Computer Science GK Questions for Competitive Exams
_______________ is the method involving creating written or generated codes that allow information to be kept secret.
(A) Debugging
(B) Programming
(C) Cryptography
(D) Open Sourcing
(E) Data Mining
Correct Answer : C
Verification of a login name and password is known as_____.
(A) Configuration
(B) Accessibility
(C) Authentication
(D) logging in
(E) None of these
Correct Answer : C
Verification process of confirming identity for allowing access to a computer system is called
(A) Login
(B) Signup
(C) Spooling
(D) Authentication
Correct Answer : D
Expand RDBMS.
(A) Relative Database Management System
(B) Rational Database Minimize System
(C) Relational Database Management System
(D) Relational Database Maximize System
(E) None of these
Correct Answer : C
When installing a peripheral you also usually need to install a________.
(A) server
(B) port
(C) driver
(D) password
(E) none of these
Correct Answer : C
Which part of the computer is directly invoked in executing the instructions of the computer program?
(A) main storage
(B) secondary storage
(C) printer
(D) processor
(E) scanner
Correct Answer : D
The Fifth generation computing device, based on _____.
(A) artificial intelligence
(B) very large scale integration (VLSI)
(C) both of above
(D) SQL
(E) None of these
Correct Answer : A
White Box testing, a software testing technique is sometimes called ______.
(A) Basic path
(B) Graph testing
(C) Data flow
(D) Glass box testing
(E) None of these
Correct Answer : D
What is the built-in permanent memory in a computer called?
(A) RAM
(B) ROM
(C) CPU
(D) CD-ROM
Correct Answer : B
Which of the following system components is the brain of a computer?
(A) Circuit board
(B) CPU
(C) Memory
(D) Network card
Correct Answer : B