Q1.
The first program that runs on a computer when the computer boots up is?
Most Important.
-
(A)
Software Program
-
(B)
Operating System
-
(C)
Utilities
-
(D)
None of the above mentioned
Ans: (B) -
Operating System
Important Points:-
During the booting process Operating System runs on a computer.
Q2.
Who was the programmer of the MS-DOS operating system?
-
(A)
Tim Paterson
-
(B)
Andrew N.
-
(C)
Bill Gates
-
(D)
Dennis Ritchie
Ans: (A) -
Tim Paterson
Important Points:-
MS-DOS was created by Tim Paterson and introduced by Microsoft in August 1981; it was last updated in 1994 with the release of MS-DOS 6.22.
Q3.
What is the full form of RAM?
Most Important.
-
(A)
Random Access Memory
-
(B)
Read And Memory
-
(C)
Random All Memory
-
(D)
None of the above mentioned
Ans: (A) -
Random Access Memory
Important Points:-
RAM, which stands for Random Access Memory, serves the purpose of storing data that requires quick access.
Q4.
Which electronic component was used in the first generation of computers?
-
(A)
Vaccum tubes
-
(B)
Red tubes
-
(C)
Abacus
-
(D)
Transistors
Ans: (A) -
Vaccum tubes
Important Points:-
The duration of the first generation computer was from 1946-1959. Vacuum tubes were used in this generation as basic components for memory and circuitry for the CPU.
Q5.
All mathematical and logical functions in the computer are done by?
Most Important.
-
(A)
Central Processing Unit
-
(B)
Arithmetic and Logical Unit
-
(C)
Control Unit
-
(D)
Memory Unit
Ans: (B) -
Arithmetic and Logical Unit
Important Points:-
The Arithmetic and Logical Unit performs Arithmetic (addition, subtraction, multiplication, division), and logic (OR and AND) operations.
Q6.
Attempts made by individuals to obtain confidential information from you by falsifying their identity are called?
Most Important.
-
(A)
Phishing scams
-
(B)
Information stealing
-
(C)
Network congestion
-
(D)
None of the above mentioned
Ans: (A) -
Phishing scams
Important Points:-
Attempts made by individuals to obtain confidential information from you by falsifying their identity are called Phishing scams. In Phishing attacks, the sender sends fraudulent communications that appear to come from a reputable source. This practice is usually done through email.