Home
Current Affairs January 2024

What is the correct answer?

4

Computers process data into information by working exclusively with :

A. multimedia

B. word

C. numbers

D. characters

Correct Answer :

C. numbers


Related Questions

What is the correct answer?

4

Identify the correct statement

A. IBM PCs used RISC CPU designs

B. Macintosh used CISC CPU design

C. IBM used CISC CPU design

D. None of above is true

What is the correct answer?

4

Where does most data go first with in a computer memory hierarchy?

A. RAM

B. ROM

C. BIOS

D. CACHE

What is the correct answer?

4

In a computer_____ is capable to store single binary bit.

A. Capacitor

B. Flip flop

C. Register

D. Inductor

What is the correct answer?

4

The metal disks, which are permanently housed in, sealed and contamination free containers are called

A. Hard disks

B. Floppy disk

C. Winchester disk

D. Flexible disk

What is the correct answer?

4

A computer has very low failure rate because it uses electronic components. It produces very consistent results. This is highlighted by which of the feature of computer?

A. Accuracy

B. Reliability

C. Versatility

D. Automatic

What is the correct answer?

4

Any method for controlling access to or use of memory is known

A. Memory map

B. Memory protection

C. Memory management

D. Memory instruction

What is the correct answer?

4

Which was the most popular first generation computer?

A. IBM 650

B. IBM 360

C. IBM 1130

D. IBM 2700

What is the correct answer?

4

Floppy disks typically in diameter

A. 3

B. 5.25

C. 8

D. All of above

What is the correct answer?

4

Which of the following memory medium is not used as main memory system?

A. Magnetic core

B. Semiconductor

C. Magnetic tape

D. Both semiconductor and magnetic tape

What is the correct answer?

4

RJ45 UTP cable has ________ Cables.

A. 2 pair

B. 3 pair

C. 4 pair

D. 5 pair

What is the correct answer?

4

When a logic bomb is activated by a time-related event, it is known as a:

A. Time-related bomb sequence.

B. Virus.

C. Time bom

D. Trojan horse.

What is the correct answer?

4

Who is credited with the idea of using punch cards to control patterns in a waving machine?

A. Pascal

B. Hollerith

C. Babbage

D. Jacquard

What is the correct answer?

4

A program that is employed in the development, repair or enhancement of other programs is known as

A. System software

B. Software tool

C. Applications program

D. Utility program

What is the correct answer?

4

Which of the following memories allows simultaneous read and write operations?

A. ROM

B. RAM

C. EPROM

D. None of above

What is the correct answer?

4

Which unit converts computer data into human readable form?

A. Input unit

B. Output unit

C. ALU

D. Control Unit

What is the correct answer?

4

The common name for the crime of stealing passwords is:

A. Jacking.

B. Identity theft.

C. Spoofing.

D. Hacking.

What is the correct answer?

4

Instruction in computer languages consists of

A. OPCODE

B. OPERAND

C. Both of above

D. None of above

What is the correct answer?

4

Analog computer works on the supply of

A. Continuous electrical pulses

B. Electrical pulses but not continuous

C. Magnetic strength

D. None of the above

What is the correct answer?

4

________ computer is small general purpose micro computer, but larger than portable computer

A. Hybrid

B. Digital

C. Desktop

D. Laptop

What is the correct answer?

4

WAN stands for

A. Wap Area Network

B. Wide Area Network

C. Wide Array Net

D. Wireless Area Network

What is the correct answer?

4

IBM System/360 is

A. Mainframe Computer

B. Mini Computers

C. Micro Computers

D. None of above

What is the correct answer?

4

Which of the following memories has the shortest access times?

A. Cache memory

B. Magnetic bubble memory

C. Magnetic core memory

D. RAM

What is the correct answer?

4

Which of the following storage device can store the largest amount of data?

A. Hard Disks

B. Flash Disks

C. Blu-Ray Disks

D. DVDs

What is the correct answer?

4

The two basic types of record access methods are:

A. Sequential and random

B. Sequential and indexed

C. Direct and immediate

D. Online and real time

What is the correct answer?

4

The first general purpose electronic digital computer in the world was

A. UNIVAC

B. EDVAC

C. ENIAC

D. All of above

What is the correct answer?

4

ASCII and EBCDIC are the popular character coding systems.What does EBCDIC stand for?

A. Extended Binary Coded Decimal Interchange Code

B. Extended Bit Code Decimal Interchange Code

C. Extended Bit Case Decimal Interchange Code

D. Extended Binary Case Decimal Interchange Code

What is the correct answer?

4

The least significant bit of the binary number, which is equivalent to any odd decimal number, is:

A. 0

B. 1

C. 1 or 0

D. 3

What is the correct answer?

4

The basic operations performed by a computer are

A. Arithmetic operation

B. Logical operation

C. Storage and relative

D. All the above

What is the correct answer?

4

Different components of the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?

A. Conductors

B. Buses

C. Connectors

D. Consecutives

What is the correct answer?

4

People often call as the brain of computer system

A. Control Unit

B. Arithmetic Logic Unit

C. Central Processing Unit

D. Storage Unit