1. A region of computer memory where frequently accessed data can be stored for rapid access is called: ?

Cookie

Plug-in

Token

Cache

Answer: Cache

Explanation:

A region of computer memory where frequently accessed data can be stored for rapid access is called Cache. Cache is a collection of data duplicating original values stored elsewhere or computed earlier, where the original data is expensive to fetch (owing to longer access time) or to compute, compared to the cost of reading the cache. In other words, a cache is a temporary storage area where frequently accessed data can be stored for rapid access.


2. A hard disk is an example of which type of data storage device ?

Primary Storage

Secondary Storage

Offline Storage

Tertiary Storage

Answer: Secondary Storage

Explanation:

Secondary storage devices are storage devices that operate alongside the computer’s primary storage, RAM and cache memory. Examples include external hard drives, USB flash drives and tape drives.


3. In the field of computing, what does VGA stand for ?

Visual Graphics Array

Video Graphics Array

Video Graphics Audio

Visual Graphics Audio

Answer: Video Graphics Array

Explanation:

VGA stands for Video Graphics Array. It is a high-resolution standard for displaying text, graphics and colors on computer monitors.


4. Which function key displays the Print Preview window in Microsoft Office ?

Alt+F2

Alt+Ctrl+F2

Ctrl+F2

Shift+F2

Answer: Ctrl+F2

Explanation:

Ctrl +F2 displays the Print Preview window in Microsoft Office.


5. Which of the following converts analogue information into digital form ?

Optical Mark Reading

Barcode reader

Digitizer

Gamepad

Answer: Digitizer

Explanation:

A digitizer is a machine that converts an analog object, image or signal into a digital (computerreadable) format.


6. In the context of computers, WORM is an acronym of: ?

Write Once, Read Many

Wireless Operating, Read Module

Word Optical, Recognition Malware

Word On, RAM Memory

Answer: Write Once, Read Many

Explanation:

WORM is an acronym for “Write Once, Read Many”. It is an optical storage technology that allows a disc to be written only once but read an unlimited number of times.


7. 1 Petabyte (PB) = 1024 ______ ?

Zettabytes

Exabytes

Terabytes

Gigabytes

Answer: Terabytes

Explanation:

1 Petabyte (PB) = 1024 Terabytes (TB)


8. In which of the following countries was the first Electronic Numerical Integrator and Computer, the first programmable general purpose electronic digital computer, developed ?

United Kingdom

China

Japan

United States of America

Answer: United States of America

Explanation:

ENIAC was developed in the USA. It was invented at the University of Pennsylvania to calculate artillery firing tables for the United States Army’s Ballistic Research Laboratory.


9. In the world of Computers, what is ‘Ubuntu’ ?

A firewell developed by Microsoft

Open Source Linux Operating System

An ERP system from SAP

Latest financial software package by Infosys

Answer: Open Source Linux Operating System.

Explanation:

Ubuntu is an open-source operating system (OS) based on the Debian GNU/Linux distribution. ... Ubuntu is primarily designed to be used on personal computers, although a server edition does also exist. Ubuntu is an African word that literally means "humanity to others."


10. Which of the following options correctly defines a firewall (in the context of computing) ?

It is the name of a software.

It is a hardware device.

It is a combination of both, software and hardware devices to permit or deny network transmission based on a set of rules

It is a combination of software and hardware-based devices to permit any and every network transmission.

Answer: It is a combination of both, software and hardware devices to permit or deny network transmission based on a set of rules

Explanation:

It is a combination of both software and hardware devices to permit or deny network transmission based on a set of rules. Explanation: A firewall is a security device - computer hardware or software that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.