Exam 5: Common Computer Devices and Technologies Terminology
Exam 1: Computer Knowledge : From Babbages Computer to Modern Technology43 Questions
Exam 2: Computer Knowledge : charts, Acronyms, Commands, and More49 Questions
Exam 3: Exploring the Impact and Evolution of Technology50 Questions
Exam 4: A History of Computing Devices: From Calculators to Microcomputers25 Questions
Exam 5: Common Computer Devices and Technologies Terminology49 Questions
Exam 6: Technology in Education and Communication49 Questions
Exam 7: Technology, History, and Anthropology34 Questions
Select questions type
……………..is a malicious software program written intentionally to enter a computer without the user's permission or knowledge.
Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
C
Information and Library Network (INFLIBNET) Centre is an Autonomous Inter-University Centre (IUC) of………………, Government of India.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
A
A…………………, also known as a worksheet, contains rows and columns and is used to record and compare numerical or financial data.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
C
A computer …………………is an important device that allows a person to enter symbols like letters and numbers into a computer.
(Multiple Choice)
4.8/5
(40)
A …………..is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.
(Multiple Choice)
4.9/5
(34)
……………is a social issue referring to the differing amount of information between those who have access to the Internet (especially broadband access) and those who do not have access.
(Multiple Choice)
4.9/5
(36)
The term 'Word processing' was coined at IBM's Boeblingen, ………………………Laboratory in the 1960s.
(Multiple Choice)
4.7/5
(37)
………………..has functional similarity with both circuit switched networking and small packet switched networking.
(Multiple Choice)
4.9/5
(38)
………….. in his work "The Concept of Law" has said 'human beings are vulnerable so rule of law is required to protect them'.
(Multiple Choice)
5.0/5
(36)
The Unix to Unix Copy Protocol (UUCP) was invented in ………… at Bell Labs.
(Multiple Choice)
4.7/5
(42)
A ……………..connects computers within a single geographical location, such as one office building, office suite, or home.
(Multiple Choice)
4.8/5
(32)
………………….. are collections of computers, software, and hardware that are all connected to help their users work together.
(Multiple Choice)
4.9/5
(40)
……………is a wireless networking technology used across the globe.
(Multiple Choice)
4.8/5
(25)
…………… is a family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.
(Multiple Choice)
4.8/5
(38)
The main function of ………………….is to coordinate the user and outside devices used in computer system.
(Multiple Choice)
4.8/5
(28)
………………..of MIT first proposed a global network of computers in 1962, and moved over to the Defense Advanced Research Projects Agency (DARPA) in late 1962 to head the work to develop it.
(Multiple Choice)
4.7/5
(36)
…………….was the first national commercial online service to offer Internet access to its subscribers.
(Multiple Choice)
4.8/5
(36)
A ……………connects computers by means of cabling systems, specialized software, and devices that manage data traffic.
(Multiple Choice)
4.8/5
(47)
Roberts moved over to DARPA in 1966 and developed his plan for………………...
(Multiple Choice)
4.9/5
(39)
………….enables read-only memory (ROM) to load the disk operating system.
(Multiple Choice)
4.7/5
(27)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)