
All of the above options
Explanation :
Except Wide Area Web all other terms are related to the given context.
[13] Which of the following is a binary number?
A.
10101011
B.
5600
C.
2020
D.
21
Ans:
10101011
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool with a set of beads for counting.
[10] Antikythera mechanism was mainly used to perform which computation?
A.
Astronomical calculation
B.
Logarithm
C.
Trigonometry
D.
Time calculation
Ans:
Astronomical calculation
Explanation :
The Antikythera mechanism is an ancient analogue computer and orrery used to predict astronomical positions and eclipses for calendrical and astrological purposes, as well as the Olympiads, the cycles of the ancient Olympic Games.
[11] What is the term used for measurement of how fast data moves from one place to another?
A.
data per unit
B.
bits per second
C.
bits per hour
D.
None of the above
Ans:
bits per second
Explanation :
The bit rate is quantified using the bits per second unit.
[12] Which among the following term is related to the collection of links throughout the Internet that creates an interconnected network?
A.
WWW
B.
Web
C.
World Wide Web
D.
All of the above options
Ans:
All of the above options
Explanation :
Except Wide Area Web all other terms are related to the given context.
[13] Which of the following is a binary number?
A.
10101011
B.
5600
C.
2020
D.
21
Ans:
10101011
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
The bit rate is quantified using the bits per second unit.
[12] Which among the following term is related to the collection of links throughout the Internet that creates an interconnected network?
A.
WWW
B.
Web
C.
World Wide Web
D.
All of the above options
Ans:
All of the above options
Explanation :
Except Wide Area Web all other terms are related to the given context.
[13] Which of the following is a binary number?
A.
10101011
B.
5600
C.
2020
D.
21
Ans:
10101011
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Binary Numbers use only '0' and '1'.
[14] What type of software must to be used to transform scanned text into a format that can be manipulated?
A.
OCR
B.
CRT
C.
RGB
D.
MIDI
Ans:
OCR
Explanation :
OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.
[15] Word processing, spreadsheet and photo-editing are examples of _.
A.
application software
B.
system software
C.
operating system software
D.
platform software
Ans:
application software
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Word processing, spreadsheet and photo-editing are examples of application software.
[16] The primary purpose of a computer is to process and convert it into information.
A.
electricity
B.
data
C.
raw material
D.
a bit
Ans:
data
Explanation :
Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information.
[17] The simultaneous processing of executing two or more programs by multiple processors is-
A.
multiprogramming
B.
multitasking
C.
time-sharing
D.
multiprocessing
Ans:
multiprocessing
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Multiprocessing is the capability of a computer to multitask, or execute more than one program or process at the same time.
[18] The first electro-mechanical computer MARK-1 was invented by _.
A.
Charles Pascal
B.
John W Mauchly
C.
Howard Aiken
D.
Clifford Berry
Ans:
Howard Aiken
Explanation :
MARK-1 invented was by Howard Aiken.
[19] What was the first electronic computer in the world?
A.
ENIAC
B.
EDSAC
C.
EDVAC
D.
UNIVAC
Ans:
ENIAC
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
ENIAC was the first electronic computer in the world.
[20] The first computer was programmed using _.
A.
Assembly language
B.
Machine language
C.
Source code
D.
Object code
Ans:
Machine language
Explanation :
The first computer was programmed using Machine Language.
[21] In which generation did multi-programming start?
A.
First generation
B.
Second generation
C.
Third generation
D.
Fourth generation
Ans:
Third generation
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Multi-programming started in third generation.
[22] Which among the following key combination can be used to search in Windows Explorer?
A.
Ctrl+F
B.
Ctrl+S
C.
Ctrl+G
D.
Alt+S
Ans:
Ctrl+F
Explanation :
Ctrl+F is the short cut key combination that can be used to search in Windows Explorer.
[23] Which of the following error occurs when software tries to access protected memory?
A.
Segmentation Fault
B.
Displaytime Error
C.
IO Error
D.
Runtime Error
Ans:
Segmentation Fault
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location.
[24] Which among the following is a term representing unit of data storage in computer memory?
A.
Pixel
B.
Decimal
C.
Octet
D.
Point
Ans:
Octet
Explanation :
Octet is another name for a byte=8bits.
[25] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A.
Haptics
B.
Caves
C.
Biometrics
D.
RFID
Ans:
Biometrics
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
Explanation :
Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
