Computer Questions Practice Question and Answer
8 Q: C in MICR stands for ______.
912 164940d7913e8bde032353ef6
64940d7913e8bde032353ef6- 1Computerfalse
- 2Codefalse
- 3Colourfalse
- 4Charactertrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Character"
Explanation :
1. The full form of MICR is Magnetic Ink Character Recognition. It is a technology that reads information in checks and other financial documents.
2. Other symbols in MICR have meanings.
- M: Magnetic Ink
- I: Ink
- C: Character
- R: Recognition
Q: The base of a binary number is -
1176 363e9fba70fa4111f87da4a68
63e9fba70fa4111f87da4a68- 14false
- 22true
- 316false
- 48false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "2"
Q: Which of the following virus overtake computer system, when it boots and destroy information ? 10265 75b5cc6d4e4d2b4197774e591
5b5cc6d4e4d2b4197774e591- 1System infectorsfalse
- 2Trojanfalse
- 3Stealth virustrue
- 4Boot infectorsfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Stealth virus"
Explanation :
Answer: C) Stealth virus Explanation:
Q: Which of the following memories needs refresh ? 2535 65b5cc6c0e4d2b4197774db0a
5b5cc6c0e4d2b4197774db0a- 1DRAMtrue
- 2ROMfalse
- 3SRAMfalse
- 4All of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "DRAM"
Explanation :
Answer: A) DRAM Explanation:
Q: Which type of memory is not directly addressable by the CPU and requires special software called EMS ? 2375 25b5cc6c0e4d2b4197774dadf
5b5cc6c0e4d2b4197774dadf- 1Expandedtrue
- 2Basefalse
- 3Conventionalfalse
- 4Nonefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Expanded"
Explanation :
Answer: A) Expanded Explanation:
Q: Which Company is the biggest player in the microprocessor industry ? 3381 45b5cc6c0e4d2b4197774dada
5b5cc6c0e4d2b4197774dada- 1AMDfalse
- 2IBMfalse
- 3Motorolafalse
- 4Inteltrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Intel"
Explanation :
Answer: D) Intel Explanation:
Q: Which is NOT a good Web security strategy ? 2372 55b5cc6c1e4d2b4197774db6e
5b5cc6c1e4d2b4197774db6e- 1Remove unnecessary compilers and interpreterstrue
- 2Add demo programs, so users can test system without accessing production datafalse
- 3Limit the users who can load software, edit or add filesfalse
- 4Restrict access to the Web server keep a minimum number of ports openfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Remove unnecessary compilers and interpreters"
Explanation :
Answer: A) Remove unnecessary compilers and interpreters Explanation:
Q: V-RAM is used for access of the following ? 2212 35b5cc6c3e4d2b4197774dc5e
5b5cc6c3e4d2b4197774dc5e- 1Programsfalse
- 2Video & Graphicstrue
- 3Text & Imagesfalse
- 4Allfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Video & Graphics"
Explanation :
Answer: B) Video & Graphics Explanation: VRAM or (video RAM), reference to any type of random access memory (RAM) is a dual-ported variant of dynamic RAM (DRAM) used to store the framebuffer in graphics adapters.