Computer Knowledge Practice Question and Answer

Q:

A hacker that changes or forges information in an electronic resource, is engaging in _________ .

1187 0

  • 1
    Cyber Crime
    Correct
    Wrong
  • 2
    Simulation
    Correct
    Wrong
  • 3
    Sniffing
    Correct
    Wrong
  • 4
    data diddling
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "data diddling "

Q:

Which among the following are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?

532 0

  • 1
    Router
    Correct
    Wrong
  • 2
    Mainframes
    Correct
    Wrong
  • 3
    Embedded computers
    Correct
    Wrong
  • 4
    Cache
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Embedded computers"

Q:

Bridge works in _________ of the OSI model.

581 0

  • 1
    Transport layer
    Correct
    Wrong
  • 2
    Network layer
    Correct
    Wrong
  • 3
    Application layer
    Correct
    Wrong
  • 4
    Data link layer
    Correct
    Wrong
  • 5
    Work layer
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Data link layer "

Q:

How many bits are there in hexadecimal code:

692 0

  • 1
    16
    Correct
    Wrong
  • 2
    0
    Correct
    Wrong
  • 3
    2
    Correct
    Wrong
  • 4
    4
    Correct
    Wrong
  • 5
    32
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "16"

Q:

Writing set of instruction to run a software

434 0

  • 1
    Coding
    Correct
    Wrong
  • 2
    Buffering
    Correct
    Wrong
  • 3
    Decoding
    Correct
    Wrong
  • 4
    Amplifying
    Correct
    Wrong
  • 5
    Debugging
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Coding "

Q:

Who Invented the computer mouse?

568 0

  • 1
    Douglas Engelbart
    Correct
    Wrong
  • 2
    Federico Faggin
    Correct
    Wrong
  • 3
    Gene Dolgoff
    Correct
    Wrong
  • 4
    Brendan Eich
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Douglas Engelbart"

Q:

The process of starting a computer and loading the necessary parts of the operating system into RAM is called?

589 0

  • 1
    Sweeping
    Correct
    Wrong
  • 2
    Booting
    Correct
    Wrong
  • 3
    Mapping
    Correct
    Wrong
  • 4
    Tagging
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Booting"

Q:

A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damages is a _______

1267 0

  • 1
    Hacker
    Correct
    Wrong
  • 2
    Analyst
    Correct
    Wrong
  • 3
    Instant Messenger
    Correct
    Wrong
  • 4
    Programmer
    Correct
    Wrong
  • 5
    Spammer
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Hacker "

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully