Home
Current Affairs January 2024

What is the correct answer?

4

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

A. Hacker

B. spammer

C. instant messenger

D. programmer

Correct Answer :

A. Hacker


Related Questions

What is the correct answer?

4

The brain of any computer system is

A. ALU

B. Memory

C. CPU

D. Control unit

What is the correct answer?

4

174. When was the X window system born?

A. 1984

B. 1989

C. 1988

D. 1990

What is the correct answer?

4

A Compiler is

A. a combination of computer hardware

B. a program which translates from one high-level language to another

C. a program which translates from one high-level to a machine level language

D. None of these

What is the correct answer?

4

CD-ROM is a

A. Semiconductor memory

B. Memory register

C. Magnetic memory

D. None of above

What is the correct answer?

4

Which of the following is called low level languages?

A. Machine language

B. Assembly language

C. Both of the above

D. None of above

What is the correct answer?

4

Which one of the following is NOT a computer language

A. MS-Excel

B. BASIC

C. COBOL

D. C++

What is the correct answer?

4

WAN is a most used abbreviation in Networking, what is its full form?

A. WAP Area Network

B. Wide Area Network

C. Wide Array of Network

D. Wireless Access Network

What is the correct answer?

4

Which of the following code used in present day computing was developed by IBM Corporation?

A. ASCII

B. Hollerith Code

C. Baudot Code

D. EBCDIC Code

What is the correct answer?

4

When was the first electro-mechanical computer developed?

A. 1880

B. 1990

C. 1944

D. None of above

What is the correct answer?

4

A floppy disk contains

A. Circular tracks only

B. Sectors only

C. Both circular tracks and sectors

D. None of the above

What is the correct answer?

4

Snowbol is an/a________

A. Operating system

B. HLL

C. Software

D. Search engine

What is the correct answer?

4

Who invented punched cards?

A. Charles Babbage

B. Dr. Herman Hollerith

C. Howard Aikin

D. Joseph Jacquard

What is the correct answer?

4

Unwanted repetitious messages, such as unsolicited bulk e-mail is known as

A. Spam

B. Trash

C. Calibri

D. Courier

What is the correct answer?

4

A path by which communication is achieved between a central processor and other devices is called

A. Audit trail

B. Network

C. Bus

D. Channel

What is the correct answer?

4

An application suitable for sequential processing is

A. Processing of grades

B. Payroll processing

C. Both a and b

D. All of above

What is the correct answer?

4

A technique used by codes to convert an analog signal into a digital bit stream is known as

A. Pulse code modulation

B. Pulse stretcher

C. Query processing

D. Queue management

What is the correct answer?

4

A device that connects to a network without the use of cables is said to be-

A. Distributed

B. free

C. centralized

D. none of these

What is the correct answer?

4

The brain of any computer system is

A. Control Unit

B. Arithmetic Logic Unit

C. Central Processing Unit

D. Storage Unit

What is the correct answer?

4

Computer is free from tiresome and boardoom. We call it

A. Diligence

B. Reliability

C. Versatility

D. Accuracy

What is the correct answer?

4

In 1999, the Melissa virus was a widely publicised:

A. E-mail virus.

B. Macro virus.

C. Trojan horse.

D. Time bomb.

What is the correct answer?

4

When was Pascaline invented?

A. 1617

B. 1620

C. 1642

D. 1837

What is the correct answer?

4

A number which is stored and processed but not in the standard exponential form is called

A. Floating point number

B. Fixed point number

C. Octal number

D. Decimal number

What is the correct answer?

4

Web cam is an

A. input unit device

B. output unit device

C. processing device

D. Input and Output device

What is the correct answer?

4

The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called

A. Duping

B. Booting

C. Padding

D. CPS

What is the correct answer?

4

Current SIMMs have either or connectors (pins)

A. 9 or 32

B. 30 or 70

C. 28 or 72

D. 30 or 72

What is the correct answer?

4

Where are data and programme stored when the processor uses them?

A. Main memory

B. Secondary memory

C. Disk memory

D. Programme memory

What is the correct answer?

4

A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is

A. Memory

B. Buffer

C. Accumulator

D. Address

What is the correct answer?

4

What is a light pen?

A. Mechanical Input device

B. Optical input device

C. Electronic input device

D. Optical output device

What is the correct answer?

4

A computer consists of

A. A central processing unit

B. A memory

C. Input and output unit

D. All of the above

What is the correct answer?

4

A program that performs a useful task while simultaneously allowing destructive acts is

A. Worm.

B. Trojan horse.

C. Virus.

D. Macro virus.