Computer Knowledge Practice Question and Answer
8 5 Q:
62d90136dc73b0303f96e91c 5 Q:
62d8faf8313eb40eb880cb9f 5 Q:
62d8fa88dc73b0303f969f4a 5 Q:
62cfd59e99f92906557788b4 5 Q:
62cfd4fa31b6d20155395006 4 Q:
62ce86fe51fe3472d6b9f179 4 Q:
62c57ec931b6d2015504632e 5 Q:
5e903024f681623fa56128fa
Q: A hacker that changes or forges information in an electronic resource, is engaging in _________ .
1187 062d90136dc73b0303f96e91c
62d90136dc73b0303f96e91c- 1Cyber Crimefalse
- 2Simulationfalse
- 3Sniffingfalse
- 4data diddlingtrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "data diddling "
Q: Which among the following are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
532 062d8faf8313eb40eb880cb9f
62d8faf8313eb40eb880cb9f- 1Routerfalse
- 2Mainframesfalse
- 3Embedded computerstrue
- 4Cachefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Embedded computers"
Q: Bridge works in _________ of the OSI model.
581 062d8fa88dc73b0303f969f4a
62d8fa88dc73b0303f969f4a- 1Transport layerfalse
- 2Network layerfalse
- 3Application layerfalse
- 4Data link layertrue
- 5Work layerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Data link layer "
Q: How many bits are there in hexadecimal code:
692 062cfd59e99f92906557788b4
62cfd59e99f92906557788b4- 116true
- 20false
- 32false
- 44false
- 532false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "16"
Q: Writing set of instruction to run a software
434 062cfd4fa31b6d20155395006
62cfd4fa31b6d20155395006- 1Codingtrue
- 2Bufferingfalse
- 3Decodingfalse
- 4Amplifyingfalse
- 5Debuggingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Coding "
Q: Who Invented the computer mouse?
568 062ce86fe51fe3472d6b9f179
62ce86fe51fe3472d6b9f179- 1Douglas Engelbarttrue
- 2Federico Fagginfalse
- 3Gene Dolgofffalse
- 4Brendan Eichfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Douglas Engelbart"
Q: The process of starting a computer and loading the necessary parts of the operating system into RAM is called?
589 062c57ec931b6d2015504632e
62c57ec931b6d2015504632e- 1Sweepingfalse
- 2Bootingtrue
- 3Mappingfalse
- 4Taggingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Booting"
Q: A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damages is a _______
1267 05e903024f681623fa56128fa
5e903024f681623fa56128fa- 1Hackertrue
- 2Analystfalse
- 3Instant Messengerfalse
- 4Programmerfalse
- 5Spammerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hacker "
en100258latest