Arrange the following in ascending order of size:
A. Mini Computer
B. Notebook Computer
C. Desktop Computer
D. Tablet
Choose the correct answer from the options given below:
Which of the following is related to computer software?
Which of the following are system software?
A. Compiler
B. Word Processor
C. Interpreter
D. Linker
E. Assembler
Choose the correct answer from the options given below:
A person who uses his expertise to gain access to other people's computers to get information illegally or to cause damage, is a
Which of the following is the correct physical address of a computer?
Identify the sequence of appropriate words A-D that correctly fills the blanks in the following paragraph:
Radio ________Identification Systems use radio waves to read and capture information stored on a tag, which can be read from several metres away. The _________is made up of a(n) _______to store and process data, and a(n) ________to receive and transmit data.
A. tag
B. frequency
C. antenna
D. microchip
Choose the correct answer from the options given below:
Match the LIST-I with LIST-II
| List – I (Recognition System) | List – II (Application) | ||
| A. | MICR | I. | Reading the car number plates |
| B. | OCR | II. | Capturing product information so that it can be added to the customer’s purchase total |
| C. | OMR | III. | Reading the numbers found on a bank cheque |
| D. | Barcode Reader | IV. | Reading marks written using pencil or pen on a specially printed paper. |
Choose the correct answer from the options given below:
In ____________, each communicating device is connected with every other device in the computer network.
Which of followrng statements are correct?
A. Worm can be hardware and software.
B. Cookies are used to store browsing information.
C. Sandbox detection is malware identification method.
D. HTTP has better security than H'I'I'PS.
E. Trojan is an antivirus.
Choose the correct answer from the options given below:
Which of the following is not a web browser?
Suggested Test Series
Suggested Test Series