Computer Questions Practice Question and Answer

Q:

C in MICR stands for ______.

879 1

  • 1
    Computer
    Correct
    Wrong
  • 2
    Code
    Correct
    Wrong
  • 3
    Colour
    Correct
    Wrong
  • 4
    Character
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Character"
Explanation :

1. The full form of MICR is Magnetic Ink Character Recognition. It is a technology that reads information in checks and other financial documents.

2. Other symbols in MICR have meanings.

- M: Magnetic Ink

- I: Ink

- C: Character

- R: Recognition

Q:

The base of a binary number is -

1144 3

  • 1
    4
    Correct
    Wrong
  • 2
    2
    Correct
    Wrong
  • 3
    16
    Correct
    Wrong
  • 4
    8
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "2"

Q: Which of the following virus overtake computer system, when it boots and destroy information  ? 10228 7

  • 1
    System infectors
    Correct
    Wrong
  • 2
    Trojan
    Correct
    Wrong
  • 3
    Stealth virus
    Correct
    Wrong
  • 4
    Boot infectors
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Stealth virus"
Explanation :

Answer: C) Stealth virus Explanation:

Q: Which of the following memories needs refresh ? 2503 6

  • 1
    DRAM
    Correct
    Wrong
  • 2
    ROM
    Correct
    Wrong
  • 3
    SRAM
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "DRAM"
Explanation :

Answer: A) DRAM Explanation:

Q: Which type of memory is not directly addressable by the CPU and requires special software called EMS ? 2343 2

  • 1
    Expanded
    Correct
    Wrong
  • 2
    Base
    Correct
    Wrong
  • 3
    Conventional
    Correct
    Wrong
  • 4
    None
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Expanded"
Explanation :

Answer: A) Expanded Explanation:

Q: Which Company is the biggest player in the microprocessor industry  ? 3345 4

  • 1
    AMD
    Correct
    Wrong
  • 2
    IBM
    Correct
    Wrong
  • 3
    Motorola
    Correct
    Wrong
  • 4
    Intel
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Intel"
Explanation :

Answer: D) Intel Explanation:

Q: Which is NOT a good Web security strategy ? 2335 5

  • 1
    Remove unnecessary compilers and interpreters
    Correct
    Wrong
  • 2
    Add demo programs, so users can test system without accessing production data
    Correct
    Wrong
  • 3
    Limit the users who can load software, edit or add files
    Correct
    Wrong
  • 4
    Restrict access to the Web server keep a minimum number of ports open
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Remove unnecessary compilers and interpreters"
Explanation :

Answer: A) Remove unnecessary compilers and interpreters Explanation:

Q: V-RAM is used for access of the following ? 2177 3

  • 1
    Programs
    Correct
    Wrong
  • 2
    Video & Graphics
    Correct
    Wrong
  • 3
    Text & Images
    Correct
    Wrong
  • 4
    All
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Video & Graphics"
Explanation :

Answer: B) Video & Graphics Explanation: VRAM or (video RAM), reference to any type of random access memory (RAM) is a dual-ported variant of dynamic RAM (DRAM) used to store the framebuffer in graphics adapters.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully