Home
Current Affairs January 2024

What is the correct answer?

4

A path by which communication is achieved between a central processor and other devices is called

A. Audit trail

B. Network

C. Bus

D. Channel

Correct Answer :

C. Bus


Related Questions

What is the correct answer?

4

The BIOS is the abbreviation of ________.

A. Basic Input Output System

B. Best Input Output System

C. Basic Input Output Symbol

D. Base Input Output System

What is the correct answer?

4

ASCII stands for

A. American standard code for information interchange

B. All purpose scientific code for information interchange

C. American security code for information interchange

D. American Scientific code for information interchange

What is the correct answer?

4

Symbolic languages were developed in

A. 1962

B. 1950

C. 1974

D. 1980

What is the correct answer?

4

ASCII and EBCDIC are the popular character coding systems. What does ASCII stand for?

A. American Stable Code for International Interchange

B. American Standard Case for Institutional Interchange

C. American Standard Code for Information Interchange

D. American Standard Code for Interchange Information

What is the correct answer?

4

Junk e-mail is also called

A. spam

B. spoof

C. sniffer script

D. spool

What is the correct answer?

4

Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?

A. Daughter board

B. Motherboard

C. Father board

D. Breadboard

What is the correct answer?

4

What does DMA stand for?

A. Distinct Memory Access

B. Direct Memory Access

C. Direct Module Access

D. Direct Memory Allocation

What is the correct answer?

4

Plotter accuracy is measured in terms of repeatability and

A. Buffer size

B. Resolution

C. Vertical dimensions

D. Intelligence

What is the correct answer?

4

Which of the following produces the best quality graphics reproduction?

A. Laser printer

B. Ink jet printer

C. Plotter

D. Dot matrix printer

What is the correct answer?

4

________ is the process of dividing the disk into tracks and sectors.

A. Tracking

B. Formatting

C. Crashing

D. Allotting

What is the correct answer?

4

The two major types of computer chips are

A. External memory chip

B. Primary memory chip

C. Microprocessor chip

D. Both b and c

What is the correct answer?

4

In analogue computer

A. Input is first converted to digital form

B. Input is never converted to digital form

C. Output is displayed in digital form

D. All of above

What is the correct answer?

4

All of the following are examples of storage devices EXCEPT:

A. hard disk drives

B. printers

C. floppy disk drives

D. CD drives

What is the correct answer?

4

The basic operations performed by a computer are

A. Arithmetic operation

B. Logical operation

C. Storage and relative

D. All the above

What is the correct answer?

4

Which of the following is not computer language?

A. High level language

B. Medium level language

C. Low level language

D. All of the above

What is the correct answer?

4

Which was the most popular first generation computer?

A. IBM 1650

B. IBM 360

C. IBM 1130

D. IBM 2700

What is the correct answer?

4

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse.

B. Virus.

C. Time bomb.

D. Time-related bomb sequence.

What is the correct answer?

4

Multi user systems provided cost savings for small business because they use a single processing unit to link several

A. Personal computers

B. Workstations

C. Dumb terminals

D. Mainframes

What is the correct answer?

4

IBM 1401 is

A. First Generation Computer

B. Second Generation Computer

C. Third Generation Computer

D. Fourth Generation Computer

What is the correct answer?

4

Perforated paper used as input of output media is known as

A. paper tapes

B. magnetic tape

C. punched papers tape

D. card punch

What is the correct answer?

4

Why is it unethical to share copyrighted files with your friends?

A. It is not unethical, because it is legal.

B. It is unethical because the files are being given for free.

C. Sharing copyrighted files without permission breaks copyright laws.

D. It is not unethical because the files are being given for free.

What is the correct answer?

4

What type of memory is not directly addressable by the CPU and requires special softw3are called EMS (expanded memory specification)?

A. Extended

B. Expanded

C. Base

D. Conventional

What is the correct answer?

4

ASCII is a coding system that provides

A. 256 different characters

B. 512 different characters

C. 1024 different characters

D. 128 different characters

What is the correct answer?

4

Regarding a VDU, Which statement is more correct?

A. It is an output device

B. It is an input device

C. It is a peripheral device

D. It is hardware item

What is the correct answer?

4

A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is

A. Bug

B. Vice

C. Lice

D. Worm

What is the correct answer?

4

________is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

What is the correct answer?

4

Which is not a comptuer of first generation?

A. ENIAC

B. UNIVAC

C. IBM 360

D. IBM 1401

What is the correct answer?

4

A set of rods where numbers were carved and used for multiplication and division aids is known as

A. Pascaline

B. Napier's Bones

C. Stepped Reckoner

D. Slide Rule

What is the correct answer?

4

Programs designed to perform specific tasks is known as

A. system software

B. application software

C. utility programs

D. operating system

What is the correct answer?

4

A path by which communication is achieved between a central processor and other devices is called

A. Audit trail

B. Network

C. Bus

D. Channel