Which among the following terms is used for unauthorized copying of a software to be used for personal gain instead of personal backup?
1) program thievery
2) data snatching
3) software piracy
4) program looting
Adv.
Which of the following is not an in-built software application found in MS Windows?
1) Paint
2) CD Player
3) Disk Defragmenter
4) Volume Control
What is that computer program called which translates one program instruction at a time into machine language?
1) Compiler
2) CPU
3) ROM
4) Interpreter
What is the overall term for creating, editing, formatting, storing, retrieving and printing a text document?
1) Word Processing
2) Spreadsheet design
3) Web design
4) Database management
Which of the following is the communication protocol that sets the standard used by every computer that accesses web based information?
1) XML
2) DML
3) HTTP
4) HTML
Java was introduced by among which of the following organizations?
1) Sun Microsystem
2) IBM
3) Intel
4) Microsoft
LAN can be connected by which of the following devices which operates on the data link layer?
1) Hub
2) Bridges
3) HDLC
4) Tunnel
Which of the following is the fastest media of data transfer?
1) Co-axial cable
2) Untwisted wire
3) Telephone lines
4) Fiber Optic
What is the maximum limit of free cloud storage on Google drive?
1) 2 GB
2) 10 GB
3) 15 GB
4) 20 GB
What is a firewall in computer network?
1) The physical boundary of network
2) An operating system of computer network
3) A system designed to prevent unauthorized access
4) A web browsing software
All Questions
Physics
Chemistry
Mathematics
English
Organic Chemistry
Inorganic Chemistry
Physical Chemistry
Algebra
Geometry